Program
DAY 1 August 20 (WED)
TIme | Crystal Hall (2F) |
---|---|
12:00~13:00 | Registration |
13:00~13:10 | Opening Remarks |
13:10~13:50 | Keynote1: Cloud Computing Security: Challenging Issues and Future Directions Prof. Willy Susilo (University of Wollongong) |
13:50~14:00 | Coffee Break |
14:00~14:20 | Session 1 (System & Application Security) |
Crashing or Freezing the Bot: LiDAR Spoofing Attacks on ROS 2 UGV( Hwaseong Lee, Hyunwoo Lee, Youngki Jung, Seondong Heo, Moosung Park and Changon Yoo) | |
14:20~14:40 | PodBeater: Exploiting Multi-Value Affinity for Efficient Co-Location Attacks in Kubernetes ( Yiju Jung, Hyerean Jang and Youngjoo Shin) |
14:40~15:00 | GUARD-CAN: Graph-Understanding and Recurrent Architecture for CAN Anomaly Detection ( Hyeong Seon Kim and Huy Kang Kim) |
15:00~15:20 | Break Time |
15:20~16:00 | Invtied Talk1: Overlaying Crypto Agility onto the N2SF in the Cloud EraDr. Jihoon Cho (Vice President, Samsung SDS) |
16:00~16:10 | Coffee Break |
16:10~16:30 | Session 2 (5G & Network Security) |
A Real-World Dataset to Enhance Intrusion Detection in SDN-IoT Systems(Chau Nguyen, Hoang Anh Nguyen, Yang-Wai Chow and Willy Susilo) | |
16:30~16:50 | Toward a Stealth Mode of 5G-AKA( Seonghan Shin) |
16:50~17:10 | Denial-of-Service Risks in 5G Devices: Empirical Analysis on Connection Restriction Mechanisms ( Beomseok Oh, Mincheol Son, Kwangmin Kim, Jiho Lee, Duckwoo Kim, Taekkyung Oh, Cheoljun Park and Yongdae Kim) |
17:10~17:20 | Coffee Break |
17:20~17:40 | Session 3 (Cybersecurity Education & Model Security) |
Real Environment Tolerance Curve (RETC): Assessing Machine Learning Model Performance Degradation Under Extreme Class Imbalance ( Yuki Tanaka and Mamoru Mimura) |
|
17:40~18:00 | TALOS: An Empirical Approach to Building Portable Hands-On Labs for Fundamental Cybersecurity Education using Open-Source (Young Han Choi and Ki Tae Park) |
DAY 2 August 21 (THU)
Time | Crystal Hall | Jade Hall |
---|---|---|
09:30~09:50 | Session 4(Security Analysis & Verification) | Session 5(Malware & Forensics) |
Impossible Differential Attack on SAND-64 (Nobuyuki Sugio) |
User Conversation Recovery from ChatGPT Local Artifacts in Web Browsers for Digital Forensic Investigations ( Minjung Yoo, Seunghyun Park and Seongmin Kim) |
|
09:50~10:10 | Formal Verification of Labyrinth Encrypted Message Storage Protocol in Messenger ( Kakeru Watanabe and Kazuki Yoneyama) |
Criminal Network Detection in Ethereum Using Change-Point Analysis: A Case Study of OFAC-Listed North Korean Wallet Addresses ( Geon Woo Jeon and Ji Won Yoon) |
10:10~10:30 | Automated VEX Generation and Vulnerability Prioritization using Inter-Module Symbol Graphs (Jeongho Lee and Seyoung Lee) |
Interaction-Aware System Call Sequence Analysis for Android Malware Classification ( Jae-Min Choi, Sang-Hoon Choi and Ki-Woong Park) |
10:30~10:50 | Break Time | |
10:50~11:30 | Keynote2: Security in the Age of AI Dr. Wolfgang Richter (Director of Engineering, Soroco Co.Ltd) |
|
11:30~11:50 | Break Time | |
11:50~12:30 | Invtied Talk2: Digital Trust in the AI Era: Navigating the New Cybersecurity LandscapeHosuk Lee (CISO of AWS Korea) | |
12:30~14:00 | Lunch Time | |
14:00~14:20 | KIISC Board Meeting | Research Story |
