Loading...


Mobisec 2021 PROGRAM






Invited Talk1 (14:00~15:00 - October 7, 2021-KST)
Introduction to Network Equipment Security Assurance Scheme (NESAS)
by CSO Joonho Lee (Huawei Korea, Korea)

Invited Talk2 (15:30~16:30 - October 8, 2021-KST)
Cybersecurity for 5G-Powered Vehicles
by CSO Jason Yoo (Autocrypt Co. Ltd., Korea)

Invited Talk3 (17:00~18:00 - October 8, 2021-KST)
AI technologies and advanced security for connected devices in next generation networks
by Prof. Antonio Skarmeta (University of Murcia, Spain)

Invited Talk4 (10:30~11:30 - October 9, 2021-KST):
Networking Cognitive Security
by Dr. Gianni D'Angelo (University of Salerno, Italy)



===============================
Oct. 7, 2021 (Thu.)
===============================

Session 1a - IoT and Cyber Security 1 (Live Presentation)
Comparative Analysis of Bluetooth LE and EDHOC for Potential Security Protocol in Artificial Pancreas System
Daniel Gerbi Duguma, Philip Virgil Astillo, Yonas Engida Gebremariam, Bonam Kim, and Ilsun You

MemTwin Consecutive Memory-Recording enhanced with FPGA for IoT Memory Inspection
Hye Lim Jung, Gi-Choel Choi, and Ki-Woong Park

Automotive Intrusion Detection Using Degree of Change in CAN Data Frame
Wansoo Kim, Jung Ho Lee, Yeon Jin Kim, Jin Gyun Chung, and Samuel Woo

Semantic Alignment-based Knowledge Graph Association for Cybersecurity
Minhwan Kim, Hanmin Kim, and Mye Sohn

____________________________________________________________________

Session 2a - 5G Core Network Security 1 (Live Presentation)
Development Protection Profile for 5G Mobile Core Network Equipment
Hyungjin Cho, Sungmoon Kwon, Daeun Kim, Dowon Kim, and Ieckchae Euom

5G StandAlone Network Attack Scenarios using GTP Protocol
Sungmoon Kwon, Daeun Kim, Seongmin Park, and Dowon Kim

A Study on Analysis of Machine Learning-based IoT Botnet Traffic in 5G Core Networks
Ye-Eun Kim, Min-Gyu Kim, and Hwankuk Kim
Security and Trust in the Integration of Network Functions within the 5G Architecture: The 5GASP Project
Jorge Gallego-Madrid, Ramon Sanchez-Iborra and Antonio Skarmeta

____________________________________________________________________

Session 3a - Cryptography and Network Security 1 (Live Presentation)
Secure Data Encryption Technique for Cloud-based Collaboration supporting Dynamic Data Update
Taek-Young Youn and Nam-Su Jho

ASD: OpenWrt-based ARP Spoofing Detector
Yeon Seon Jeong, Hyung Hoon Kim, Hyojin Jo and Dong Hoon Lee

Theoretical Analysis of Biases in Chacha 128-bits
Karthika Sk and Kunwar Singh

Research On Health Security Association Model Based On Mobile Communication Location
Tao Haoran, Ding Ning, Huang Tianhui, Liu Jingyuan, Luo Rui, Qian Dongsheng and Ma Yuyin

==========================================================

Session 1b - BlockChain Security (Recorded Presentation)
A Resource-Blockchain Framework for Safeguarding IoT
Monika Bharti, Rajesh Kumar, Sharad Saxena and Vishal Sharma

The Design and Implementation of Blockchain-assisted User Public-private Key Generation Method
Tianhong Zhang, Jianfeng Guan and Zejun Lan

Authentication for Applications in 5G Based on Blockchain
Lanfang Ren, Xiaoting Huang, Huachun Zhou, Bo Yang, and Li Su

Smart Contract Based Personal Data Protection Framework: in cross-app advertising
Yuyuan Shi and Jianfeng Guan
____________________________________________________________________

Session 2b - IoT and Cyber Security 2 (Recorded Presentation)
Secure LoRaWAN Root Key Update Scheme for IoT Environment
Kun-Lin Tsai, Li-Woei Chen, Fang-Yie Leu, Hsiung-Chieh Hsu, and Tz-Yuan Huang

Distributed trust and reputation services in pervasive Internet-of-Things deployments
Borja Bordel Sánchez and Ramón Alcarria

A Secure Dispersed Computing Scheme for Internet of Mobile Things
Yan Zhao, Jincai Zou, Yuqiang Zhang, and Ning Hu

