Main Program
Main Venue: Crystal Hall, Jade Hall (2F)
Day 1: August 21 (Wednesday), 2024
Time |
Crystal Hall |
|
13:00 - 13:20 |
Registration in front of Crystal Hall |
|
13:20 - 13:30 |
Opening Remarks |
|
13:30 - 14:10 |
Keynote 1: Proactive Cybersecurity Measures and Response through Passive Monitoring Technology Session Chair: Jong-Hyouk Lee (Sejong University) |
|
14:10 - 14:30 |
Coffee Break |
|
14:30 - 15:30 |
Session 1: Cryptography Session Chair: Keita Emura (Kanazawa University) |
|
15:30 - 15:50 |
Coffee Break |
|
15:50 - 16:50 |
Session 2: Network Security Session Chair: Sokjoon Lee (Gachon University) |
Day 2: August 22 (Thursday), 2024
Time |
Crystal Hall |
Jade Hall |
09:30 - 10:30 |
Session 3: AI Security Session Chair: Taekyoung Kwon (Yonsei University) |
Session 4: Network & Application Security Session Chair: Hwajeong Seo (Hansung University) |
10:30 - 10:50 |
Coffee Break |
|
10:50 - 11:30 |
Keynote 2: Information Security and Standards: Common Goals and Synergies Session Chair: Jong-Hyouk Lee (Sejong University) |
|
11:30 - 11:50 |
Coffee Break |
|
11:50 - 12:30 |
Invited Talk: Advanced Cryptography Based on PQC for Future Communication Services Session Chair: Sokjoon Lee (Gachon University, Korea) |
|
12:30 - 14:00 |
Lunch |
|
14:00 - 15:00 |
Session 5: AI Security Session Chair: DaeHun Nyang (Ewha Womans University) |
Session 6: CPS Security Session Chair: Heejun Roh (Inha University) |
15:00 - 16:00 |
KIISC Board Meeting |
Poster Session 1 in front of Jade Hall Session Chair: Jungsoo Park (Kangnam University) |
16:00 - 17:00 |
Poster Session 2 in front of Jade Hall Session Chair: Dong-Chan Kim (Kookmin University) |
|
17:00 - 18:00 |
Poster Session 3 in front of Jade Hall Session Chair: Il-Gu Lee (Sungshin Women's University) |
|
18:00 - 18:30 |
Break Time |
|
18:30 - End |
Banquet (Convention Hall, 1F) |
Day 3: August 23 (Friday), 2024
Time |
Crystal Hall |
Jade Hall |
09:30 - 10:30 |
Session 7: Fuzzing |
Session 8: Malware |
10:30 - 10:50 |
Coffee Break |
|
10:50 - 11:50 |
Session 9: Software Security Session Chair: Jungtae Kim (ETRI) |
Session 10: Emerging Topic |
11:50 - 13:00 |
Lunch |
Paper Sessions
Day 1: August 21 (Wednesday), 2024
Session 1: Cryptography
Session Chair: Keita Emura (Kanazawa University)
ECPM Cryptanalysis Resource Estimation
Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Jaehan Cho and Howon Kim (Pusan National University)
Integral Attack with Bit-based Division Property on the Lightweight Block Cipher LBC
Naoki Shibayama and Yasutaka Igarashi (Tokyo University of Science)
Session 2: Network Security
Session Chair: Sokjoon Lee (Gachon University)
ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach
Jihye Kim, Jaehyoung Park and Jong-Hyouk Lee (Sejong University)
Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints
Mariama Mbow (Kyushu University), Rodrigo Román (University of Malaga), Ayan Seal (PDPM Indian Institute of Information Technology, Design and Manufacturing), Kevin I-Kai Wang (The University of Auckland), Sraban Kumar Mohanty (PDPM Indian Institute of Information Technology, Design and Manufacturing) and Kouichi Sakurai (Kyushu University)
Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training
Jung Yup Rhee, Leo Hyun Park and Taekyoung Kwon (Yonsei University)
Day 2: August 22 (Thursday), 2024
Session 3: AI Security
Session Chair: Taekyoung Kwon (Yonsei University)
VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators
Gyeongsup Lim, Wonjun Oh and Junbeom Hur (Korea University)
Unsupervised Contextual Anomalous Communication Detection Using VQ Tokenization with Flow Data
Norihiro Okui (KDDI Research Inc.), Shotaro Fukushima (ARISE analytics inc.), Ayumu Kubota (KDDI Research Inc.) and Takuya Yoshida (Toyota Motor Corporation)
Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking
Mai Bui, Thien-Phuc Doan, Kihun Hong and Souhwan Jung (Soongsil University)
Session 4: Network & Application Security
Session Chair: Hwajeong Seo (Hansung University)
Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing
Jaehyoung Park, Jihye Kim and Jong-Hyouk Lee (Sejong University)
Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Emperical Analysis
Ahod Alghuried and David Mohaisen (University of Central Florida)
LLM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture
Bogeum Kim, Hyejin Sim, Jiwon Yun, Jaehan Cho and Howon Kim (Pusan National University)
Session 5: AI Security
Session Chair: DaeHun Nyang (Ewha Womans University)
ChatDEOB: An Effective Deobfuscation Method based on Large Language Model
Byunggeon Choi, Hongjoo Jin, Dong Hoon Lee and Wonsuk Choi (Korea University)
An effective ensemble algorithm for short-term load forecasting
En-Wei Zhang, Luo-Fan Wu and Chun-Wei Tsai (National Sun Yat-sen University)
Session 6: CPS Security
Session Chair: Heejun Roh (Inha University)
PUF-Based Authentication and Authorization Protocol for IoT
Yu-Tse Shih (National Sun Yat-sen University), Shih-Ming Huang (Industrial Technology Research Institute) and Chun-I Fan (National Sun Yat-sen University)
Field Testing and Detection of Camera Interference for Autonomous Driving
Ki Beom Park and Huy Kang Kim (Korea University)
One-class Classification-based Position Falsification Detection System in C-ITS Communication Network
Ilhwan Ji, ChangJin Choi (Gachon University), Cheolho Lee (ENKI WhiteHat), Seungho Jeon and Jung Taek Seo (Gachon University)
Day 3: August 23 (Friday), 2024
Session 7: Fuzzing
Session Chair: Chae-Tae Im (KISA)
Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection
Manu Jo Varghese, Frank Jiang (Deakin University), Abdur Rakib (Coventry University), Robin Doss and Adnan Anwar (Deakin University)
Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information leakage attack in air-gapped networks
Yeon-Jin Kim, Na-Eun Park and Il-Gu Lee (Sungshin Women's University)
Fuzzing JavaScript Engines with Diversified Mutation Strategies
Cheng-Han Shie, Pin-Huang Fang and Chun-I Fan (National Sun Yat-sen University)
Session 8: Malware
Session Chair: Deok Gyu Lee (Seowon University)
Detecting Phishing-targeted Web Push Notifications through Image Similarity Analysis
Rion Matsuzaki and Masaya Sato (Okayama Prefectural University)
Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective
Ayodeji Adeniran, Kieran Human and David Mohaisen (University of Central Florida)
A Survey on Attack Cases with VBS Malware in Windows
GyuHyun Jeon, Seungho Jeon and Jung Taek Seo (Gachon University)
Session 9: Software Security
Session Chair: Jungtae Kim (ETRI)
Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Segmentation Models with Patch Attack
Naufal Suryanto, Andro Aprila Adiputra, Ahmada Yusril Kadiptya (Pusan National University), Yongsu Kim (SmartM2M) and Howon Kim (Pusan National University)
Plotting OSS-based Supply Chain attack strategies and the defense failure
Arpita Dinesh Sarang, Sang-Hoon Choi and Ki-Woong Park (Sejong University)
A Proposal of a Supply Chain Security Model for Generative AI
Keun Young Lee (Financial Security Institute) and Jiyeon YOO (Sangmyung University)
Session 10: Emerging Topic
Session Chair: Youngsoo Kim (ETRI)
Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid
Taeyang Lee and Jong-Hyouk Lee (Sejong University)
Quantum Implementation of LSH
Yujin Oh, Kyungbae Jang and Hwajeong Seo (Hansung University)
Who ruins the game?: unveiling cheating users in the “Battlefield" game
Dong Young Kim and Huy Kang Kim (Korea University)