KIISC Board Meeting | From Page to Stage: Returning to Top Security Venue (Taekyoung Kwon, Yonsei University) |
|
14:20~14:40 | Recommendations for Writing Research Papers in Security Area( DaeHun Nyang, Ewha Womans University) | |
14:40~15:00 | Lesson: Simple Is Always Best (Hyunwoo Lee, Korea Institute of Energy Technology (KENTECH)) |
|
15:00~16:00 | KIISC Board Meeting | Poster Session |
KIISC Board Meeting | Poster Session 1 | |
16:00~17:00 | Poster Session 2 | |
17:00~18:00 | Poster Session 3 | |
18:00~18:30 | Break Time | |
18:30~End | Banquet (Convention Hall, 1F) |
DAY 3 August 22 (FRI)
Time | Crystal Hall | Jade Hall | Ruby Hall | |
---|---|---|---|---|
09:30~09:50 | Session 6(Quantum & Cryptography) | Session 7(AI/LLM for Security) | No Session | |
09:30~09:50Depth-Optimized Quantum Implementation of CHAM ( Kyoungbae Jang, Yujin Oh and Hwajeong Seo) |
Detecting Malicious JavaScript Code by Code-Specialized LLM ( Keiichi Kinoshita and Mamoru Mimura) |
|||
09:50~10:10 | Quantum Implementation and Analysis of SHA-1 ( Seyoung Yoon, Gyeongju Song, Kyungbae Jang and Hwajeong Seo) |
A Framework for Assessing Nation-State Cyber Attack Capabilities Using MITRE ATT&CK and Large Language Models ( Hyungkwan Kim, Hyunggyu Lee and Wook Shin) |
||
10:10~10:30 | PoC Hash: A Power-of-Commutators Hash over Hamiltonian Quaternions ( Hyungrok Jo and Junji Shikata) |
Understanding Encrypted Network Anomalies with LLMs: A Post-hoc Cognitive Framework (Lee Seon Woo, Park Hyeon Woo and Lee Tae Jin) |
||
10:30~10:50 | Break Time | |||
10:50~11:10 | Session 8(Privacy & Anonymity) | Session 9(IoT & Traffic Analysis) | ||
No Session10:50~11:10Towards Sender Anonymity for Singleton Sets ( Yamya Reiki and Yudhveer Singh ) |
IoT Botnet Detection Based on the Behaviors of DNS over TLS Queries ( Cheng-Han Shie, Yu-Chun Tseng and Chun-I Fan) |
|||
11:10~11:30 | LeakGuard: Detecting and Mitigating Attribute Leakage in Fine-Tuned Diffusion Models ( A Yeon Kim, Jung Yup Rhee and Taekyoung Kwon) |
Bootstrap-based Evaluation of Clustering Suitability Across TCP Payload Dataset Structures ( Dung Ta Anh, Yasuhiro Nakamura and Hidema Tanaka) |
||
11:30~11:50 | Privacy-Preserving Logistic Regression Using Homomorphic Encryption: An Adaptive Optimization Approach ( Hye-Yeon Shim, Yeon-Ji Lee and Il-Gu Lee) |
Comparative Eval. of SSL Feature Extractors & Classifiers for DFAD ( Seong Bean Park and Hyun Min Song) |
||
11:50~13:20 | Lunch Time | |||
13:20~13:35 | No Session | Session 10 (Poster paper Oral Session1) | ||
Machine Learning-Based Power Allocation for Secure MISO Communication Systems assisted by a Cooperative Jammer (Min Jeong Kang, Jung Hoon Lee and Il-Gu Lee) |
||||
13:35~13:50 | Towards Symbolic Formalization of PoW Integrity in Blockchain (Kengo Matsui and Shigeki Hagihara) |
|||
13:50~14:05 | Secure Restricted Access Window-Based Group Coordination for Mission-Critical Low-Latency and High Throughput Applications (Seung-ha Jee, Yu-ran Jeon and Il-Gu Lee) |
|||
14:05~14:20 | Invisible Watermarking Based on DWT-SVD for Protecting Generative AI Content (Seo-Yi Kim, Na-Eun Park and Il-Gu Lee) |
|||
14:20~14:35 | Security Policy Dissemination Scheme Between Satellite Ground Stations Based on CCSDS AOS Frames (Dongphil Kim) |
|||
