August 23-25, 2023
MAISON GLAD, Jeju Island, Korea


Poster Session 1 : 15:00 - 16:30, August 24 (Thursday), 2023


A Survey on Attack Cases with Living-Off-The-Land Techniques in Windows and Linux

Gyuhyun Jeon, Seungho Jeon and Jung Taek Seo

Data Calibration to Enhance Security and Accuracy of Federated Learning

Na-Eun Park, So-Yeon Kim, Yuran Jeon, Seoyi Kim and Il-Gu Lee

Anomaly Detection using LSTM-Based Autoencoder with Time Series Dataset over a network

Hyewon Suk and Minsuk Kim

V2V-MHT:Accelerated V2V Authentication Framework using Merkle Hash Tree

YoonSun Han, YoungBeom Kim and Seog Chung Seo

Vehicle CAN Network Imbalance Intrusion Detection and Explanation Based on XGBoost and SHAP

Thi-Thu-Huong Le, Naufal Suryanto, Aji Teguh Prihatno, Yustus Eko Oktian, Hyoeun Kang and Howon Kim

Enhancing Cyber Strategies through Reinforcement Learning: A CyberBattleSim(CBS)

Bumsok Kim, Minsuk Kim, Junghyun Kim, Yonghoon Choi and Seungseo Roh

A Model for Collecting and Analyzing Network Logs DataSets

Jaehan Jeong and Go Woong

Decision Tree Based Poising Backdoor Attacks and Mutation model SPRT detection defense in NSL-KDD Dataset

Jinhyeok Jang, Yoonsoo An, Dowan Kim and Daeseon Choi

A Method of GML-based Software Structuring for Verification of Open-source Software License Compatibility

Won-Bin Kim, Yongjoon Joe, Kyung-Yeob Park and Dong-Myung Shin

Designing a Deceptive Honeypot Architecture for Industrial Control Systems

Dong-Hyuk Shin, Jong-Bum Lee and Ieck-Chae Euom

Suboptimal Feature Selection Technique for Efficient Machine Learning-based Malicious Traffic Detection

So-Eun Jeon, Ye-Sol Oh, Ye-Seul Kil, Yeon-Ji Lee and Il-Gu Lee

Identity Concealing Steganography-based Data Sharing Mechanism

Jinsu Kim and Namje Park

Poster: SGX-Enabled Edge Cloud Architecture for Secure Data Augmentation

Jiwon Ock and Seongmin Kim

Solid Pod-based medical data sharing system to ensure data sovereignty

Sohui Kim, Minjeong Kim and Ilgu Lee

A Study on Establishing a Secure Remote Work Environment in a VDI Environment Based on Zero Trust

Chang Hoon Kim, Howon Kim, Sokjoon Lee, Young Rang Kim and Jungsoo Park

Analyzing Risk Attitudes in DeFi Crypto Credit Lending through On-chain Data

Simon Oh, Yeongjae Shin, Uk Jo, Hyoeun Kang, Kyeongwoo Oh, Jaehyun Kim, Bogeum Kim, Hyejin Sim, Changwoo Choi and Howon Kim

Parameter Optimization Techniques for Privacy and Utility Trade-off of Differential Privacy

Jung-Hwa Ryu, Sun-Jin Lee, Hye-Yeon Shim and Il-Gu Lee

A Study on Digital Human Ownership Management Techniques in Metaverse Based on NFT

Changhyun Roh, Changjun Choi, HyunSoo Kim and DongMyung Shin

Exploring Hybrid Quantum-Classical Approaches for Information Security

Dedy Septono Catur Putranto, Rini Wisnu Wardhani and Howon Kim

Analysis of international trends for the introduction of Zero Trust

Jeong Hyeop Hong, Sun Woo Kim, Ui Hyun Park and Kyung-ho Son

TrustVoice: Detecting Voice Phishing Apps Using Their Runtime Behaviors

Chanjong Lee and Hyoungshick Kim

The RSA Algorithm’s Quantum Cryptanalysis Posture

Rini Wisnu Wardhani, Dedy Septono Catur Putranto and Howon Kim

Blockchain-based Zero Trust System for Medical Data Exchange

Yohan Kim, Hanho Jeong, Jaehan Cho, Donggyu Kim, SangBong Oh and Howon Kim

Metaverse Copyright Ownership Verification using Redundant Verification for Virtual Performance

