August 21-23, 2024
MAISON GLAD, Jeju Island, Korea

POSTER PROGRAM



Poster Session 1: 15:00 - 16:00, August 22 (Thursday), 2024

Session Chair: Jungsoo Park (Kangnam University)


Proposal of distributed network data management mechanism based on keyword extraction from text content

Jinsu Kim, Keunbae Choi, and Namje Park (Jeju National University)


Poster: Blockchain-Based ESG Reporting and Refurbishment Certification in the Cosmetics Industry

Cho Nwe Zin Latt, Muhammad Firdaus and Kyung-Hyune Rhee (Pukyong National University)


Random Public Codebook-Based Double XOR Cipher

Seung-Ha Ji, So-Eun Jeon and Il-Gu Lee (Sungshin Women’s University)


Error Correction Code-Based Two-Layer Digital Watermarking Technique

Do-Eun Kim, So-Hyun Park and Il-Gu Lee (Sungshin Women’s University)


A Study on Enhancing Reauthentication Methods Among Workloads in a ZTA Environment

Wonhwi Choi and Jungsoo Park (Kangnam University)


Exploring Hybrid Approach-Steganalysis in Digital Forensics Applications

Rini Wisnu Wardhani, Dedy Septono Catur Putranto, Thi-Thu-Huong Le, Agus Mahardika Ari Laksmono, Hwang Yeonjeong and Howon Kim (Pusan National University)


Ultra-high Reliable Multi-AP Cooperation Using Securely Compressed Channel-status Information

So-Eun Jeon and Il-Gu Lee (Sungshin Women’s University)


Adversarial Attacks on Behavior Decisions and Countermeasures Using Dropout-Based Fake Node

Seungyeol Lee, Youngju Lee and Jaecheol Ha (Hoseo University)


Blockchain-based secure vehicle data trading model for vehicle accident reconstruction

Su Jin Shin, Youngho Park and Sang Uk Shin (Pukyong National University)


Secure and Low Latency Transmission Technique for Next Generation Wireless LANs

Sun-Jin Lee and Il-Gu Lee (Sungshin Women’s University)


Data Preprocessing Technique for Privacy-Preserving Machine Learning

Ye-Rim Jeong, So-Yeon Kim and Il-Gu Lee (Sungshin Women’s University)


Mission-centric Cyber Resilience Assessment using Transformer Models in Tactical Modeling and Simulation

Seungwoon Lee, Haerin Kim and Jaesik Kang (LIG Nex1)


Enhancing Cyber Warfare Training: A Cost-Effective Approach to Multi-Host Network Simulations with Container-Based Cyber Range

Haerin Kim and Seungwoon Lee (LIG Nex1)


Defense Mechanism Using Purifier and Detector Against Adversarial Patch Attacks for Unmanned Combat Systems

Dong-U Kang (Korea University), Jaesik Kang and Seungwoon Lee (LIG Nex1)


Poster: A Robust Counting Sketch for Data Plane Intrusion Detection

Sian Kim and DaeHun Nyang (Ewha Womans University)


Multi-Link Operation-Based Group Selection Technique for Enhancing Privacy and Efficiency in Federated Learning

So-Yeon Kim, Na-Eun Park, Yu-Ran Jeon and Il-Gu Lee (Sungshin Women’s University)


COLA Sketch: Enhancing Intrusion Detection with Collision-Aware Noise Reduction

JiYeon Kim, Sian Kim and DaeHun Nyang (Ewha Womans University)


Clock Glitch-based Fault Injection Attack on Deep Neural Network

Hyoju Kang, Seongwoo Hong and Jaecheol Ha (Hoseo University)


Modular Design Approach in API Security

I Wayan Adi Juliawan Pawana, Youngjae Kim, Bonam Kim and Ilsun You (Kookmin University)


Poster: Impact Assessment of Cooperative Driving Performance because of I/O Latency

Juon Kim(Korea University), Sanghwa Jin, Jongin Lee (Samsung Electronics) and Wonsuk Choi (Korea University)


