Accepted Posters
Poster Session
Poster Session 1 |
Authors | Title |
---|---|---|
So-Eun Jeon, Jung Hoon Lee and Il-Gu Lee | Smart Jamming with User Data: Redefining Wireless Secrecy in Multi-AP Networks | |
Sobirova Khusnora Bakhtiyor Kizi, Cho Nwe Zin Latt and Kyung Hyune Rhee | A Hybrid Sensitive Data Detection Framework for Structured Enterprise Data with Extension to Unstructured Text | |
Sayeon Kim, Olmi Lee and Woohyun Jang | Executable Protection via TPM-Sealed Key Unsealing and Memory-Only Execution in Embedded Systems | |
Su Jin Shin, Siwan Noh and Sang Uk Shin | BNPKM: Biometric Non-stored Private Key Management | |
Chanhee Han, Kyeongseok Lee and Homook Cho | DisTORbution Crawler: Active Tor Configuration for Efficient Dark Web Crawling | |
So Yeon Kim, Dong Woo Lee, Seong Hyun Min, Jung Hun Lim, Ma Il Jo, In Jae Kim, Ja Sil Choi, Min Ho Jung, Seong Eun Park and Won Gyum Kim | Context-Aware and Attention-Driven Deepfake Detection via Enhanced Residual Architectures | |
Seoyun Kang, Jeongeun Ryu, Yumin Lee, Jueun Son and Seongmin Kim | Empirical Study on Consistency of LLM-Based Policy as Code Generation for Network Policies | |
Yumin Lee, Jeongeun Ryu Ryu, Seoyun Kang, Jueun Son and Seongmin Kim | Exploring Prompt Strategy of LLM-based PaC Generation in Kubernetes Environment | |
Junghyun Mok and Sokjoon Lee | A Zero Trust Based Framework for xApp Access Control in O-RAN | |
Juhyeon Lee, Il Whan Ji and Jung Taek Seo | A Reinforcement Learning-Based Model for Multi-Step Attack Sequence Prediction in Industrial Control Systems | |
Dong-Kwon Jung and Woong-Sik Kim | Forecasting Stock Prices in the Korean Market Using News Sentiment | |
Kyu-Hyun Kang, Jae Yoon Kim, Nam-Su Jho and Taek-Young Yoon | Quantum-Secure Timestamp for the Integrity of Classical Signatures in Quantum Transition | |
Donghwan Lee, Hojune Shin and Younho Lee | Homomorphic Stationarity Testing using CKKS for Outsourced Time-series Data Analysis | |
Sehwa Ko, Kyeongmin Lee, Eunse Kang and Junyoung Son | FingerRatchet: A Lightweight Anonymous P2P Protocol with Out-of-Band Fingerprint Exchange | |
I Wayan Adi Juliawan Pawana, Hoseok Kwon, Bonam Kim and Ilsun You | Enhancing Private 5G Networks for IIoT: EAP-AKA’ Implementation in Open5GS | |
Selynn Kim, Taehun Kim and Youngjoo Shin | A Survey of Speculative Load Prediction Attacks Exploiting Memory Disambiguation Units | |
Sun-Jin Lee and Il-Gu Lee | Privacy-Preserving GAN-Based Data Augmentation for Intrusion Detection Without Accuracy Degradation | |
Yu-Na Kim, Yeon-Jin Kim and Il-Gu Lee | Optimizing Synthetic-to-Original Data Ratio for Reliable Model Training | |
Hwaseong Lee, Hyunwoo Lee, Youngki Jung, Seondong Heo, Moosung Park and Changon Yoo | UGVScan: Automated Tool for Multi-layer Rule Profiling on ROS 2-based UGV platforms | |
Kihoon Kim, Dongyeop Kim, Taeuk Ha and Jinsoo Jang | Recent Trends in Space Cybersecurity: Attack and Defense | |
Hye-eun Son and Hyoseung Kim | AnonC2PA: C2PA-based Anonymous Proof of Content Authenticity | |
Da-hyung Kim, Jeong-hwa Ryu, Su-bin Lee and Seong-min Kim | Comparative Analysis of HTML Structure Between Legal and Illegal Streaming Websites | |
Lee Taeyong, You Inseo, Kim Ju-Chan, Lee Kyumin, Jin Hyeonggwon, Yang Seunggwon, Yoon Hyenonbin, Park Jihoo, No Yonghun and Lee Minwoo | NMEA Under Siege: Dynamic Flooding Attacks and Defenses | |
Poster Session 2 |
Lee Taeyong, You Inseo, Kim Ju-Chan, Lee Kyumin, Jin Hyeonggwon, Yang Seunggwon, Yoon Hyenonbin, Park Jihoo, No Yonghun and Lee Minwoo | Visual Tampering in S-52: Threats and Protections |
Jueon Choi, Gunjin Cha, Misoo Kim, Ieck-Chae Eum and Kwanghoon Choi | A Method for Selecting Security Checklist Items Associated with Incidents by Analyzing Security Incident Reports and Vulnerability Checklists Using LLM | |
Kiyeon Kim, Minyoung Choi, Jumi Kim, Eunjin Kim and Gibum Kim | A Study on the Analysis and Improvement of Web-Based DRM Bypass Techniques for OTT Content Protection | |
