Loading...

 Keynote Session  

 Keynote Session
No. Time Title/authors/Institution PDF
Keynote-1
Dec. 15, 2022
14:00 ~ 15:00
Human-in-the-Loop XAI-enabled Vulnerability Detection, Investigation, and Mitigation
Prof. Kim Kwang Choo (University of Texas at San Antonio, USA)
Keynote-2
Dec. 15, 2022
15:15 ~ 16:15
Security Mechanisms for Data Transmission among B5G/6G Networks
Prof. Fang-Yie Leu (TungHai University and Ming Chuan University, Taiwan)
Keynote-1
Dec. 16, 2022
15:15 ~ 16:15
Understanding the cyber exercise
Dr. Jungmin Kang (National Security Research Institute, South Korea)


 Oral/Poster Presentation  

 Oral Presentation
Paper Id Date Title/authors/Institution PDF
1A-1
Dec. 15, 2022
09:00 ~ 10:15
Security requirements and countermeasures in a cloud-native environment
Youngsoo Kim, Cheolhee Park, Yongyoon Shin, Jonghoon Lee and Jong-Guen Park
ETRI, South Korea
1A-2
Dec. 15, 2022
09:00 ~ 10:15
KRSIE: An eBPF-based Kubernetes Runtime Security Instrumentation and Enforcement System
Songi Gwak, Thien-Phuc Doan, and Souhwan Jung
Soongsil University, South Korea
1A-3
Dec. 15, 2022
09:00 ~ 10:15
Application Hibernation Framework with Dynamic Throttling of Resource
Sang-Hoon Choi1, Seong-Jin Kim1, Hanjin Park2 and Ki-Woong Park1
1Sejong University, South Korea
2The Affiliated Institute of ETRI, South Korea
1A-4
Dec. 15, 2022
09:00 ~ 10:15
Refining Seccomp Security Profile for Container Hardening
Linh Nguyen-Thuy, Long Nguyen-Vu, Jungsoo Park, and Souhwan Jung
Soongsil University, South Korea
1B-1
Dec. 15, 2022
09:00 ~ 10:15
Multi-objective Deep Reinforcement Learning for Virtual Security Function Placement
Cong Zhou, Jing Tao, Baokang Zhao, and Baosheng Wang
National University of Defense Technology, China
1B-2
Dec. 15, 2022
09:00 ~ 10:15
A Graph Neural Network Detection Scheme for Malicious Behavior Knowledge Base
Ouyang Liu, Kun Li, Ziwei Yin, and Huachun Zhou
Beijing Jiaotong University, China
1B-3
Dec. 15, 2022
09:00 ~ 10:15
Recent Challenges in a New Distributed Learning Paradigm
Sandi Rahmadika, Bayu Ramadhani Fajri, Geovanne Farell, Ahmaddul Hadi, and Khairi Budayawan
Universitas Negeri Padang, Indonesia
1B-4
Dec. 15, 2022
09:00 ~ 10:15
Parameters Transfer Framework for Multi-domain Fake News Detection
Rafał Kozik, Krzysztof Samp, Michał Choraś, and Marek Pawlicki
Bydgoszcz University of Science and Technology, Poland
2A-1
Dec. 15, 2022
10:45 ~ 12:00
NTT quantum circuit for CRYSTALS–Kyber
Gyeongju Song, Kyungbae Jang, Siwoo Eum, Minjoo Sim, and Hwajeong Seo
Hansung University, South Korea
2A-2
Dec. 15, 2022
10:45 ~ 12:00
AVX512 Crypto : Parallel Implementation methods of Korean Block Cipher using AVX-512
Young Ryeol Choi, Hojin Choi and Seog Chung Seo
Kookmin University, South Korea
2A-3
Dec. 15, 2022
10:45 ~ 12:00
K-XMSS and K-SPHINCS+: Hash based Signatures with Korean Cryptography Algorithms
Minjoo Sim, Siwoo Eum, Gyeongju Song, Yujin Yang, Wonwoong Kim, and Hwajeong Seo
Hansung University, South Korea
2A-4
Dec. 15, 2022
10:45 ~ 12:00
Simulation of Vehicle-to-Vehicle Communication based on selected PQC-DSA
Young Beom Kim and Seog Chung Seo
Kookmin University, South Korea
2B-1
Dec. 15, 2022
