August 20-22, 2025
MAISON GLAD, Jeju Island, Korea

Accepted Posters



Poster Session

Poster

Session 1

Authors Title
So-Eun Jeon, Jung Hoon Lee and Il-Gu Lee Smart Jamming with User Data: Redefining Wireless Secrecy in Multi-AP Networks
Sobirova Khusnora Bakhtiyor Kizi, Cho Nwe Zin Latt and Kyung Hyune Rhee A Hybrid Sensitive Data Detection Framework for Structured Enterprise Data with Extension to Unstructured Text
Sayeon Kim, Olmi Lee and Woohyun Jang Executable Protection via TPM-Sealed Key Unsealing and Memory-Only Execution in Embedded Systems
Su Jin Shin, Siwan Noh and Sang Uk Shin BNPKM: Biometric Non-stored Private Key Management
Chanhee Han, Kyeongseok Lee and Homook Cho DisTORbution Crawler: Active Tor Configuration for Efficient Dark Web Crawling
So Yeon Kim, Dong Woo Lee, Seong Hyun Min, Jung Hun Lim, Ma Il Jo, In Jae Kim, Ja Sil Choi, Min Ho Jung, Seong Eun Park and Won Gyum Kim Context-Aware and Attention-Driven Deepfake Detection via Enhanced Residual Architectures
Seoyun Kang, Jeongeun Ryu, Yumin Lee, Jueun Son and Seongmin Kim Empirical Study on Consistency of LLM-Based Policy as Code Generation for Network Policies
Yumin Lee, Jeongeun Ryu Ryu, Seoyun Kang, Jueun Son and Seongmin Kim Exploring Prompt Strategy of LLM-based PaC Generation in Kubernetes Environment
Junghyun Mok and Sokjoon Lee A Zero Trust Based Framework for xApp Access Control in O-RAN
Juhyeon Lee, Il Whan Ji and Jung Taek Seo A Reinforcement Learning-Based Model for Multi-Step Attack Sequence Prediction in Industrial Control Systems
Dong-Kwon Jung and Woong-Sik Kim Forecasting Stock Prices in the Korean Market Using News Sentiment
Kyu-Hyun Kang, Jae Yoon Kim, Nam-Su Jho and Taek-Young Yoon Quantum-Secure Timestamp for the Integrity of Classical Signatures in Quantum Transition
Donghwan Lee, Hojune Shin and Younho Lee Homomorphic Stationarity Testing using CKKS for Outsourced Time-series Data Analysis
Sehwa Ko, Kyeongmin Lee, Eunse Kang and Junyoung Son FingerRatchet: A Lightweight Anonymous P2P Protocol with Out-of-Band Fingerprint Exchange
I Wayan Adi Juliawan Pawana, Hoseok Kwon, Bonam Kim and Ilsun You Enhancing Private 5G Networks for IIoT: EAP-AKA’ Implementation in Open5GS
Selynn Kim, Taehun Kim and Youngjoo Shin A Survey of Speculative Load Prediction Attacks Exploiting Memory Disambiguation Units
Sun-Jin Lee and Il-Gu Lee Privacy-Preserving GAN-Based Data Augmentation for Intrusion Detection Without Accuracy Degradation
Yu-Na Kim, Yeon-Jin Kim and Il-Gu Lee Optimizing Synthetic-to-Original Data Ratio for Reliable Model Training
Hwaseong Lee, Hyunwoo Lee, Youngki Jung, Seondong Heo, Moosung Park and Changon Yoo UGVScan: Automated Tool for Multi-layer Rule Profiling on ROS 2-based UGV platforms
Kihoon Kim, Dongyeop Kim, Taeuk Ha and Jinsoo Jang Recent Trends in Space Cybersecurity: Attack and Defense
Hye-eun Son and Hyoseung Kim AnonC2PA: C2PA-based Anonymous Proof of Content Authenticity
Da-hyung Kim, Jeong-hwa Ryu, Su-bin Lee and Seong-min Kim Comparative Analysis of HTML Structure Between Legal and Illegal Streaming Websites
Lee Taeyong, You Inseo, Kim Ju-Chan, Lee Kyumin, Jin Hyeonggwon, Yang Seunggwon, Yoon Hyenonbin, Park Jihoo, No Yonghun and Lee Minwoo NMEA Under Siege: Dynamic Flooding Attacks and Defenses

