Loading...

 Keynote Session  

 Keynote Session
No. Time Title/authors/Institution PDF
Keynote-1
Dec. 19, 2023
14:00 ~ 15:00
Deepvoice: a new AI threat to our society
Prof. Souhwan Jung(Soong-sil University, South Korea)
Keynote-2
Dec. 19, 2023
15:15 ~ 16:15
Promoting Social Implementation of Advanced Cryptography Using Visible Cryptography
Dr. Goichiro Hanaoka (CPSEC, AIST, JAPAN)


 Oral/Poster Presentation  

 Oral Presentation
Session Article Id Date Title/authors/Institution PDF
1A-1
1
Dec. 19, 2023 09:00 ~ 10:15
Optimal Implementation of Quantum Circuits of Core Operations in BIKE
Yu-Jin Yang, Kyungbae Jang, Yujin Oh, Se Jin Lim, and Hwajeong Seo
Hansung University, South Korea
1A-2
2
Dec. 19, 2023 09:00 ~ 10:15
Lattice-based Multi-Entity Identification Protocols
Yohei Watanabe1,2, Toi Tomita3, and Junji Shikata3,2
1The University of Electro-Communications, Japan,
2Japan Datacom Co., Ltd., Japan,
3Yokohama National University, Yokohama, Japan
1A-3
3
Dec. 19, 2023 09:00 ~ 10:15
Revisiting the algorithms for the quaternion l-isogeny path problems
Hyungrok Jo and Junji Shikata
Yokohama National University, Japan
1A-4
4
Dec. 19, 2023 09:00 ~ 10:15
Privacy-Preserving Encryption of Surveillance Videos supporting Selective Decryption
Chan Hyeong Cho, Hyun Min Song, and Taek-Young Youn
Dankook University, Yongin, South Korea
1B-1
5
Dec. 19, 2023 09:00 ~ 10:15
Lightweight Federated Learning-based Intrusion Detection for the Industrial Internet of Things
Sunjin Lee, Chaerim Han, Haeun Lee, Doeun Kim, and Il-Gu Lee
Sungshin Women’s University, Seoul, South Korea
1B-2
6
Dec. 19, 2023 09:00 ~ 10:15
Memory Efficient Malware Detection Technique Using Binary Classifiers and Optimal Feature Selection
Ye-Seul Kil, Yu-Ran Jeon, Sun-Jin Lee, Eui-Jin Kim, and Il-Gu Lee
Sungshin Women’s University, Seoul, South Korea
1B-3
7
Dec. 19, 2023 09:00 ~ 10:15
One-Class Anomaly Detection Based on Auto-Encoder for Encrypted Network Attack Analysis
Min-Gyu Kim and Hwankuk Kim
Sangmyung University, South Korea
1B-4
8
Dec. 19, 2023 09:00 ~ 10:15
The Impact of Data Scaling Approaches on Deep Learning, Random Forest and Nearest Neighbour-based Network Intrusion Detection Systems for DoS Detection in IoT Networks
Marek Pawlicki, Rafal Kozik, and Michal Chora´
Bydgoszcz University of Science and Technology, Poland
2A-1
9
Dec. 19, 2023 10:30 ~ 11:40
Vectorized Implementation of Crystals-Kyber on NEON extension
YoungBeom Kim and Seog Chung Seo
Kookmin University, South Korea
2A-2
10
Dec. 19, 2023 10:30 ~ 11:40
Optimized Kyber implementation on 16-bit MSP430 Microcontroller
Donghyun Shin, YoungBeom Kim, and Seog Chung Seo
Kookmin University, South Korea
2A-3
11
Dec. 19, 2023 10:30 ~ 11:40
Simulation-based Evaluation of Post-Quantum Algorithm in TLS 1.3
Hyunjun Kim, Siwoo Eum, Song Minho, and Hwajeong Seo
Hansung University, South Korea
2A-4
12
Dec. 19, 2023 10:30 ~ 11:40
A Novel Framework to Construct Quantum Circuits of S-Boxes : Application to 4-bit S-Boxes
Yongjin Jeon, Seungjun Baek, and Jongsung Kim
Kookmin University, South Korea
2B-1
13
Dec. 19, 2023 10:30 ~ 11:40
Machine learning-based NOMA for Physical Layer Security in Cell-Free Communication Systems
Min Jeong Kang1, Jung Hoon Lee1, and Il-Gu Lee2
11Hankuk University of Foreign Studies, South Korea,
2Sungshin Women’s University, South Korea
2B-2
14
Dec. 19, 2023 10:30 ~ 11:40
An Approach to Detect Illegal Online Gambling Using Generative AI
Sooyon Seo, Jaeho Hwang, and Moohong Min
Sungkyunkwan University, South Korea
2B-3
15
Dec. 19, 2023 10:30 ~ 11:40
Integrating Machine Learning models into the Linux Kernel: Opportunities and Challenges
Jorge Gallego-Madrid, Irene Bru-Santa, Ramon Sanchez-Iborra, and Antonio Skarmeta Gomez
Murcia University, Spain
2B-4
16
Dec. 19, 2023 10:30 ~ 11:40
Proposal of Dynamic Critical Line Algorithm by Real-time Monitoring with IoT sensors for Early Weather Warning System
Noriki Uchida1, Tomoyuki Ishida1, Hiroaki Yuze2, and Yoshitaka Shibata3
1Fukuoka Institute of Technology, Japan.