Yong Heon Lim, Jong Chan Seo and Hae Young Lee | PCFG-Based Framework for Cracking Korean Users’ Passwords | |
Heechan Kim, Jaehyun Kim, Kyungyun Lee and Junyoung Son | Blockchain-Assisted Explainable AI Framework for Accountability in Autonomous Driving Systems | |
Yujeong Seo and Hyunwoo Lee | PHANTOM: Predictive Security Policy Orchestration for Detecting Multi-stage Stealthy Attacks | |
Seokjae Gwon, Gyeonghoe Kim and Seyoung Lee | Evaluating Domain-Specific Hallucinations in LLMs Triggered by Jeju Dialect Inputs | |
Seokjae Gwon, Esther Kim, Huijin Lim, Nahyun Kim and Seyoung Lee | Design and Implementation of a Security Vulnerability Practice Testbed in Agentic LLM Environments | |
Gunseung Jin, Minseo Park and Jinsoo Jang | Forensic Analysis of Mattermost Server | |
Hyunjin Jang, Jiwon Yun, Yeonjeong Hwang, Morsheda Akter, Howon Kim and Junyoung Son | Multi-class Attack Detection in CAN Networks using Lightweight 1D CNN | |
Wibby Aldryani Astuti Praditasari, Hyejin Yoon, Hyeongyeop Kim and Okyeon Yi | Quantum-Rekeyed Privacy for AI-Powered Financial Assistants | |
Adi Panca Saputra Iskandar, Yongho Ko, Bonam Kim and Ilsun You | Blockchain-Assisted Handover Authentication: A Lightweight and Scalable Approach for 5G | |
Se-Ok Jeon, Seokhwi Kim and Kwanghoon Choi | Analyzing the Limitations of CVE‑Based Source‑Code Vulnerability Slice Extraction | |
Hyunji Cho, Jiyeon Yang, Woojin Im and Jinsoo Jang | Forensic Analysis of Siri on iOS | |
Sooin Kim, Seonghyun Min, Limjung Hoon, Jiyoung Shin and Wongyum Kim | Enhancing Face Forgery Detection through Dual-branch Transformer and contrastive pretraining | |
Yunsung Kim, Gyeongdeok An, Sangwon Lee and Jaecheol Ha | CNN-based Trace Interval Detection for Fault Injection Point Identification on DNN Models | |
Yoonjung Cho, Jeongwoo Lee, Baikjin Jung and Heejo Lee | Poster: Enhancing Vulnerability Fix Commit Identification via Data Augmentation with Security Unrelated Commits | |
Kyeongseok Yang, Sungyu Kim, Jeongwoo Lee, Yoongjong Na, Duyeong Kim and Heejo Lee | Poster: HatBOM, An Automated Analysis Platform for SBOM and VEX Generation | |
Yeonhee Kim, Soona Lee and Jongkil Kim | On-Device RAG System with Role-Based Document Access Control: A PropertyGPT-Based Approach | |
Dongjun Choi and Jungtaek Seo | A Quantitative Assessment Framework for Cyber Incident Response Exercises in Nuclear Facilities | |
Yoonsun Han, Mingi Kim, Chearin Kim and Seog Chung Seo | Isogeny Based Quantum Secure Bootstrapping Against Fake Base Stations in 6G Networks | |
Shin Dawit, Cho Jaehan, Son Junyoung and Kim Howon | Quantum Machine Learning for Intrusion Detection: Analyzing QSVM on CIC-IDS2017 | |
Mingi Kim, Yoonsun Han, Chaerin Kim and Seog Chung Seo | A New DPKI_Based Model for Certificate Validation against FBS Attacks | |
Poster Session 3 |
Chaerin Kim, Yoonsun Han, Mingi Kim and Seog Chung Seo | Post Quantum Cryptography Migration for IoT–NTN Communications in 6G Networks |
Heeyeong Suh, Nayeon Ryu and Seyoung Lee | Speak One, Leak All? Exploiting Multilingual LLMs via Monolingual Mode | |
Gyeongdeok An, Yunsung Kim, Sangwon Lee and Jaecheol Ha | Slope-based Sum of Absolute Differences (S-SAD) Method for Improving Pattern-matching Accuracy on Side-Channel Signal | |
Jung Kyu Seo, Ju Hyeon Lee and Jung Taek Seo | A Survey on AI-Based Anomaly Detection Using TypeSpecific Datasets in Industrial Control Systems | |
Chae-wan Hong, Seung-ha Jee and Il-Gu Lee | Feature Selection Optimization Based on Data Characteristics for Ransomware Detection | |
Nayeon Ryu, Heeyeong Suh and Seyoung Lee | Choices Beneath the Surface : How Dark Patterns Operate in Kiosk Interfaces Across Countries | |
Min-ji Cho, So-Eun Jeon and Il-gu Lee | Cooperative Machine Learning Framework for Efficient Detection of Wireless Availability Attacks in Internet of Things Networks | |