Won-Bin Kim, Changhyun Roh, Yongjoon Joe and Dong-Myung Shin


Poster Session 2 : 16:30 - 18:00, August 24 (Thursday), 2023


Physical Layer Security Mechanism for Secure Trigger- based Uplink Multi-user Transmission

So-Hyun Park and Il-Gu Lee

Efficient Implementation of Kyber on MSP430 Environment

DongHyun Shin, YoungBeom Kim and Seog Chung Seo

Optimization Study of Parallel Implementation for Scrypt: A Memory Hard Function

Seongjun Choi, Dongcheon Kim and Seog Chung Seo

High-Performance Kyber implementation on ARMv7 Neon Technology

YoungBeom Kim, Jeonghwan Shin, Hojoong Park and Seog Chung Seo

Defense Against Adversarial Evasion Attacks on Self-Driving Car Using Image Quantization

Seungyeol Lee, Hyeonro Lee and Jaecheol Ha

Face Verifiable Anonymization in Video Surveillance

Sungjune Park, Hyunsik Na, Seungmin Kim and Daeseon Choi

A Multi-step Framework for Botnet Attack Detection in IoT Environment

Hojun Jin, Seungho Jeon and Jung Taek Seo

Implementation of Montgomery Reduction and Butterflies for CRYSTALS-Dilithium on RISC-V

Yongryeol Choi, YoungBeom Kim and Seog Chung Seo

The Sky's Betrayal: Drone Hijacking on DJI Enhanced WiFi Protocol

Derry Pratama, Jaegeun Moon, Agus Mahardika Ari Laksmono, Dongwook Yun, Byeonguk Jeong, Iqbal Muhammad, Jang Hyun Ji and Howon Kim

Efficient implementation of multiplication reduction over NIST prime P-384 for 8‑bit AVR Processor

Mingi Kim, YoungBeom Kim and Seog Chung Seo

A Study on Tor Traffic Identification Technology for Blocking Dark Web Access in a LAN Environment

Hongbi Kim, Daeil Jang and Seunggoo Ji

Contact PUF: Highly Stable Physical Unclonable Functions Based on Contact Failure Probability in 180 nm, 130 nm, and 28 nm CMOS Processes

Duhyun Jeon, Dongmin Lee and Byong-Deok Choi

An Implementation of Lightweight RISC-V Trusted Execution Environment with Memory Encryption and Task Isolation

Woojung Park, Janghyun Ji and Jaegeun Moon

Analysis of current status for secure IoT-based payment

Hyeon No, Heekyung Shin, Jiwon Ock, Yeeun Kim and Seongmin Kim

Tri-band-based Wi-Fi Indoor Localization to Defend against Jamming Attacks

Jin-Min Lee, Na-Yeon Shin, Jung-Hyun Moon and Il-Gu Lee

On Secrecy of RSMA-enabled UAV Downlink Communications: Problem and Research Trends

Tri-Hai Nguyen, Heejae Park and Laihyuk Park

Accelerating Key Derivation Function on GPU Architectures

Dong-Cheon Kim and Seog Chung Seo

Enhancing Robustness of Self-Driving Car Regression Models through Feature Squeezing

Hyeonro Lee, Seungyeol Lee, Seongwoo Hong and Jaecheol Ha

Privacy-Preserving DTx Data with Differential Privacy

Gee-Hee Yun and Kyoung-Jin Kim

Side channel attack resistant Binarized Neural Network Accelerator

Junho Lee, Haeyoung Kim, Dongwook Yun and Howon Kim

Tabling GHASH in LEA-GCM on GPU and optimization

Jaeseok Lee, Dongcheon Kim and Seog Chung Seo

Research on Identification of Cyber Attacker Groups and Interpretation of Results

Sungtaek Oh and Woong Go

Evaluation Criteria for Cyberattack Scenarios Used in Training Exercises

Insung Song, Seungho Jeon and Jung Taek Seo

Malextension: Malicious Extension to Hack your Browser

Jiwon Jang, Ye-Sol Oh, Hyunwoo Choi and Il-Gu Lee