Paper Id |
Date |
Title/authors/Institution |
PDF |
1A-1 |
Dec. 15, 2022 09:00 ~ 10:15 |
Security requirements and countermeasures in a cloud-native environment
Youngsoo Kim, Cheolhee Park, Yongyoon Shin, Jonghoon Lee and Jong-Guen Park ETRI, South Korea
|
|
1A-2 |
Dec. 15, 2022 09:00 ~ 10:15 |
KRSIE: An eBPF-based Kubernetes Runtime Security Instrumentation and Enforcement System
Songi Gwak, Thien-Phuc Doan, and Souhwan Jung Soongsil University, South Korea
|
|
1A-3 |
Dec. 15, 2022 09:00 ~ 10:15 |
Application Hibernation Framework with Dynamic Throttling of Resource
Sang-Hoon Choi1, Seong-Jin Kim1, Hanjin Park2 and Ki-Woong Park1
1Sejong University, South Korea
2The Affiliated Institute of ETRI, South Korea
|
|
1A-4 |
Dec. 15, 2022 09:00 ~ 10:15 |
Refining Seccomp Security Profile for Container Hardening
Linh Nguyen-Thuy, Long Nguyen-Vu, Jungsoo Park, and Souhwan Jung Soongsil University, South Korea
|
|
1B-1 |
Dec. 15, 2022 09:00 ~ 10:15 |
Multi-objective Deep Reinforcement Learning for Virtual Security Function Placement
Cong Zhou, Jing Tao, Baokang Zhao, and Baosheng Wang National University of Defense Technology, China
|
|
1B-2 |
Dec. 15, 2022 09:00 ~ 10:15 |
A Graph Neural Network Detection Scheme for Malicious Behavior Knowledge Base
Ouyang Liu, Kun Li, Ziwei Yin, and Huachun Zhou Beijing Jiaotong University, China
|
|
1B-3 |
Dec. 15, 2022 09:00 ~ 10:15 |
Recent Challenges in a New Distributed Learning Paradigm
Sandi Rahmadika, Bayu Ramadhani Fajri, Geovanne Farell, Ahmaddul Hadi, and Khairi Budayawan
Universitas Negeri Padang, Indonesia
|
|
1B-4 |
Dec. 15, 2022 09:00 ~ 10:15 |
Parameters Transfer Framework for Multi-domain Fake News Detection
Rafał Kozik, Krzysztof Samp, Michał Choraś, and Marek Pawlicki
Bydgoszcz University of Science and Technology, Poland
|
|
2A-1 |
Dec. 15, 2022 10:45 ~ 12:00 |
NTT quantum circuit for CRYSTALS–Kyber
Gyeongju Song, Kyungbae Jang, Siwoo Eum, Minjoo Sim, and Hwajeong Seo Hansung University, South Korea
|
|
2A-2 |
Dec. 15, 2022 10:45 ~ 12:00 |
AVX512 Crypto : Parallel Implementation methods of Korean Block Cipher using AVX-512
Young Ryeol Choi, Hojin Choi and Seog Chung Seo
Kookmin University, South Korea
|
|
2A-3 |
Dec. 15, 2022 10:45 ~ 12:00 |
K-XMSS and K-SPHINCS+: Hash based Signatures with Korean Cryptography Algorithms
Minjoo Sim, Siwoo Eum, Gyeongju Song, Yujin Yang, Wonwoong Kim, and Hwajeong Seo Hansung University, South Korea
|
|
2A-4 |
Dec. 15, 2022 10:45 ~ 12:00 |
Simulation of Vehicle-to-Vehicle Communication based on selected PQC-DSA
Young Beom Kim and Seog Chung Seo Kookmin University, South Korea
|
|
2B-1 |
Dec. 15, 2022 10:45 ~ 12:00 |
A Practical Detection and Defense Scheme against Smart Contract Attacks based on Transaction Features
Ruichi Yan1, Guohua Tian1, Shichong Tan1 and Zhengtao Jiang2
1Xidian University, China
2Communication University of China
|
|
2B-2 |
Dec. 15, 2022 10:45 ~ 12:00 |
A blockchain-based framework for audio copyright deposition
Ridong Huang, Jianmao Xiao, Jing Zhao, Yuhang Zhang, Jiangyu Wang, Siqi Chen, Jianyu Zou, and Yuanlong Cao
Jiangxi Normal University, China
|
|
2B-3 |
Dec. 15, 2022 10:45 ~ 12:00 |
Identifier Resolution Mechanism based on Blockchain for Industrial Internet
Wang Xiuling, Zhu Shuxing, and Zou Biaofei
Beijing Jiaotong University, China
|
|
2B-4 |
Dec. 15, 2022 10:45 ~ 12:00 |