Hyobeen Cho, Namryeong Kim, Sunwoo Jeong and Ilgu Lee | Enhancing DeFi Smart Contract Security via LangChain and Retrieval-Augmented Generation | |
Suji Park, Yeon-Ji Lee and Il-Gu Lee | A Revocable Multimodal EEG Authentication Paradigm Using P300 Responses | |
Yeonwoo Lee, Yeonji Lee and Ilgu Lee | Improving Decision Accuracy in Multi-Sensor-Based Machine Learning Systems through Drift-Resilient Contribution Analysis | |
Suyeong Kim, Hyeyeon Shim and Ilgu Lee | An Analysis of the Impact of Dataset Preprocessing on the Performance of Homomorphic Encryption-Based Machine Learning | |
Chanhyuk Kim, Changuk Jang and Okyeon Yi | Design of a Web-Based Verification Tool for Ensuring the Reliability of PQC Algorithm Implementations | |
Da-eun Yu, Seung-ha Jee and Il-Gu Lee | Integrated Detection and Response Framework for DDoS and Ransomware Attacks | |
Gyuha Son, Seo-Yi Kim and Il-Gu Lee | Lightweight Anomaly Detection for Internet of Things: Integrating Feature Selection and Dimensionality Reduction | |
Chaewon Song, Hyeyeon Shim and Ilgu Lee | Privacy-Preserving Grid-Based Clustering of Medical Data Using Homommorphic Encryption | |
Jungjoo Oh and Il-Gu Lee | An Integrated Privacy Decision-Making Model for Multi-Factor Authentication Adoption | |
Mi-Yeon Kim, Sang-Hoon Choi and Ki-Woong Park | Revealing Hidden Contention through Disk I/O Analysis in Multi-Tenant Containers | |
Hyeran Jung, Yeonsu Jeong, Seonwoo Lee and Taejin Lee | Feedback-Driven False Alarm Detection for Network Attacks | |
So-Yeon Kim and Il-Gu Lee | A Multi-Link Selective Access Control Framework for Secure and Reliable IoT Communications | |
Ye-Sin Kim, Jin-Min Lee and Il-Gu Lee | An Interference-Aware Channel Selection Algorithm for Secure and Reliable Multi-Link Operation | |
Hyein Lee, Hyunche Song and Il-Gu Lee | Privacy at Risk: Evaluating Data Protection Practices in South Korea’s Leading Digital Mental Health Apps | |
Jung-Min Moon, Na-Eun Park and Il-Gu Lee | Wireless Channel Delay Spread-Based Dynamic Guard Interval Adjustment and Secondary Data Transmission Technique | |
Jin-Min Lee, Hye-Yeon Shim and Il-Gu Lee | OBSS Interference Management via Distributed ML-based Joint TX Power and RX Sensitivity Control |
Poster paper Oral Session1 |
Authors |
Title |
Min Jeong Kang, Jung Hoon Lee and Il-Gu Lee |
Machine Learning-Based Power Allocation for Secure MISO Communication Systems assisted by a Cooperative Jammer |
|
Kengo Matsui and Shigeki Hagihara |
Towards Symbolic Formalization of PoW Integrity in Blockchain |
|
Seung-ha Jee, Yu-ran Jeon and Il-Gu Lee |
Secure Restricted Access Window-Based Group Coordination for Mission-Critical Low-Latency and High Throughput Applications |
|
Seo-Yi Kim, Na-Eun Park and Il-Gu Lee |
Invisible Watermarking Based on DWT-SVD for Protecting Generative AI Content |
|
Dongphil Kim |
Security Policy Dissemination Scheme Between Satellite Ground Stations Based on CCSDS AOS Frames |
|
Ga-Yeong Kim, Na-Eun Park and Il-Gu Lee |
Security Vulnerability Analysis of Real-time Content Popularity Prediction-based Dynamic Memory Allocation System |
|
Poster paper Oral Session2 |
Ye-Hyeon Ahn, Sun-Jin Lee and Il-Gu Lee |
A Lightweight Authentication Scheme for Securing IoT with Dual-Layer Verification |
Chae Yeon Park, So Eun Jeon and Il-Gu Lee |
Physical Layer-based Obfuscated Data Transmission Technique for Internet of Battlefield Things |
|
Na-Hyun Kim, Sungbin Moon, Yewon Hwang, Seungho Jung, Seong-Cheon Park and Youngjae Lee |
Detection of Concurrent Hardware Trojan (HT) Using EM and Backscattering Side-Channel Approah |
|
Ye-Rim Jeong, Yeon-Jin Kim, Chae-Yeon Park and Il-Gu Lee |
Air-Gap Exfiltration via High-Order Modulation-Based Screen Saver Covert Channels: Design, Implementation, and Defense |
|
Sukyoung Kim, Soyeon Kim and Ilgu Lee |
Enhancing Inter-Satellite Link Security with Shamir’s Secret Sharing-Based Frequency Hopping |