Loading...

 Online Proceeding  

Proceeding Download


Track 1 + Main Session  : Live (3 Days)

Track 2 : Live (3 Days)

Track 3 : Live (3 Days)


 Keynote Session  

 Keynote Session
No. Time Title/authors/Institution PDF
Keynote-1
Dec. 17, 2024
14:00 ~ 15:00
Challenges on Security for future 6G Networks
Prof. Antonio Skarmeta(University of Mercia, Spain)
Keynote-2
Dec. 18, 2024
13:30 ~ 14:30
NICT's Cyber Security Research: Japan's ICT Research Institute's Global Cyber Security Initiatives and Research Introduction on Monitoring, Analysis and Mitigation of DoS/DDoS Attacks
Prof. Koji Nakao (NICT, Yokohama National University, JAPAN)


 Oral/Poster Presentation  

 Oral Presentation
Session Article Id Time Title/authors/Institution Abstract
1A-1
1
Dec. 17, 2024 09:00 ~ 10:30
A Time Series Approach to False Base Station Detection in Beyond 5G Networks Using LSTM
I Wayan Adi Juliawan Pawana, Seog Chung Seo, Okyeon Yi, Ilsun You (Kookmin University), Philip Virgil Astillo (University of San Carlos), Linawati (Udayana University)
1A-2
2
Dec. 17, 2024 09:00 ~ 10:30
Frame-based Data Transmission for base Stations of 5G/6G networks
Fang-Yie Leu, Yu-Han Chen (Computer Science Department, TungHai University), Kun-Lin Tsai (Electrical Engineering Department, Tunghai University), Susanto Susanto (National Research and Innovation Agencies, Indonesia)
1A-3
3
Dec. 17, 2024 09:00 ~ 10:30
Anomaly Detection Based on LSTM Autoencoder for DDoS Detection in Open RAN
Suhyeon Lee, Hwankuk Kim (Kookmin University)
1A-4
4
Dec. 17, 2024 09:00 ~ 10:30
Intelligent Security for Private 5G Networks: Approaches to Data Collection and Processing
Hoonki Lee, Jonghoon Lee, Mikyong Han, Nohsam Park, Yongyoon Shin (ETRI)
1B-1
5
Dec. 17, 2024 09:00 ~ 10:30
PROXIMA : Process Rather than Outcome, eXplainable Instruction of Multiple Ai for Cybersecurity Exercise
Sung-Kyu Ahn (SysCore Lab, Sejong University), Ki-Woong Park (Sejong University)
1B-2
6
Dec. 17, 2024 09:00 ~ 10:30
PhiShield: An AI-based Personalized Anti-spam Solution at the end Node
Hyunsol Mun, Jeeeun Park, Boeun Kim, Yeonhee Kim, Jongkil Kim (Ewha Womans University)
1B-3
7
Dec. 17, 2024 09:00 ~ 10:30
ARGUS: Analyzing Routes on Geolocation Unavailable Scenarios using Sensor Fusion and Deep Learning
Saehee Jun, Gang Min Kim, Huy Kang Kim (School of Cybersecurity, Korea University), Byung Il Kwak (Hallym University)
1B-4
8
Dec. 17, 2024 09:00 ~ 10:30
A Comprehensive Study of Machine Learning Techniques for Malicious URL Detection in Cybersecurity
Tanjim Mahmud, Md Hasan Ali, Tanvir Hasan (Rangamati Science and Technology University), Mst. Sharmin Akter (Port City International University, Chittagong), Mohammad Tarek Aziz, Mohammad Kamal Uddin (Chittagong University of Engineering & Technology), Mohammad Shahadat Hossain (University of Chittagong), Karl Andersson (Luleå University of Technology)
1B-5
9
Dec. 17, 2024 09:00 ~ 10:30
IPG : Incremental Patch Generation for Generalized Adversarial Patch Training
Wonho Lee, Hyunsik Na, Junsung Kim, Daeseon Choi (Soongsil University)
1C-1
10
Dec. 17, 2024 09:00 ~ 10:30
Towards Mobile Users Location Privacy Protection: A Review on Location Simulation and Detection Technologies among Location-Based Service Applications
Bing Zhang, Yiyang Shi (Zhengzhou University) Wenqi Shi, Hang He, Xiangyang Luo (Key Laboratory of Cyberspace Situation Awareness of Henan Province)
1C-2
11
Dec. 17, 2024 09:00 ~ 10:30
A Networking Scheme for FANETs Based on an Improved Smart Identifier Network (SINET)
Han Zeyu, Huizhi Wang, Wang Xiaoyi (Beijing Jiaotong University), Linyuan Yao (Beijing Institute of Astronautical Systems Engineering)
1C-3
12
Dec. 17, 2024 09:00 ~ 10:30
A DDoS Attack Detection Method Based on an Ensemble of Small Models for Multi-Layer Satellite Networks
Xiaojing Fan, Wangjian Zhou, Huachun Zhou (Beijing Jiaotong University)
1C-4
13
Dec. 17, 2024 09:00 ~ 10:30
A Novel Framework for Route Recommendation in Cooperative Vehicle Systems: The SHAFA Model
Manipriya Sankaranarayanan (Indian Institute of Information Technology Sricity, Chittoor), Mala C (National Institute of Information Technology, Tiruchirappalli, Tamil Nadu)
2A-1
14
Dec. 17, 2024 10:45 ~ 12:00
A Study on Enhancing Reauthentication Methods Among Workloads in a ZTA Environment
Wonhwi Choi, Jungsoo Park (Kangnam University)
2A-2
15
Dec. 17, 2024 10:45 ~ 12:00
A Study on Parallel Tuple Sieve Algorithm
Yuntao Wang (The University of Electro-Communications), Keiichi Imai, Eiichiro Fujisaki (Japan Advanced Institute of Science and Technology)
2A-3
16
Dec. 17, 2024 10:45 ~ 12:00
A Study on Signature-Based Web API Intrusion Detection Algorithm Using Regular Expressions
Youngjae Kim, I Wayan Adi Juliawan Pawana, Ilsun You, Bonam Kim (Kookmin University), Junyong Lee, Myeongcheol Kim (Penta Security Inc.)