14:35~14:50 | Security Vulnerability Analysis of Real-time Content Popularity Prediction-based Dynamic Memory Allocation System (Ga-Yeong Kim, Na-Eun Park and Il-Gu Lee) |
|||
14:50~15:00 | Break Time | |||
15:00~15:15 | No Session | Session 11 (Poster paper Oral Session2) | ||
A Lightweight Authentication Scheme for Securing IoT with Dual-Layer Verification (Ye-Hyeon Ahn, Sun-Jin Lee and Il-Gu Lee) |
||||
15:15~15:30 | Physical Layer-based Obfuscated Data Transmission Technique for Internet of Battlefield Things (Chae Yeon Park, So Eun Jeon and Il-Gu Lee) |
|||
15:30~15:45 | Detection of Concurrent Hardware Trojan (HT) Using EM and Backscattering Side-Channel Approah (Na-Hyun Kim, Sungbin Moon, Yewon Hwang, Seungho Jung, Seong-Cheon Park and Youngjae Lee) |
|||
15:45~16:00 | Air-Gap Exfiltration via High-Order Modulation-Based Screen Saver Covert Channels: Design, Implementation, and Defense (Ye-Rim Jeong, Yeon-Jin Kim, Chae-Yeon Park and Il-Gu Lee) |
|||
16:00~16:15 | Enhancing Inter-Satellite Link Security with Shamir’s Secret Sharing-Based Frequency Hopping (Sukyoung Kim, Soyeon Kim and Ilgu Lee) |
Paper Session
Paper Number |
Authors | Title |
---|---|---|
2 | Nobuyuki Sugio | Impossible Differential Attack on SAND-64 |
3 | Beomseok Oh, Mincheol Son, Kwangmin Kim, Jiho Lee, Duckwoo Kim, Taekkyung Oh, Cheoljun Park and Yongdae Kim | Denial-of-Service Risks in 5G Devices: Empirical Analysis on Connection Restriction Mechanisms |
6 | Yiju Jung, Hyerean Jang and Youngjoo Shin | PodBeater: Exploiting Multi-Value Affinity for Efficient Co-Location Attacks in Kubernetes |
17 | Kyoungbae Jang, Yujin Oh and Hwajeong Seo | Depth-Optimized Quantum Implementation of CHAM |
18 | Cheng-Han Shie, Yu-Chun Tseng and Chun-I Fan | IoT Botnet Detection Based on the Behaviors of DNS over TLS Queries |
19 | Hwaseong Lee, Hyunwoo Lee, Youngki Jung, Seondong Heo, Moosung Park and Changon Yoo | Crashing or Freezing the Bot: LiDAR Spoofing Attacks on ROS 2 UGV |
21 | Yamya Reiki and Yudhveer Singh | Towards Sender Anonymity for Singleton Sets |
22 | Dung Ta Anh, Yasuhiro Nakamura and Hidema Tanaka | Bootstrap-based Evaluation of Clustering Suitability Across TCP Payload Dataset Structures |
24 | Yuki Tanaka and Mamoru Mimura | Real Environment Tolerance Curve (RETC): Assessing Machine Learning Model Performance Degradation Under Extreme Class Imbalance |
25 | Kakeru Watanabe and Kazuki Yoneyama | Formal Verification of Labyrinth Encrypted Message Storage Protocol in Messenger |
28 | Seyoung Yoon, Gyeongju Song, Kyungbae Jang and Hwajeong Seo | Quantum Implementation and Analysis of SHA-1 |
29 | Young Han Choi and Ki Tae Park | TALOS: An Empirical Approach to Building Portable Hands-On Labs for Fundamental Cybersecurity Education using Open-source |
32 | Hyeong Seon Kim and Huy Kang Kim | GUARD-CAN: Graph-Understanding and Recurrent Architecture for CAN Anomaly Detection |
33 | A Yeon Kim, Jung Yup Rhee and Taekyoung Kwon | LeakGuard: Detecting and Mitigating Attribute Leakage in Fine-Tuned Diffusion Models |
34 | Keiichi Kinoshita and Mamoru Mimura | Detecting Malicious JavaScript Code by Code-Specialized LLM |
41 | Minjung Yoo, Seunghyun Park and Seongmin Kim | User Conversation Recovery from ChatGPT Local Artifacts in Web Browsers for Digital Forensic Investigations |
