[Poster] Privacy-Preserving Network Monitoring for Blockchain
Mintae Kim, Hocheol Nam, Hobin Kim, Wonhoi Kim, Jaehyun Ha and Min Suk Kang.
[Poster] A Qualitative Comparison of Rust-Based SGX Frameworks
Heekyung Shin, Jiwon Ock, Hyeon No, Jiwoo Kang and Seongmin Kim.
[Poster] SEEM: A Method for Training Sequentially Enhanced Ensemble Models for Intrusion Detection
Yuna Han and Hangbae Chang.
[Poster] Decentralized fair data trading with random arbitrator node
Mi Hyeon Jeon and Sang Uk Shin.
[Poster] Analysis of Security Cost for Adapting Industrial Technology Leakage Prevention Solutions
Yeseul Kil, Eunyoung Lee and Ilgu Lee.
[Poster] MUD for Infusion Pumps: An Attempt to Reduce Network-based Attacks
Daniel Gerbi Duguma, Gunwoo Kim, Bonam Kim and Ilsun You.
[Poster] Revision of the National Advanced Strategic Industries Law through Isomorphism Theory
Jeon Gahye, Shin Nayeon, Kim Minjeong and Lee Ilgu.
[Poster] A Study on Detecting Peel Chain Transactions Based on Heuristic
Keun-Woo Bae, Yong-hee Shin, Dae-il Jang and Seung-goo Ji.
[Poster] Attention Based Embedding Neural Network for Reverse Engineering
Sami Ullah, Wenhui Jin, Ye Eun Kim, Yuguang Jin and Heekuck Oh.
[Poster] Cryptocurrency Investigation Design for Tracking Industrial Leakage by Ransomware on Darknet
Youngjae Kong and Hangbae Chang.
[Poster] Adaptive Cryptography for Lightweight and Low-cost IoT Devices
Yu-ran Jeon, Jung-Hwa Ryu, Jung-Hyun Moon, Ye-Sol Oh and Il-Gu Lee.
[Poster] RF Fingerprinting Method for Passive Key Entry System Authentication using MFCC features
Hyeon Park, Soohyun Kim, Jaeyong Lee, Kyungho Park and Taeguen Kim.
[Poster] Efficient parallel implementation methods of LSH-512 utilizing SIMD AVX-512
HoJin Choi and Seogchung Seo.
[Poster] Network Traffic Aware Memory Attestation for Low Power Internet of Things
Na-Eun Park, Tae-Rim Park, Hye-Yeon Shim, Yeon-Ji Lee and Il-Gu Lee.
[Poster] Whitelist Security Application and Analysis in Healthcare Systems
Binna Kim and Sangji Park.
[Poster] On the Claims of Weak Block Synchronization in Bitcoin
Seungjin Baek, Hocheol Nam, Yongwoo Oh, Muoi Tran and Min Suk Kang.
[Poster] Exploring FaaS platforms' charging method from the perspective of Kubernetes HPA to avoid burst attacks
Sara Hong, Yeeun Kim and Seongmin Kim.
[Poster] Design of KEM-DEM on 6G Telecommunication for Quantum Computer
Seyoon Lee, Taewan Kim, Changuk Jang and Okyeon Yi.
[Poster] Metamorphic Testing on NIST LWC Finalists
Yongryeol Choi, Young Beom Kim and Seog Chung Seo.
[Poster] Decentralized SSO Authentication System with Identity Provider
Etienne Igugu Tshisekedi, Cho Nwe Zin Latt, Mariz Aguilar and Kyung-Hyune Rhee.
[Poster] Performance evaluation of SMC in Fully Decentralized Network
Soyoung Joo and Il-Gu Lee.
[Poster] An Analysis on the Feasibility of Cost-Effective Sandbox Using Open Source Intrusion Detection System
So-Yeon Kim, Jin-Min Lee, So-Hui Kim and Il-Gu Lee.
[Poster] Deep learning-based Profiled Side-Channel Analysis Using Unsupervised Domain Adaptation on Different-Device
Jieun Woo and Dong-Guk Han.
[Poster] Differential Fault Attack on AES using Three-byte Fault Ciphertext
Jae-Won Huh and Dong-Guk Han.
[Poster] Transformer-based network Intrusion Detection
[Poster] A Study on the Improvement of OCR Performance for the Detection of Personal Information in Images
Chanyoung Kwon, Yeongdon Kim and Binna Kim.
[Poster] BPFenforcer: An eBPF based Security Policy Enforcement System for Containerized Environment
Songi Gwak, Thien-Phuc Doan and Souhwan Jung.
[Poster] Study of Intelligent Cyber Range Simulation using Reinforcement Learning
Junghyun Kim, Bumsok Kim and Min-Suk Kim.
[Poster] Study of Technology for Anomaly Detection in Secure Edge System via Video Surveillance
Jae-Hyeok Jeong and Min-Suk Kim.
[Poster] Performance evaluation of open source-based intrusion detection for advanced cyberattacks jointly utilizing ransomware and trojans
Yurim Lee, Soeun Jeon, Sunjin Lee and Ilgu Lee.
[Poster] A Study on TTP analysis method of similar attack groups using MITRE ATT&CK framework
Chan-Woong Hwang and Woong Go.
[Poster] MFT : Metamorphic Fuzz Testing for Efficient Correctness Validation of Cryptographic Implementations
HyungJoon Yoon, YoungBeom Kim, Yongryeol Choi and Seog Chung Seo.
[Poster] Efficient Remote Identification for Drone Swarms
Jun-Woo Kwon, Kang-Moon Seo, Soojin Lee, Jane Kim and Seung-Hyun Seo.
[Poster] Automotive Cyber Security for Data Storage of Autonomous Vehicles
Insup Kim, Ganggyu Lee and Wonsuk Choi.
[Poster] On Privacy Risks of Watching YouTube over Cellular Networks with Carrier Aggregation
Nitya Lakshmanan, Abdelhak Bentaleb, Byoungjun Choi, Roger Zimmermann, Jun Han and Min Suk Kang.
[Poster] A Blockchain-based Dataset Distribution Protocol for a Trustworthy AI Collaboration Framework
Siwan Noh, Sung-Won Kang, Zhuohao Qian and Kyung-Hyune Rhee.
[Poster] Exploratory research on digital forensic laboratory tools and equipment: Focused on focus group interviews
Su-Min Shin, Hyeon-Min Park and Gi-Bum Kim.
[Poster] Deep learning based Scheme for Developing Secure Systems in CCTV using Anomaly detection
Hyewon Suk, Junwon Jang and Minsuk Kim.
[Poster] Consistent Management Method on Shared Object Manipulation in Mixed Reality
Jun Lee and Hyun Kwon.
[Poster] XR-based Spatial Multi-Presence System for Remote Collaboration
Jun Lee and Hyun Kwon.