2Shizuoka Prefectural University, Japan.
3Iwate Prefectural University, Japan.
3A-1
17
Dec. 20, 2023 09:00 ~ 10:15
GDN-based Time Series Anomaly Detection using Time Series Clustering
Mingyu Lee , Seungho Jeon, and Jungtaek Seo
Gachon University, South Korea
3A-2
18
Dec. 20, 2023 09:00 ~ 10:15
Adversarial Patch Attack on Person Detection and Countermeasure Using Input Channel Diversification
Seongyeol Lee, Seongwoo Hong, and Jaecheol Ha
Hoseo University, South Korea
3A-3
19
Dec. 20, 2023 09:00 ~ 10:15
Enhancing Privacy through Federated Learning of NWDAF using SGX: Anomaly Detection in 5G MEC
Jiwon Ock and Seongmin Kim
Sungshin Women’s University, South Korea
3A-4
20
Dec. 20, 2023 09:00 ~ 10:15
A Study on IIoT Datasets and Machine Learning Classifiers for Malicious Traffic Classification in IIoT Environments
GyuHyun Jeon, Ilhwan Ji, Seungho Jeon, and Jungtaek Seo
Gachon University, South Korea
3B-1
21
Dec. 20, 2023 09:00 ~ 10:15
Hybrid Interaction Aware Model for Surrounding Vehicle Behaviour Prediction using Bi-LSTM for Autonomous Driving
Syama R and Mala C
National Institute of Technology, India
3B-2
22
Dec. 20, 2023 09:00 ~ 10:15
Smart Cooperative Routing for Computing Power Service in Financial Computing Network
Guoqing Dong, Tianhao Peng, Qixuan Zhang, and Huizhi Wang
Beijing Jiao Tong University, Beijing, China
3B-3
23
Dec. 20, 2023 09:00 ~ 10:15
A Semantic-rich Identifier Mapping Management Mechanism for Personalized Application
Jiapeng Jiang, Jianfeng Guan, Jianbang Chen, and Kexian Liu
Beijing University of Posts and Telecommunications, China
3B-4
24
Dec. 20, 2023 09:00 ~ 10:15
A Multi-level Wavelet-based Time Series Approach for Network Traffic Prediction
Liu Si-yuan, He Qian, Liu Peng, and Zhang Fan
Guilin University of Electronic Technology, China
4A-1
25
Dec. 20, 2023 10:30 ~ 11:40
Generating Anomaly Data for ICS Environments: Comparative Study
JuHyeon Lee, Ilhwan JI, Seungho Jeon, and Jungtaek Seo
Gachon University, South Korea
4A-2
26
Dec. 20, 2023 10:30 ~ 11:40
Fault Injection Attacks Using Clock Glitch Against Deep Neural Networks and Their Countermeasures
Seongwoo Hong, Hyojoo Kang, Youngjoo Lee, and Jaecheol Ha
Hoseo University, South Korea
4A-3
27
Dec. 20, 2023 10:30 ~ 11:40
Identifying Internet of Things Devices Using Machine Learning Based on Encrypted Traffic Data
Seung-Ju Han, Dong-Hyuk Shin, Yu-Bin Kim, Jong-Bum Lee, and Ieck-Chae Euom
Chonnam National University, South Korea
4A-4
28
Dec. 20, 2023 10:30 ~ 11:40
Cyber Attack and Defense Strategies using Reinforcement Learning via Simulated Network Environment
Bum-Sok Kim, Hye-Won Suk, Jung-Hyun Kim, Jae-Hyeok Jeong, and Min-Suk Kim
Sangmyung University, South Korea
4B-1
29
Dec. 20, 2023 10:30 ~ 11:40
Hardware Implementation of SM4 Encryption Algorithm with Hybrid Stochastic Computing
Yinjie Song, Hongge Li, and Yuhao Chen
Beihang University, China
4B-2
30
Dec. 20, 2023 10:30 ~ 11:40
An Overview on Open-RAN Security: Issues, Requirements, Discussions
Heejae Park1, Seonghyeon So1, Woongsoo Na2, Wonseok Choi3, and Laihyuk Park1
1Seoul National University of Science and Technology, South Korea