2A-4
17
Dec. 17, 2024 10:45 ~ 12:00
Counter-Based Session Key Establishment Protocol for Efficient and Forward Security in Bluetooth BR/EDR
Bae Woori, Youn Taek-Young, Jho Nam-Su (Dankook University)
2B-1
18
Dec. 17, 2024 10:45 ~ 12:00
The OWApp Benchmark: an OWASP-compliant Vulnerable Android App Dataset
Bing Zhang, Yiyang Shi (Zhengzhou University) Wenqi Shi, Hang He, Xiangyang Luo (Key Laboratory of Cyberspace Situation Awareness of Henan Province)
2B-2
19
Dec. 17, 2024 10:45 ~ 12:00
Artificial Expert Support for Specification-based Misehavior Detection System Framework in Cyber Physical Systems.
Han Zeyu, Huizhi Wang, Wang Xiaoyi (Beijing Jiaotong University) Linyuan Yao (Beijing Institute of Astronautical Systems Engineering)
2B-3
20
Dec. 17, 2024 10:45 ~ 12:00
An Explainable Android Malware Detection Framework Based on Graph Neural Network
Xiaojing Fan, Wangjian Zhou, Huachun Zhou (Beijing Jiaotong University)
2B-4
21
Dec. 17, 2024 10:45 ~ 12:00
Proactive Threat Detection and Anomaly Analysis Framework Using Log-Based Sequence Analysis
Seong-Su Yoon, Hui-Seok Yang, Joon-Seok Kim, Sang-Joon Lee (Chonnam National University)
2C-1
22
Dec. 17, 2024 10:45 ~ 12:00
Provably Secure Unidirectional Threshold PRE+ Schemes
Maruthi V, Kunwar Singh (National Institute of Technology, Trichy, Tamil Nadu)
2C-2
23
Dec. 17, 2024 10:45 ~ 12:00
An Efficient Sequential Aggregate Signature Scheme with Lazy Verification
Arinjita Paul (Niobium Microsystems), Sabyasachi Dutta (SRM University-AP), Kouichi Sakurai (Kyushu University), Chandrasekaran Pandurangan (Indian Institute of Science)
2C-3
24
Dec. 17, 2024 10:45 ~ 12:00
User Identification Based on sEMG and Accelerometer Sensors and Deep Learning Approaches
Sakorn Mekruksavanich (University of Phayao)Anuchit Jitpattanakul (King Mongkut's University of Technology North Bangkok)
3A-1
25
Dec. 17, 2024 13:15 ~ 16:15
Securing Authentication and Authorization in Computing Continuum
Mario Marín, Antonio Skarmeta Gomez (University of Murcia)Alejandro Arias, Rafael Marín (Odin Solutions SL)
3A-2
26
Dec. 17, 2024 13:15 ~ 16:15
FLARE: A blockchain strategy for hierarchical Federated Learning algorithms
Marcos Gabriel Mannarino Loures, Claudio Farias (Federal University of Rio de Janeiro)
3A-3
27
Dec. 17, 2024 13:15 ~ 16:15
QoE-Driven Spot Pricing Schemes For Edge User Allocation Across the Distributed Cloud-Edge Continuum
Filippou Michail, Prodromos Makris, Aristotelis Kretsis, Panagiotis Kokkinos, , Emmanouel Varvarigos (National Technical University of Athens)
3B-1
28
Dec. 17, 2024 13:15 ~ 16:15
Efficient and Secure CSIDH using Relation Lattices
Mohamed Bourefis, Atsuko Miyaji (Osaka University)
3B-2
29
Dec. 17, 2024 13:15 ~ 16:15
A Study on Evaluation Items and Indicators for Ensuring Cyber Resilience
Sooyon Seo, Jaeho Hwang, Minseok Hur, Dongmin Kim, Sechan Lee, Moohong Min (Sungkyunkwan University)
3B-3
30
Dec. 17, 2024 13:15 ~ 16:15
The Amplified Boomerang Attack on ChaCha
Nasratullah Ghafoori, Atsuko Miyaji (Osaka University)
3C-1
31
Dec. 17, 2024 13:15 ~ 16:15
An Enhanced Payload Image Steganography Employing Hybrid Edge Detection Technique and MSB Cover Image
A F M Zainul Abadin (Pabna University of Science and Technology), Mohammad Kamrul Hasan (Universiti Kebangsaan Malaysia), Rossilawati Sulaiman (National University of Malaysia)
3C-2
32
Dec. 17, 2024 13:15 ~ 16:15
A High Security Image Steganography System Employing Multiple Edge Detectors
A F M Zainul Abadin (Pabna University of Science and Technology), Rossilawati Sulaiman (National University of Malaysia), Mohammad Kamrul Hasan (Universiti Kebangsaan Malaysia)
3C-3
33
Dec. 17, 2024 13:15 ~ 16:15
A method for supporting quick scene recognition by generating average images from surveillance videos
Kaoru Sugita (Fukuoka Institute of Technology)
4A-1
34
Dec. 17, 2024 16:30 ~ 18:00
Distributed AI-Based Network Intent Resolution for Reliable Security Service Orchestration
Pedro Martinez-Julia, Ved P. Kafle, Hitoshi Asaeda (National Institute of Information and Communications Technology) , Ana Hermosilla (University of Murcia)
4A-2
35
Dec. 17, 2024 16:30 ~ 18:00
Towards a Framework and Methodology Adherent to the EU Cyber Resilience Act - Observations from CERTIFY
Stefano Sebastio (Collins Aerospace) , Sara Matheu, Antonio Skarmeta Gomez (University of Murcia) Matteo Molé, Roberto Cascella (European Cyber Security Organization (ECSO))