A Trust-based Blockchain System for Secured Migration of BLE Devices in IoT Networks
E Suresh Babu and A. Aswani Devi NIT Warangal, India
|
|
3A-1 |
Dec. 15, 2022 16:30 ~ 18:00 |
An Explainable Cyberattack Alert Framework using Knowledge Graph Construction and Reinforcement Learning
Kunyoung Kim, Jeongbin Lee, Jongmo Kim, and Mye Sohn
Sungkyunkwan University, South Korea
|
|
3A-2 |
Dec. 15, 2022 16:30 ~ 18:00 |
Practical Machine Learning-based Software Vulnerability Discovery for Internet of Things
So-Eun Jeon, Sun-Jin Lee and Il-Gu Lee
Sungshin Women's University, South Korea
|
|
3A-3 |
Dec. 15, 2022 16:30 ~ 18:00 |
Malicious traffic classification techniques utilizing compressed sensing and learning for secure Internet of Things
Yu-Rim Lee, Na-Eun Park, Seo-Yi Kim, and Il-Gu Lee
Sungshin Women's University, South Korea
|
|
3A-4 |
Dec. 15, 2022 16:30 ~ 18:00 |
Incremental Learning for Personalized Development of Personalized Activity Recognition Model using Incremental Learning
Jeongbin Lee, Jaewoong Kang, and Mye Sohn
Sungkyunkwan University, South Korea
|
|
3A-5 |
Dec. 15, 2022 16:30 ~ 18:00 |
Machine Learning-based Endpoint Detection and Response Framework against Intelligent Cyber Attacks
Sun-Jin Lee, So-Eun Jeon and Il-Gu Lee
Sungshin Women's University, South Korea
|
|
3B-1 |
Dec. 15, 2022 16:30 ~ 18:00 |
Using Machine Learning for Detecting Timing Side-Channel Attacks in Software-Defined Networks
Faizan Shoaib, Yang-Wai Chow, Elena Vlahu-Gjorgievska, and Chau Nguyen University of Wollongong, Australia
|
|
3B-2 |
Dec. 15, 2022 16:30 ~ 18:00 |
Theoretical and Deep Learning Based Analysis of Biases in Salsa 128 bits
SK Karthika and Kunwar Singh
NIT Tiruchirappalli, India
|
|
3B-3 |
Dec. 15, 2022 16:30 ~ 18:00 |
A Blockchain-Assisted Searchable Lightweight CP-ABE for IoT
Peng Liu, Qian He, Siyuan Liu, Jianing Li, and Zhongyi Zhai
Guilin University of Electronic Technology, China
|
|
3B-4 |
Dec. 15, 2022 16:30 ~ 18:00 |
Blockchain-based Terminal Access Control in Software Defined Network
Bingcheng Jiang, Qian He, Qi Pan, and Mingliu He
Guilin University of electronic and technology, China
|
|
3B-5 |
Dec. 15, 2022 16:30 ~ 18:00 |
A Token-Based Access Control Mechanism for the Internet of Things Using Blockchain
Yuzheng Yang, Zhe Tu, Haoxiang Song, and Huachun Zhou Beijing Jiaotong University, China
|
|
4A-1 |
Dec. 16, 2022 09:00 ~ 10:15 |
Single-Frame-Based Data Compression for CAN Data Authentication
Shiyi Jin1, Dong-Hyun Seo2, Yeon-Jin Kim3, Youn-Eun Kim3, Samuel Woo4 and Jin-Gyun Chung1
1Jeonbuk National University, South Korea
2Jeonbuk Institute of Automotive Convergence Technology, South Korea
3Korea Automative Technology Institute, South Korea
4Dankook University, South Korea
|
|
4A-2 |
Dec. 16, 2022 09:00 ~ 10:15 |
ReplayFuzzer: IoT attack replay analysis platform based on IoT virtualization
Hye Lim Jung and Ki-Woong Park
Sejong University, South Korea
|
|
4A-3 |
Dec. 16, 2022 09:00 ~ 10:15 |
Low Power High Performance Security Mechanism for Internet of Things
Sun-Woo Yun, Na-Eun Park, and Il-Gu Lee
Sungshin Women’s University, South Korea
|
|
4A-4 |
Dec. 16, 2022 09:00 ~ 10:15 |
A practical method for identifying ECUs using differential voltage
Jungho Lee1, Samuel Woo1 and Yousik Lee2
1Dankook University, South Korea
2ETAS Korea Co. Ltd, South Korea
|
|
4B-1 |
Dec. 16, 2022 09:00 ~ 10:15 |
Hybrid Deep Learning Approaches for Gait-based Continuous Authentication using Wearable Sensors