A Credible Information Fusion Method Based on Cascaded Topology Interactive Traceability
Yueqing Gao, Yuting Shen, Huachun Zhou, Benhui Shi, Lulu Chen, and Chu Du
____________________________________________________________________

Session 3b - Poster Presentation (Recorded Presentation)


================================
Oct. 8, 2021 (Fri.)
================================

Session 4a - Digital Forensic (Live Presentation)
Forensic Analysis of Apple Carplay: A case study
Junsu Lee, Juwon Kim, Hojun Seong, Keonyong Lee, Seongje Cho, Younjae Park, and Minkyu Park

Fingerprint Defender: Defense against browser based user tracking
Deepali Moad, Vikas Sihag, Gaurav Choudhary, Daniel Gerbi Duguma, and Ilsun You

Detection of Business Email Compromise Attacks with Writing Style Analysis
Alisa Vorobeva, Guldar Khisaeva, Danil Zakoldaev, and Igor Kotenko

Forensic analysis of Fitness Applications on Android
Rahul Sinha, Vikas Sihag, Gaurav Choudhary, Manu Vardhan, and Pradeep Singh
____________________________________________________________________

Session 5a - Malware Analysis (Live Presentation)
Measuring Anti-analysis Techniques in Malware
Minho Kim, Haehyun Cho, and Jeong Hyun Yi

Android Adware Detection using Soot and CFG
Jungsoo Park, Hyunseok Shim, Long Nguyen Vu, and Souhwan Jung

A Systematic Literature Review on the Mobile Malware Detection Methods
Kim Yu-Kyung, Jemin Lee, Myong-Hyun Go, Hae Young Kang, and Kyungho Lee

Effectiveness of Video-Classification in Android malware detection through API-Streams and CNN-LSTM Autoencoders
Gianni D'Angelo, Francesco Palmieri, and Antonio Robustelli
____________________________________________________________________

Session 6 - AI & Cloud Security (Live Presentation)
Temporal Patterns Discovery of Evolving Graphs for Graph Neural Network (GNN)-based Anomaly Detection in Heterogenous Networks
Jongmo Kim, Kunyoung Kim, and Mye Sohn

Anomaly Detection Methods Using Power Plant Packet Data with Machine Learning in IoT Environment
Junwon Kim, Hyunpyo Choi, Jiho Shin, and Jung Taek Seo

DAVS: Dockerfile Analysis for Vulnerable Scanning
Thien-Phuc Doan and Souhwan Jung

A Novel Rescaled and Reformulated Convolution Network for Semantic Segmentation
Sai Prabanjan Kumar Kalvapalli, C. Mala, and V. Punitha



==========================================================

Session 4b - 5G Virtual Infra. & Services Security 2 (Recorded Presentation)

GreenSlice: An Energy-Efficient Secure Network Slicing Framework
Ozan Akin, Umut Can Gülmez, Ozan Sazak, Osman Ufuk Yagmur, and Pelin Angin

A Blockchain-based User Identity Authentication Method for 5G
Zhe Tu, Huachun Zhou, Kun Li, Haoxiang Song, and Weilin Wang

Cyber-Attack Behavior Knowledge Graph Based on CAPEC and CWE towards 6G
Weilin Wang, Huachun Zhou, Kun Li, Zhe Tu, and Feiyang Liu

The security between two SDN switches belonging to two 5GC
Fang-Yie Leu

____________________________________________________________________

Session 5b - Cryptography and Network Security 2 (Recorded Presentation)
Which One is More Robust to Low-rate DDoS Attacks? The Multipath TCP or The SCTP
Lejun Ji, Gang Lei, Ruiwen Ji, Yuanlong Cao, Xun Shao, and Xin Huang

A DDoS Detection Method with Feature Set Dimension Reduction
Man Li, Yajuan Qin and Huachun Zhou

Malicious Behavior Feature Graph for Knowledge Reasoning of DDoS Attacks in 6G
Kun Li, Huachun Zhou, Zhe Tu, Feiyang Liu, and Lijuan Li

AN ANONYMOUS COMMUNICATION SYSTEM BASED ON SOFTWARE DEFINED ARCHITECTURE
Xinda Cheng, Yixing Chen, Jincai Zou, Yuqiang Zhang, and Ning Hu

____________________________________________________________________


================================
Oct. 9, 2021 (Sat.)
================================

Session 7 - Best Papers (Live Presentation)
Trojan Attacks and Defense for Speech Recognition
Wei Zong, Yang-Wai Chow, Willy Susilo, and Jongkil Kim

Research and Implementation of Speed and Distance Measurement Technology in Train Safety Control System
Yutong Liu, Fei Song, Xiuling Wang, and Letian Li