Proposal of eqSIM Security Toolkit for Private 5G Device Authentication

Hyejin Yoon, Yoonjin Jang, Seunghwan Yun and Okyeon Yi (Kookmin University)



Poster Session 2: 16:00 - 17:00, August 22 (Thursday), 2024

Session Chair: Dong-Chan Kim (Kookmin University)


Proposal of a client consensus mechanism in a blockchain proof environment based on token distribution

Jinsu Kim, Keunbae Choi and Namje Park (Jeju National University)


Better RDP-GAN with A Noisy Generator

JungHye Choi and DaeHun Nyang (Ewha Womans University)


Study on the possibility of hash collisions of OTP values

Tae-Gyeong NA, Hansaem Wi and Okyeon Yi (Kookmin University)


Template-free Jailbreak Red-Teaming for LLM: A Effort-Effective Approach

Donghyun Kim, Mingyu Lee, Yijun Jin, Sang Seo, Hyunpyo Choi and Juhyun Jang (NSHC Inc.)


Empirical Analysis of Cryptocurrency Payment Tracking through Money Laundering Brokers: Case Study of an Unexplored Scam

Mijin Shin, Minjung Yoo, Eunbeen Lee, Yiseul Choi, Yunyoung Jung and Seongmin Kim (Sungshin Women's University)


Proposal for a Small Quantum Encryptor for Application Data Security

Hyeongyeop Kim, Seowoo Jung, Changuk Jang and Okyeon Yi (Kookmin University)


A Study on the Processing of Contraband Evidence; Focused on Child Sexual Abuse Material

Ye-eun Jeon, Yeram Lim and Seongmin Kim (Sungshin Women's University)


Generative AI and Child Sexual Abuse Material: Enhancing Legal Frameworks through Child Recognition Model

Yeram Lim, Ye-eun Jeon and Seongmin Kim (Sungshin Women's University)


COPY&RETURN: Nullifying Suspicious Cryptographic Operations for Behavioral Analysis of Ransomware

Yohan Lee, Jiseok Bang and Seungkwang Lee (Dankook University)


Interoperable Alternative to Canary-based Protection of Stack Smashing

Kangmin Kim (Dankook University), Jeong-Nyeo Kim (ETRI) and Seungkwang Lee (Dankook University)


Early Detection of Vulnerabilities in Static Analysis with Terraform and Kubernetes: Methods and Strategies

Hyeyeon Hyeon, Gahyun Kim, Mijin Kim, Yerin Chun and Seongmin Kim (Sungshin Women’s University)


Exploiting Standalone Access Vulnerabilities in Envoy Proxy for Restart Attacks

Jiwon Yoo, Seo-yeon Kang and Seongmin Kim (Sungshin Women’s University)


Interference Avoidance and Mitigation Technique Utilizing Cooperative Characterization of Interferers in Dense Wireless Networks

Jin-Min Lee, Hye-Yeon Shim and Il-Gu Lee (Sungshin Women’s University)


An Effective Labeling Model for Minimal Labeled Encrypted Network Traffic Data

Daeho Choi, Minjeong Cho and Kiwook Shon (Seoul National University of Science and Technology)


5G Private Networks: A Survey on Architecture, Threats, Security Requirements, and Research Challenges

Changhyeon Woo, Jieon Oh, Yongho Ko and Ilsun You (Kookmin University)


Reliable Practical Byzantine Fault Tolerance Mechanism for High Throughput and Low Latency Blockchain Consensus

Namryeong Kim and Il-Gu Lee (Sungshin Women's University)


Cryptojacking Container Detection Based on Network Flow Analysis in Kubernetes

Sumin Kim, Soomin Lee, Jeongeun Ryu, Ri-Yeong Kim and Seongmin Kim (Sungshin Women's University)


Autoencoder-Based Face De-identification and Swapping for Enhanced Privacy Protection

So Yeon Kim, Seong Hyun Min, Ma li Jo and Won Gyum Kim (AIDEEP Inc.)