10:45 ~ 12:00
A Practical Detection and Defense Scheme against Smart Contract Attacks based on Transaction Features
Ruichi Yan1, Guohua Tian1, Shichong Tan1 and Zhengtao Jiang2
1Xidian University, China
2Communication University of China
2B-2
Dec. 15, 2022
10:45 ~ 12:00
A blockchain-based framework for audio copyright deposition
Ridong Huang, Jianmao Xiao, Jing Zhao, Yuhang Zhang, Jiangyu Wang, Siqi Chen, Jianyu Zou, and Yuanlong Cao
Jiangxi Normal University, China
2B-3
Dec. 15, 2022
10:45 ~ 12:00
Identifier Resolution Mechanism based on Blockchain for Industrial Internet
Wang Xiuling, Zhu Shuxing, and Zou Biaofei
Beijing Jiaotong University, China
2B-4
Dec. 15, 2022
10:45 ~ 12:00
A Trust-based Blockchain System for Secured Migration of BLE Devices in IoT Networks
E Suresh Babu and A. Aswani Devi
NIT Warangal, India
3A-1
Dec. 15, 2022
16:30 ~ 18:00
An Explainable Cyberattack Alert Framework using Knowledge Graph Construction and Reinforcement Learning
Kunyoung Kim, Jeongbin Lee, Jongmo Kim, and Mye Sohn
Sungkyunkwan University, South Korea
3A-2
Dec. 15, 2022
16:30 ~ 18:00
Practical Machine Learning-based Software Vulnerability Discovery for Internet of Things
So-Eun Jeon, Sun-Jin Lee and Il-Gu Lee
Sungshin Women's University, South Korea
3A-3
Dec. 15, 2022
16:30 ~ 18:00
Malicious traffic classification techniques utilizing compressed sensing and learning for secure Internet of Things
Yu-Rim Lee, Na-Eun Park, Seo-Yi Kim, and Il-Gu Lee
Sungshin Women's University, South Korea
3A-4
Dec. 15, 2022
16:30 ~ 18:00
Incremental Learning for Personalized Development of Personalized Activity Recognition Model using Incremental Learning
Jeongbin Lee, Jaewoong Kang, and Mye Sohn
Sungkyunkwan University, South Korea
3A-5
Dec. 15, 2022
16:30 ~ 18:00
Machine Learning-based Endpoint Detection and Response Framework against Intelligent Cyber Attacks
Sun-Jin Lee, So-Eun Jeon and Il-Gu Lee
Sungshin Women's University, South Korea
3B-1
Dec. 15, 2022
16:30 ~ 18:00
Using Machine Learning for Detecting Timing Side-Channel Attacks in Software-Defined Networks
Faizan Shoaib, Yang-Wai Chow, Elena Vlahu-Gjorgievska, and Chau Nguyen
University of Wollongong, Australia
3B-2
Dec. 15, 2022
16:30 ~ 18:00
Theoretical and Deep Learning Based Analysis of Biases in Salsa 128 bits
SK Karthika and Kunwar Singh
NIT Tiruchirappalli, India
3B-3
Dec. 15, 2022
16:30 ~ 18:00
A Blockchain-Assisted Searchable Lightweight CP-ABE for IoT
Peng Liu, Qian He, Siyuan Liu, Jianing Li, and Zhongyi Zhai
Guilin University of Electronic Technology, China
3B-4
Dec. 15, 2022
16:30 ~ 18:00
Blockchain-based Terminal Access Control in Software Defined Network
Bingcheng Jiang, Qian He, Qi Pan, and Mingliu He
Guilin University of electronic and technology, China
3B-5
Dec. 15, 2022
16:30 ~ 18:00
A Token-Based Access Control Mechanism for the Internet of Things Using Blockchain
Yuzheng Yang, Zhe Tu, Haoxiang Song, and Huachun Zhou
Beijing Jiaotong University, China
4A-1
Dec. 16, 2022
09:00 ~ 10:15
Single-Frame-Based Data Compression for CAN Data Authentication
Shiyi Jin1, Dong-Hyun Seo2, Yeon-Jin Kim3, Youn-Eun Kim3, Samuel Woo4 and Jin-Gyun Chung1
1Jeonbuk National University, South Korea