2Kongju National University, South Korea
3Telecommunications Technology Association, South Korea
4B-3
31
Dec. 20, 2023 10:30 ~ 11:40
Privacy-preserving Fair Outsourcing Polynomial Computation without FHE and FPR
Ying Wang1, Qiang Wang1, Zhifan Huang1, Fucai Zhou1, Changsheng Zhang1, and Che Bian2
1Software College, Northeastern University, China
2The Fourth Affiliated Hospital, China Medical University, China
4B-4
32
Dec. 20, 2023 10:30 ~ 11:40
Universal receptor for chaotic cryptosystems based on Chua’s circuit in embedded mobile devices
Borja Bordel and Ram´on Alcarria
Universidad Polit´ecnica de Madrid, Spain
5A-1
33
Dec. 20, 2023 13:15 ~ 14:30
Symmetric Encryption Key Generation Method with Approximate Computation
Kun-Lin Tsai1, Feng-Yi Leu2, Chi-Hung Lo1, Li-Woei Chen2, and Jin-Wei Ye1
1Tunghai University, Taiwan
2Chinese Military Academy, Taiwan
5A-2
34
Dec. 20, 2023 13:15 ~ 14:30
SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE
Hongxiao Wang1, Zoe L. Jiang2,3, Yanmin Zhao1, Siu-Ming Yiu1, Peng Yang2, Man Chen4, Zejiu Tan2, and Bohan Jin2
1University of Hong Kong, Hong Kong, China
2Harbin Institute of Technology, China
3Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies, China
4Shandong University, China
5A-3
35
Dec. 20, 2023 13:15 ~ 14:30
Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping
Itsuki Maebayashi1, Yuki Takeuchi1, Md. Arshad Ali2, Yasuyuki Nogami1, and Yuta Kodera1
1Okayama University, Japan
2Hajee Mohammad Danesh Science and Technology University, Bangladesh
5A-4
36
Dec. 20, 2023 13:15 ~ 14:30
Deep Learning-Based Neural Distinguisher for Format-Preserving Encryption Scheme FF3
Dukyoung Kim, Hyunji Kim, Kyungbae Jang, and Hwajeong Seo
Hansung University, South Korea
5B-1
37
Dec. 20, 2023 13:15 ~ 14:30
A Study on 5GNR Based False Base Station Detection Technology
Kisoon Sung, Hyungdeug Bae, Yousun Hwang, Jisoo Shin, Sungmin Oh, and Jong-Geun Park
Electronics and Telecommunications Research Institute(ETRI), South Korea
5B-2
38
Dec. 20, 2023 13:15 ~ 14:30
A Novel Tracked Threat to 5G and Beyond AKA Protocol
Zhiwei Cui, Baojiang Cui, Jie Xu, and Junsong Fu
Beijing University of Posts and Telecommunications, China
5B-3
39
Dec. 20, 2023 13:15 ~ 14:30
Fake Base Detection and Localization in 5G Network: A Proof of Concept
Danmarl Butad1, Steven Matthew Tao1, Harlee Tudtud1, Alvin Joseph Macapagal1, Philip Virgil Astillo1, Gaurav Choudhary2, and Nicola Dragoni2
1San Carlos University, Philippines 2Denmark Technical University(DTU), Denmark
5B-4
40
Dec. 20, 2023 13:15 ~ 14:30
Computing Resource Allocation Based on Multi-base Station and Multi-user Scenario in Mobile Edge Computing
Yaozhang Zhong, Yingkui Du, Jing Zhao, Qinghang Gao, Yujuan Zou, Yong Luo, Kailin Chao and Ziyu Yin
Jiangxi Normal University, China.
6A-1
41
Dec. 20, 2023 14:45 ~ 16:15
A Heterogeneous Computing Framework for Accelerating Fully Homomorphic Encryption
Cheng-Jhih Shih1, Shih-Hao Hung1,2,3,, Ching-Wen Chen1, Chiy-Ferng Perng4, Meng-Chao Kao4, Chi-Sheng Shih1,3, and Tei-Wei Kuo1,2,3
1National Taiwan University, Taipei, Taiwan.
2Mohamed bin Zayed University of Artificial Intelligence, UAE.
