Loading...

 Keynote Session  

 Keynote Session
No. Time Title/authors/Institution PDF
Keynote-1
Oct. 7, 2021
14:00 ~ 15:00
Introduction to Network Equipment Security Assurance Scheme (NESAS)
CSO Joonho Lee (Huawei Korea, South Korea)
Keynote-2
Oct. 8, 2021
15:30 ~ 16:30
Cybersecurity for 5G-Powered Vehicles
CSO Jaeson Yoo (Autocrypt Co. Ltd., South Korea)
Keynote-3
Oct. 8, 2021
17:00 ~ 18:00
AI technologies and advanced security for connected devices in next generation networks
Prof. Antonio Skarmeta (University of Murcia, Spain)
Keynote-4
Oct. 9, 2021
10:30 ~ 11:30
Networking Cognitive Security
Dr. Gianni D'Angelo (University of Salerno, Italy


 Oral/Poster Presentation  

 Oral Presentation
Paper Id Date Title/authors/Institution PDF
1A-1
Oct. 7, 2021
09:00 ~ 10:30
Comparative Analysis of Bluetooth LE and EDHOC for Potential Security Protocol in Artificial Pancreas System
Daniel Gerbi Duguma, Philip Virgil Astillo, Yonas Engida Gebremariam, Bonam Kim, and Ilsun You
1A-2
Oct. 7, 2021
09:00 ~ 10:30
MemTwin Consecutive Memory-Recording enhanced with FPGA for IoT Memory Inspection
Hye Lim Jung, Gi-Choel Choi, and Ki-Woong Park
1A-3
Oct. 7, 2021
09:00 ~ 10:30
Automotive Intrusion Detection Using Degree of Change in CAN Data Frame
Wansoo Kim, Jung Ho Lee, Yeon Jin Kim, Jin Gyun Chung, and Samuel Woo
1A-4
Oct. 7, 2021
09:00 ~ 10:30
Semantic Embedding-based Entity Alignment for Cybersecurity Knowledge Graphs
Minhwan Kim, Hanmin Kim,Gyudong Park and Mye Sohn
1B-1
Oct. 7, 2021
09:00 ~ 10:30
A Resource-Blockchain Framework for Safeguarding IoT
Monika Bharti, Rajesh Kumar, Sharad Saxena and Vishal Sharma
1B-2
Oct. 7, 2021
09:00 ~ 10:30
The Design and Implementation of Blockchain-assisted User Public-private Key Generation Method
Tianhong Zhang, Jianfeng Guan and Zejun Lan
1B-3
Oct. 7, 2021
09:00 ~ 10:30
A blockchain - based authentication scheme for 5G applications
Lanfang Ren, Xiaoting Huang, Huachun Zhou, Bo Yang, and Li Su
1B-4
Oct. 7, 2021
09:00 ~ 10:30
Smart Contract Based Personal Data Protection Framework: in cross-app advertising
Yuyuan Shi and Jianfeng Guan
2A-1
Oct. 7, 2021
11:00 ~ 12:30
Development Protection Profile for 5G Mobile Core Network Equipment
Hyungjin Cho, Sungmoon Kwon, Daeun Kim, Dowon Kim, and Ieckchae Euom
2A-2
Oct. 7, 2021
11:00 ~ 12:30
5G StandAlone Network Attack Scenarios using GTP Protocol
Sungmoon Kwon, Daeun Kim, Seongmin Park, and Dowon Kim
2A-3
Oct. 7, 2021
11:00 ~ 12:30
A Study on Analysis of Machine Learning-based IoT Botnet Traffic in 5G Core Networks
Ye-Eun Kim, Min-Gyu Kim, and Hwankuk Kim
2A-4
Oct. 7, 2021
11:00 ~ 12:30
Security and Trust in the Integration of Network Functions within the 5G Architecture: The 5GASP Project
Jorge Gallego-Madrid, Ramon Sanchez-Iborra and Antonio Skarmeta
2B-1
Oct. 7, 2021
11:00 ~ 12:30
Secure LoRaWAN Root Key Update Scheme for IoT Environment
Kun-Lin Tsai, Li-Woei Chen, Fang-Yie Leu, Hsiung-Chieh Hsu, and Tz-Yuan Huang
2B-2
Oct. 7, 2021
11:00 ~ 12:30
Distributed trust and reputation services in pervasive Internet-of-Things deployments
Borja Bordel Sánchez and Ramón Alcarria
2B-3
Oct. 7, 2021
11:00 ~ 12:30
A Secure Dispersed Computing Scheme for Internet of Mobile Things
Yan Zhao, Jincai Zou, Yuqiang Zhang, and Ning Hu
2B-4
Oct. 7, 2021
11:00 ~ 12:30
A Credible Information Fusion Method Based on Cascaded Topology Interactive Traceability
Yueqing Gao, Yuting Shen, Huachun Zhou, Benhui Shi, Lulu Chen, and Chu Du
3A-1