46 | Jeongho Lee and Seyoung Lee | Automated VEX Generation and Vulnerability Prioritization using Inter-Module Symbol Graphs |
47 | Geon Woo Jeon and Ji Won Yoon | Criminal Network Detection in Ethereum Using Change-Point Analysis: A Case Study of OFAC-Listed North Korean Wallet Addresses |
51 | Hyungkwan Kim, Hyunggyu Lee and Wook Shin | A Framework for Assessing Nation-State Cyber Attack Capabilities Using MITRE ATT&CK and Large Language Models |
54 | Jae-Min Choi, Sang-Hoon Choi and Ki-Woong Park | Interaction-Aware System Call Sequence Analysis for Android Malware Classificatio |
59 | Seong Bean Park and Hyun Min Song | Comparative Eval. of SSL Feature Extractors & Classifiers for DFAD |
60 | Hye-Yeon Shim, Yeon-Ji Lee and Il-Gu Lee | Privacy-Preserving Logistic Regression Using Homomorphic Encryption: An Adaptive Optimization Approach |
64 | Chau Nguyen, Hoang Anh Nguyen, Yang-Wai Chow and Willy Susilo | A Real-World Dataset to Enhance Intrusion Detection in SDN-IoT Systems |
66 | Lee Seon Woo, Park Hyeon Woo and Lee Tae Jin | Understanding Encrypted Network Anomalies with LLMs: A Post-hoc Cognitive Framework |
67 | Hyungrok Jo and Junji Shikata | PoC Hash: A Power-of-Commutators Hash over Hamiltonian Quaternions |
69 | Seonghan Shin | Toward a Stealth Mode of 5G-AKA |
Poster Session
Poster Session 1 |
Authors | Title |
---|---|---|
So-Eun Jeon, Jung Hoon Lee and Il-Gu Lee | Smart Jamming with User Data: Redefining Wireless Secrecy in Multi-AP Networks | |
Sobirova Khusnora Bakhtiyor Kizi, Cho Nwe Zin Latt and Kyung Hyune Rhee | A Hybrid Sensitive Data Detection Framework for Structured Enterprise Data with Extension to Unstructured Text | |
Sayeon Kim, Olmi Lee and Woohyun Jang | Executable Protection via TPM-Sealed Key Unsealing and Memory-Only Execution in Embedded Systems | |
Su Jin Shin, Siwan Noh and Sang Uk Shin | BNPKM: Biometric Non-stored Private Key Management | |
Chanhee Han, Kyeongseok Lee and Homook Cho | DisTORbution Crawler: Active Tor Configuration for Efficient Dark Web Crawling | |
So Yeon Kim, Dong Woo Lee, Seong Hyun Min, Jung Hun Lim, Ma Il Jo, In Jae Kim, Ja Sil Choi, Min Ho Jung, Seong Eun Park and Won Gyum Kim | Context-Aware and Attention-Driven Deepfake Detection via Enhanced Residual Architectures | |
Seoyun Kang, Jeongeun Ryu, Yumin Lee, Jueun Son and Seongmin Kim | Empirical Study on Consistency of LLM-Based Policy as Code Generation for Network Policies | |
Yumin Lee, Jeongeun Ryu Ryu, Seoyun Kang, Jueun Son and Seongmin Kim | Exploring Prompt Strategy of LLM-based PaC Generation in Kubernetes Environment | |
Junghyun Mok and Sokjoon Lee | A Zero Trust Based Framework for xApp Access Control in O-RAN | |
Juhyeon Lee, Il Whan Ji and Jung Taek Seo | A Reinforcement Learning-Based Model for Multi-Step Attack Sequence Prediction in Industrial Control Systems | |
Dong-Kwon Jung and Woong-Sik Kim | Forecasting Stock Prices in the Korean Market Using News Sentiment | |
Kyu-Hyun Kang, Jae Yoon Kim, Nam-Su Jho and Taek-Young Yoon | Quantum-Secure Timestamp for the Integrity of Classical Signatures in Quantum Transition | |
Donghwan Lee, Hojune Shin and Younho Lee | Homomorphic Stationarity Testing using CKKS for Outsourced Time-series Data Analysis | |
