August 20-22, 2025
MAISON GLAD, Jeju Island, Korea

Program



 

DAY 1   August 20 (WED)

TIme Crystal Hall (2F)
12:00~13:00 Registration
13:00~13:10 Opening Remarks
13:10~13:50 Keynote1: Cloud Computing Security: Challenging Issues and Future Directions
Prof. Willy Susilo (University of Wollongong)
13:50~14:00 Coffee Break
14:00~14:20 Session 1 (System & Application Security)
Crashing or Freezing the Bot: LiDAR Spoofing Attacks on ROS 2 UGV( Hwaseong Lee, Hyunwoo Lee, Youngki Jung, Seondong Heo, Moosung Park and Changon Yoo)
14:20~14:40 PodBeater: Exploiting Multi-Value Affinity for Efficient Co-Location Attacks in Kubernetes ( Yiju Jung, Hyerean Jang and Youngjoo Shin)
14:40~15:00 GUARD-CAN: Graph-Understanding and Recurrent Architecture for CAN Anomaly Detection ( Hyeong Seon Kim and Huy Kang Kim)
15:00~15:20 Break Time
15:20~16:00 Invtied Talk1: Overlaying Crypto Agility onto the N2SF in the Cloud EraDr. Jihoon Cho (Vice President, Samsung SDS)
16:00~16:10 Coffee Break
16:10~16:30 Session 2 (5G & Network Security)
A Real-World Dataset to Enhance Intrusion Detection in SDN-IoT Systems(Chau Nguyen, Hoang Anh Nguyen, Yang-Wai Chow and Willy Susilo)
16:30~16:50 Toward a Stealth Mode of 5G-AKA( Seonghan Shin)
16:50~17:10 Denial-of-Service Risks in 5G Devices: Empirical Analysis on Connection Restriction Mechanisms
( Beomseok Oh, Mincheol Son, Kwangmin Kim, Jiho Lee, Duckwoo Kim, Taekkyung Oh, Cheoljun Park and Yongdae Kim)
17:10~17:20 Coffee Break
17:20~17:40 Session 3 (Cybersecurity Education & Model Security)
Real Environment Tolerance Curve (RETC): Assessing Machine Learning Model Performance Degradation Under Extreme Class Imbalance
( Yuki Tanaka and Mamoru Mimura)
17:40~18:00 TALOS: An Empirical Approach to Building Portable Hands-On Labs for Fundamental Cybersecurity Education using Open-Source
(Young Han Choi and Ki Tae Park)

 

 

DAY 2   August 21 (THU)

Time Crystal Hall Jade Hall
09:30~09:50 Session 4(Security Analysis & Verification) Session 5(Malware & Forensics)
Impossible Differential Attack on SAND-64
(Nobuyuki Sugio)
User Conversation Recovery from ChatGPT Local Artifacts in Web Browsers for Digital Forensic Investigations
( Minjung Yoo, Seunghyun Park and Seongmin Kim)
09:50~10:10 Formal Verification of Labyrinth Encrypted Message Storage Protocol in Messenger
( Kakeru Watanabe and Kazuki Yoneyama)
Criminal Network Detection in Ethereum Using Change-Point Analysis: A Case Study of OFAC-Listed North Korean Wallet Addresses
( Geon Woo Jeon and Ji Won Yoon)
10:10~10:30 Automated VEX Generation and Vulnerability Prioritization using Inter-Module Symbol Graphs
(Jeongho Lee and Seyoung Lee)
Interaction-Aware System Call Sequence Analysis for Android Malware Classification
( Jae-Min Choi, Sang-Hoon Choi and Ki-Woong Park)
10:30~10:50 Break Time
10:50~11:30 Keynote2: Security in the Age of AI
Dr. Wolfgang Richter (Director of Engineering, Soroco Co.Ltd)
11:30~11:50 Break Time
11:50~12:30 Invtied Talk2: Digital Trust in the AI Era: Navigating the New Cybersecurity LandscapeHosuk Lee (CISO of AWS Korea)
12:30~14:00 Lunch Time
14:00~14:20 KIISC Board Meeting Research Story
KIISC Board Meeting From Page to Stage: Returning to Top Security Venue
(Taekyoung Kwon, Yonsei University)
14:20~14:40 Recommendations for Writing Research Papers in Security Area( DaeHun Nyang, Ewha Womans University)
14:40~15:00 Lesson: Simple Is Always Best
(Hyunwoo Lee, Korea Institute of Energy Technology (KENTECH))
15:00~16:00 KIISC Board Meeting Poster Session
KIISC Board Meeting Poster Session 1
16:00~17:00 Poster Session 2
17:00~18:00 Poster Session 3
18:00~18:30 Break Time
18:30~End Banquet (Convention Hall, 1F)