3Nanyang Technological University(NTU), Singapore
4Wistron Corporation, Taiwan
6A-2
42
Dec. 20, 2023 14:45 ~ 16:15
Power consumption analysis of cryptographic algorithms
Wonseok Choi1, Laihyuk Park2, Youngjin Kim1, and Junsi Jeong1
1Telecommunications Technology Association(TTA), South Korea
2Seoul National University of Science and Technology, South Korea
6A-3
43
Dec. 20, 2023 14:45 ~ 16:15
Generic Construction of Forward-Secure Chameleon Hash Function
Pengxuan Wei1, Koki Matsubara1, Atsuko Miyaji1, and Yangguang Tian2
1Osaka University, Osaka, Japan
2Surrey University, U.K.
6A-4
44
Dec. 20, 2023 14:45 ~ 16:15
Privacy Preserving Decentralized Swap Derivative Leveraging Blockchain Technology and Cryptographic Primitives
Gayathri V, Kunwar Singh, and Karthik Narayan V V
National Institute of Technology, India
6A-5
45
Dec. 20, 2023 14:45 ~ 16:15
Exploring Leakage Characteristics and Attacks through Profiles of Screaming Channels
Yuki Matsukawa, Daiki Miyahara, Takeshi Sugawara, Kazuo Sakiyama, and Yang Li
The University of Electro-Communications, Japan
6B-1
46
Dec. 20, 2023 14:45 ~ 16:15
Your App's Account is not Secure: Identifying Implementation Flaws of SMS OTP Authentication
Jiayu Zhao1, Yiyu Yang1, Fannv He1, and Yuqing Zhang1,2,3
1University of Chinese Academy of Sciences, China
2Hainan University, China
3Xidian University, China
6B-2
47
Dec. 20, 2023 14:45 ~ 16:15
Measuring the leakage of sensitive data in Wechat mini-programs communication traffic
Yuhang Huang1, Xiaoqi Zhang 1,2, and Yuqing Zhang1,2,3
1University of Chinese Academy of Sciences, China
2Hangzhou Institute of Technology of Xidian University, China
3Hainan University, China
6B-3
48
Dec. 20, 2023 14:45 ~ 16:15
A Programmable Switch Based Detection of DDoS Attacks Intelligent Network Element Realization
Jingfu Yan, Weilin Wang, and Huachun Zhou
Beijing Jiaotong University, China
6B-4
49
Dec. 20, 2023 14:45 ~ 16:15
An intelligent next-generation traffic filter for large containerized distributed applications
Borja Bordel , Ram´on Alcarria , and Calimanut-Ionut Cira adrid
Universidad Polit´ecnica de Madrid, Spain
7-1
50
Dec. 20, 2023 16:30 ~ 18:00
Secure deployment of third-party applications over 5G-NFV ML-empowered infrastructures
Ana Hermosilla1, Jose Manuel Manj´on-C´aliz2, Pedro Martinez-Julia3, Antonio Pastor2, Jordi Ortiz4, Diego R. Lopez2, and Antonio Skarmeta1
1University of Murcia, Spain
2Telef´onica I+D, Spain
3National Institute of Information and Communications Technology, Japan
4University Center of Defense at the Spanish Air Force Academy, Spain
7-2
51
Dec. 20, 2023 16:30 ~ 18:00
Analysis of Cloud Migration Trends and Security Threats in the South Korean Financial Sector
Daemin Shin1, Jiyoon Kim2, and Ilsun You3
1Financial Security Institute, South Korea
2Gyeongsang National Univeristy, South Korea
3Kookmin University, South Korea
7-3
52
Dec. 20, 2023 16:30 ~ 18:00
Formal Verification of 5GAKA-LCCO protocol supporting Forward Secrecy: Based on enhanced BAN Logic
Gunwoo Kim, Yongho Ko, and Ilsun You
Kookmin University, South Korea
7-4
53
Dec. 20, 2023 16:30 ~ 18:00
A ML based downlink scheduling for multiple traffics in 5G NR systems
Fang-Yie Leu1, Kun-Lin Tsai1, Heru Susanto2,3, and Jung-Chun Liu1
1Thunghai University, Taiwan
2University Technology of Brunei, Brunei
3Research Center for Informatics, The Indonesia Institute of Sciences, Indonesia
7-5
54
Dec. 20, 2023 16:30 ~ 18:00
Network Slicing Handover Authentication: A Hyperledger Fabric-Driven Privacy and Security Solution
Etienne Igugu Tshisekedi, Cho Nwe Zin Latt, Muhammad Firdaus, and Kyung-Hyune Rhee
Pukyong National University, South Korea
8A-1
55
Dec. 21, 2023 09:00 ~ 10:15
Verification of Learning Effects in Online Classes Using Real-Time Video Avatar Conferencing System
Momoka Hagihara and Tomoyuki Ishida
Fukuoka Institute of Technology, Japan
8A-2
56
Dec. 21, 2023 09:00 ~ 10:15
The Car is safe: A Fast and Accurate Experimental Pressure-based Authentication System for Identifying Car Drivers
Mohsen Ali Alawami, Dahyun Jung, Yewon Park, Yoonseo Ku, Gyeonghwan Choi, and Ki-Woong Park
Sejong University, South Korea
8A-3
57
Dec. 21, 2023 09:00 ~ 10:15
Privacy Preserving Multi Factor Authentication Protocol for Next Generation Grids Deployed in Smart Cities
Osama Ahmed and Hiroshi Kamabe
Gifu University, Japan
8A-4
58
Dec. 21, 2023 09:00 ~ 10:15
Dark web author group identification using Authorship Attribution and LDA
Gun-Yoon Shin1, Dong Wook Kim1, Younghoan Jang1, SungJin Park2, A- ran Park2, younghwan Kim2, and Myung-Mook Han1
1Gachon University, South Korea.