Sehwa Ko, Kyeongmin Lee, Eunse Kang and Junyoung Son | FingerRatchet: A Lightweight Anonymous P2P Protocol with Out-of-Band Fingerprint Exchange | |
I Wayan Adi Juliawan Pawana, Hoseok Kwon, Bonam Kim and Ilsun You | Enhancing Private 5G Networks for IIoT: EAP-AKA’ Implementation in Open5GS | |
Selynn Kim, Taehun Kim and Youngjoo Shin | A Survey of Speculative Load Prediction Attacks Exploiting Memory Disambiguation Units | |
Sun-Jin Lee and Il-Gu Lee | Privacy-Preserving GAN-Based Data Augmentation for Intrusion Detection Without Accuracy Degradation | |
Yu-Na Kim, Yeon-Jin Kim and Il-Gu Lee | Optimizing Synthetic-to-Original Data Ratio for Reliable Model Training | |
Hwaseong Lee, Hyunwoo Lee, Youngki Jung, Seondong Heo, Moosung Park and Changon Yoo | UGVScan: Automated Tool for Multi-layer Rule Profiling on ROS 2-based UGV platforms | |
Kihoon Kim, Dongyeop Kim, Taeuk Ha and Jinsoo Jang | Recent Trends in Space Cybersecurity: Attack and Defense | |
Hye-eun Son and Hyoseung Kim | AnonC2PA: C2PA-based Anonymous Proof of Content Authenticity | |
Da-hyung Kim, Jeong-hwa Ryu, Su-bin Lee and Seong-min Kim | Comparative Analysis of HTML Structure Between Legal and Illegal Streaming Websites | |
Lee Taeyong, You Inseo, Kim Ju-Chan, Lee Kyumin, Jin Hyeonggwon, Yang Seunggwon, Yoon Hyenonbin, Park Jihoo, No Yonghun and Lee Minwoo | NMEA Under Siege: Dynamic Flooding Attacks and Defenses | |
Poster Session 2 |
Lee Taeyong, You Inseo, Kim Ju-Chan, Lee Kyumin, Jin Hyeonggwon, Yang Seunggwon, Yoon Hyenonbin, Park Jihoo, No Yonghun and Lee Minwoo | Visual Tampering in S-52: Threats and Protections |
Jueon Choi, Gunjin Cha, Misoo Kim, Ieck-Chae Eum and Kwanghoon Choi | A Method for Selecting Security Checklist Items Associated with Incidents by Analyzing Security Incident Reports and Vulnerability Checklists Using LLM | |
Kiyeon Kim, Minyoung Choi, Jumi Kim, Eunjin Kim and Gibum Kim | A Study on the Analysis and Improvement of Web-Based DRM Bypass Techniques for OTT Content Protection | |
Yong Heon Lim, Jong Chan Seo and Hae Young Lee | PCFG-Based Framework for Cracking Korean Users’ Passwords | |
Heechan Kim, Jaehyun Kim, Kyungyun Lee and Junyoung Son | Blockchain-Assisted Explainable AI Framework for Accountability in Autonomous Driving Systems | |
Yujeong Seo and Hyunwoo Lee | PHANTOM: Predictive Security Policy Orchestration for Detecting Multi-stage Stealthy Attacks | |
Seokjae Gwon, Gyeonghoe Kim and Seyoung Lee | Evaluating Domain-Specific Hallucinations in LLMs Triggered by Jeju Dialect Inputs | |
Seokjae Gwon, Esther Kim, Huijin Lim, Nahyun Kim and Seyoung Lee | Design and Implementation of a Security Vulnerability Practice Testbed in Agentic LLM Environments | |
Gunseung Jin, Minseo Park and Jinsoo Jang | Forensic Analysis of Mattermost Server | |
Hyunjin Jang, Jiwon Yun, Yeonjeong Hwang, Morsheda Akter, Howon Kim and Junyoung Son | Multi-class Attack Detection in CAN Networks using Lightweight 1D CNN | |
Wibby Aldryani Astuti Praditasari, Hyejin Yoon, Hyeongyeop Kim and Okyeon Yi | Quantum-Rekeyed Privacy for AI-Powered Financial Assistants | |
Adi Panca Saputra Iskandar, Yongho Ko, Bonam Kim and Ilsun You | Blockchain-Assisted Handover Authentication: A Lightweight and Scalable Approach for 5G | |