 

 

DAY 3   August 22 (FRI)

Time Crystal Hall Jade Hall Ruby Hall
09:30~09:50 Session 6(Quantum & Cryptography) Session 7(AI/LLM for Security) No Session
09:30~09:50Depth-Optimized Quantum Implementation of CHAM
( Kyoungbae Jang, Yujin Oh and Hwajeong Seo)
Detecting Malicious JavaScript Code by Code-Specialized LLM
( Keiichi Kinoshita and Mamoru Mimura)
09:50~10:10 Quantum Implementation and Analysis of SHA-1
( Seyoung Yoon, Gyeongju Song, Kyungbae Jang and Hwajeong Seo)
A Framework for Assessing Nation-State Cyber Attack Capabilities Using MITRE ATT&CK and Large Language Models
( Hyungkwan Kim, Hyunggyu Lee and Wook Shin)
10:10~10:30 PoC Hash: A Power-of-Commutators Hash over Hamiltonian Quaternions
( Hyungrok Jo and Junji Shikata)
Understanding Encrypted Network Anomalies with LLMs: A Post-hoc Cognitive Framework
(Lee Seon Woo, Park Hyeon Woo and Lee Tae Jin)
10:30~10:50 Break Time
10:50~11:10 Session 8(Privacy & Anonymity) Session 9(IoT & Traffic Analysis)
No Session10:50~11:10Towards Sender Anonymity for Singleton Sets
( Yamya Reiki and Yudhveer Singh )
IoT Botnet Detection Based on the Behaviors of DNS over TLS Queries
( Cheng-Han Shie, Yu-Chun Tseng and Chun-I Fan)
11:10~11:30 LeakGuard: Detecting and Mitigating Attribute Leakage in Fine-Tuned Diffusion Models
( A Yeon Kim, Jung Yup Rhee and Taekyoung Kwon)
Bootstrap-based Evaluation of Clustering Suitability Across TCP Payload Dataset Structures
( Dung Ta Anh, Yasuhiro Nakamura and Hidema Tanaka)
11:30~11:50 Privacy-Preserving Logistic Regression Using Homomorphic Encryption: An Adaptive Optimization Approach
( Hye-Yeon Shim, Yeon-Ji Lee and Il-Gu Lee)
Comparative Eval. of SSL Feature Extractors & Classifiers for DFAD
( Seong Bean Park and Hyun Min Song)
11:50~13:20 Lunch Time
13:20~13:35 No Session Session 10 (Poster paper Oral Session1)
Machine Learning-Based Power Allocation for Secure MISO Communication Systems assisted by a Cooperative Jammer
(Min Jeong Kang, Jung Hoon Lee and Il-Gu Lee)
13:35~13:50 Towards Symbolic Formalization of PoW Integrity in Blockchain
(Kengo Matsui and Shigeki Hagihara)
13:50~14:05 Secure Restricted Access Window-Based Group Coordination for Mission-Critical Low-Latency and High Throughput Applications
(Seung-ha Jee, Yu-ran Jeon and Il-Gu Lee)
14:05~14:20 Invisible Watermarking Based on DWT-SVD for Protecting Generative AI Content
(Seo-Yi Kim, Na-Eun Park and Il-Gu Lee)
14:20~14:35 Security Policy Dissemination Scheme Between Satellite Ground Stations Based on CCSDS AOS Frames
(Dongphil Kim)
14:35~14:50 Security Vulnerability Analysis of Real-time Content Popularity Prediction-based Dynamic Memory Allocation System
(Ga-Yeong Kim, Na-Eun Park and Il-Gu Lee)
14:50~15:00 Break Time
15:00~15:15 No Session Session 11 (Poster paper Oral Session2)
A Lightweight Authentication Scheme for Securing IoT with Dual-Layer Verification
(Ye-Hyeon Ahn, Sun-Jin Lee and Il-Gu Lee)
15:15~15:30 Physical Layer-based Obfuscated Data Transmission Technique for Internet of Battlefield Things
(Chae Yeon Park, So Eun Jeon and Il-Gu Lee)
15:30~15:45 Detection of Concurrent Hardware Trojan (HT) Using EM and Backscattering Side-Channel Approah
(Na-Hyun Kim, Sungbin Moon, Yewon Hwang, Seungho Jung, Seong-Cheon Park and Youngjae Lee)
15:45~16:00 Air-Gap Exfiltration via High-Order Modulation-Based Screen Saver Covert Channels: Design, Implementation, and Defense
(Ye-Rim Jeong, Yeon-Jin Kim, Chae-Yeon Park and Il-Gu Lee)
16:00~16:15 Enhancing Inter-Satellite Link Security with Shamir’s Secret Sharing-Based Frequency Hopping