2LIG Nex1, South Korea.
8B-1
59
Dec. 21, 2023 09:00 ~ 10:15
A Biometric-based Data Protection Scheme for Removable Storage Devices
Rui Wu1, Yubing Jiang2, and Peisong Shen2
1Beijing University of Civil Engineering and Architecture, China
2Institute of Information Engineering, Chinese Academy of Sciences, China
8B-2
60
Dec. 21, 2023 09:00 ~ 10:15
Few-shot and Multi-biometrics for Management Identification in Energy Industry
JunHo Yoon, Sokjoon Lee, and Chang Choi
Gachon University, South Korea
8B-3
61
Dec. 21, 2023 09:00 ~ 10:15
A Hybrid Residual Neural Network with Attention Mechanism for Activity-based User Identification Using Smartwatch Sensors
Sakorn Mekruksavanich1 and Anuchit Jitpattanakul2
1University of Phayao, Thailand
2King Mongkut’s University of Technology North Bangkok, Thailand
8B-4
62
Dec. 21, 2023 09:00 ~ 10:15
Anonymous drone swarm identification considering dynamic flight plan
Soojin Lee1 and Seunghyun Seo2
1Hanyang University, South Korea
2Hanyang University ERICA, South Korea
9A-1
63
Dec. 21, 2023 10:30 ~ 11:45
Improving Host-based Intrusion Detection by Enhanced Contextual Information in Containers
Linh Nguyen-Thuy, Long Nguyen-Vu, and Souhwan Jung
Soongsil University, South Korea
9A-2
64
Dec. 21, 2023 10:30 ~ 11:45
Research Directions in Formal Verification of Network Configurations toward Verification of Mobile Networks
Hideki Sakurada1,2 and Kouichi Sakurai2,3
1Nippon Telegraph and Telephone Corporation, Japan
2Kyushu University, Japan
3Advanced Telecommunications Research Institute International, Japan
9A-3
65
Dec. 21, 2023 10:30 ~ 11:45
Research on a Generative Adversarial Network Based Framework for Cyber Training Network Generation
Dong-Wook KiM1, Gun-Yoon-Shin1, Younghoan Jang1, Seungjae Cho2, Kwangsoo Kim2, Jaesik Kang2, and Myung-Mook Han1
1Gachon University, South Korea.
2LIG Nex1, South Korea.