Sakorn Mekruksavanich1, Ponnipa Jantawong1 and Anuchit Jitpattanakul2
1University of Phayao, Thailand
2King Mongkut’s University of Technology North Bangkok, Thailand
|
|
4B-2 |
Dec. 16, 2022 09:00 ~ 10:15 |
Web API Verifier for IoTtalk and Its Applications
Wen-Yu Lin, Min-Zheng Shieh, and Yi-Bing Lin National Yang Ming Chiao Tung University, Taiwan
|
|
4B-3 |
Dec. 16, 2022 09:00 ~ 10:15 |
Proposal of Early Landslide Warning System considering Scalability and Reliability with Emergent IoT Data Priority
Noriki Uchida1, Shigeyuki Endo1, Tomoyuki Ishida1, Hiroaki Yuze2 and Yoshitaka Shibata3
1Fukuoka Institute of Technology, Japan
2University of Shizuoka, Japan
3Iwate Prefectural University, Japan
|
|
4B-4 |
Dec. 16, 2022 09:00 ~ 10:15 |
WebThingsTalk: An IoTtalk adapter for WebThings devices
Yu-Ching Chen and Min-Zheng Shieh
National Yang Ming Chiao Tung University, Taiwan
|
|
5A-1 |
Dec. 16, 2022 10:45 ~ 12:00 |
Automated Dynamic Analysis Scheme for Unpacking Malware
Minho Kim, Gwangyeol Lee, Haehyun Cho, and Jeong Hyun Yi Soongsil University, South Korea
|
|
5A-2 |
Dec. 16, 2022 10:45 ~ 12:00 |
Deriving IoT Botnet Defense Technique Using MITRE ATT&CK-D3FEND
Donghyun Kim1, Jiho Shin2 and Jung Taek Seo1
1Gachon University, South Korea
2Korean National Police University, South Korea
|
|
5A-3 |
Dec. 16, 2022 10:45 ~ 12:00 |
Framework for Analyzing Abnormal Behavior of Drones through Simulation Parallelization
Sung-Kyu Ahn, Hyelim Jung, and Ki-Woong Park
Sejong University, South Korea
|
|
5A-4 |
Dec. 16, 2022 10:45 ~ 12:00 |
A Framework for Security Attack Detection and Root Cause Analysis based on Elastic Stack
Hyojoung Shin and Moohong Min Sungkyunkwan University, South Korea
|
|
5B-1 |
Dec. 16, 2022 10:45 ~ 12:00 |
Security SFC Path Selection Using Deep Reinforcement Learning
Shuangxing Deng, Man Li, Qi Guo, and Huachun Zhou
Beijing Jiaotong University, China
|
|
5B-2 |
Dec. 16, 2022 10:45 ~ 12:00 |
Attacks Against Security Context in 5G Network
Zhiwei Cui1, Baojiang Cui1, Li Su2, Haitao Du2, Hongxin Wang1 and Junsong Fu1
1Beijing University of Posts and Telecommunications, China
2China Mobile Research Institute, China
|
|
5B-3 |
Dec. 16, 2022 10:45 ~ 12:00 |
Deployment approach for securing NetApp onboarding in 5G
Ana Hermosilla1, Jorge Gallego-Madrid1, Antonio Skarmeta1, Pedro Martinez-Juila2 and Ved Kafle2
1Odin Solutions, S.L. Spain
2National Institute of Information and Communications, Japan
|
|
5B-4 |
Dec. 16, 2022 10:45 ~ 12:00 |
Spatial multiplexing techniques and multifrequency cells for massive-type communications in future 6G networks
Borja Bordel Sánchez1,3, Ramón Alcarria1,3, Joaquin Chung1 and
Ivan Armuelles Voinov2
1Argonne National Laboratory, USA
2Universidad de Panamá, Panamá
3Universidad Politécnica de Madrid, Spain
|
|
6A-1 |
Dec. 16, 2022 13:30 ~ 14:45 |
A Method to Train DDoS Detection Models for Insufficient 5GC Traffic with GAN and SMOTE
YeaSul Kim and Hwankuk Kim SangMyung University, South Korean
|
|
6A-2 |
Dec. 16, 2022 13:30 ~ 14:45 |
A study on machine learning-based false base station detection method in 5G
Hoonyong Park1, Daehyeon Son2, Gunwoo Kim2 and Ilsun You2
1Soonchunhyang University, South Korea
2Kookmin University, South Korea
|
|
6A-3 |
Dec. 16, 2022 13:30 ~ 14:45 |
Procedure Collision Testing for 5G SA Network
Yeongbin Hwang, Mincheol Son, and Yongdae Kim KAIST, South Korea