4A-3
36
Dec. 17, 2024 16:30 ~ 18:00
A privacy preserving Health Data Space approach for federated machine learning
Alessandro Bassi (Eurescom GmbH)Konstantinos Koutsopoulos (Qualtek SARL)
4A-4
37
Dec. 17, 2024 16:30 ~ 18:00
Cross-Domain Telemetry Architecture: Real-Time Metrics in the Computing Continuum
José Manuel Bernabé Murcia, Eduardo Cánovas Mártinez, Antonio Skarmeta Gomez (University of Murcia), Alejandro Molina Zarca (University Center of Defense at the Spanish Air Force Academy), Stefano Braghin (IBM Research Europe – Ireland)
4C-1
38
Dec. 17, 2024 16:30 ~ 18:00
CAFL: Contrastive Learning and Self-Attention in Federated Learning
Riqing Xu, Wenbin Qiu, Gang Lei (Jiangxi Normal University, Nanchang, China)
4C-2
39
Dec. 17, 2024 16:30 ~ 18:00
A Color-Based Data Poisoning Backdoor Approach for Misleading Adversarial Privacy Prediction
Muhammad Rizwan, Wang Xingfu, Yi Ke, Ammar Hawbani (University of Science and Technology of China) , Shivanshu Shrivastava (Rajiv Gandhi Institute of Petroleum Technology) , Pelin Angin (Middle East Technical University) , Zhu Han (University of Houston)
4C-3
40
Dec. 17, 2024 16:30 ~ 18:00
Administration of Environment Aware Deep Learning Based Access Control
Pankaj Chhetri, Ram Krishnan (University of Texas at San Antonio) , Mohammad Nur Nobi (FedEx Dataworks)
4C-4
41
Dec. 17, 2024 16:30 ~ 18:00
NetSMoM: ML Driven Network Slicing framework for Efficient and Secure Service Delivering in 6G Network
Ramraj Dangi (SCOPE, VIT Bhopal University, M.P., India), Lokesh Malviya (SCSE, VIT Bhopal University, M.P., India), Akshay Jadhav (SCSE, Manipal University Jaipur, India), Gaurav Choudhary (University of Southern Denmark, Sonderborg, Denmark), Nicola Dragoni (DTU Compute, Technical University of Denmark)
5A-1
42
Dec. 18, 2024 09:00 ~ 10:30
Evaluation of a Startup Program Identification for Efficient and Accurate IoT Security Investigations
Yuta Shimamoto, Ryota Yoshimoto, Jiratchaya Phinyodom (Okayama University), Hiroyuki Uekawa, Mitsuaki Akiyama (NTT Social Informatics Laboratories), Toshihiro Yamauchi (Okayama University)
5A-2
43
Dec. 18, 2024 09:00 ~ 10:30
Detection techniques and Countermeasures against Deepfake-related Crime
Soojin Oh, Cheol Hee Yoon (Korean National Police University)
5A-3
44
Dec. 18, 2024 09:00 ~ 10:30
Analysis of Deepfake Detection Models Against Deepfake Crimes
Lee Sechan, Seo Sooyon, Jaeho Hwang, Hur Minseok, Kim Dongmin, Min Moohong (Sungkyunkwan University), Kim Aram (University of Suwon)
5A-4
45
Dec. 18, 2024 09:00 ~ 10:30
Analysis and investigation of remote call service artifacts used in voice phishing: Focusing on voice phishing using CMC
Minjung Yoo, Seunghyun Park, Seongmin Kim (Sungshin Women's University)
5A-5
46
Dec. 18, 2024 09:00 ~ 10:30
Zero Trust Approach to Enhance the Security of Microservices-Based DevSecOps
Daemin Shin (Financial Security Institute) , Jiyoon Kim (Gyeongsang National University), Ilsun You (Kookmin University)
5B-1
47
Dec. 18, 2024 09:00 ~ 10:30
V2G Fuzzer : Fuzzing Tool for Implementing Electric Vehicle Charger V2G Communication
Yu-Bin Kim, Dong-Hyuk Shin, Ieck-Chae Euom, Jae-Jun Ha (System Security Research Center, Chonnam National University)
5B-2
48
Dec. 18, 2024 09:00 ~ 10:30
Enhancing Security with Virtualization and Real-time Communications for Applications on Autonomous Vehicles
Chih-Hao Chang, Chi-Sheng Shih, Shih-Hao Hung (National Taiwan University)
5B-3
49
Dec. 18, 2024 09:00 ~ 10:30
Blockchain-based secure vehicle data trading model for vehicle accident reconstruction
Su Jin Shin, Ye Hyeon Park, Youngho Park, Kyung-Hyune Rhee, Sang Uk Shin (Pukyong National University)
5B-4
50
Dec. 18, 2024 09:00 ~ 10:30
Automotive Crash Data Collection and Analysis: A Log-Based Case Study
Jeehun Jung, Seong-Je Cho, Gyunseung Ahn (Dankook University), Kyoungwon Suh (Illinois State University)
5B-5
51
Dec. 18, 2024 09:00 ~ 10:30
A Survey of Intrusion Detection Systems for Autonomous Vehicles Current Solutions and Limitations
Ulysses Lam (The University of Queensland), Jin-Hee Cho (Virginia Tech), Hyuk Lim (Korea Institute of Energy Technology), Terrence Moore, Frederica Free-Nelson (US Army Research Laboratory), Dongseong Kim (The University of Queensland)
6A-1
52
Dec. 18, 2024 10:45 ~ 12:00
Enhancing Cloud Security for IoHT: A Dual-Layer Scheme Combining Quantum Key Distribution and Post-Quantum Cryptography.
