Paper Id |
Date |
Title/authors/Institution |
PDF |
1A-1 |
Oct. 7, 2021 09:00 ~ 10:30 |
Comparative Analysis of Bluetooth LE and EDHOC for Potential Security Protocol in Artificial Pancreas System Daniel Gerbi Duguma, Philip Virgil Astillo, Yonas Engida Gebremariam, Bonam Kim, and Ilsun You | |
1A-2 |
Oct. 7, 2021 09:00 ~ 10:30 |
MemTwin Consecutive Memory-Recording enhanced with FPGA for IoT Memory Inspection Hye Lim Jung, Gi-Choel Choi, and Ki-Woong Park | |
1A-3 |
Oct. 7, 2021 09:00 ~ 10:30 |
Automotive Intrusion Detection Using Degree of Change in CAN Data Frame Wansoo Kim, Jung Ho Lee, Yeon Jin Kim, Jin Gyun Chung, and Samuel Woo | |
1A-4 |
Oct. 7, 2021 09:00 ~ 10:30 |
Semantic Embedding-based Entity Alignment for Cybersecurity Knowledge Graphs Minhwan Kim, Hanmin Kim,Gyudong Park and Mye Sohn | |
1B-1 |
Oct. 7, 2021 09:00 ~ 10:30 |
A Resource-Blockchain Framework for Safeguarding IoT Monika Bharti, Rajesh Kumar, Sharad Saxena and Vishal Sharma | |
1B-2 |
Oct. 7, 2021 09:00 ~ 10:30 |
The Design and Implementation of Blockchain-assisted User Public-private Key Generation Method Tianhong Zhang, Jianfeng Guan and Zejun Lan | |
1B-3 |
Oct. 7, 2021 09:00 ~ 10:30 |
A blockchain - based authentication scheme for 5G applications Lanfang Ren, Xiaoting Huang, Huachun Zhou, Bo Yang, and Li Su | |
1B-4 |
Oct. 7, 2021 09:00 ~ 10:30 |
Smart Contract Based Personal Data Protection Framework: in cross-app advertising Yuyuan Shi and Jianfeng Guan | |
2A-1 |
Oct. 7, 2021 11:00 ~ 12:30 |
Development Protection Profile for 5G Mobile Core Network Equipment Hyungjin Cho, Sungmoon Kwon, Daeun Kim, Dowon Kim, and Ieckchae Euom | |
2A-2 |
Oct. 7, 2021 11:00 ~ 12:30 |
5G StandAlone Network Attack Scenarios using GTP Protocol Sungmoon Kwon, Daeun Kim, Seongmin Park, and Dowon Kim | |
2A-3 |
Oct. 7, 2021 11:00 ~ 12:30 |
A Study on Analysis of Machine Learning-based IoT Botnet Traffic in 5G Core Networks Ye-Eun Kim, Min-Gyu Kim, and Hwankuk Kim | |
2A-4 |
Oct. 7, 2021 11:00 ~ 12:30 |
Security and Trust in the Integration of Network Functions within the 5G Architecture: The 5GASP Project Jorge Gallego-Madrid, Ramon Sanchez-Iborra and Antonio Skarmeta | |
2B-1 |
Oct. 7, 2021 11:00 ~ 12:30 |
Secure LoRaWAN Root Key Update Scheme for IoT Environment Kun-Lin Tsai, Li-Woei Chen, Fang-Yie Leu, Hsiung-Chieh Hsu, and Tz-Yuan Huang | |
2B-2 |
Oct. 7, 2021 11:00 ~ 12:30 |
Distributed trust and reputation services in pervasive Internet-of-Things deployments Borja Bordel Sánchez and Ramón Alcarria | |
2B-3 |
Oct. 7, 2021 11:00 ~ 12:30 |
A Secure Dispersed Computing Scheme for Internet of Mobile Things Yan Zhao, Jincai Zou, Yuqiang Zhang, and Ning Hu | |
2B-4 |
Oct. 7, 2021 11:00 ~ 12:30 |
A Credible Information Fusion Method Based on Cascaded Topology Interactive Traceability Yueqing Gao, Yuting Shen, Huachun Zhou, Benhui Shi, Lulu Chen, and Chu Du | |
3A-1 |
Oct. 7, 2021 15:30 ~ 17:00 |
Secure Data Encryption Technique for Cloud-based Collaboration supporting Dynamic Data Update Taek-Young Youn and Nam-Su Jho | |
3A-2 |
Oct. 7, 2021 15:30 ~ 17:00 |
ASD: OpenWrt-based ARP Spoofing Detector Yeon Seon Jeong, Hyung Hoon Kim, Hyojin Jo and Dong Hoon Lee | |
3A-3 |
Oct. 7, 2021 15:30 ~ 17:00 |
Theoretical Analysis of Biases in Chacha 128-bits Karthika Sk and Kunwar Singh | |
3A-4 |
Oct. 7, 2021 15:30 ~ 17:00 |