9A-4
66
Dec. 21, 2023 10:30 ~ 11:45
Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare : A Brief Survey and Analysis
Seongmin Park1, Myeongsu Lee2, Sarang Na1 , and Joonhyung Lim1
1Korea Internet & Security Agency, South Korea
2AhnLab, South Korea
9B-1
67
Dec. 21, 2023 10:30 ~ 11:45
Revisiting an Extension of Kannan’s Embedding for Ring-LWE
Satoshi Uesugi, Shinya Okumura, and Atsuko Miyaji
Osaka University, Japan
9B-2
68
Dec. 21, 2023 10:30 ~ 11:45
Memory and Performance Analysis of YOLOv7 with Post Training Quantization for Security Edge Devices
Yun-Wei Lin and Jhih-Hong Shen
National Yang Ming Chiao Tung University, Taiwan
9B-3
69
Dec. 21, 2023 10:30 ~ 11:45
VirtualHideDroid: User data anonymization through virtualization techniques
Francesco Pagano1, Antonio Ruggia1, Luca Verderame1, and Alessio Merlo2
1Università degli Studi di Genova, Italy
2Centre for Advanced Defense Studies, Italy
9B-4
70
Dec. 21, 2023 10:30 ~ 11:45
A Cross-Domain Secure Data Trading Framework Based on Blockchain-Cloud Fusion
Youngho Park, Sang Ukshin, Sujin Shin, and Yehyeon Park
Pukyong National University, South Korea
 Workshop Presentation
Session Article Id Date Title/authors/Institution PDF
Workshop
W-1
Dec. 20, 2023 16:30 ~ 18:00
Quantum implementation of Encoding algorithm for HQC
Yujin Oh, Sejin Lim, Kyungbae Jang, and Hwajeong Seo
Hansung University, South Korea
Workshop
W-2
Dec. 20, 2023 16:30 ~ 18:00
Suboptimal Feature Selection Parameter Optimization Scheme for Efficient Malicious Traffic Detection
So-Eun Jeon, Ye-Sol Oh, Yeon-Ji Lee, and Il-Gu Lee
Sungshin Women’s University, South Korea
Workshop
W-3
Dec. 20, 2023 16:30 ~ 18:00
Trigger-Based Automatic Request for Effective Data Recovery of Erasure-Coded Blockchain Storage
So-Hyun Park, So-Yeon Kim, So-Hui Kim, and Il-Gu Lee
Sungshin Women’s University, South Korea
Workshop
W-4
Dec. 20, 2023 16:30 ~ 18:00
High-speed Implementation of AIM symmetric primitives within AIMer digital signature
Minwoo Lee, Kyungbae jang, Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, and Hwajeong Seo
Hansung University, South Korea
Workshop
W-5
Dec. 20, 2023 16:30 ~ 18:00
PQWAVE-MHT: Post-Quantum secure WAVE protocol based on Merkle Hash Tree for secure V2X communication
Yoonsun Han, Youngbeom Kim, and Seogchung Seo
Kookmin University, South Korea
Workshop
W-6
Dec. 20, 2023 16:30 ~ 18:00
Study of the Correlation Methodology between Operational Technology Vulnerabilities and Adversarial Behavior Information
Doyeon Kim, Seongsu Yoon, Joonseok Kim, Kakyung Kim, and Ieckchae Euom
Chonnam National University, South Korea
Workshop
W-7
Dec. 20, 2023 16:30 ~ 18:00
Darknet Traffic Detection based on Contrastive Learning
Daeun Kim, Yiseul Choi, Eunbeen Lee, Jeongeun Cho, and Seongmin Kim
Sungshin Women’s University, South Korea
 Poster Presentation
Session Article Id Time Title/authors/Institution Abstract
Poster
P-1
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Vehicle data sharing using MPC scheme based on blockchain
Sujin Shin, Yehyeon Park, and Sanguk Shin
Pukyong National University, South Korea
Poster
P-2
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Auction System Model with Blockchain based MPC Technology
Yehyeon Park, Sujin Shin, and Sanguk Shin
Pukyong National University, South Korea
Poster
P-3
Dec. 19, 2023 16:30 ~ 18:00
POSTER: A Diagnosis System to Find Map Escape Bugs in Metaverse System using Reinforcement Learning
Jun Lee¹, Hanna Lee², Seongchan Lee², and Hyun Kwon³
1Hoseo University, South Korea
2Yatav Enter, South Korea
3Korea Military Academy, South Korea
Poster
P-4
Dec. 19, 2023 16:30 ~ 18:00
POSTER: In-Vehicle Privacy Leakage Prevention in the Multi-User Setting
Woori Bae, Yongho Choi, and Taekyoung Youn
Dankook University, South Korea
Poster
P-5
Dec. 19, 2023 16:30 ~ 18:00
POSTER: A New Attack Dataset for CAN Intrusion Detection Systems
Minjeong Kang, Jiwoo Shin, Hyunghoon Kim, Yeongjae Seo, and Hyojin Jo
Soongsil University, South Korea
Poster
P-6
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Blackbox fuzzing approach in Obfuscated Apps for IoT Device
Yeongjae Seo, Dayoung Kim, Minjeong Kang, Hyojin Jo, and Seungmin Lee
Soongsil University, South Korea
Poster
P-7
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Model Agnostic Meta-Learning for Efficient Federated Deep Reinforcement
Chaerim Han, Sunjin Lee, and Il-Gu Lee
Sungshin Women's University, South Korea
Poster
P-8