(Sukyoung Kim, Soyeon Kim and Ilgu Lee)

 

 

Paper Session

Paper
Number
Authors Title
2 Nobuyuki Sugio Impossible Differential Attack on SAND-64
3 Beomseok Oh, Mincheol Son, Kwangmin Kim, Jiho Lee, Duckwoo Kim, Taekkyung Oh, Cheoljun Park and Yongdae Kim Denial-of-Service Risks in 5G Devices: Empirical Analysis on Connection Restriction Mechanisms
6 Yiju Jung, Hyerean Jang and Youngjoo Shin PodBeater: Exploiting Multi-Value Affinity for Efficient Co-Location Attacks in Kubernetes
17 Kyoungbae Jang, Yujin Oh and Hwajeong Seo Depth-Optimized Quantum Implementation of CHAM
18 Cheng-Han Shie, Yu-Chun Tseng and Chun-I Fan IoT Botnet Detection Based on the Behaviors of DNS over TLS Queries
19 Hwaseong Lee, Hyunwoo Lee, Youngki Jung, Seondong Heo, Moosung Park and Changon Yoo Crashing or Freezing the Bot: LiDAR Spoofing Attacks on ROS 2 UGV
21 Yamya Reiki and Yudhveer Singh Towards Sender Anonymity for Singleton Sets
22 Dung Ta Anh, Yasuhiro Nakamura and Hidema Tanaka Bootstrap-based Evaluation of Clustering Suitability Across TCP Payload Dataset Structures
24 Yuki Tanaka and Mamoru Mimura Real Environment Tolerance Curve (RETC): Assessing Machine Learning Model Performance Degradation Under Extreme Class Imbalance
25 Kakeru Watanabe and Kazuki Yoneyama Formal Verification of Labyrinth Encrypted Message Storage Protocol in Messenger
28 Seyoung Yoon, Gyeongju Song, Kyungbae Jang and Hwajeong Seo Quantum Implementation and Analysis of SHA-1
29 Young Han Choi and Ki Tae Park TALOS: An Empirical Approach to Building Portable Hands-On Labs for Fundamental Cybersecurity Education using Open-source
32 Hyeong Seon Kim and Huy Kang Kim GUARD-CAN: Graph-Understanding and Recurrent Architecture for CAN Anomaly Detection
33 A Yeon Kim, Jung Yup Rhee and Taekyoung Kwon LeakGuard: Detecting and Mitigating Attribute Leakage in Fine-Tuned Diffusion Models
34 Keiichi Kinoshita and Mamoru Mimura Detecting Malicious JavaScript Code by Code-Specialized LLM
41 Minjung Yoo, Seunghyun Park and Seongmin Kim User Conversation Recovery from ChatGPT Local Artifacts in Web Browsers for Digital Forensic Investigations
46 Jeongho Lee and Seyoung Lee Automated VEX Generation and Vulnerability Prioritization using Inter-Module Symbol Graphs
47 Geon Woo Jeon and Ji Won Yoon Criminal Network Detection in Ethereum Using Change-Point Analysis: A Case Study of OFAC-Listed North Korean Wallet Addresses
51 Hyungkwan Kim, Hyunggyu Lee and Wook Shin A Framework for Assessing Nation-State Cyber Attack Capabilities Using MITRE ATT&CK and Large Language Models
54 Jae-Min Choi, Sang-Hoon Choi and Ki-Woong Park Interaction-Aware System Call Sequence Analysis for Android Malware Classificatio
59 Seong Bean Park and Hyun Min Song Comparative Eval. of SSL Feature Extractors & Classifiers for DFAD
60 Hye-Yeon Shim, Yeon-Ji Lee and Il-Gu Lee Privacy-Preserving Logistic Regression Using Homomorphic Encryption: An Adaptive Optimization Approach
64 Chau Nguyen, Hoang Anh Nguyen, Yang-Wai Chow and Willy Susilo A Real-World Dataset to Enhance Intrusion Detection in SDN-IoT Systems
66 Lee Seon Woo, Park Hyeon Woo and Lee Tae Jin Understanding Encrypted Network Anomalies with LLMs: A Post-hoc Cognitive Framework
67 Hyungrok Jo and Junji Shikata PoC Hash: A Power-of-Commutators Hash over Hamiltonian Quaternions
69 Seonghan Shin Toward a Stealth Mode of 5G-AKA