One-Pixel Attack Mitigation Technique

Yeon-Ji Lee and Il-Gu Lee (Sungshin Women’s University)


Enhancing Alarm Systems Utilizing In-Network Computing for Mitigating Tampered Alarms

Junghyun Moon, Eunji Chang and Kookheui Kwon (KINAC)



Poster Session 3: 17:00 - 18:00, August 22 (Thursday), 2024

Session Chair: Il-Gu Lee (Sungsin Women's University)


Multi-Channel-Based Physical Layer Security for Dynamic Key Update

Chae-Yeon Park, Sun-Jin Lee and Il-Gu Lee (Sungshin Women's University)


The Paradox of Security Controls: Do Stricter Organizational Measures Improve Security Levels?

Jungjoo Oh and Il-Gu Lee (Sungshin Women's University)


Optimized Implementation of SABER on resource-constrained 16-bit MSP430 MCU

MinGi Kim, DongHyun Shin, YoungBeom Kim and Seog Chung Seo (Kookmin University)


TrustMark, can I trust you?

Su-Kyoung Kim, Yu-Ran Jeon, Jung-Hwa Ryu and Il-Gu Lee (Sungshin Women’s University)


Partial Homomorphic Encryption for Privacy-Preserving Data Learning

Hye-Yeon Shim, Yu-Ran Jeon and Il-Gu Lee (Sungshin Women’s University)


ML-DSA Implicit certificates: PQC Migration for IEEE 1609.2 Standard

YoonSun Han(Kookmin University), Dongmin Kim (Samsung Electronics) and Seog Chung Seo (Kookmin University)


Efficient Implementation of Falcon on Cortex-M4

Junhyeok Choi, Seung-Ju Wi and Seog Chung Seo (Kookmin University)


Repeated Embedding Techniques of Duplicated Least Significant Bits for Secure Digital Watermarks

Chae-Won Song, So-Hyun Park and Il-Gu Lee (Sungshin Women's University)


Practical Zero Trust Implementation for Low Latency and High Reliability Networks

Seo-Yi Kim and Il-Gu Lee (Sungshin Women's University)


A Study on the Strengthening of the Research Security System: Focusing on the Comparative Analysis of Laws and Systems in Major Countries

Hyun-Che Song, Hye-In Lee and Il-Gu Lee (Sungshin Women's University)


Forensic Analysis of Trust Wallet Artifacts in Browser Extension Environment

JiWon Bae and Kiwook Sohn (Seoul National University of Science and Technology)


Optimizing HQC on Cortex-M4

DongCheon Kim and Seog Chung Seo (Kookmin University)


A Study of V2V Certificate Management for PQC Migration

Jung-Hun Kang, Soojin Lee and Seung-Hyun Seo (Hanyang University)


Security Evaluation on the KpqC Round 2 Lattice-based Candidates

Sumin Park, Eunmin Lee, Hyun-A Noh, Hyojung Yoon and Joohee Lee (Sungshin Women's University)


Comparison of Voice Feature Extraction Techniques for Deepfake Detection

Seong-Bean Park, Jeong-Hyun Sim and Hyun-Min Song (Dankook University)


The architectural difference of Consumer, IoT and M2M eSIM RSP security

Hoseok Kwon, Taeho Won, Bonam Kim and Ilsun You (Kookmin University)


Analysis of Security Threats and Countermeasures of Artificial Intelligence-Based Digital Education

Hye-In Lee, Hyun-Che Song and Il-Gu Lee (Sungshin Women's University)


Hardware-based NTT accelerator design for ML-DSA

Byeonguk Jeong, Eunse Kang and Howon Kim (Pusan National University)


Efficient Fuzzing Technique for Lightweight Firmware-Over-The-Air

Na-Hyun Kim, Jin-Min Lee and Il-Gu Lee (Sungshin Women's University)


Enhancing Operational Technology Cybersecurity using Security Levels, Differential Privacy, and Post-Quantum Cryptography

Junghyun Moon, Eunji Chang and Kookheui Kwon (KINAC)


Evaluation and Analysis of Adversarial Attacks to Digital Watermarks

A-Young Jeon, Yeon-Ji Lee and Il-Gu Lee (Sungshin Women’s University)