Research On Health Security Association Model Based On Mobile Communication Location Tao Haoran, Ding Ning, Huang Tianhui, Liu Jingyuan, Luo Rui, Qian Dongsheng and Ma Yuyin | |
4A-1 |
Oct. 8, 2021 09:00 ~ 10:30 |
Forensic Analysis of Apple Carplay: A case study Junsu Lee, Juwon Kim, Hojun Seong, Keonyong Lee, Seongje Cho, Younjae Park, and Minkyu Park | |
4A-2 |
Oct. 8, 2021 09:00 ~ 10:30 |
Fingerprint Defender: Defense against browser based user tracking Deepali Moad, Vikas Sihag, Gaurav Choudhary, Daniel Gerbi Duguma, and Ilsun You | |
4A-3 |
Oct. 8, 2021 09:00 ~ 10:30 |
Detection of Business Email Compromise Attacks with Writing Style Analysis Alisa Vorobeva, Guldar Khisaeva, Danil Zakoldaev, and Igor Kotenko | |
4A-4 |
Oct. 8, 2021 09:00 ~ 10:30 |
Forensic analysis of Fitness Applications on Android Rahul Sinha, Vikas Sihag, Gaurav Choudhary, Manu Vardhan, and Pradeep Singh | |
4B-1 |
Oct. 8, 2021 09:00 ~ 10:30 |
GreenSlice: An Energy-Efficient Secure Network Slicing Framework Ozan Akin, Umut Can G?lmez, Ozan Sazak, Osman Ufuk Yagmur, and Pelin Angin | |
4B-2 |
Oct. 8, 2021 09:00 ~ 10:30 |
A Blockchain-based User Identity Authentication Method for 5G Zhe Tu, Huachun Zhou, Kun Li, Haoxiang Song, and Weilin Wang | |
4B-3 |
Oct. 8, 2021 09:00 ~ 10:30 |
Cyber-Attack Behavior Knowledge Graph Based on CAPEC and CWE towards 6G Weilin Wang, Huachun Zhou, Kun Li, Zhe Tu, and Feiyang Liu | |
4B-4 |
Oct. 8, 2021 09:00 ~ 10:30 |
The Security Mechanisms between two UPFs Belonging to two 5G Core Networks Fang-Yie Leu, Yu-Syuan Lu, and Heru Susanto | |
5A-1 |
Oct. 8, 2021 11:00 ~ 12:30 |
Measuring Anti-analysis Techniques in Malware Minho Kim, Haehyun Cho, and Jeong Hyun Yi | |
5A-2 |
Oct. 8, 2021 11:00 ~ 12:30 |
Android Adware Detection using Soot and CFG Jungsoo Park, Hyunseok Shim, Long Nguyen Vu, and Souhwan Jung | |
5A-3 |
Oct. 8, 2021 11:00 ~ 12:30 |
A Systematic Literature Review on the Mobile Malware Detection Methods Kim Yu-Kyung, Jemin Lee, Myong-Hyun Go, Hae Young Kang, and Kyungho Lee | |
5A-4 |
Oct. 8, 2021 11:00 ~ 12:30 |
Effectiveness of Video-Classification in Android malware detection through API-Streams and CNN-LSTM Autoencoders Gianni D'Angelo, Francesco Palmieri, and Antonio Robustelli | |
5B-1 |
Oct. 8, 2021 11:00 ~ 12:30 |
Which One is More Robust to Low-rate DDoS Attacks? The Multipath TCP or The SCTP Lejun Ji, Gang Lei, Ruiwen Ji, Yuanlong Cao, Xun Shao, and Xin Huang | |
5B-2 |
Oct. 8, 2021 11:00 ~ 12:30 |
A DDoS Detection Method with Feature Set Dimension Reduction Man Li, Yajuan Qin and Huachun Zhou | |
5B-3 |
Oct. 8, 2021 11:00 ~ 12:30 |
Malicious Behavior Feature Graph for Knowledge Reasoning of DDoS Attacks in 6G Kun Li, Huachun Zhou, Zhe Tu, Feiyang Liu, and Lijuan Li | |
5B-4 |
Oct. 8, 2021 11:00 ~ 12:30 |
An Anonymous Communication System Based on Software Defined Architecture Xinda Cheng, Yixing Chen, Jincai Zou, Yuqiang Zhang, and Ning Hu | |
6-1 |
Oct. 8, 2021 13:30 ~ 15:00 |
Temporal Patterns Discovery of Evolving Graphs for Graph Neural Network (GNN)-based Anomaly Detection in Heterogenous Networks Jongmo Kim, Kunyoung Kim,Gi-yoon Jeon, and Mye Sohn | |
6-2 |
Oct. 8, 2021 13:30 ~ 15:00 |
Anomaly Detection Methods Using Power Plant Packet Data with Machine Learning in IoT Environment Junwon Kim, Hyunpyo Choi, Jiho Shin, and Jung Taek Seo | |
6-3 |
Oct. 8, 2021 13:30 ~ 15:00 |