 

 

Poster Session

Poster

Session 1

Authors Title
So-Eun Jeon, Jung Hoon Lee and Il-Gu Lee Smart Jamming with User Data: Redefining Wireless Secrecy in Multi-AP Networks
Sobirova Khusnora Bakhtiyor Kizi, Cho Nwe Zin Latt and Kyung Hyune Rhee A Hybrid Sensitive Data Detection Framework for Structured Enterprise Data with Extension to Unstructured Text
Sayeon Kim, Olmi Lee and Woohyun Jang Executable Protection via TPM-Sealed Key Unsealing and Memory-Only Execution in Embedded Systems
Su Jin Shin, Siwan Noh and Sang Uk Shin BNPKM: Biometric Non-stored Private Key Management
Chanhee Han, Kyeongseok Lee and Homook Cho DisTORbution Crawler: Active Tor Configuration for Efficient Dark Web Crawling
So Yeon Kim, Dong Woo Lee, Seong Hyun Min, Jung Hun Lim, Ma Il Jo, In Jae Kim, Ja Sil Choi, Min Ho Jung, Seong Eun Park and Won Gyum Kim Context-Aware and Attention-Driven Deepfake Detection via Enhanced Residual Architectures
Seoyun Kang, Jeongeun Ryu, Yumin Lee, Jueun Son and Seongmin Kim Empirical Study on Consistency of LLM-Based Policy as Code Generation for Network Policies
Yumin Lee, Jeongeun Ryu Ryu, Seoyun Kang, Jueun Son and Seongmin Kim Exploring Prompt Strategy of LLM-based PaC Generation in Kubernetes Environment
Junghyun Mok and Sokjoon Lee A Zero Trust Based Framework for xApp Access Control in O-RAN
Juhyeon Lee, Il Whan Ji and Jung Taek Seo A Reinforcement Learning-Based Model for Multi-Step Attack Sequence Prediction in Industrial Control Systems
Dong-Kwon Jung and Woong-Sik Kim Forecasting Stock Prices in the Korean Market Using News Sentiment
Kyu-Hyun Kang, Jae Yoon Kim, Nam-Su Jho and Taek-Young Yoon Quantum-Secure Timestamp for the Integrity of Classical Signatures in Quantum Transition
Donghwan Lee, Hojune Shin and Younho Lee Homomorphic Stationarity Testing using CKKS for Outsourced Time-series Data Analysis
Sehwa Ko, Kyeongmin Lee, Eunse Kang and Junyoung Son FingerRatchet: A Lightweight Anonymous P2P Protocol with Out-of-Band Fingerprint Exchange
I Wayan Adi Juliawan Pawana, Hoseok Kwon, Bonam Kim and Ilsun You Enhancing Private 5G Networks for IIoT: EAP-AKA’ Implementation in Open5GS
Selynn Kim, Taehun Kim and Youngjoo Shin A Survey of Speculative Load Prediction Attacks Exploiting Memory Disambiguation Units
Sun-Jin Lee and Il-Gu Lee Privacy-Preserving GAN-Based Data Augmentation for Intrusion Detection Without Accuracy Degradation
Yu-Na Kim, Yeon-Jin Kim and Il-Gu Lee Optimizing Synthetic-to-Original Data Ratio for Reliable Model Training
Hwaseong Lee, Hyunwoo Lee, Youngki Jung, Seondong Heo, Moosung Park and Changon Yoo UGVScan: Automated Tool for Multi-layer Rule Profiling on ROS 2-based UGV platforms
Kihoon Kim, Dongyeop Kim, Taeuk Ha and Jinsoo Jang Recent Trends in Space Cybersecurity: Attack and Defense
Hye-eun Son and Hyoseung Kim AnonC2PA: C2PA-based Anonymous Proof of Content Authenticity
Da-hyung Kim, Jeong-hwa Ryu, Su-bin Lee and Seong-min Kim Comparative Analysis of HTML Structure Between Legal and Illegal Streaming Websites
Lee Taeyong, You Inseo, Kim Ju-Chan, Lee Kyumin, Jin Hyeonggwon, Yang Seunggwon, Yoon Hyenonbin, Park Jihoo, No Yonghun and Lee Minwoo NMEA Under Siege: Dynamic Flooding Attacks and Defenses