Se-Ok Jeon, Seokhwi Kim and Kwanghoon Choi | Analyzing the Limitations of CVE‑Based Source‑Code Vulnerability Slice Extraction | |
Hyunji Cho, Jiyeon Yang, Woojin Im and Jinsoo Jang | Forensic Analysis of Siri on iOS | |
Sooin Kim, Seonghyun Min, Limjung Hoon, Jiyoung Shin and Wongyum Kim | Enhancing Face Forgery Detection through Dual-branch Transformer and contrastive pretraining | |
Yunsung Kim, Gyeongdeok An, Sangwon Lee and Jaecheol Ha | CNN-based Trace Interval Detection for Fault Injection Point Identification on DNN Models | |
Yoonjung Cho, Jeongwoo Lee, Baikjin Jung and Heejo Lee | Poster: Enhancing Vulnerability Fix Commit Identification via Data Augmentation with Security Unrelated Commits | |
Kyeongseok Yang, Sungyu Kim, Jeongwoo Lee, Yoongjong Na, Duyeong Kim and Heejo Lee | Poster: HatBOM, An Automated Analysis Platform for SBOM and VEX Generation | |
Yeonhee Kim, Soona Lee and Jongkil Kim | On-Device RAG System with Role-Based Document Access Control: A PropertyGPT-Based Approach | |
Dongjun Choi and Jungtaek Seo | A Quantitative Assessment Framework for Cyber Incident Response Exercises in Nuclear Facilities | |
Yoonsun Han, Mingi Kim, Chearin Kim and Seog Chung Seo | Isogeny Based Quantum Secure Bootstrapping Against Fake Base Stations in 6G Networks | |
Shin Dawit, Cho Jaehan, Son Junyoung and Kim Howon | Quantum Machine Learning for Intrusion Detection: Analyzing QSVM on CIC-IDS2017 | |
Mingi Kim, Yoonsun Han, Chaerin Kim and Seog Chung Seo | A New DPKI_Based Model for Certificate Validation against FBS Attacks | |
Poster Session 3 |
Chaerin Kim, Yoonsun Han, Mingi Kim and Seog Chung Seo | Post Quantum Cryptography Migration for IoT–NTN Communications in 6G Networks |
Heeyeong Suh, Nayeon Ryu and Seyoung Lee | Speak One, Leak All? Exploiting Multilingual LLMs via Monolingual Mode | |
Gyeongdeok An, Yunsung Kim, Sangwon Lee and Jaecheol Ha | Slope-based Sum of Absolute Differences (S-SAD) Method for Improving Pattern-matching Accuracy on Side-Channel Signal | |
Jung Kyu Seo, Ju Hyeon Lee and Jung Taek Seo | A Survey on AI-Based Anomaly Detection Using TypeSpecific Datasets in Industrial Control Systems | |
Chae-wan Hong, Seung-ha Jee and Il-Gu Lee | Feature Selection Optimization Based on Data Characteristics for Ransomware Detection | |
Nayeon Ryu, Heeyeong Suh and Seyoung Lee | Choices Beneath the Surface : How Dark Patterns Operate in Kiosk Interfaces Across Countries | |
Min-ji Cho, So-Eun Jeon and Il-gu Lee | Cooperative Machine Learning Framework for Efficient Detection of Wireless Availability Attacks in Internet of Things Networks | |
Hyobeen Cho, Namryeong Kim, Sunwoo Jeong and Ilgu Lee | Enhancing DeFi Smart Contract Security via LangChain and Retrieval-Augmented Generation | |
Suji Park, Yeon-Ji Lee and Il-Gu Lee | A Revocable Multimodal EEG Authentication Paradigm Using P300 Responses | |
Yeonwoo Lee, Yeonji Lee and Ilgu Lee | Improving Decision Accuracy in Multi-Sensor-Based Machine Learning Systems through Drift-Resilient Contribution Analysis | |
Suyeong Kim, Hyeyeon Shim and Ilgu Lee | An Analysis of the Impact of Dataset Preprocessing on the Performance of Homomorphic Encryption-Based Machine Learning | |
