POSTER PROGRAM
Poster Session 1: 15:00 - 16:00, August 22 (Thursday), 2024
Session Chair: Jungsoo Park (Kangnam University)
Proposal of distributed network data management mechanism based on keyword extraction from text content
Jinsu Kim, Keunbae Choi, and Namje Park (Jeju National University)
Poster: Blockchain-Based ESG Reporting and Refurbishment Certification in the Cosmetics Industry
Cho Nwe Zin Latt, Muhammad Firdaus and Kyung-Hyune Rhee (Pukyong National University)
Random Public Codebook-Based Double XOR Cipher
Seung-Ha Ji, So-Eun Jeon and Il-Gu Lee (Sungshin Women’s University)
Error Correction Code-Based Two-Layer Digital Watermarking Technique
Do-Eun Kim, So-Hyun Park and Il-Gu Lee (Sungshin Women’s University)
A Study on Enhancing Reauthentication Methods Among Workloads in a ZTA Environment
Wonhwi Choi and Jungsoo Park (Kangnam University)
Exploring Hybrid Approach-Steganalysis in Digital Forensics Applications
Rini Wisnu Wardhani, Dedy Septono Catur Putranto, Thi-Thu-Huong Le, Agus Mahardika Ari Laksmono, Hwang Yeonjeong and Howon Kim (Pusan National University)
Ultra-high Reliable Multi-AP Cooperation Using Securely Compressed Channel-status Information
So-Eun Jeon and Il-Gu Lee (Sungshin Women’s University)
Adversarial Attacks on Behavior Decisions and Countermeasures Using Dropout-Based Fake Node
Seungyeol Lee, Youngju Lee and Jaecheol Ha (Hoseo University)
Blockchain-based secure vehicle data trading model for vehicle accident reconstruction
Su Jin Shin, Youngho Park and Sang Uk Shin (Pukyong National University)
Secure and Low Latency Transmission Technique for Next Generation Wireless LANs
Sun-Jin Lee and Il-Gu Lee (Sungshin Women’s University)
Data Preprocessing Technique for Privacy-Preserving Machine Learning
Ye-Rim Jeong, So-Yeon Kim and Il-Gu Lee (Sungshin Women’s University)
Mission-centric Cyber Resilience Assessment using Transformer Models in Tactical Modeling and Simulation
Seungwoon Lee, Haerin Kim and Jaesik Kang (LIG Nex1)
Enhancing Cyber Warfare Training: A Cost-Effective Approach to Multi-Host Network Simulations with Container-Based Cyber Range
Haerin Kim and Seungwoon Lee (LIG Nex1)
Defense Mechanism Using Purifier and Detector Against Adversarial Patch Attacks for Unmanned Combat Systems
Dong-U Kang (Korea University), Jaesik Kang and Seungwoon Lee (LIG Nex1)
Poster: A Robust Counting Sketch for Data Plane Intrusion Detection
Sian Kim and DaeHun Nyang (Ewha Womans University)
Multi-Link Operation-Based Group Selection Technique for Enhancing Privacy and Efficiency in Federated Learning
So-Yeon Kim, Na-Eun Park, Yu-Ran Jeon and Il-Gu Lee (Sungshin Women’s University)
COLA Sketch: Enhancing Intrusion Detection with Collision-Aware Noise Reduction
JiYeon Kim, Sian Kim and DaeHun Nyang (Ewha Womans University)
Clock Glitch-based Fault Injection Attack on Deep Neural Network
Hyoju Kang, Seongwoo Hong and Jaecheol Ha (Hoseo University)
Modular Design Approach in API Security
I Wayan Adi Juliawan Pawana, Youngjae Kim, Bonam Kim and Ilsun You (Kookmin University)
Poster: Impact Assessment of Cooperative Driving Performance because of I/O Latency
Juon Kim(Korea University), Sanghwa Jin, Jongin Lee (Samsung Electronics) and Wonsuk Choi (Korea University)
Proposal of eqSIM Security Toolkit for Private 5G Device Authentication
Hyejin Yoon, Yoonjin Jang, Seunghwan Yun and Okyeon Yi (Kookmin University)
Poster Session 2: 16:00 - 17:00, August 22 (Thursday), 2024
Session Chair: Dong-Chan Kim (Kookmin University)
Proposal of a client consensus mechanism in a blockchain proof environment based on token distribution
Jinsu Kim, Keunbae Choi and Namje Park (Jeju National University)
Better RDP-GAN with A Noisy Generator
JungHye Choi and DaeHun Nyang (Ewha Womans University)
Study on the possibility of hash collisions of OTP values
Tae-Gyeong NA, Hansaem Wi and Okyeon Yi (Kookmin University)
Template-free Jailbreak Red-Teaming for LLM: A Effort-Effective Approach
Donghyun Kim, Mingyu Lee, Yijun Jin, Sang Seo, Hyunpyo Choi and Juhyun Jang (NSHC Inc.)