Poster

Session 2

Lee Taeyong, You Inseo, Kim Ju-Chan, Lee Kyumin, Jin Hyeonggwon, Yang Seunggwon, Yoon Hyenonbin, Park Jihoo, No Yonghun and Lee Minwoo Visual Tampering in S-52: Threats and Protections
Jueon Choi, Gunjin Cha, Misoo Kim, Ieck-Chae Eum and Kwanghoon Choi A Method for Selecting Security Checklist Items Associated with Incidents by Analyzing Security Incident Reports and Vulnerability Checklists Using LLM
Kiyeon Kim, Minyoung Choi, Jumi Kim, Eunjin Kim and Gibum Kim A Study on the Analysis and Improvement of Web-Based DRM Bypass Techniques for OTT Content Protection
Yong Heon Lim, Jong Chan Seo and Hae Young Lee PCFG-Based Framework for Cracking Korean Users’ Passwords
Heechan Kim, Jaehyun Kim, Kyungyun Lee and Junyoung Son Blockchain-Assisted Explainable AI Framework for Accountability in Autonomous Driving Systems
Yujeong Seo and Hyunwoo Lee PHANTOM: Predictive Security Policy Orchestration for Detecting Multi-stage Stealthy Attacks
Seokjae Gwon, Gyeonghoe Kim and Seyoung Lee Evaluating Domain-Specific Hallucinations in LLMs Triggered by Jeju Dialect Inputs
Seokjae Gwon, Esther Kim, Huijin Lim, Nahyun Kim and Seyoung Lee Design and Implementation of a Security Vulnerability Practice Testbed in Agentic LLM Environments
Gunseung Jin, Minseo Park and Jinsoo Jang Forensic Analysis of Mattermost Server
Hyunjin Jang, Jiwon Yun, Yeonjeong Hwang, Morsheda Akter, Howon Kim and Junyoung Son Multi-class Attack Detection in CAN Networks using Lightweight 1D CNN
Wibby Aldryani Astuti Praditasari, Hyejin Yoon, Hyeongyeop Kim and Okyeon Yi Quantum-Rekeyed Privacy for AI-Powered Financial Assistants
Adi Panca Saputra Iskandar, Yongho Ko, Bonam Kim and Ilsun You Blockchain-Assisted Handover Authentication: A Lightweight and Scalable Approach for 5G
Se-Ok Jeon, Seokhwi Kim and Kwanghoon Choi Analyzing the Limitations of CVE‑Based Source‑Code Vulnerability Slice Extraction
Hyunji Cho, Jiyeon Yang, Woojin Im and Jinsoo Jang Forensic Analysis of Siri on iOS
Sooin Kim, Seonghyun Min, Limjung Hoon, Jiyoung Shin and Wongyum Kim Enhancing Face Forgery Detection through Dual-branch Transformer and contrastive pretraining
Yunsung Kim, Gyeongdeok An, Sangwon Lee and Jaecheol Ha CNN-based Trace Interval Detection for Fault Injection Point Identification on DNN Models
Yoonjung Cho, Jeongwoo Lee, Baikjin Jung and Heejo Lee Poster: Enhancing Vulnerability Fix Commit Identification via Data Augmentation with Security Unrelated Commits
Kyeongseok Yang, Sungyu Kim, Jeongwoo Lee, Yoongjong Na, Duyeong Kim and Heejo Lee Poster: HatBOM, An Automated Analysis Platform for SBOM and VEX Generation
Yeonhee Kim, Soona Lee and Jongkil Kim On-Device RAG System with Role-Based Document Access Control: A PropertyGPT-Based Approach
Dongjun Choi and Jungtaek Seo A Quantitative Assessment Framework for Cyber Incident Response Exercises in Nuclear Facilities
Yoonsun Han, Mingi Kim, Chearin Kim and Seog Chung Seo Isogeny Based Quantum Secure Bootstrapping Against Fake Base Stations in 6G Networks
Shin Dawit, Cho Jaehan, Son Junyoung and Kim Howon Quantum Machine Learning for Intrusion Detection: Analyzing QSVM on CIC-IDS2017
Mingi Kim, Yoonsun Han, Chaerin Kim and Seog Chung Seo A New DPKI_Based Model for Certificate Validation against FBS Attacks