Oct. 7, 2021
15:30 ~ 17:00
Secure Data Encryption Technique for Cloud-based Collaboration supporting Dynamic Data Update
Taek-Young Youn and Nam-Su Jho
3A-2
Oct. 7, 2021
15:30 ~ 17:00
ASD: OpenWrt-based ARP Spoofing Detector
Yeon Seon Jeong, Hyung Hoon Kim, Hyojin Jo and Dong Hoon Lee
3A-3
Oct. 7, 2021
15:30 ~ 17:00
Theoretical Analysis of Biases in Chacha 128-bits
Karthika Sk and Kunwar Singh
3A-4
Oct. 7, 2021
15:30 ~ 17:00
Research On Health Security Association Model Based On Mobile Communication Location
Tao Haoran, Ding Ning, Huang Tianhui, Liu Jingyuan, Luo Rui, Qian Dongsheng and Ma Yuyin
4A-1
Oct. 8, 2021
09:00 ~ 10:30
Forensic Analysis of Apple Carplay: A case study
Junsu Lee, Juwon Kim, Hojun Seong, Keonyong Lee, Seongje Cho, Younjae Park, and Minkyu Park
4A-2
Oct. 8, 2021
09:00 ~ 10:30
Fingerprint Defender: Defense against browser based user tracking
Deepali Moad, Vikas Sihag, Gaurav Choudhary, Daniel Gerbi Duguma, and Ilsun You
4A-3
Oct. 8, 2021
09:00 ~ 10:30
Detection of Business Email Compromise Attacks with Writing Style Analysis
Alisa Vorobeva, Guldar Khisaeva, Danil Zakoldaev, and Igor Kotenko
4A-4
Oct. 8, 2021
09:00 ~ 10:30
Forensic analysis of Fitness Applications on Android
Rahul Sinha, Vikas Sihag, Gaurav Choudhary, Manu Vardhan, and Pradeep Singh
4B-1
Oct. 8, 2021
09:00 ~ 10:30
GreenSlice: An Energy-Efficient Secure Network Slicing Framework
Ozan Akin, Umut Can G?lmez, Ozan Sazak, Osman Ufuk Yagmur, and Pelin Angin
4B-2
Oct. 8, 2021
09:00 ~ 10:30
A Blockchain-based User Identity Authentication Method for 5G
Zhe Tu, Huachun Zhou, Kun Li, Haoxiang Song, and Weilin Wang
4B-3
Oct. 8, 2021
09:00 ~ 10:30
Cyber-Attack Behavior Knowledge Graph Based on CAPEC and CWE towards 6G
Weilin Wang, Huachun Zhou, Kun Li, Zhe Tu, and Feiyang Liu
4B-4
Oct. 8, 2021
09:00 ~ 10:30
The Security Mechanisms between two UPFs Belonging to two 5G Core Networks
Fang-Yie Leu, Yu-Syuan Lu, and Heru Susanto
5A-1
Oct. 8, 2021
11:00 ~ 12:30
Measuring Anti-analysis Techniques in Malware
Minho Kim, Haehyun Cho, and Jeong Hyun Yi
5A-2
Oct. 8, 2021
11:00 ~ 12:30
Android Adware Detection using Soot and CFG
Jungsoo Park, Hyunseok Shim, Long Nguyen Vu, and Souhwan Jung
5A-3
Oct. 8, 2021
11:00 ~ 12:30
A Systematic Literature Review on the Mobile Malware Detection Methods
Kim Yu-Kyung, Jemin Lee, Myong-Hyun Go, Hae Young Kang, and Kyungho Lee
5A-4
Oct. 8, 2021
11:00 ~ 12:30
Effectiveness of Video-Classification in Android malware detection through API-Streams and CNN-LSTM Autoencoders
Gianni D'Angelo, Francesco Palmieri, and Antonio Robustelli
5B-1
Oct. 8, 2021
11:00 ~ 12:30
Which One is More Robust to Low-rate DDoS Attacks? The Multipath TCP or The SCTP
Lejun Ji, Gang Lei, Ruiwen Ji, Yuanlong Cao, Xun Shao, and Xin Huang
5B-2
Oct. 8, 2021
11:00 ~ 12:30
A DDoS Detection Method with Feature Set Dimension Reduction
Man Li, Yajuan Qin and Huachun Zhou
5B-3
Oct. 8, 2021
11:00 ~ 12:30
Malicious Behavior Feature Graph for Knowledge Reasoning of DDoS Attacks in 6G
Kun Li, Huachun Zhou, Zhe Tu, Feiyang Liu, and Lijuan Li
5B-4
Oct. 8, 2021
11:00 ~ 12:30
An Anonymous Communication System Based on Software Defined Architecture
Xinda Cheng, Yixing Chen, Jincai Zou, Yuqiang Zhang, and Ning Hu
6-1
Oct. 8, 2021
13:30 ~ 15:00
Temporal Patterns Discovery of Evolving Graphs for Graph Neural Network (GNN)-based Anomaly Detection in Heterogenous Networks
Jongmo Kim, Kunyoung Kim,Gi-yoon Jeon, and Mye Sohn
6-2