Changjong Kim, Seunghwan Kim (Seoultech), Sunggon Kim (Seoul National University of Science and Technology)
6A-2
53
Dec. 18, 2024 10:45 ~ 12:00
Public Salt-based Post-Quantum PAKE Protocol
Hyun Seo Kim, Ye Sol Lee, Jung Yeon Hwang (Sungshin Women's University)
6A-3
54
Dec. 18, 2024 10:45 ~ 12:00
Analysis of Backdoored (Classic) McEliece in a Multi-User Setting
Dai Miura, Hyungrok Jo, Shingo Sato, Junji Shikata (Yokohama National University)
6A-4
55
Dec. 18, 2024 10:45 ~ 12:00
Reversible Face De-Identification Using Format-Preserving Encryption
Heehwan Kim, Sungjune Park, Daeseon Choi (Soongsil University)
6B-1
56
Dec. 18, 2024 10:45 ~ 12:00
High-Definition Reconstruction of Wildfire-Affected Areas Using Attention SRU-GAN on Wildfire Images
Jong Chan Park, Gun-Woo Kim (Gyeongsang National University)
6B-2
57
Dec. 18, 2024 10:45 ~ 12:00
Development of a Shelter Control System for Refugees
Yuta Seri, Tomoyuki Ishida (Fukuoka Institute of Technology)
6B-3
58
Dec. 18, 2024 10:45 ~ 12:00
Robust and Invisible Watermarking Using Low-Frequency Domain-Based Discrete Wavelet Transform
Seo-Yi Kim, Yeon-Ji Lee, Il-Gu Lee (Sungshin Women's University)
6B-4
59
Dec. 18, 2024 10:45 ~ 12:00
Software Defined Range-proof Authentication Mechanism for Untraceable Digital ID
So-Eun Jeon, Yeon-Ji Lee, Il-Gu Lee (Sungshin Women's University)
7A-1
60
Dec. 18, 2024 15:00 ~ 16:15
A Scenario Language for Model-based Testing of TLS
Jaehun Lee, Kyungmin Bae (POSTECH)
7A-2
61
Dec. 18, 2024 15:00 ~ 16:15
Utilizing LLM Chatbots for Formal Descriptions of Cryptographic Protocols
Hideki Sakurada (NTT Communication Science Laboratories, NTT Corporation)Kouichi Sakurai (Kyushu University)
7A-3
62
Dec. 18, 2024 15:00 ~ 16:15
Toward correctness by construction for network security configuration
Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza (Politecnico di Torino)
7A-4
63
Dec. 18, 2024 15:00 ~ 16:15
Comprehensive Formal Verification of EAP-AKA'-FS Using ProVerif: Ensuring Robustness in Future Mobile Networks
Seonghan Shin (National Institute of Advanced Industrial Science and Technology (AIST))Yongho Ko, Ilsun You (Kookmin University)
7B-1
64
Dec. 18, 2024 15:00 ~ 16:15
Machine Learning-Based Secure Transmission with Artificial Noise in MISO Communication Systems
Min Jeong Kang, Jung Hoon Lee (Hankuk University of Foreign Studies)Il-Gu Lee (Sungshin Women's University)
7B-2
65
Dec. 18, 2024 15:00 ~ 16:15
Neutralizing tunneling protocols by manipulating VPN client routing tables
In June Shin, Ji Yul Kim (Daegu University)Chang Hoon Kim (Daegu University)
7B-3
66
Dec. 18, 2024 15:00 ~ 16:15
Dynamic xIFS-Based Low-Latency Traffic Transmission Technique
Sun-Jin Lee, Il-Gu Lee (Sungshin Women's University)
7B-4
67
Dec. 18, 2024 15:00 ~ 16:15
DFL: Differential Federated Learning for Enhancing Privacy and Efficiency of Multilink-Operation Wireless Communication Networks
So-Yeon Kim, Na-Eun Park, Yu-Ran Jeon, Il-Gu Lee (Sungshin Women's University)
8A-1
68
Dec. 19, 2024 09:00 ~ 10:15
SCU-CGAN: Enhancing Fire Detection through Synthetic Fire Image Generation and Dataset Augmentation
Ju-Young Kim, Ji-Hong Park (Gyeongsang National University)Gun-Woo Kim (Gyeongsang National University)
8A-2
69
Dec. 19, 2024 09:00 ~ 10:15
Clock Glitch-based Fault Attacks on Convolutional Neural Networks
Seongwoo Hong, Hyoju Kang, Seungyeol Lee, Jaecheol Ha (Hoseo University)
8A-3
70
Dec. 19, 2024 09:00 ~ 10:15
Federated Random Forests for Privacy-Preserving Intrusion Detection in IoT Networks
Md. Parvezur Rahman Mahin, Farhana Anwar Tisha (East West University)Effat Ara (American International University of Bangladesh)Raihan Ul Islam (Associate Professor, East West University)Karl Andersson (Lulea University of Technology)Mohammad Shahadat Hossain (University of Chittagong)
8A-4
71
Dec. 19, 2024 09:00 ~ 10:15
Fair Incentive Distribution Mechanism in Hierarchical Federated Learning
Siwan Noh, Ju-Hyun Jeon, Kyung-Hyune Rhee (Pukyong National University)
8B-1
72
Dec. 19, 2024 09:00 ~ 10:15
Lightweight Object-detection Model on Edge Devices for Safety and Security Applications
