Accepted Papers
# | Authors | Title |
---|---|---|
4 | Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Jo Jaehan and Howon Kim | ECPM Cryptanalysis Resource Estimation |
16 | Gyeongsup Lim, Wonjun Oh and Junbeom Hur | VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators |
18 | Yujin Oh, Kyungbae Jang and Hwajeong Seo | Quantum Implementation of LSH |
19 | Manu Jo Varghese, Adnan Anwar, Robin Doss, Frank Jiang and Abdur Rakib | Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection |
20 | Naufal Suryanto, Andro Aprila Adiputra, Ahmada Yusril Kadiptya, Yongsu Kim and Howon Kim | Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Segmentation Models with Patch Attack |
26 | Norihiro Okui, Shotaro Fukushima, Ayumu Kubota and Takuya Yoshida | Unsupervised Contextual Anomalous Communication Detection Using VQ Tokenization with Flow Data |
27 | Arpita Dinesh Sarang, Sang-hoon Choi and Ki-woong Park | Plotting OSS-based Supply Chain attack strategies and the defense failure |
28 | Mai Bui, Thien-Phuc Doan, Kihun Hong and Souhwan Jung | Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking |
29 | Yu-Tse Shih, Shih-Ming Huang and Chun-I Fan | PUF-Based Authentication and Authorization Protocol for IoT |
31 | Kibeom Park and Huy Kang Kim | Field Testing and Detection of Camera Interference for Autonomous Driving |
34 | Byunggeon Choi, Hongjoo Jin, Dong Hoon Lee and Wonsuk Choi | ChatDEOB: An Effective Deobfuscation Method based on Large Language Model |
41 | En-Wei Zhang, Luo-Fan Wu and Chun-Wei Tsai | An effective ensemble algorithm for short-term load forecasting |
42 | Keun Young Lee and Ji-yeon Yoo | A Proposal of a Supply Chain Security Model for Generative AI |
43 | Ahod Alghuried and David Mohaisen | Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Emperical Analysis |
44 | Xiaofeng Lu and Tianze Cheng | A Black-box Adversarial Attack Against Graph Neural Network Based on Random Walk |
45 | Dong Young Kim and Huy Kang Kim | Who ruins the game?: unveiling cheating users in the “Battlefield" game |
50 | Rion Matsuzaki and Masaya Sato | Detecting Phishing-targeted Web Push Notifications through Image Similarity Analysis |
53 | Ilhwan Ji, Changjin Choi, Cheolho Lee, Seungho Jeon and Jung Taek Seo | One-class Classification-based Position Falsification Detection System in C-ITS Communication Network |
54 | Naoki Shibayama and Yasutaka Igarashi | Integral Attack with Bit-based Division Property on the Lightweight Block Cipher LBC |
57 | Oğuz Yayla and Yunus Emre Yılmaz | An AIS-20/31 Compliant and Improved for Acceleration PLL-TRNG Implementation |
60 | Ayodeji Adeniran, Kieran Human and David Mohaisen | Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective |
62 | Bogeum Kim, Hyejin Sim, Jiwon Yun, Howon Kim and Jaehan Cho | LLM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture |
66 | Taeyang Lee and Jong-Hyouk Lee | Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid |
68 | Jihye Kim, Jaehyoung Park and Jong-Hyouk Lee | ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach |
72 | Mariama Mbow, Rodrigo Román, Ayan Seal, Sraban Kumar Mohanty, Kevin I-Kai Wang and Kouichi Sakurai | Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints |
78 | Yeon-Jin Kim, Na-Eun Park and Il-Gu Lee | Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information leakage attack in air-gapped networks |
83 | Jaehyoung Park, Jihye Kim and Jong-Hyouk Lee | Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing |
85 | Jung Yup Rhee, Leo Hyun Park and Taekyoung Kwon | Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training |
87 | Gyuhyun Jeon, Seungho Jeon and Jung Taek Seo | A Survey on Attack Cases with VBS Malware in Windows |
88 | Cheng-Han Shie, Pin-Huang Fang and Chun-I Fan | Fuzzing JavaScript Engines with Diversified Mutation Strategies |