Poster

Session 2

Lee Taeyong, You Inseo, Kim Ju-Chan, Lee Kyumin, Jin Hyeonggwon, Yang Seunggwon, Yoon Hyenonbin, Park Jihoo, No Yonghun and Lee Minwoo Visual Tampering in S-52: Threats and Protections
Jueon Choi, Gunjin Cha, Misoo Kim, Ieck-Chae Eum and Kwanghoon Choi A Method for Selecting Security Checklist Items Associated with Incidents by Analyzing Security Incident Reports and Vulnerability Checklists Using LLM
Kiyeon Kim, Minyoung Choi, Jumi Kim, Eunjin Kim and Gibum Kim A Study on the Analysis and Improvement of Web-Based DRM Bypass Techniques for OTT Content Protection
Yong Heon Lim, Jong Chan Seo and Hae Young Lee PCFG-Based Framework for Cracking Korean Users’ Passwords
Heechan Kim, Jaehyun Kim, Kyungyun Lee and Junyoung Son Blockchain-Assisted Explainable AI Framework for Accountability in Autonomous Driving Systems
Yujeong Seo and Hyunwoo Lee PHANTOM: Predictive Security Policy Orchestration for Detecting Multi-stage Stealthy Attacks
Seokjae Gwon, Gyeonghoe Kim and Seyoung Lee Evaluating Domain-Specific Hallucinations in LLMs Triggered by Jeju Dialect Inputs
Seokjae Gwon, Esther Kim, Huijin Lim, Nahyun Kim and Seyoung Lee Design and Implementation of a Security Vulnerability Practice Testbed in Agentic LLM Environments
Gunseung Jin, Minseo Park and Jinsoo Jang Forensic Analysis of Mattermost Server
Hyunjin Jang, Jiwon Yun, Yeonjeong Hwang, Morsheda Akter, Howon Kim and Junyoung Son Multi-class Attack Detection in CAN Networks using Lightweight 1D CNN
Wibby Aldryani Astuti Praditasari, Hyejin Yoon, Hyeongyeop Kim and Okyeon Yi Quantum-Rekeyed Privacy for AI-Powered Financial Assistants
Adi Panca Saputra Iskandar, Yongho Ko, Bonam Kim and Ilsun You Blockchain-Assisted Handover Authentication: A Lightweight and Scalable Approach for 5G
Se-Ok Jeon, Seokhwi Kim and Kwanghoon Choi Analyzing the Limitations of CVE‑Based Source‑Code Vulnerability Slice Extraction
Hyunji Cho, Jiyeon Yang, Woojin Im and Jinsoo Jang Forensic Analysis of Siri on iOS
Sooin Kim, Seonghyun Min, Limjung Hoon, Jiyoung Shin and Wongyum Kim Enhancing Face Forgery Detection through Dual-branch Transformer and contrastive pretraining
Yunsung Kim, Gyeongdeok An, Sangwon Lee and Jaecheol Ha CNN-based Trace Interval Detection for Fault Injection Point Identification on DNN Models
Yoonjung Cho, Jeongwoo Lee, Baikjin Jung and Heejo Lee Poster: Enhancing Vulnerability Fix Commit Identification via Data Augmentation with Security Unrelated Commits
Kyeongseok Yang, Sungyu Kim, Jeongwoo Lee, Yoongjong Na, Duyeong Kim and Heejo Lee Poster: HatBOM, An Automated Analysis Platform for SBOM and VEX Generation
Yeonhee Kim, Soona Lee and Jongkil Kim On-Device RAG System with Role-Based Document Access Control: A PropertyGPT-Based Approach
Dongjun Choi and Jungtaek Seo A Quantitative Assessment Framework for Cyber Incident Response Exercises in Nuclear Facilities
Yoonsun Han, Mingi Kim, Chearin Kim and Seog Chung Seo Isogeny Based Quantum Secure Bootstrapping Against Fake Base Stations in 6G Networks
Shin Dawit, Cho Jaehan, Son Junyoung and Kim Howon Quantum Machine Learning for Intrusion Detection: Analyzing QSVM on CIC-IDS2017
Mingi Kim, Yoonsun Han, Chaerin Kim and Seog Chung Seo A New DPKI_Based Model for Certificate Validation against FBS Attacks