Yun-Wei Lin, Dong-Sheng Zhuang, Jia-Huei Shie (National Yang Ming Chiao Tung University)
8B-2
73
Dec. 19, 2024 09:00 ~ 10:15
Proposal of Early Heavy Rain Warning System by Micrometeorological and Geographical Factors with Numerous IoT Sensors
Noriki Uchida, Tomoyuki Ishida (Fukuoka Institute of Technology)Hiroaki Yuze (University of Shizuoka)Yoshitaka Shibata (Iwate Prefectural University)
8B-3
74
Dec. 19, 2024 09:00 ~ 10:15
Adapting Matrix Factorization for Multivariate Time Series Imputation
Minje Kim, Sang-Min Choi (Gyeongsang National University)
8B-4
75
Dec. 19, 2024 09:00 ~ 10:15
Detecting Cryptojacking Containers in Kubernetes Using eBPF
Riyeong Kim, Su-Min Kim, Jeong-Eun Ryu, Soo-Min Lee, Seongmin Kim (Sungshin Women's University)
8C-1
76
Dec. 19, 2024 09:00 ~ 10:15
Percolation-based Optimization for Enhancing SDN Structure Resilience
Yizhong Hu, Jianfeng Guan, Kexian Liu (Beijing University of Posts and Telecommunications)
8C-2
77
Dec. 19, 2024 09:00 ~ 10:15
A Three-Pronged Approach to Malicious APK: Combining Snort, Wireshark, and Wazuh for Advanced Threat Management
Yi Anson Lam, Siu Ming Yiu, K P Chow (The University of Hong Kong)
8C-3
78
Dec. 19, 2024 09:00 ~ 10:15
Resilient Multi-Path Aggregation Transmission Mechanism for Bandwidth Enhancement
Qixuan Zhang, Yuyin Ma, Liang Wang (Beijing Jiaotong University)
8C-4
79
Dec. 19, 2024 09:00 ~ 10:15
Infiltrating the Metaverse: A Security Assessment of Multifaceted Voice Command Manipulation and Undermine
Arpita Dinesh Sarang, Sang-hoon Choi, Ki-woong Park (Sejong University)
9A-1
80
Dec. 19, 2024 10:30 ~ 12:00
Bidirectional Proxy Re-Encryption based on Isogenies
Jiawei Chen, Hyungrok Jo, Shingo Sato, Junji Shikata (Yokohama National University)
9A-2
81
Dec. 19, 2024 10:30 ~ 12:00
PRNG-Oriented Side-Channel Security Evaluation for TI-AES
Yusaku Harada, Maki Tsukahara, Daiki Miyahara, Yang Li, Kazuo Sakiyama (The University of Electro-Communications)Yuko Hara (Tokyo Institute of Technology)
9A-3
82
Dec. 19, 2024 10:30 ~ 12:00
A Blockchain-Based Approach for Secure Email Encryption with Variable ECC Key Lengths Selection
Md. Biplob Hossain, Maya Rahayu, Yuta Kodera, Yasuyuki Nogami, Samsul Huda (Okayama University)Md. Arshad Ali (Faculty of CSE, Hajee Mohammad Danesh Science and Technology University)
9A-4
83
Dec. 19, 2024 10:30 ~ 12:00
Analysis of Numerous Security Algorithm Performance with Data Encryption on Edge Device
Sangmyung Lee, Ehan Sohn, Soeun Kim (Seoul National University of Science and Technology)Sunggon Kim (Seoul National University of Science and Technology)
9A-5
84
Dec. 19, 2024 10:30 ~ 12:00
Lightweight IoT Data Encryption using Time Parameter based Ascon Algorithm
Kunlin Tsai, Ju-Wei Zhu, Deng-Yao Yao, Guo-Wei Wang, Fang-Yie Leu (TungHai University)
9B-1
85
Dec. 19, 2024 10:30 ~ 12:00
Development of Stepping-stone Intrusion Detection and its Trend
Jianhua Yang (Columbus State University, GA)Yongzhong Zhang (Shanghai Open University, Shanghai)Lixin Wang (Columbus State University, Columbus, GA)
9B-2
86
Dec. 19, 2024 10:30 ~ 12:00
Multi-channel Transmission Techniques of Multiple Encryption Keys and Ciphertext for Secure Firmware-Over-The-Air Mechanism
Chae-Yeon Park (Sungshin Women's University)Seo-Young Lim (Kangnam University)Sun-Jin Lee, Il-Gu Lee (Sungshin Women's University)
9B-3
87
Dec. 19, 2024 10:30 ~ 12:00
Exploring the Potential of Anomaly Detection through Prompt Engineering
Sungjune Park, Daeseon Choi (Soongsil University)
9B-4
88
Dec. 19, 2024 10:30 ~ 12:00
Co-EDR: Cooperative-based Event Data Recording Technique for Efficient Firmware Fuzzing
Seung-Ha Ji, Soeun Jeon (Sungshin Women's University)Dongim Han (BaekSeok University)Il-Gu Lee (Sungshin Women's University)
9C-1
89
Dec. 19, 2024 10:30 ~ 12:00
NGAP Anomaly Detection based on Signaling Sequences in 5GC Boundary
Shaocong Feng, Baojiang Cui, Meiyi Jiang, Weichun He, Junsong Fu (Beijing University of Posts and Telecommunications)
9C-2
90
Dec. 19, 2024 10:30 ~ 12:00
ADL: A Method of Attack Detection with LLM by Assigning Traffic Sequencing in 5G IoT