2Jeonbuk Institute of Automotive Convergence Technology, South Korea
3Korea Automative Technology Institute, South Korea
4Dankook University, South Korea
4A-2
Dec. 16, 2022
09:00 ~ 10:15
ReplayFuzzer: IoT attack replay analysis platform based on IoT virtualization
Hye Lim Jung and Ki-Woong Park
Sejong University, South Korea
4A-3
Dec. 16, 2022
09:00 ~ 10:15
Low Power High Performance Security Mechanism for Internet of Things
Sun-Woo Yun, Na-Eun Park, and Il-Gu Lee
Sungshin Women’s University, South Korea
4A-4
Dec. 16, 2022
09:00 ~ 10:15
A practical method for identifying ECUs using differential voltage
Jungho Lee1, Samuel Woo1 and Yousik Lee2
1Dankook University, South Korea
2ETAS Korea Co. Ltd, South Korea
4B-1
Dec. 16, 2022
09:00 ~ 10:15
Hybrid Deep Learning Approaches for Gait-based Continuous Authentication using Wearable Sensors
Sakorn Mekruksavanich1, Ponnipa Jantawong1 and Anuchit Jitpattanakul2
1University of Phayao, Thailand
2King Mongkut’s University of Technology North Bangkok, Thailand
4B-2
Dec. 16, 2022
09:00 ~ 10:15
Web API Verifier for IoTtalk and Its Applications
Wen-Yu Lin, Min-Zheng Shieh, and Yi-Bing Lin
National Yang Ming Chiao Tung University, Taiwan
4B-3
Dec. 16, 2022
09:00 ~ 10:15
Proposal of Early Landslide Warning System considering Scalability and Reliability with Emergent IoT Data Priority
Noriki Uchida1, Shigeyuki Endo1, Tomoyuki Ishida1, Hiroaki Yuze2 and Yoshitaka Shibata3
1Fukuoka Institute of Technology, Japan
2University of Shizuoka, Japan
3Iwate Prefectural University, Japan
4B-4
Dec. 16, 2022
09:00 ~ 10:15
WebThingsTalk: An IoTtalk adapter for WebThings devices
Yu-Ching Chen and Min-Zheng Shieh
National Yang Ming Chiao Tung University, Taiwan
5A-1
Dec. 16, 2022
10:45 ~ 12:00
Automated Dynamic Analysis Scheme for Unpacking Malware
Minho Kim, Gwangyeol Lee, Haehyun Cho, and Jeong Hyun Yi
Soongsil University, South Korea
5A-2
Dec. 16, 2022
10:45 ~ 12:00
Deriving IoT Botnet Defense Technique Using MITRE ATT&CK-D3FEND
Donghyun Kim1, Jiho Shin2 and Jung Taek Seo1
1Gachon University, South Korea
2Korean National Police University, South Korea
5A-3
Dec. 16, 2022
10:45 ~ 12:00
Framework for Analyzing Abnormal Behavior of Drones through Simulation Parallelization
Sung-Kyu Ahn, Hyelim Jung, and Ki-Woong Park
Sejong University, South Korea
5A-4
Dec. 16, 2022
10:45 ~ 12:00
A Framework for Security Attack Detection and Root Cause Analysis based on Elastic Stack
Hyojoung Shin and Moohong Min
Sungkyunkwan University, South Korea
5B-1
Dec. 16, 2022
10:45 ~ 12:00
Security SFC Path Selection Using Deep Reinforcement Learning
Shuangxing Deng, Man Li, Qi Guo, and Huachun Zhou
Beijing Jiaotong University, China
5B-2
Dec. 16, 2022
10:45 ~ 12:00
Attacks Against Security Context in 5G Network
Zhiwei Cui1, Baojiang Cui1, Li Su2, Haitao Du2, Hongxin Wang1 and Junsong Fu1
1Beijing University of Posts and Telecommunications, China
2China Mobile Research Institute, China
5B-3
Dec. 16, 2022
10:45 ~ 12:00
Deployment approach for securing NetApp onboarding in 5G
Ana Hermosilla1, Jorge Gallego-Madrid1, Antonio Skarmeta1, Pedro Martinez-Juila2 and Ved Kafle2
1Odin Solutions, S.L. Spain