Chanhyuk Kim, Changuk Jang and Okyeon Yi | Design of a Web-Based Verification Tool for Ensuring the Reliability of PQC Algorithm Implementations | |
Da-eun Yu, Seung-ha Jee and Il-Gu Lee | Integrated Detection and Response Framework for DDoS and Ransomware Attacks | |
Gyuha Son, Seo-Yi Kim and Il-Gu Lee | Lightweight Anomaly Detection for Internet of Things: Integrating Feature Selection and Dimensionality Reduction | |
Chaewon Song, Hyeyeon Shim and Ilgu Lee | Privacy-Preserving Grid-Based Clustering of Medical Data Using Homommorphic Encryption | |
Jungjoo Oh and Il-Gu Lee | An Integrated Privacy Decision-Making Model for Multi-Factor Authentication Adoption | |
Mi-Yeon Kim, Sang-Hoon Choi and Ki-Woong Park | Revealing Hidden Contention through Disk I/O Analysis in Multi-Tenant Containers | |
Hyeran Jung, Yeonsu Jeong, Seonwoo Lee and Taejin Lee | Feedback-Driven False Alarm Detection for Network Attacks | |
So-Yeon Kim and Il-Gu Lee | A Multi-Link Selective Access Control Framework for Secure and Reliable IoT Communications | |
Ye-Sin Kim, Jin-Min Lee and Il-Gu Lee | An Interference-Aware Channel Selection Algorithm for Secure and Reliable Multi-Link Operation | |
Hyein Lee, Hyunche Song and Il-Gu Lee | Privacy at Risk: Evaluating Data Protection Practices in South Korea’s Leading Digital Mental Health Apps | |
Jung-Min Moon, Na-Eun Park and Il-Gu Lee | Wireless Channel Delay Spread-Based Dynamic Guard Interval Adjustment and Secondary Data Transmission Technique | |
Jin-Min Lee, Hye-Yeon Shim and Il-Gu Lee | OBSS Interference Management via Distributed ML-based Joint TX Power and RX Sensitivity Control |
Poster paper Oral Session1 |
Authors |
Title |
Min Jeong Kang, Jung Hoon Lee and Il-Gu Lee |
Machine Learning-Based Power Allocation for Secure MISO Communication Systems assisted by a Cooperative Jammer |
|
Kengo Matsui and Shigeki Hagihara |
Towards Symbolic Formalization of PoW Integrity in Blockchain |
|
Seung-ha Jee, Yu-ran Jeon and Il-Gu Lee |
Secure Restricted Access Window-Based Group Coordination for Mission-Critical Low-Latency and High Throughput Applications |
|
Seo-Yi Kim, Na-Eun Park and Il-Gu Lee |
Invisible Watermarking Based on DWT-SVD for Protecting Generative AI Content |
|
Dongphil Kim |
Security Policy Dissemination Scheme Between Satellite Ground Stations Based on CCSDS AOS Frames |
|
Ga-Yeong Kim, Na-Eun Park and Il-Gu Lee |
Security Vulnerability Analysis of Real-time Content Popularity Prediction-based Dynamic Memory Allocation System |
|
Poster paper Oral Session2 |
Ye-Hyeon Ahn, Sun-Jin Lee and Il-Gu Lee |
A Lightweight Authentication Scheme for Securing IoT with Dual-Layer Verification |
Chae Yeon Park, So Eun Jeon and Il-Gu Lee |
Physical Layer-based Obfuscated Data Transmission Technique for Internet of Battlefield Things |
|
Na-Hyun Kim, Sungbin Moon, Yewon Hwang, Seungho Jung, Seong-Cheon Park and Youngjae Lee |
Detection of Concurrent Hardware Trojan (HT) Using EM and Backscattering Side-Channel Approah |
|
Ye-Rim Jeong, Yeon-Jin Kim, Chae-Yeon Park and Il-Gu Lee |
Air-Gap Exfiltration via High-Order Modulation-Based Screen Saver Covert Channels: Design, Implementation, and Defense |
|
Sukyoung Kim, Soyeon Kim and Ilgu Lee |
Enhancing Inter-Satellite Link Security with Shamir’s Secret Sharing-Based Frequency Hopping |