Aoran Huang, Huachun Zhou (Beijing Jiaotong University)
9C-3
91
Dec. 19, 2024 10:30 ~ 12:00
Enhancing Security in Open RAN Networks: Leveraging Zero Trust Architecture to Address Emerging Threats
Dowon Kim, Seongmin Park (Korea Internet Security and Agency)Sungmoon Kwon (Ajou University)
9C-4
92
Dec. 19, 2024 10:30 ~ 12:00
A Security Testing Framework for NAS Protocol Based on Template Modification and Signaling Fuzzing
Changnan Li, Baojiang Cui, Jie Xu (Beijing University of Posts and Telecommunications)
9C-5
93
Dec. 19, 2024 10:30 ~ 12:00
5G Sentinel: High-Precision Elastic Deep Intrusion Detection System for 5G Network
Shengjia Chang, Baojiang Cui, Shaocong Feng (Beijing University of Posts and Telecommunications)
ISE-1
94
Dec. 19, 2024 13:30 ~ 15:30
RT-TTS: A Real-Time Two-Stage Framework for Emotional Text-to-Speech Synthesis Without Labeled Emotion Data
Myeong Jin (Department of AI Convergence Engineering, Gyeongsang National University)Gun-Woo Kim (Gyeongsang National University)
ISE-2
95
Dec. 19, 2024 13:30 ~ 15:30
A Comprehensive Review of Digital Twin: Concepts, Applications, and Challenges
Changhui Bae, Euteum Choi (Gyeongsang National University)Seongjin Lee (Gyeongsang National University)
ISE-3
96
Dec. 19, 2024 13:30 ~ 15:30
A Multi-Stage Detection with Image Upscaling for Enhancing Small Object Detection in Early Fire Detection
Jisang Moon, Changhui Bae, Euteum Choi (Gyeongsang National University)Seongjin Lee (Gyeongsang National University)
ISE-4
97
Dec. 19, 2024 13:30 ~ 15:30
Network Recovery Method for UAVs through Neighbor Node Classification
Dongyun Ok, Euteum Choi (Gyeongsang National University), Seongjin Lee (Gyeongsang National University)
ISE-5
98
Dec. 19, 2024 13:30 ~ 15:30
Obstacle Avoidance in Autonomous Driving Exploiting Smooth Adaptive Dynamic Window Approach
Myeongjun Kim (Department of AI Convergence Engineering, Gyeongsang National University), Gun-Woo Kim (Gyeongsang National University)
WS1
99
Dec. 17, 2024 16:30 ~ 18:00
AutoBlue Sentinel: A Bluetooth Intrusion Detection System for Automotive Security
Zahyun Kang, Sanghoon Jeon (Kookmin University)
WS2
100
Dec. 17, 2024 16:30 ~ 18:00
A Study on Performance Comparison and Optimization of Anomaly Detection Systems Using BERT Variants
Yu-Jin So (Kunsan National University), Jong-Geun Park (Electronics and Telecommunication Research Institute)Kyuchang Kang (Kunsan National University)
WS3
101
Dec. 17, 2024 16:30 ~ 18:00
Enhancing Vehicle Smart Key Security with Blockchain Mechanisms
Sebi Kim, Sanghoon Jeon (Kookmin University)
WS4
102
Dec. 17, 2024 16:30 ~ 18:00
Robust Watermark Against Model Extraction Attack
Yeon-Ji Lee, Seo-Yi Kim, Il-Gu Lee (Sungshin Women's University)
WS5
103
Dec. 17, 2024 16:30 ~ 18:00
Dual Core based Hierarchical Partial Wireless Network Firmware Update Technology
Na-Hyun Kim, Jin-Min Lee, Il-Gu Lee (Sungshin Women's University)
WS6
104
Dec. 17, 2024 16:30 ~ 18:00
Computational analysis of PQC migration in EAP based 5G primary authenticaton
Hoseok Kwon, Bonam Kim, Seog Chung Seo, Okyeon Yi, Ilsun You (Kookmin University)
WS7
105
Dec. 17, 2024 16:30 ~ 18:00
Framework for Analyzing Heterogeneous Log Internal Artifacts for Remote Code Execution Detection
Seung-Ju Han, Ieck-Chae Euom, Ka-Kyung Kim, Hye-Ji Lee (System Security Research Center)
WS8
106
Dec. 17, 2024 16:30 ~ 18:00
CiME: Hardware-Based Detection Ransomware Using Capacitor in Memory for Entropy
Hyelim Jung (SysCoreLab., Sejong University, Seoul), Ki-Woong Park (Sejong University)
WS9
107
Dec. 17, 2024 16:30 ~ 18:00
One Time Password-based Peer-to-Peer Offline Authentication for Next-Generation Digital IDs
Jin-Min Lee, Sun-Jin Lee, Il-Gu Lee (Sungshin Women's University)
 Poster Presentation
Session Article Id Time Title/authors/Institution Abstract
P-1
108
Dec. 18, 2024 16:30 ~ 17:15
Privacy-Preserving Biometric Matching Framework for IoT-Cloud Architecture
Hyuna Noh, Eunmin Lee, Joohee Lee (Sungshin Women's University)
P-2
109
Dec. 18, 2024 16:30 ~ 17:15
Enabling Uncooperative Physical Localization in Cellular Networks