Oct. 8, 2021
13:30 ~ 15:00
Anomaly Detection Methods Using Power Plant Packet Data with Machine Learning in IoT Environment
Junwon Kim, Hyunpyo Choi, Jiho Shin, and Jung Taek Seo
6-3
Oct. 8, 2021
13:30 ~ 15:00
DAVS: Dockerfile Analysis for Vulnerable Scanning
Thien-Phuc Doan and Souhwan Jung
6-4
Oct. 8, 2021
13:30 ~ 15:00
A Novel Rescaled and Reformulated Convolution Network for Semantic Segmentation
Sai Prabanjan Kumar Kalvapalli, C. Mala, and V. Punitha
7-1
Oct. 8, 2021
9:00 ~ 10:10
Trojan Attacks and Defense for Speech Recognition
Wei Zong, Yang-Wai Chow, Willy Susilo, and Jongkil Kim
7-2
Oct. 8, 2021
9:00 ~ 10:10
Research and Implementation of Speed and Distance Measurement Technology in Train Safety Control System
Yutong Liu, Fei Song, Xiuling Wang, and Letian Li
 Poster Presentation
Paper Id Time Title/authors/Institution Abstract
3B-1
Oct. 7, 2021
15:30 ~ 17:00
POSTER: Feature Reduction in Machine Learning for Application-based Examples
Long Nguyen-Vu and Souhwan Jung
3B-2
Oct. 7, 2021
15:30 ~ 17:00
POSTER: A Study on Voice-based Authentication via Speaker-Recognition and the Risk of Speech Synthesis
Hyeon Park and TaeGuen Kim
3B-3
Oct. 7, 2021
15:30 ~ 17:00
Poster : A Benchmark for Image Encryption Scheme with Statistical Effective Range
Sung-Won Kang and Kyung-Hyune Rhee
3B-4
Oct. 7, 2021
15:30 ~ 17:00
Poster: Performance comparison of GNSS navigation message authentication protocols
Turabek Gaybullaev, Da-Yeon Jeon, and Mun-Kyu Lee
3B-5
Oct. 7, 2021
15:30 ~ 17:00
Poster: Decentralized Fair Data Trading Model
Kang Woo Cho, Mi Hyeon Jeon, and Sang Uk Shin
3B-6
Oct. 7, 2021
15:30 ~ 17:00
POSTER: Development of Total Security Platform to Protect Autonomous Car and Intelligent Traffic System under 5G Environment
Keon Yun, Won Haeng Lee, Myung Woo Chung, Jin Hyeok Oh, Hyun Jun Shin, and Kwon Koo Kwak
3B-7
Oct. 7, 2021
15:30 ~ 17:00
Poster: A study on user recognition based on dilated convolution using biosignals for wearable device application
Min-Gu Kim and Sung Bum Pan
3B-8
Oct. 7, 2021
15:30 ~ 17:00
Poster: Study on the Deep Learning-Based Face Recognition Using HOG Features
Cheol-Ho Song, Min-Gu Kim and Sung-Bum Pan
3B-9
Oct. 7, 2021
15:30 ~ 17:00
Poster: Toward Hourglass-Concepted Memory Data Leakage Protection with Capacitor-Based Timer
Ahn Sung-Kyu, Ji-Won Kang, and Ki-Woong Park
3B-10
Oct. 7, 2021
15:30 ~ 17:00
Poster: Evaluating the robustness of blockchain network topology against blockchain network attacks
Huisu Jang, Kang-Ju Lee, and Woong Kook
3B-11
Oct. 7, 2021
15:30 ~ 17:00
Poster: Deobfuscating Obfuscated Code for Detecting Sensitive Data Flows in Mobile Malware
DongHo Lee, Haehyun Cho and Jeong Hyun Yi
3B-12
Oct. 7, 2021
15:30 ~ 17:00
Poster: A Study on Deep Learning-based Approaches for Code Similarity Detection
Younghoon Ban, Haehyun Cho, and Jeong Hyun Yi
3B-13
Oct. 7, 2021
15:30 ~ 17:00
Poster: Specification-based Misbehavior Detection and Deep Learning-based Anomaly Detection System to Enhance Insulin Pump Security
Philip Virgil Astillo, Yonas Engida Gebremariam, Daniel Gerbi Duguma, Bonam Kim, and Ilsun You
3B-14
Oct. 7, 2021
15:30 ~ 17:00
Poster: Secure and Efficient JWT Token Authentication for Light OAuth 2.0 Implementation
Sung-Hyun Kim, Su-Yoon Jang, and Taek-Young Youn
3B-15
Oct. 7, 2021
15:30 ~ 17:00
Poster: Instruction-level Disassembler Based on Power Consumption Leakage of IoT devices
Daehyeon Bae, Jaewook Lee, and Jaecheol Ha







Previous Page