Empirical Analysis of Cryptocurrency Payment Tracking through Money Laundering Brokers: Case Study of an Unexplored Scam
Mijin Shin, Minjung Yoo, Eunbeen Lee, Yiseul Choi, Yunyoung Jung and Seongmin Kim (Sungshin Women's University)
Proposal for a Small Quantum Encryptor for Application Data Security
Hyeongyeop Kim, Seowoo Jung, Changuk Jang and Okyeon Yi (Kookmin University)
A Study on the Processing of Contraband Evidence; Focused on Child Sexual Abuse Material
Ye-eun Jeon, Yeram Lim and Seongmin Kim (Sungshin Women's University)
Generative AI and Child Sexual Abuse Material: Enhancing Legal Frameworks through Child Recognition Model
Yeram Lim, Ye-eun Jeon and Seongmin Kim (Sungshin Women's University)
COPY&RETURN: Nullifying Suspicious Cryptographic Operations for Behavioral Analysis of Ransomware
Yohan Lee, Jiseok Bang and Seungkwang Lee (Dankook University)
Interoperable Alternative to Canary-based Protection of Stack Smashing
Kangmin Kim (Dankook University), Jeong-Nyeo Kim (ETRI) and Seungkwang Lee (Dankook University)
Early Detection of Vulnerabilities in Static Analysis with Terraform and Kubernetes: Methods and Strategies
Hyeyeon Hyeon, Gahyun Kim, Mijin Kim, Yerin Chun and Seongmin Kim (Sungshin Women’s University)
Exploiting Standalone Access Vulnerabilities in Envoy Proxy for Restart Attacks
Jiwon Yoo, Seo-yeon Kang and Seongmin Kim (Sungshin Women’s University)
Interference Avoidance and Mitigation Technique Utilizing Cooperative Characterization of Interferers in Dense Wireless Networks
Jin-Min Lee, Hye-Yeon Shim and Il-Gu Lee (Sungshin Women’s University)
An Effective Labeling Model for Minimal Labeled Encrypted Network Traffic Data
Daeho Choi, Minjeong Cho and Kiwook Shon (Seoul National University of Science and Technology)
5G Private Networks: A Survey on Architecture, Threats, Security Requirements, and Research Challenges
Changhyeon Woo, Jieon Oh, Yongho Ko and Ilsun You (Kookmin University)
Reliable Practical Byzantine Fault Tolerance Mechanism for High Throughput and Low Latency Blockchain Consensus
Namryeong Kim and Il-Gu Lee (Sungshin Women's University)
Cryptojacking Container Detection Based on Network Flow Analysis in Kubernetes
Sumin Kim, Soomin Lee, Jeongeun Ryu, Ri-Yeong Kim and Seongmin Kim (Sungshin Women's University)
Autoencoder-Based Face De-identification and Swapping for Enhanced Privacy Protection
So Yeon Kim, Seong Hyun Min, Ma li Jo and Won Gyum Kim (AIDEEP Inc.)