Poster

Session 3

Chaerin Kim, Yoonsun Han, Mingi Kim and Seog Chung Seo Post Quantum Cryptography Migration for IoT–NTN Communications in 6G Networks
Heeyeong Suh, Nayeon Ryu and Seyoung Lee Speak One, Leak All? Exploiting Multilingual LLMs via Monolingual Mode
Gyeongdeok An, Yunsung Kim, Sangwon Lee and Jaecheol Ha Slope-based Sum of Absolute Differences (S-SAD) Method for Improving Pattern-matching Accuracy on Side-Channel Signal
Jung Kyu Seo, Ju Hyeon Lee and Jung Taek Seo A Survey on AI-Based Anomaly Detection Using TypeSpecific Datasets in Industrial Control Systems
Chae-wan Hong, Seung-ha Jee and Il-Gu Lee Feature Selection Optimization Based on Data Characteristics for Ransomware Detection
Nayeon Ryu, Heeyeong Suh and Seyoung Lee Choices Beneath the Surface : How Dark Patterns Operate in Kiosk Interfaces Across Countries
Min-ji Cho, So-Eun Jeon and Il-gu Lee Cooperative Machine Learning Framework for Efficient Detection of Wireless Availability Attacks in Internet of Things Networks
Hyobeen Cho, Namryeong Kim, Sunwoo Jeong and Ilgu Lee Enhancing DeFi Smart Contract Security via LangChain and Retrieval-Augmented Generation
Suji Park, Yeon-Ji Lee and Il-Gu Lee A Revocable Multimodal EEG Authentication Paradigm Using P300 Responses
Yeonwoo Lee, Yeonji Lee and Ilgu Lee Improving Decision Accuracy in Multi-Sensor-Based Machine Learning Systems through Drift-Resilient Contribution Analysis
Suyeong Kim, Hyeyeon Shim and Ilgu Lee An Analysis of the Impact of Dataset Preprocessing on the Performance of Homomorphic Encryption-Based Machine Learning
Chanhyuk Kim, Changuk Jang and Okyeon Yi Design of a Web-Based Verification Tool for Ensuring the Reliability of PQC Algorithm Implementations
Da-eun Yu, Seung-ha Jee and Il-Gu Lee Integrated Detection and Response Framework for DDoS and Ransomware Attacks
Gyuha Son, Seo-Yi Kim and Il-Gu Lee Lightweight Anomaly Detection for Internet of Things: Integrating Feature Selection and Dimensionality Reduction
Chaewon Song, Hyeyeon Shim and Ilgu Lee Privacy-Preserving Grid-Based Clustering of Medical Data Using Homommorphic Encryption
Jungjoo Oh and Il-Gu Lee An Integrated Privacy Decision-Making Model for Multi-Factor Authentication Adoption
Mi-Yeon Kim, Sang-Hoon Choi and Ki-Woong Park Revealing Hidden Contention through Disk I/O Analysis in Multi-Tenant Containers
Hyeran Jung, Yeonsu Jeong, Seonwoo Lee and Taejin Lee Feedback-Driven False Alarm Detection for Network Attacks
So-Yeon Kim and Il-Gu Lee A Multi-Link Selective Access Control Framework for Secure and Reliable IoT Communications
Ye-Sin Kim, Jin-Min Lee and Il-Gu Lee An Interference-Aware Channel Selection Algorithm for Secure and Reliable Multi-Link Operation
Hyein Lee, Hyunche Song and Il-Gu Lee Privacy at Risk: Evaluating Data Protection Practices in South Korea’s Leading Digital Mental Health Apps
Jung-Min Moon, Na-Eun Park and Il-Gu Lee Wireless Channel Delay Spread-Based Dynamic Guard Interval Adjustment and Secondary Data Transmission Technique
Jin-Min Lee, Hye-Yeon Shim and Il-Gu Lee OBSS Interference Management via Distributed ML-based Joint TX Power and RX Sensitivity Control

 

Poster

paper

Oral

Session1

Authors

Title

Min Jeong Kang, Jung Hoon Lee and Il-Gu Lee

Machine Learning-Based Power Allocation for Secure MISO Communication Systems assisted by a Cooperative Jammer

Kengo Matsui and Shigeki Hagihara

Towards Symbolic Formalization of PoW Integrity in Blockchain

Seung-ha Jee, Yu-ran Jeon and Il-Gu Lee

Secure Restricted Access Window-Based Group Coordination for Mission-Critical Low-Latency and High Throughput Applications

Seo-Yi Kim, Na-Eun Park and Il-Gu Lee

Invisible Watermarking Based on DWT-SVD for Protecting Generative AI Content

Dongphil Kim

Security Policy Dissemination Scheme Between Satellite Ground Stations Based on CCSDS AOS Frames

Ga-Yeong Kim, Na-Eun Park and Il-Gu Lee

Security Vulnerability Analysis of Real-time Content Popularity Prediction-based Dynamic Memory Allocation System

Poster

paper

Oral

Session2

Ye-Hyeon Ahn, Sun-Jin Lee and Il-Gu Lee

A Lightweight Authentication Scheme for Securing IoT with Dual-Layer Verification

Chae Yeon Park, So Eun Jeon and Il-Gu Lee

Physical Layer-based Obfuscated Data Transmission Technique for Internet of Battlefield Things

Na-Hyun Kim, Sungbin Moon, Yewon Hwang, Seungho Jung, Seong-Cheon Park and Youngjae Lee

Detection of Concurrent Hardware Trojan (HT) Using EM and Backscattering Side-Channel Approah

Ye-Rim Jeong, Yeon-Jin Kim, Chae-Yeon Park and Il-Gu Lee

Air-Gap Exfiltration via High-Order Modulation-Based Screen Saver Covert Channels: Design, Implementation, and Defense

Sukyoung Kim, Soyeon Kim and Ilgu Lee

Enhancing Inter-Satellite Link Security with Shamir’s Secret Sharing-Based Frequency Hopping