August 20-22, 2025
MAISON GLAD, Jeju Island, Korea

Accepted Papers



Paper
Number
Authors Title
2  Nobuyuki Sugio  Impossible Differential Attack on SAND-64
3  Beomseok Oh, Mincheol Son, Kwangmin Kim, Jiho Lee, Duckwoo Kim, Taekkyung Oh, Cheoljun Park and Yongdae Kim  Denial-of-Service Risks in 5G Devices: Empirical Analysis on Connection Restriction Mechanisms
6  Yiju Jung, Hyerean Jang and Youngjoo Shin  PodBeater: Exploiting Multi-Value Affinity for Efficient Co-Location Attacks in Kubernetes
17  Kyoungbae Jang, Yujin Oh and Hwajeong Seo  Depth-Optimized Quantum Implementation of CHAM
18  Cheng-Han Shie, Yu-Chun Tseng and Chun-I Fan  IoT Botnet Detection Based on the Behaviors of DNS over TLS Queries
19  Hwaseong Lee, Hyunwoo Lee, Youngki Jung, Seondong Heo, Moosung Park and Changon Yoo  Crashing or Freezing the Bot: LiDAR Spoofing Attacks on ROS 2 UGV
21  Yamya Reiki and Yudhveer Singh  Towards Sender Anonymity for Singleton Sets
22  Dung Ta Anh, Yasuhiro Nakamura and Hidema Tanaka  Bootstrap-based Evaluation of Clustering Suitability Across TCP Payload Dataset Structures
24  Yuki Tanaka and Mamoru Mimura  Real Environment Tolerance Curve (RETC): Assessing Machine Learning Model Performance Degradation Under Extreme Class Imbalance
25  Kakeru Watanabe and Kazuki Yoneyama  Formal Verification of Labyrinth Encrypted Message Storage Protocol in Messenger
28  Seyoung Yoon, Gyeongju Song, Kyungbae Jang and Hwajeong Seo  Quantum Implementation and Analysis of SHA-1
29  Young Han Choi and Ki Tae Park  TALOS: An Empirical Approach to Building Portable Hands-On Labs for Fundamental Cybersecurity Education using Open-source
32  Hyeong Seon Kim and Huy Kang Kim  GUARD-CAN: Graph-Understanding and Recurrent Architecture for CAN Anomaly Detection
33  A Yeon Kim, Jung Yup Rhee and Taekyoung Kwon  LeakGuard: Detecting and Mitigating Attribute Leakage in Fine-Tuned Diffusion Models
34  Keiichi Kinoshita and Mamoru Mimura  Detecting Malicious JavaScript Code by Code-Specialized LLM
41  Minjung Yoo, Seunghyun Park and Seongmin Kim  User Conversation Recovery from ChatGPT Local Artifacts in Web Browsers for Digital Forensic Investigations
46  Jeongho Lee and Seyoung Lee  Automated VEX Generation and Vulnerability Prioritization using Inter-Module Symbol Graphs
47  Geon Woo Jeon and Ji Won Yoon  Criminal Network Detection in Ethereum Using Change-Point Analysis: A Case Study of OFAC-Listed North Korean Wallet Addresses
51  Hyungkwan Kim, Hyunggyu Lee and Wook Shin  A Framework for Assessing Nation-State Cyber Attack Capabilities Using MITRE ATT&CK and Large Language Models
54  Jae-Min Choi, Sang-Hoon Choi and Ki-Woong Park  Interaction-Aware System Call Sequence Analysis for Android Malware Classificatio
59  Seong Bean Park and Hyun Min Song  Comparative Eval. of SSL Feature Extractors & Classifiers for DFAD
60  Hye-Yeon Shim, Yeon-Ji Lee and Il-Gu Lee  Privacy-Preserving Logistic Regression Using Homomorphic Encryption: An Adaptive Optimization Approach
64  Chau Nguyen, Hoang Anh Nguyen, Yang-Wai Chow and Willy Susilo  A Real-World Dataset to Enhance Intrusion Detection in SDN-IoT Systems
66  Lee Seon Woo, Park Hyeon Woo and Lee Tae Jin  Understanding Encrypted Network Anomalies with LLMs: A Post-hoc Cognitive Framework
67  Hyungrok Jo and Junji Shikata  PoC Hash: A Power-of-Commutators Hash over Hamiltonian Quaternions
69  Seonghan Shin  Toward a Stealth Mode of 5G-AKA