Poster

Session 3

Chaerin Kim, Yoonsun Han, Mingi Kim and Seog Chung Seo Post Quantum Cryptography Migration for IoT–NTN Communications in 6G Networks
Heeyeong Suh, Nayeon Ryu and Seyoung Lee Speak One, Leak All? Exploiting Multilingual LLMs via Monolingual Mode
Gyeongdeok An, Yunsung Kim, Sangwon Lee and Jaecheol Ha Slope-based Sum of Absolute Differences (S-SAD) Method for Improving Pattern-matching Accuracy on Side-Channel Signal
Jung Kyu Seo, Ju Hyeon Lee and Jung Taek Seo A Survey on AI-Based Anomaly Detection Using TypeSpecific Datasets in Industrial Control Systems
Chae-wan Hong, Seung-ha Jee and Il-Gu Lee Feature Selection Optimization Based on Data Characteristics for Ransomware Detection
Nayeon Ryu, Heeyeong Suh and Seyoung Lee Choices Beneath the Surface : How Dark Patterns Operate in Kiosk Interfaces Across Countries
Min-ji Cho, So-Eun Jeon and Il-gu Lee Cooperative Machine Learning Framework for Efficient Detection of Wireless Availability Attacks in Internet of Things Networks
Hyobeen Cho, Namryeong Kim, Sunwoo Jeong and Ilgu Lee Enhancing DeFi Smart Contract Security via LangChain and Retrieval-Augmented Generation
Suji Park, Yeon-Ji Lee and Il-Gu Lee A Revocable Multimodal EEG Authentication Paradigm Using P300 Responses
Yeonwoo Lee, Yeonji Lee and Ilgu Lee Improving Decision Accuracy in Multi-Sensor-Based Machine Learning Systems through Drift-Resilient Contribution Analysis
Suyeong Kim, Hyeyeon Shim and Ilgu Lee An Analysis of the Impact of Dataset Preprocessing on the Performance of Homomorphic Encryption-Based Machine Learning
Chanhyuk Kim, Changuk Jang and Okyeon Yi Design of a Web-Based Verification Tool for Ensuring the Reliability of PQC Algorithm Implementations
Da-eun Yu, Seung-ha Jee and Il-Gu Lee Integrated Detection and Response Framework for DDoS and Ransomware Attacks
Gyuha Son, Seo-Yi Kim and Il-Gu Lee Lightweight Anomaly Detection for Internet of Things: Integrating Feature Selection and Dimensionality Reduction
Chaewon Song, Hyeyeon Shim and Ilgu Lee Privacy-Preserving Grid-Based Clustering of Medical Data Using Homommorphic Encryption
Jungjoo Oh and Il-Gu Lee An Integrated Privacy Decision-Making Model for Multi-Factor Authentication Adoption
Mi-Yeon Kim, Sang-Hoon Choi and Ki-Woong Park Revealing Hidden Contention through Disk I/O Analysis in Multi-Tenant Containers