One-Pixel Attack Mitigation Technique
Yeon-Ji Lee and Il-Gu Lee (Sungshin Women’s University)
Enhancing Alarm Systems Utilizing In-Network Computing for Mitigating Tampered Alarms
Junghyun Moon, Eunji Chang and Kookheui Kwon (KINAC)
Poster Session 3: 17:00 - 18:00, August 22 (Thursday), 2024
Session Chair: Il-Gu Lee (Sungsin Women's University)
Multi-Channel-Based Physical Layer Security for Dynamic Key Update
Chae-Yeon Park, Sun-Jin Lee and Il-Gu Lee (Sungshin Women's University)
The Paradox of Security Controls: Do Stricter Organizational Measures Improve Security Levels?
Jungjoo Oh and Il-Gu Lee (Sungshin Women's University)
Optimized Implementation of SABER on resource-constrained 16-bit MSP430 MCU
MinGi Kim, DongHyun Shin, YoungBeom Kim and Seog Chung Seo (Kookmin University)
TrustMark, can I trust you?
Su-Kyoung Kim, Yu-Ran Jeon, Jung-Hwa Ryu and Il-Gu Lee (Sungshin Women’s University)
Partial Homomorphic Encryption for Privacy-Preserving Data Learning
Hye-Yeon Shim, Yu-Ran Jeon and Il-Gu Lee (Sungshin Women’s University)
ML-DSA Implicit certificates: PQC Migration for IEEE 1609.2 Standard
YoonSun Han(Kookmin University), Dongmin Kim (Samsung Electronics) and Seog Chung Seo (Kookmin University)
Efficient Implementation of Falcon on Cortex-M4
Junhyeok Choi, Seung-Ju Wi and Seog Chung Seo (Kookmin University)
Repeated Embedding Techniques of Duplicated Least Significant Bits for Secure Digital Watermarks
Chae-Won Song, So-Hyun Park and Il-Gu Lee (Sungshin Women's University)
Practical Zero Trust Implementation for Low Latency and High Reliability Networks
Seo-Yi Kim and Il-Gu Lee (Sungshin Women's University)
A Study on the Strengthening of the Research Security System: Focusing on the Comparative Analysis of Laws and Systems in Major Countries
Hyun-Che Song, Hye-In Lee and Il-Gu Lee (Sungshin Women's University)
Forensic Analysis of Trust Wallet Artifacts in Browser Extension Environment
JiWon Bae and Kiwook Sohn (Seoul National University of Science and Technology)
Optimizing HQC on Cortex-M4
DongCheon Kim and Seog Chung Seo (Kookmin University)
A Study of V2V Certificate Management for PQC Migration
Jung-Hun Kang, Soojin Lee and Seung-Hyun Seo (Hanyang University)
Security Evaluation on the KpqC Round 2 Lattice-based Candidates
Sumin Park, Eunmin Lee, Hyun-A Noh, Hyojung Yoon and Joohee Lee (Sungshin Women's University)
Comparison of Voice Feature Extraction Techniques for Deepfake Detection
Seong-Bean Park, Jeong-Hyun Sim and Hyun-Min Song (Dankook University)
The architectural difference of Consumer, IoT and M2M eSIM RSP security
Hoseok Kwon, Taeho Won, Bonam Kim and Ilsun You (Kookmin University)
Analysis of Security Threats and Countermeasures of Artificial Intelligence-Based Digital Education
Hye-In Lee, Hyun-Che Song and Il-Gu Lee (Sungshin Women's University)
Hardware-based NTT accelerator design for ML-DSA
Byeonguk Jeong, Eunse Kang and Howon Kim (Pusan National University)
Efficient Fuzzing Technique for Lightweight Firmware-Over-The-Air
Na-Hyun Kim, Jin-Min Lee and Il-Gu Lee (Sungshin Women's University)
Enhancing Operational Technology Cybersecurity using Security Levels, Differential Privacy, and Post-Quantum Cryptography
Junghyun Moon, Eunji Chang and Kookheui Kwon (KINAC)
Evaluation and Analysis of Adversarial Attacks to Digital Watermarks
A-Young Jeon, Yeon-Ji Lee and Il-Gu Lee (Sungshin Women’s University)