|
|
6A-4 |
Dec. 16, 2022 13:30 ~ 14:45 |
Building and utilizing small-scale testbed for research on 5G SA network- related security vulnerabilities
Dowon Kim1,2, Ilsun You2, Seongmin Park1,2 and Sungmoon Kwon1
1KISA, South Korea
2Kookmin University, South Korea
|
|
6B-1 |
Dec. 16, 2022 13:30 ~ 14:45 |
DyBAnd: Dynamic Behavior-Based Android Malware Detection
Shashank Jaiswal1, Vikas Sihag1, Gaurav Choudhary2 and Nicola Dragoni2
1Sardar Patel University of Police, Security and Criminal Justice, India
2Technical University of Denmark (DTU), Denmark
|
|
6B-2 |
Dec. 16, 2022 13:30 ~ 14:45 |
Detecting Account Level Disinformation Based on Facebook Platform by Social Robot
Huan-Chieh Tseng, Min-Yuan Ho, Tzer-Shyong Chen, Yu-Fang Chung, Chun-Ming Lai and Bo-Wei
TungHai University, Taiwan
|
|
6B-3 |
Dec. 16, 2022 13:30 ~ 14:45 |
A Novel Co-operative Traffic Congestion Level Estimation Scheme for Diverse Regions in VANET
Manipriya Sankaranarayana1 and Mala. C2
1IIIT Sri City, China
2NIT Tiruchirappalli, India
|
|
6B-4 |
Dec. 16, 2022 13:30 ~ 14:45 |
The Enhancement of FlexE Network Performance Based On Network Calculus Theory
Gao Kaiqiang1, Wang Zhihui1, Pan Juan1, Pang Yuhang1, Wei Lei2 and Jiang Song2
1China Electric Power Research Institute Co. Ltd, China
2State Grid Jiangsu Electric Power Co. Ltd, China
|
|
7-1 |
Dec. 17, 2022 09:00 ~ 10:35 |
A Systematic Approach to Security Management in the MonB5G Architecture
Slawomir Kuklinski1,2 and Jacek Wytrebowicz1
1Warsaw University of Technology, Poland
2Orange Polska, Poland
|
|
7-2 |
Dec. 17, 2022 09:00 ~ 10:35 |
A Study on 5G Security Activities in Japan
SeongHan Shin
National Institute of Advanced Industrial Science and Technology (AIST), Japan
|
|
7-3 |
Dec. 17, 2022 09:00 ~ 10:35 |
A Secure Data Encryption Method for Mobile Edge Computing
Kun-Lin Tsai, Tzu-Chen Liu, Shao-tang Lin, Fang-Yie Leu, Yu-Chia Lin, and Ming-Wun Chiang
Tunghai University, Taichung, Taiwan
|
|
7-4 |
Dec. 17, 2022 09:00 ~ 10:35 |
A Study on Botnet Attack Formulation Technique for 5G Massive IoT Targets
Hojun Jin1, Jiho Shin2 and Jung Taek Seo1
1Gachon University, South Korea
2Korean National Police University, South Korea
|
|
7-5 |
Dec. 17, 2022 09:00 ~ 10:35 |
Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense
Shih-Ting Chiu1, Heru Susanto2 and Feng-Yie Leu1
1ThungHai University, Taiwan
2Universiti Teknologi Brunei, Indonesia
|
|
8-1 |
Dec. 17, 2022 11:00 ~ 12:35 |
A Blockchain-based Secure and Fair Decentralized Data Trading System
Youngho Park, Mi Hyeon Jeon, and Sang Uk Shin
Pukyong National University, South Korea
|
|
8-2 |
Dec. 17, 2022 11:00 ~ 12:35 |
A Study on PLC Data Integrity Verification Using Private Blockchain
ChangHyun Roh1, Ilhwan Ji1, Jiho Shin2 and Jung Taek Seo1
1Gachon University, South Korea
2Korean National Police University, South Korea
|
|
8-3 |
Dec. 17, 2022 11:00 ~ 12:35 |
Privacy Protection Data Delivery Scheme
Akihiro Yamamura
Akita University, Japan
|
|
8-4 |
Dec. 17, 2022 11:00 ~ 12:35 |
A Secure Dataset Distribution Protocol for An Accountable AI Collaboration System
Siwan Noh and Kyung-Hyune Rhee Pukyong National University, South Korea
|
|
8-5 |
Dec. 17, 2022 11:00 ~ 12:35 |
Trends in Personalized Federated Learning: Concept, Methods, and Challenges
Muhammad Firdaus and Kyung-Hyune Rhee
Pukyong National University, South Korea
|
|