2National Institute of Information and Communications, Japan
5B-4
Dec. 16, 2022
10:45 ~ 12:00
Spatial multiplexing techniques and multifrequency cells for massive-type communications in future 6G networks
Borja Bordel Sánchez1,3, Ramón Alcarria1,3, Joaquin Chung1 and Ivan Armuelles Voinov2
1Argonne National Laboratory, USA
2Universidad de Panamá, Panamá
3Universidad Politécnica de Madrid, Spain
6A-1
Dec. 16, 2022
13:30 ~ 14:45
A Method to Train DDoS Detection Models for Insufficient 5GC Traffic with GAN and SMOTE
YeaSul Kim and Hwankuk Kim
SangMyung University, South Korean
6A-2
Dec. 16, 2022
13:30 ~ 14:45
A study on machine learning-based false base station detection method in 5G
Hoonyong Park1, Daehyeon Son2, Gunwoo Kim2 and Ilsun You2
1Soonchunhyang University, South Korea
2Kookmin University, South Korea
6A-3
Dec. 16, 2022
13:30 ~ 14:45
Procedure Collision Testing for 5G SA Network
Yeongbin Hwang, Mincheol Son, and Yongdae Kim
KAIST, South Korea
6A-4
Dec. 16, 2022
13:30 ~ 14:45
Building and utilizing small-scale testbed for research on 5G SA network- related security vulnerabilities
Dowon Kim1,2, Ilsun You2, Seongmin Park1,2 and Sungmoon Kwon1
1KISA, South Korea
2Kookmin University, South Korea
6B-1
Dec. 16, 2022
13:30 ~ 14:45
DyBAnd: Dynamic Behavior-Based Android Malware Detection
Shashank Jaiswal1, Vikas Sihag1, Gaurav Choudhary2 and Nicola Dragoni2
1Sardar Patel University of Police, Security and Criminal Justice, India
2Technical University of Denmark (DTU), Denmark
6B-2
Dec. 16, 2022
13:30 ~ 14:45
Detecting Account Level Disinformation Based on Facebook Platform by Social Robot
Huan-Chieh Tseng, Min-Yuan Ho, Tzer-Shyong Chen, Yu-Fang Chung, Chun-Ming Lai and Bo-Wei
TungHai University, Taiwan
6B-3
Dec. 16, 2022
13:30 ~ 14:45
A Novel Co-operative Traffic Congestion Level Estimation Scheme for Diverse Regions in VANET
Manipriya Sankaranarayana1 and Mala. C2
1IIIT Sri City, China
2NIT Tiruchirappalli, India
6B-4
Dec. 16, 2022
13:30 ~ 14:45
The Enhancement of FlexE Network Performance Based On Network Calculus Theory
Gao Kaiqiang1, Wang Zhihui1, Pan Juan1, Pang Yuhang1, Wei Lei2 and Jiang Song2
1China Electric Power Research Institute Co. Ltd, China
2State Grid Jiangsu Electric Power Co. Ltd, China
7-1
Dec. 17, 2022
09:00 ~ 10:35
A Systematic Approach to Security Management in the MonB5G Architecture
Slawomir Kuklinski1,2 and Jacek Wytrebowicz1
1Warsaw University of Technology, Poland
2Orange Polska, Poland
7-2
Dec. 17, 2022
09:00 ~ 10:35
A Study on 5G Security Activities in Japan
SeongHan Shin
National Institute of Advanced Industrial Science and Technology (AIST), Japan
7-3
Dec. 17, 2022
09:00 ~ 10:35
A Secure Data Encryption Method for Mobile Edge Computing
Kun-Lin Tsai, Tzu-Chen Liu, Shao-tang Lin, Fang-Yie Leu, Yu-Chia Lin, and Ming-Wun Chiang
Tunghai University, Taichung, Taiwan
7-4
Dec. 17, 2022
09:00 ~ 10:35
A Study on Botnet Attack Formulation Technique for 5G Massive IoT Targets
Hojun Jin1, Jiho Shin2 and Jung Taek Seo1
1Gachon University, South Korea
2Korean National Police University, South Korea
7-5
Dec. 17, 2022
09:00 ~ 10:35
Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense
Shih-Ting Chiu1, Heru Susanto2 and Feng-Yie Leu1
1ThungHai University, Taiwan
2Universiti Teknologi Brunei, Indonesia
8-1
Dec. 17, 2022
11:00 ~ 12:35
A Blockchain-based Secure and Fair Decentralized Data Trading System
Youngho Park, Mi Hyeon Jeon, and Sang Uk Shin
Pukyong National University, South Korea
8-2
Dec. 17, 2022
11:00 ~ 12:35
A Study on PLC Data Integrity Verification Using Private Blockchain
ChangHyun Roh1, Ilhwan Ji1, Jiho Shin2 and Jung Taek Seo1
1Gachon University, South Korea
2Korean National Police University, South Korea
8-3
Dec. 17, 2022
11:00 ~ 12:35
Privacy Protection Data Delivery Scheme
Akihiro Yamamura
Akita University, Japan
8-4
Dec. 17, 2022
11:00 ~ 12:35
A Secure Dataset Distribution Protocol for An Accountable AI Collaboration System
Siwan Noh and Kyung-Hyune Rhee
Pukyong National University, South Korea
8-5
Dec. 17, 2022
11:00 ~ 12:35
Trends in Personalized Federated Learning: Concept, Methods, and Challenges
Muhammad Firdaus and Kyung-Hyune Rhee
Pukyong National University, South Korea
 Poster Presentation
Paper Id Time Title/authors/Institution Abstract
P-1
Dec. 16, 2022
16:30 ~ 18:00
POSTER: Threshold Implementation of Lightweight Block Cipher PIPO
Yeon-Jae Kim and Dong-Guk Han
Kookmin University, South Korea
P-2
Dec. 16, 2022
16:30 ~ 18:00
POSTER: Deep-Learning-based Key Generation Mechanism using Sensor Data collected from IoT Devices
Yong Woo Lee, Jejin Jo, Jun Seob Kim, Mee Lan Han and Dooho Choi
Korea University, Sejong, South Korea
P-3
Dec. 16, 2022
16:30 ~ 18:00
POSTER: Renewable Electricity Certificates using Smartmeter and BlockChain
Yuki Satou, Szilard Zsolt Fazekas and Akihiro Yamamura
Akita University, Japan
P-4
Dec. 16, 2022
16:30 ~ 18:00
POSTER: Metaverse-based Counseling System to Protect the Identity of Clients
Jun Lee, Hanna Lee, Seongchan Lee and Hyun Kwon
Hoseo University, South Korea
P-5
Dec. 16, 2022
16:30 ~ 18:00
POSTER: Packet Sequence-based Intrusion Detection System for In-Vehicle CAN Bus Network
Seungmin Lee, Hyunghoon Kim, Haehyun Cho and Hyo Jin Jo
Soongsil University, South Korea
P-6
Dec. 16, 2022
16:30 ~ 18:00
POSTER: Blockchain Applied 5G Authentication and Key Agreement Evaluation
Hoseok Kwon, Gunwoo Kim, Ajung Im, Bonam Kim and Ilsun You
Kookmin University, South Korea
P-7
Dec. 16, 2022
16:30 ~ 18:00
POSTER: Delegatable Searchable Encryption with Proof-of-work
Jongkil Kim
Ewha Womans University, South Korea
P-8
Dec. 16, 2022
16:30 ~ 18:00
POSTER: Anonymous pseudonymised-dataset combination without key management systems
Myeong-Hyeon Kim and Taek-Young Youn
Dankook University, South Korea
P-9
Dec. 16, 2022
16:30 ~ 18:00
POSTER: Formal Security Analysis for TLS 1.3 using AVISPA tool
Jongmin Oh1, Daehyeon Son1, Jiyoon Kim2 and Ilsun You1
1Kookmin University, South Korea
2Gyeongsang National University, South Korea
P-10
Dec. 16, 2022
16:30 ~ 18:00
PPOSTER: A Study on the Deep-Learning-Based Video Surveillance and Management System in Security and Dangerous Facilities
Jeong Jaehyeok, Choi Yourak and Park Taejin
Sangmyung University, South Korea
P-11
Dec. 16, 2022
16:30 ~ 18:00
POSTER: A Study on Analyzing Build Properties for Android Emulator Detection