Taekkyung Oh, Duckwoo Kim, Beomseok Oh, Yongdae Kim (KAIST)
P-3
110
Dec. 18, 2024 16:30 ~ 17:15
Dual Broker-Based Message Queuing Telemetry Transport Protocol for Secure Authentication
Do-Eun Kim, So-Hyun Park, Il-Gu Lee (Sungshin Women's University)
P-4
111
Dec. 18, 2024 16:30 ~ 17:15
Proposal of Chip-swap Technology for Vehicle Forensics in EDR Interface Damage
Dongchan Ham, Seonghyun Kim, Minyoung Chang, Samuel Woo, Seungkwang Lee (Dankook University)
P-5
112
Dec. 18, 2024 16:30 ~ 17:15
Authentication System for Connected Cars Using Multi-Touch Pressure Gesture Recognition
Jun Lee (Hoseo University), Youngseok Ahn (Impressivo Korea Inc.), Hyun Kwon (Korea Military Academy)
P-6
113
Dec. 18, 2024 16:30 ~ 17:15
Quantum Error Detection: Enhancing Reliability in Quantum Computing
Wibby Aldryani Astuti Praditasari, Hyejin Yoon, Okyeon Yi (Kookmin University)
P-7
114
Dec. 18, 2024 16:30 ~ 17:15
Size-Hiding Inner Product Private Joins and Compute with Cardinality
Eunmin Lee, Hyun-A Noh, Joohee Lee (Sungshin Women's University)
P-8
115
Dec. 18, 2024 16:30 ~ 17:15
Automated Quantum Circuit Synthesis Mechanism Considering Quantum Circuit Depth Optimization
Chan Ho Choi, Jinseop Oh, Sangman Lee, Dooho Choi (Korea University)
P-9
116
Dec. 18, 2024 16:30 ~ 17:15
Towards Measuring Shoulder Surfing Resistance
Raymond Zhu, Ye Zhu (PassWorld, Inc., Cleveland State University)
P-10
117
Dec. 18, 2024 16:30 ~ 17:15
Automated Exploit Generation for Cellular Security Using Fake UE
Mincheol Son, Kwangmin Kim, Suhwan Jeong, Jiwoo Suh, Cheoljun Park, Yongdae Kim (KAIST)
P-11
118
Dec. 18, 2024 16:30 ~ 17:15
Security evaluation by ProfVerif for PQC-TLS and Modified KEM protocol
Soonwook Choi, Dooho Choi (Korea University)
P-12
119
Dec. 18, 2024 16:30 ~ 17:15
Formal Verification of TLS 1.3 PSK with ECDH: Analyzing Security through BAN Logic
Jieon Oh, Chaeyeon You, Bonam Kim, Seogchoung Seo, Okyeon Yi, Ilsun You (Kookmin University)
P-13
120
Dec. 18, 2024 16:30 ~ 17:15
Assessing Infrastructure-as-Code Static Analysis Tools in Cloud-native Environments
Kahyun Kim, Mijin Kim, Yerin Chun, Hyeyeon Hyeon, Jiwon Yoo, Seongmin Kim (Sungshin Women's University)
P-14
121
Dec. 18, 2024 16:30 ~ 17:15
Evaluating the Impact of TLS Metadata on Behavior-Based Encrypted Malware Family Classification
Joonseo Ha, Byung II Kwak, Mee Lan Han (Korea University)
P-15
122
Dec. 18, 2024 16:30 ~ 17:15
Exfiltrating Data from Air-Gapped Networks via Apple Wireless Direct Link
Minji Lee, Hyunwoo Choi (Sungshin Women's University)
P-16
123
Dec. 18, 2024 16:30 ~ 17:15
The Performance Improvement Analysis of HTTP/3 in 5G Service-Based Architecture
Tae Ho Won, Bonam Kim, Seog Chung Seo, Okyeon Yi, Ilsun You (Kookmin University)
P-17
124
Dec. 18, 2024 16:30 ~ 17:15
Authentication of Base Station for 6G Open Network Environment
Yoonsun Han, Youngbeom Kim, Mingi Kim, Ilsun You, Okyeon Yi, Seog Chung Seo (Kookmin University)
P-18
125
Dec. 18, 2024 16:30 ~ 17:15
Fuzzing Based Side-Channel Data Leakage Attack in Air-Gapped Networks
Yeon-Jin Kim, Na-Eun Park, Il-Gu Lee (Sungshin Women's University)
P-19
126
Dec. 18, 2024 16:30 ~ 17:15
Negative Testing in KpqC CAVP
Mingi Kim, Junhyeok Choi, Dongcheon Kim, Ilsun You, Okyeon Yi, Seog Chung Seo (Kookmin University)
P-20
127
Dec. 18, 2024 16:30 ~ 17:15
Parallel Implementation of MAYO on GPU
Junhyeok Choi, Dongcheon Kim, Ilsun You, Okyeon Yi, Seog Chung Seo (Kookmin University)
P-21
128
Dec. 18, 2024 16:30 ~ 17:15
Breaking the Sequential Barrier: A Parallel Multi-Factor Authentication with Shamir's Secret Sharing
Jungjoo Oh, Hye-Yeon Shim, Junho Hong, Il-Gu Lee (Sungshin Women's University)
P-22
129
Dec. 18, 2024 16:30 ~ 17:15
Signal Fingerprinting Method Based on Emphasized Spectrum Data for IoT Device Authentication
Hyeon Park (SoonChunHyang University), Taeguen Kim (Korea University)
P-23
130
Dec. 18, 2024 16:30 ~ 17:15
A Study on Reducing Traffic Congestion via Road Balance for Roadside Units
Keon Yun, Yunjin Oh, Myongcheol Lim, Jinhyeok Oh, Jihye Ryu, Minchul Kim (Penta Security Inc.)