DAVS: Dockerfile Analysis for Vulnerable Scanning Thien-Phuc Doan and Souhwan Jung | |
6-4 |
Oct. 8, 2021 13:30 ~ 15:00 |
A Novel Rescaled and Reformulated Convolution Network for Semantic Segmentation Sai Prabanjan Kumar Kalvapalli, C. Mala, and V. Punitha | |
7-1 |
Oct. 8, 2021 9:00 ~ 10:10 |
Trojan Attacks and Defense for Speech Recognition Wei Zong, Yang-Wai Chow, Willy Susilo, and Jongkil Kim | |
7-2 |
Oct. 8, 2021 9:00 ~ 10:10 |
Research and Implementation of Speed and Distance Measurement Technology in Train Safety Control System Yutong Liu, Fei Song, Xiuling Wang, and Letian Li | |
Paper Id |
Time |
Title/authors/Institution |
Abstract |
3B-1 |
Oct. 7, 2021 15:30 ~ 17:00 |
POSTER: Feature Reduction in Machine Learning for Application-based Examples Long Nguyen-Vu and Souhwan Jung | |
3B-2 |
Oct. 7, 2021 15:30 ~ 17:00 |
POSTER: A Study on Voice-based Authentication via Speaker-Recognition and the Risk of Speech Synthesis Hyeon Park and TaeGuen Kim | |
3B-3 |
Oct. 7, 2021 15:30 ~ 17:00 |
Poster : A Benchmark for Image Encryption Scheme with Statistical Effective Range Sung-Won Kang and Kyung-Hyune Rhee | |
3B-4 |
Oct. 7, 2021 15:30 ~ 17:00 |
Poster: Performance comparison of GNSS navigation message authentication protocols Turabek Gaybullaev, Da-Yeon Jeon, and Mun-Kyu Lee | |
3B-5 |
Oct. 7, 2021 15:30 ~ 17:00 |
Poster: Decentralized Fair Data Trading Model Kang Woo Cho, Mi Hyeon Jeon, and Sang Uk Shin | |
3B-6 |
Oct. 7, 2021 15:30 ~ 17:00 |
POSTER: Development of Total Security Platform to Protect Autonomous Car and Intelligent Traffic System under 5G Environment Keon Yun, Won Haeng Lee, Myung Woo Chung, Jin Hyeok Oh, Hyun Jun Shin, and Kwon Koo Kwak | |
3B-7 |
Oct. 7, 2021 15:30 ~ 17:00 |
Poster: A study on user recognition based on dilated convolution using biosignals for wearable device application Min-Gu Kim and Sung Bum Pan | |
3B-8 |
Oct. 7, 2021 15:30 ~ 17:00 |
Poster: Study on the Deep Learning-Based Face Recognition Using HOG Features Cheol-Ho Song, Min-Gu Kim and Sung-Bum Pan | |
3B-9 |
Oct. 7, 2021 15:30 ~ 17:00 |
Poster: Toward Hourglass-Concepted Memory Data Leakage Protection with Capacitor-Based Timer Ahn Sung-Kyu, Ji-Won Kang, and Ki-Woong Park | |
3B-10 |
Oct. 7, 2021 15:30 ~ 17:00 |
Poster: Evaluating the robustness of blockchain network topology against blockchain network attacks Huisu Jang, Kang-Ju Lee, and Woong Kook | |
3B-11 |
Oct. 7, 2021 15:30 ~ 17:00 |
Poster: Deobfuscating Obfuscated Code for Detecting Sensitive Data Flows in Mobile Malware DongHo Lee, Haehyun Cho and Jeong Hyun Yi | |
3B-12 |
Oct. 7, 2021 15:30 ~ 17:00 |
Poster: A Study on Deep Learning-based Approaches for Code Similarity Detection Younghoon Ban, Haehyun Cho, and Jeong Hyun Yi | |
3B-13 |
Oct. 7, 2021 15:30 ~ 17:00 |
Poster: Specification-based Misbehavior Detection and Deep Learning-based Anomaly Detection System to Enhance Insulin Pump Security Philip Virgil Astillo, Yonas Engida Gebremariam, Daniel Gerbi Duguma, Bonam Kim, and Ilsun You | |
3B-14 |
Oct. 7, 2021 15:30 ~ 17:00 |
Poster: Secure and Efficient JWT Token Authentication for Light OAuth 2.0 Implementation Sung-Hyun Kim, Su-Yoon Jang, and Taek-Young Youn | |
3B-15 |
Oct. 7, 2021 15:30 ~ 17:00 |
Poster: Instruction-level Disassembler Based on Power Consumption Leakage of IoT devices Daehyeon Bae, Jaewook Lee, and Jaecheol Ha | |