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Log Analysis Technology through Account Management Incident Analysis in OpenStack-based Cloud Environment
Yunyoung Jung, Minhui Seo, Yeeun Kim, Jungjoo Oh, Il-Gu Lee, Seongmin Kim, and Wonhyung Park
Sungshin Women's University, South Korea
Poster
P-9
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Parallel Structure of RNN and LSTM Autoencoder for financial Transaction Detection
Seoyi Kim, Hyejeong Hwang, and Il-Gu Lee
Sungshin Women's University, South Korea
Poster
P-10
Dec. 19, 2023 16:30 ~ 18:00
POSTER: A Secure Data Sharing Mechanism Based on Principal Component Analysis
Yeonji Lee, Nayeon Shin, and Il-Gu Lee
Sungshin Women's University, South Korea
Poster
P-11
Dec. 19, 2023 16:30 ~ 18:00
POSTER: A Study on CAN Signal Identification via Linear Regression Models
Byeongyeol Ahn, Seoyeon Kim, Jaehyeok Yang, and Taeguen Kim
Soonchunhyang University, South Korea
Poster
P-12
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Automated Mapping System for Identifying Vulnerable Assets Based on TTP
Boram Kim, Yeeun Kim, and Hwankuk Kim
Sangmyung University, South Korea
Poster
P-13
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Security Evaluation Guideline for Automotive OTA-supported Electronic Control Unit
Dongchan Ham, Jungho Lee, and Samuel Woo
Dankook University, South Korea
Poster
P-14
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Propose a new In-Vehicle CAN attack using analog signals for CAN bus fuzzings
Kyungrok Park, Samuel Woo, and Taekyoung Youn
Dankook University, South Korea
Poster
P-15
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Using GAN for Measurement Report Generation to Overcome Limited Data for FBS Detection
Yeongshin Park, Bumjoon Kim, Bonam Kim, and Ilsun You
Kookmin University, South Korea
Poster
P-16
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Analyzing Security Vulnerabilities in 5G-AKA′ Using ProVerif
Taeho Won, Minsong Eom, Bonam Kim, and Ilsun You
Kookmin University, South Korea
Poster
P-17
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Analyzing the Latest Trends and Security Threats of Generative AI with ChatGPT
Hyunche Song, Hyein Lee, and Il-Gu Lee
Sungshin Women's University, South Korea
Poster
P-18
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Enhancing Cloud Native Security: Analysis of Kubernetes Vulnerabilities
Heekyung Shin, Jiwon Ock, and Seongmin Kim
Sungshin Women's University, South Korea
Poster
P-19
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Variational Autoencoder-based Rule Automation for EDR Framework
Haeun Lee, Sunjin Lee, and Il-Gu Lee
Sungshin Women's University, South Korea
Poster
P-20
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Study on Token-based Access Control Model for Smart Factory using Blockchain with Digital Twins
Seung-Hyeon Lee, Gee-hee Yun, and Kyoung-Jin Kim
Sungshin Women's University, South Korea
Poster
P-21
Dec. 19, 2023 16:30 ~ 18:00
POSTER: AI-Based Analysis of Traffic Accident Footage: Predicting Accident Types and Liability Ratios Using Deep Learning
Harang Kim and Hyun Min Song
Dankook University, South Korea
Poster
P-22
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Seamless services using mobile repeater supporting multi-link operation
Junghwa Ryu, Yuran Jeon, Junghyun Moon, and Il-Gu Lee
Sungshin Women's University, South Korea
Poster
P-23
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Rethinking Roaming Architecture in 5G based on LBO
Hyeon No, Sangwook Bae, Eunyoung Jeong, and Seongmin Kim
Sungshin Women's University, South Korea
Poster
P-24
Dec. 19, 2023 16:30 ~ 18:00
POSTER: A New Perspective on Cyber Security Threats: A Focus on the Epidemiological Triangle Model
Jungjoo Oh, Minkyung Song, Yeram Lim, Minhui Seo, and Wonhyung Park
Sungshin Women's University, South Korea
Poster
P-25
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Machine learning detection model for identifying IoT resource exhaustion attacks
Yeonjin Kim, Naeun Park, and Il-Gu Lee
Sungshin Women's University, South Korea
Poster
P-26
Dec. 19, 2023 16:30 ~ 18:00
POSTER: TLS-based Modified Handshake for Quantum Key Transmission
Hoyeong Kim, Soonwook Choi, and Dooho Choi
Korea University Sejong, South Korea
Poster
P-27
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Time-Space trade-offs analysis for ASCON S-box
Jinseob Oh and Dooho Choi
Korea University Sejong, South Korea
Poster
P-28
Dec. 19, 2023 16:30 ~ 18:00
POSTER: A Study on the Enabling Measure for Secure Data Transfer Based on Privacy
