August 21-23, 2024
MAISON GLAD, Jeju Island, Korea

Main Program



Main Venue: Crystal Hall, Jade Hall (2F)

Day 1: August 21 (Wednesday), 2024

Time

Crystal Hall

13:00 - 13:20

Registration in front of Crystal Hall

13:20 - 13:30

Opening Remarks

13:30 - 14:10

Keynote 1: Proactive Cybersecurity Measures and Response through Passive Monitoring Technology
Koji Nakao (National Institute of Information and Communications Technology (NICT), Japan)

Session Chair: Jong-Hyouk Lee (Sejong University)

14:10 - 14:30

Coffee Break

14:30 - 15:30

Session 1: Cryptography

Session Chair: Keita Emura (Kanazawa University)

15:30 - 15:50

Coffee Break

15:50 - 16:50

Session 2: Network Security

Session Chair: Sokjoon Lee (Gachon University)

 

 

Day 2: August 22 (Thursday), 2024

Time

Crystal Hall

Jade Hall

09:30 - 10:30

Session 3: AI Security

Session Chair: Taekyoung Kwon (Yonsei University)

Session 4: Network & Application Security

Session Chair: Hwajeong Seo (Hansung University)

10:30 - 10:50

Coffee Break

10:50 - 11:30

Keynote 2: Information Security and Standards: Common Goals and Synergies
Sal FRANCOMACARO (National Institute of Standards and Technology (NIST), USA)

Session Chair: Jong-Hyouk Lee (Sejong University)

11:30 - 11:50

Coffee Break

11:50 - 12:30

Invited Talk: Advanced Cryptography Based on PQC for Future Communication Services
Junji Shikata (Yokohama National University, Japan)

Session Chair: Sokjoon Lee (Gachon University, Korea)

12:30 - 14:00

Lunch

14:00 - 15:00

Session 5: AI Security

Session Chair: DaeHun Nyang (Ewha Womans University)

Session 6: CPS Security

Session Chair: Heejun Roh (Inha University)

15:00 - 16:00

KIISC Board Meeting

Poster Session 1 in front of Jade Hall

Session Chair: Jungsoo Park (Kangnam University)

16:00 - 17:00

Poster Session 2 in front of Jade Hall

Session Chair: Dong-Chan Kim (Kookmin University)

17:00 - 18:00

Poster Session 3 in front of Jade Hall

Session Chair: Il-Gu Lee (Sungshin Women's University)

18:00 - 18:30

Break Time

18:30 - End

Banquet (Convention Hall, 1F)

 

 

Day 3: August 23 (Friday), 2024

Time

Crystal Hall

Jade Hall

09:30 - 10:30

Session 7: Fuzzing
Session Chair: Chae-Tae Im (KISA)

Session 8: Malware
Session Chair: Deok Gyu Lee (Seowon University)

10:30 - 10:50

Coffee Break

10:50 - 11:50

Session 9: Software Security

Session Chair: Jungtae Kim (ETRI)

Session 10: Emerging Topic
Session Chair: Youngsoo Kim (ETRI)

11:50 - 13:00

Lunch

 

Paper Sessions

Day 1: August 21 (Wednesday), 2024
 

Session 1: Cryptography

Session Chair: Keita Emura (Kanazawa University)

ECPM Cryptanalysis Resource Estimation

Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Jaehan Cho and Howon Kim (Pusan National University)

Integral Attack with Bit-based Division Property on the Lightweight Block Cipher LBC

Naoki Shibayama and Yasutaka Igarashi (Tokyo University of Science)

 

Session 2: Network Security

Session Chair: Sokjoon Lee (Gachon University)

ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach

Jihye Kim, Jaehyoung Park and Jong-Hyouk Lee (Sejong University)

Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints

Mariama Mbow (Kyushu University), Rodrigo Román (University of Malaga), Ayan Seal (PDPM Indian Institute of Information Technology, Design and Manufacturing), Kevin I-Kai Wang (The University of Auckland), Sraban Kumar Mohanty (PDPM Indian Institute of Information Technology, Design and Manufacturing) and Kouichi Sakurai (Kyushu University)

Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training

Jung Yup Rhee, Leo Hyun Park and Taekyoung Kwon (Yonsei University)

 

Day 2: August 22 (Thursday), 2024
 

Session 3: AI Security

Session Chair: Taekyoung Kwon (Yonsei University)

VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators

Gyeongsup Lim, Wonjun Oh and Junbeom Hur (Korea University)

Unsupervised Contextual Anomalous Communication Detection Using VQ Tokenization with Flow Data

Norihiro Okui (KDDI Research Inc.), Shotaro Fukushima (ARISE analytics inc.), Ayumu Kubota (KDDI Research Inc.) and Takuya Yoshida (Toyota Motor Corporation)

Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking

Mai Bui, Thien-Phuc Doan, Kihun Hong and Souhwan Jung (Soongsil University)
 

Session 4: Network & Application Security

Session Chair: Hwajeong Seo (Hansung University)

Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing

Jaehyoung Park, Jihye Kim and Jong-Hyouk Lee (Sejong University)

Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Emperical Analysis

Ahod Alghuried and David Mohaisen (University of Central Florida)

LLM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture

Bogeum Kim, Hyejin Sim, Jiwon Yun, Jaehan Cho and Howon Kim (Pusan National University)

Session 5: AI Security

Session Chair: DaeHun Nyang (Ewha Womans University)

ChatDEOB: An Effective Deobfuscation Method based on Large Language Model

Byunggeon Choi, Hongjoo Jin, Dong Hoon Lee and Wonsuk Choi (Korea University)

An effective ensemble algorithm for short-term load forecasting

En-Wei Zhang, Luo-Fan Wu and Chun-Wei Tsai (National Sun Yat-sen University)
 

Session 6: CPS Security

Session Chair: Heejun Roh (Inha University)

PUF-Based Authentication and Authorization Protocol for IoT

Yu-Tse Shih (National Sun Yat-sen University), Shih-Ming Huang (Industrial Technology Research Institute) and Chun-I Fan (National Sun Yat-sen University)

Field Testing and Detection of Camera Interference for Autonomous Driving

Ki Beom Park and Huy Kang Kim (Korea University)

One-class Classification-based Position Falsification Detection System in C-ITS Communication Network

Ilhwan Ji, ChangJin Choi (Gachon University), Cheolho Lee (ENKI WhiteHat), Seungho Jeon and Jung Taek Seo (Gachon University)

 

Day 3: August 23 (Friday), 2024
 

Session 7: Fuzzing

Session Chair: Chae-Tae Im (KISA)

Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection

Manu Jo Varghese, Frank Jiang (Deakin University), Abdur Rakib (Coventry University), Robin Doss and Adnan Anwar (Deakin University)

Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information leakage attack in air-gapped networks

Yeon-Jin Kim, Na-Eun Park and Il-Gu Lee (Sungshin Women's University)

Fuzzing JavaScript Engines with Diversified Mutation Strategies

Cheng-Han Shie, Pin-Huang Fang and Chun-I Fan (National Sun Yat-sen University)
 

Session 8: Malware

Session Chair: Deok Gyu Lee (Seowon University)

Detecting Phishing-targeted Web Push Notifications through Image Similarity Analysis

Rion Matsuzaki and Masaya Sato (Okayama Prefectural University)

Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective

Ayodeji Adeniran, Kieran Human and David Mohaisen (University of Central Florida)

A Survey on Attack Cases with VBS Malware in Windows

GyuHyun Jeon, Seungho Jeon and Jung Taek Seo (Gachon University)

Session 9: Software Security

Session Chair: Jungtae Kim (ETRI)

Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Segmentation Models with Patch Attack

Naufal Suryanto, Andro Aprila Adiputra, Ahmada Yusril Kadiptya (Pusan National University), Yongsu Kim (SmartM2M) and Howon Kim (Pusan National University)

Plotting OSS-based Supply Chain attack strategies and the defense failure

Arpita Dinesh Sarang, Sang-Hoon Choi and Ki-Woong Park (Sejong University)

A Proposal of a Supply Chain Security Model for Generative AI

Keun Young Lee (Financial Security Institute) and Jiyeon YOO (Sangmyung University)

Session 10: Emerging Topic

Session Chair: Youngsoo Kim (ETRI)

Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid

Taeyang Lee and Jong-Hyouk Lee (Sejong University)

Quantum Implementation of LSH

Yujin Oh, Kyungbae Jang and Hwajeong Seo (Hansung University)

Who ruins the game?: unveiling cheating users in the “Battlefield" game

Dong Young Kim and Huy Kang Kim (Korea University)