Accepted Papers
Paper Number |
Authors | Title |
2 | Nobuyuki Sugio | Impossible Differential Attack on SAND-64 |
3 | Beomseok Oh, Mincheol Son, Kwangmin Kim, Jiho Lee, Duckwoo Kim, Taekkyung Oh, Cheoljun Park and Yongdae Kim | Denial-of-Service Risks in 5G Devices: Empirical Analysis on Connection Restriction Mechanisms |
6 | Yiju Jung, Hyerean Jang and Youngjoo Shin | PodBeater: Exploiting Multi-Value Affinity for Efficient Co-Location Attacks in Kubernetes |
17 | Kyoungbae Jang, Yujin Oh and Hwajeong Seo | Depth-Optimized Quantum Implementation of CHAM |
18 | Cheng-Han Shie, Yu-Chun Tseng and Chun-I Fan | IoT Botnet Detection Based on the Behaviors of DNS over TLS Queries |
19 | Hwaseong Lee, Hyunwoo Lee, Youngki Jung, Seondong Heo, Moosung Park and Changon Yoo | Crashing or Freezing the Bot: LiDAR Spoofing Attacks on ROS 2 UGV |
21 | Yamya Reiki and Yudhveer Singh | Towards Sender Anonymity for Singleton Sets |
22 | Dung Ta Anh, Yasuhiro Nakamura and Hidema Tanaka | Bootstrap-based Evaluation of Clustering Suitability Across TCP Payload Dataset Structures |
24 | Yuki Tanaka and Mamoru Mimura | Real Environment Tolerance Curve (RETC): Assessing Machine Learning Model Performance Degradation Under Extreme Class Imbalance |
25 | Kakeru Watanabe and Kazuki Yoneyama | Formal Verification of Labyrinth Encrypted Message Storage Protocol in Messenger |
28 | Seyoung Yoon, Gyeongju Song, Kyungbae Jang and Hwajeong Seo | Quantum Implementation and Analysis of SHA-1 |
29 | Young Han Choi and Ki Tae Park | TALOS: An Empirical Approach to Building Portable Hands-On Labs for Fundamental Cybersecurity Education using Open-source |
32 | Hyeong Seon Kim and Huy Kang Kim | GUARD-CAN: Graph-Understanding and Recurrent Architecture for CAN Anomaly Detection |
33 | A Yeon Kim, Jung Yup Rhee and Taekyoung Kwon | LeakGuard: Detecting and Mitigating Attribute Leakage in Fine-Tuned Diffusion Models |
34 | Keiichi Kinoshita and Mamoru Mimura | Detecting Malicious JavaScript Code by Code-Specialized LLM |
41 | Minjung Yoo, Seunghyun Park and Seongmin Kim | User Conversation Recovery from ChatGPT Local Artifacts in Web Browsers for Digital Forensic Investigations |
46 | Jeongho Lee and Seyoung Lee | Automated VEX Generation and Vulnerability Prioritization using Inter-Module Symbol Graphs |
47 | Geon Woo Jeon and Ji Won Yoon | Criminal Network Detection in Ethereum Using Change-Point Analysis: A Case Study of OFAC-Listed North Korean Wallet Addresses |
51 | Hyungkwan Kim, Hyunggyu Lee and Wook Shin | A Framework for Assessing Nation-State Cyber Attack Capabilities Using MITRE ATT&CK and Large Language Models |
54 | Jae-Min Choi, Sang-Hoon Choi and Ki-Woong Park | Interaction-Aware System Call Sequence Analysis for Android Malware Classificatio |
59 | Seong Bean Park and Hyun Min Song | Comparative Eval. of SSL Feature Extractors & Classifiers for DFAD |
60 | Hye-Yeon Shim, Yeon-Ji Lee and Il-Gu Lee | Privacy-Preserving Logistic Regression Using Homomorphic Encryption: An Adaptive Optimization Approach |
64 | Chau Nguyen, Hoang Anh Nguyen, Yang-Wai Chow and Willy Susilo | A Real-World Dataset to Enhance Intrusion Detection in SDN-IoT Systems |
66 | Lee Seon Woo, Park Hyeon Woo and Lee Tae Jin | Understanding Encrypted Network Anomalies with LLMs: A Post-hoc Cognitive Framework |
67 | Hyungrok Jo and Junji Shikata | PoC Hash: A Power-of-Commutators Hash over Hamiltonian Quaternions |
69 | Seonghan Shin | Toward a Stealth Mode of 5G-AKA |