Il-kyu Kim, Jae-do Lim, Namsu Kim, Boojoong Kang and Seong-je Cho
Dankook University, South Korea
P-12
Dec. 16, 2022
16:30 ~ 18:00
POSTER: Development of Security Evaluation Tools for Key Sensors in Autonomous Vehicles
Jungho Ju, Dongchan Ham and Samuel Woo
Dankook University, South Korea
P-13
Dec. 16, 2022
16:30 ~ 18:00
POSTER: Improving facial expression recognition using contactless sensing data
Youngeun An, Jimin Lee, EunSang Bak and Sungbum Pan
Chosun University, South Korea
P-14
Dec. 16, 2022
16:30 ~ 18:00
POSTER: Dynamic Monitoring and Surveillance of Anomaly Detection for Advanced Security Facility using Unsupervised Learning
Yonghoon Choi, Hwanhee Jung and Minsuk Kim
Sangmyung University, South Korea
P-15
Dec. 16, 2022
16:30 ~ 18:00
POSTER: Unified framework for the cybersecurity management system and software update management system
Yunkeun Song and Samuel Woo
Dankook University, South Korea
P-16
Dec. 16, 2022
16:30 ~ 18:00
POSTER: Cyber Security Management System (CSMS) Requirements: Requirements Analysis
Junhee Oh and Samuel Woo
Dankook University, South Korea
P-17
Dec. 16, 2022
16:30 ~ 18:00
POSTER: Application Vulnerability Analysis of AI Security using Fully Homomorphic Encryption
Inpyo Hong, Gyuho Choi and Chang Choi
Gachon University, South Korea
P-18
Dec. 16, 2022
16:30 ~ 18:00
POSTER: Side Channel Analysis of Hardware Implementation CRYSTALS-KYBER Ciphertext Comparison
Soo-Jin Kim and Dong-Guk Han
Kookmin University, South Korea
P-19
Dec. 16, 2022
16:30 ~ 18:00
POSTER: A Study on Personal Recognition based on Multi-Stream Siamese Network
Jin Su Kim, Cheol Ho Song and Sungbum Pan
Chosun University, South Korea
P-20
Dec. 16, 2022
16:30 ~ 18:00
POSTER: Electromagnetic and Thermal Information Utilization System to Improve The Success Rate of Laser Fault Injection Attack
Hye-Won Mun, Jaedeok Ji, and Dong-Guk Han
Kookmin University, South Korea
P-21
Dec. 16, 2022
16:30 ~ 18:00
POSTER: Formal Analysis of Trusted Execution Environment API
Seunghyun Chae, Geunyeol Yu and Kyungmin Bae
Pohang University of Science and Technology, South Korea
P-22
Dec. 16, 2022
16:30 ~ 18:00
POSTER: A Study on the VMI-based Kernel Runtime Protection System for Virtual Machine in Cloud Environment
Yeo Reum Jo and Ki-Woong Park
Sejong University, South Korea
P-23
Dec. 16, 2022
16:30 ~ 18:00
POSTER: Security Testing via User Credential-based Attacks against Online Services and Applications
Jaehyeok Han, Byung Il Kwak, Sangjin Lee and Mee Lan Han
Korea University, Sejong, South Korea
P-24
Dec. 16, 2022
16:30 ~ 18:00
POSTER: Development of attack response and intelligent RSU technology for vehicle security threat prevention
Sangmin Lee, Keon Yun, Jinhyeok Oh, Sunwoo Yun and Myongcheol Lim
Penta Security, South Korea
P-25
Dec. 16, 2022
16:30 ~ 18:00
POSTER: CNN-based Malware Detection using Opcode Frequency Image
Ko Seok Min, Jaehyeok Yang, Wonjun Choi and Taeguen Kim
Soonchunhyang University, South Korea
P-26
Dec. 16, 2022
16:30 ~ 18:00
POSTER: Detection and identification of bus-off attacks on In-Vehicle CAN
Dayoung Kim, Seungmin Lee, Jiwoo Shin, Hyunghoon Kim and Hyo Jin
Soongsil University, South Korea







Previous Page