Geehee Yun and Kyoungjin Kim
Sungshin Women's University, South Korea
Poster
P-29
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Enhancing Cloud Audit based on Log Normalization
Yeeun Kim, Hyeon No, Minjeong Kim, Sohui Kim, Wonhyung Park, Il-Gu Lee, and Seongmin Kim
Sungshin Women's University, South Korea
Poster
P-30
Dec. 19, 2023 16:30 ~ 18:00
POSTER: A Novel Deep Learning-based Model for Voice Authentication using Randomly-generated Label
Seung-A Park, Sun-Beom Kwon, Jun-Seob Kim, Mee Lan Han, and Dooho Choi
Korea University, South Korea
Poster
P-31
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Entropy-based Image Preprocessing Method for Encrypted Network Traffic
Haeseong Cha¹, Seungyong Park¹, Byoungjin Seok¹, Erzhena Tcydenova¹, Jungsuk Song², and Kiwook Sohn¹
1Seoul National University of Science and Technology, South Korea
2Korea Institute of Science and Technology, South Korea
Poster
P-32
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Backward Compatible Identity-based Encryption
Jongkil Kim
Ewha Womans University, South Korea
Poster
P-33
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Research on Graph AI Based Anomaly Detection for Endpoint Detection and Response
Hyunwoo Lee and Taejin Lee
Hoseo University, South Korea
Poster
P-34
Dec. 19, 2023 16:30 ~ 18:00
POSTER: A Study for Decrease False Positive and False Negative Antivirus Technique in File Partial Encryption
Inhoe Ku, Sanghoon Choi, and kiwoong Park
Sejong University, South Korea
Poster
P-35
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Implementation of Real-time Network Function for False Base Station Detection in 5G Environments
Daehyeon Son and Ilsun You
Kookmin University, South Korea
Poster
P-36
Dec. 19, 2023 16:30 ~ 18:00
POSTER: A Study on Security Protocol for establishing secure communication channels in 5G AKMA
Jongmin Oh and Ilsun You
Kookmin University, South Korea
Poster
P-37
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Light weight data integrity verification with immutable merkle root on massive IIoT data
Hoseok Kwon1, Yaechan Moon1, Seiil Son2, Bonam Kim1, and Ilsun You1
1Kookmin University, South Korea
2Korea Communications Agency, South Korea
Poster
P-38
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Traffic Control Methodology through Locating Emergency Vehicles
Suyeon Lee, Youbin Ko, Sungwon Yang, Soomin Ryou, and Yeonsup Lim
Sungshin Women's University, South Korea
Poster
P-39
Dec. 19, 2023 16:30 ~ 18:00
POSTER: FedMLO: A Communication-Efficient Federated Learning with Multi-Link Operation
Soyeon Kim, Yunjeong Jeong, Chaeyeon Park, Seongwon Yoon, and Il-Gu Lee
Sungshin Women's University, South Korea
Poster
P-40
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Performance Comparison of Auto-Encoder Models for Anomaly Detection of Network Traffic
Seunga Park, Yejin Jang, Daseul Kim, and Meelan Han
Korea University Sejong, South Korea
Poster
P-41
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Interference aware Indoor Localization utilizing Multi-link Operation
Jinmin Lee, Junghyun Moon, and Il-Gu Lee
Sungshin Women's University, South Korea
Poster
P-42
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Research on various metapath-specific embedding-based interpretations of heterogeneous graphs
Sangyeon Hwang, Suengbum Lim, Yeeun Lee, and Taejin Lee
Sungshin Women's University, South Korea
Poster
P-43
Dec. 19, 2023 16:30 ~ 18:00
POSTER: De-obfuscation System for Obfuscation Techniques based on Trampoline Code
Gwangyeol Lee, Minho Kim, Jeonghyun Yi, and Haehyun Cho
Soongsil University, South Korea
Poster
P-44
Dec. 19, 2023 16:30 ~ 18:00
POSTER: A Study on safety communication methods among vehicles and infrastructure using machine learning
Keon Yun, Sangmin Lee, Jinhyeok Oh, Heesun Yun, Minchul Kim, and Myongcheol Lim
Penta Security, South Korea
Poster
P-45
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Mobile Network Security in the Age of 5G-Advanced : A Deep Dive into Emerging Standards
Yoonji Seo
Korea University, South Korea
Poster
P-46
Dec. 19, 2023 16:30 ~ 18:00
POSTER: An Algorithm for Sequential Recommendation Based on Dynamic Item Frames
Wooseok Kim, Minje Kim, Hyejin Jeong, and Sangmin Choi
Gyeongsang National University, South Korea
Poster
P-47
Dec. 19, 2023 16:30 ~ 18:00
POSTER: Extraction of Attack Scenarios Targeting IoT and Development of MTD Defense Techniques
Hojunjin, Seungho Jeon, and Jungtaek Seo
Gachon University, South Korea







Previous Page