Hyeran Jung, Yeonsu Jeong, Seonwoo Lee and Taejin Lee Feedback-Driven False Alarm Detection for Network Attacks
So-Yeon Kim and Il-Gu Lee A Multi-Link Selective Access Control Framework for Secure and Reliable IoT Communications
Ye-Sin Kim, Jin-Min Lee and Il-Gu Lee An Interference-Aware Channel Selection Algorithm for Secure and Reliable Multi-Link Operation
Hyein Lee, Hyunche Song and Il-Gu Lee Privacy at Risk: Evaluating Data Protection Practices in South Korea’s Leading Digital Mental Health Apps
Jung-Min Moon, Na-Eun Park and Il-Gu Lee Wireless Channel Delay Spread-Based Dynamic Guard Interval Adjustment and Secondary Data Transmission Technique
Jin-Min Lee, Hye-Yeon Shim and Il-Gu Lee OBSS Interference Management via Distributed ML-based Joint TX Power and RX Sensitivity Control

 

Poster

paper

Oral

Session1

Authors

Title

Min Jeong Kang, Jung Hoon Lee and Il-Gu Lee

Machine Learning-Based Power Allocation for Secure MISO Communication Systems assisted by a Cooperative Jammer

Kengo Matsui and Shigeki Hagihara

Towards Symbolic Formalization of PoW Integrity in Blockchain

Seung-ha Jee, Yu-ran Jeon and Il-Gu Lee

Secure Restricted Access Window-Based Group Coordination for Mission-Critical Low-Latency and High Throughput Applications

Seo-Yi Kim, Na-Eun Park and Il-Gu Lee

Invisible Watermarking Based on DWT-SVD for Protecting Generative AI Content

Dongphil Kim

Security Policy Dissemination Scheme Between Satellite Ground Stations Based on CCSDS AOS Frames

Ga-Yeong Kim, Na-Eun Park and Il-Gu Lee

Security Vulnerability Analysis of Real-time Content Popularity Prediction-based Dynamic Memory Allocation System

Poster

paper

Oral

Session2

Ye-Hyeon Ahn, Sun-Jin Lee and Il-Gu Lee

A Lightweight Authentication Scheme for Securing IoT with Dual-Layer Verification

Chae Yeon Park, So Eun Jeon and Il-Gu Lee

Physical Layer-based Obfuscated Data Transmission Technique for Internet of Battlefield Things

Na-Hyun Kim, Sungbin Moon, Yewon Hwang, Seungho Jung, Seong-Cheon Park and Youngjae Lee

Detection of Concurrent Hardware Trojan (HT) Using EM and Backscattering Side-Channel Approah

Ye-Rim Jeong, Yeon-Jin Kim, Chae-Yeon Park and Il-Gu Lee

Air-Gap Exfiltration via High-Order Modulation-Based Screen Saver Covert Channels: Design, Implementation, and Defense

Sukyoung Kim, Soyeon Kim and Ilgu Lee

Enhancing Inter-Satellite Link Security with Shamir’s Secret Sharing-Based Frequency Hopping