P-24
131
Dec. 18, 2024 16:30 ~ 17:15
Enhancing Security in DevSecOps through IaC: A Study on Terraform-Kubernetes
Mijin Kim, Kahyun Kim, Yerin Chun, Hyeyeon Hyeon, Jiwon Yoo, Seongmin Kim (Sungshin Women's University)
P-25
132
Dec. 18, 2024 16:30 ~ 17:15
An Adaptive Device Authentication Framework for Private 5G Networks: Key Considerations for Implementation
Jihoon Choi, Hyesu Oh, Juseoung Lee, Sukhyeon Jeon (Telecommunications Technology Association (TTA))
P-26
133
Dec. 18, 2024 16:30 ~ 17:15
DTV: Dynamic Topology Virtualization System for Mitigating ICARUS in LEO Satellite Networks
Jaemin Myeong, Won-Bin Kim, Jinho Yoo, Daehee Seo (Sangmyung University)
P-27
134
Dec. 18, 2024 16:30 ~ 17:15
Requirements for Application DTLS on Element Management System
Hyeonyeop Shin, Donghyun Kum (Telecommunications Technology Association)
P-28
135
Dec. 18, 2024 16:30 ~ 17:15
Privacy Camera: Outputting original digital images without privacy leaks
Ho Yeong Kim, Seung-A Park, Chanho Choi, Mee Lan Han, Dooho Choi (Korea University)
P-29
136
Dec. 18, 2024 16:30 ~ 17:15
A Detection Framework for Inaudible Attack on Mobile AI Assistants
Mijin Shin, Seolin Um, Seongmin Kim (Sungshin Women's University)
P-30
137
Dec. 18, 2024 16:30 ~ 17:15
Optimization Analysis of Binary Field Multiplication in Cortex-M4
Dongcheon Kim, Ilsun You, Okyeon Yi, Seog Chung Seo (Kookmin University)
P-31
138
Dec. 18, 2024 16:30 ~ 17:15
How to ensure availability against DoS attacks in V2X communication channel environments
Youngjin Kim, Kyung-Mo Sung, Wonseok Choi (Telecommunications Technology Association)
P-32
139
Dec. 18, 2024 16:30 ~ 17:15
Efficient Implementation of ALTEQ on Cortex-M4
Yongryeol Choi, Youngbeom Kim, Willy Susilo, Ilsun You, Okyeon Yi, Seog Chung Seo (Kookmin University)
P-33
140
Dec. 18, 2024 16:30 ~ 17:15
DoS Attack Detection in Microservices Environment Using Distributed Tracing
Sumin Kim, Riyeong Kim, Seongmin Kim (Sungshin Women's University)
P-34
141
Dec. 18, 2024 16:30 ~ 17:15
A Networking Scheme for FANETs Based on an Improved Smart Identifier Network (SINET)
Zeyu Han, Huizhi Wang, Xiaoyi Wang, Linyuan Yao (Beijing Jiaotong University, Beijing Institute of Astronautical Systems Engineering)
P-35
142
Dec. 18, 2024 16:30 ~ 17:15
Feasibility Evaluation and Analysis of Information Leakage Attacks Using Wi-Fi Beacons in the Air-Gapped Network
Ye-Rim Jeong, So-Yeon Kim, Il-Gu Lee (Sungshin Women's University)
P-36
143
Dec. 18, 2024 16:30 ~ 17:15
A Study on Protocol Enabling a Third Party to Compute Multiparty Private Set Intersection
Ki-Hwan Kim, Su-Hyun Kim, Im-Yeong Lee (Soonchunhyang University)
P-37
144
Dec. 18, 2024 16:30 ~ 17:15
Error detection techniques for location-based vehicle communication message
Wonseok Choi, Kyung-Mo Sung, Youngjin Kim (TTA), Laihyuk Park (Seoul National University of Science & Technology), Woongsoo Na (Kongju National University)
P-38
145
Dec. 18, 2024 16:30 ~ 17:15
Blockchain-based PKI for 6G Integrated NTN Domain
Youngbeom Kim, Yoonsun Han, Mingi Kim, Ilsun You, Okyeon Yi, Seog Chung Seo (Kookmin University)
P-39
146
Dec. 18, 2024 16:30 ~ 17:15
Formal Verification of the EAP-AKA' Protocol Using ProVerif
Changhyeon Woo, Bonam Kim, Seogchung Seo, Okyeon Yi, Ilsun You (Kookmin University)
P-40
147
Dec. 18, 2024 16:30 ~ 17:15
Infrared-based Attack on Lane Detection Algorithm for Autonomous Vehicles
Hyunmin Ju, Sangmin Woo, Dohyun Kim, Yongdae Kim (KAIST)
P-41
148
Dec. 18, 2024 17:15 ~ 18:00
Empirical analysis on Neural Networks based Zero-Day Attack Detection
Yeon-Seo Park, Sin-Young Gwak, Hee-Ju Hong, Yeon-Sup Lim (Sungshin Women's University)
P-42
149
Dec. 18, 2024 17:15 ~ 18:00
Up-to-date Dataset for Darknet Traffic Detection
Daeun Kim, Mijin Shin, Seongmin Kim (Sungshin Women's University)
P-43
150
Dec. 18, 2024 17:15 ~ 18:00
Supply Chain Attack Scenario for a Smart Water Purification Plant
June-Hee Lee, Hyeon-Ah Yoo, Man-Hee Lee (Hannam University)
P-44
151
Dec. 18, 2024 17:15 ~ 18:00
Encrypted Attack Traffic Augmentation Techniques Based on Point-in-Time Feature
Daeho Choi, Yeog Kim, Changhoon Lee, Kiwook Sohn (Seoul National University of Science and Technology)
P-45
152
Dec. 18, 2024 17:15 ~ 18:00
Development of a Differential Voltage-based In-Vehicle Network Intrusion Detection System
Su Yeon Yoo, Kyungrok Park, Jungho Lee, Hyunmin Song, Samuel Woo (Dankook University)
P-46
153
Dec. 18, 2024 17:15 ~ 18:00
Dataset Characterization-Guided Machine Learning
Na-Eun Park, Yeon-Jin Kim, Il-Gu Lee (Sungshin Women's University)
P-47
154
Dec. 18, 2024 17:15 ~ 18:00
Contract Analysis Mechanism Based on Digital Content Categorization for License Agreement Clause Recommendation
Hyun-Soo Kim, Chang-Jun Choi, Seung-Chan Back, Yong-Joon Joe, Dong-Myung Shin, Ae-Kyung Kim (LSware Inc.)
P-48
155
Dec. 18, 2024 17:15 ~ 18:00
GPS Spoofing Detection: Leveraging Commodity Receiver
Jaehoon Kim, Juwhan Noh, Jiwoo Suh, Yongdae Kim (KAIST)
P-49
156
Dec. 18, 2024 17:15 ~ 18:00
Robust and Invisible Digital Watermark Utilizing Multi-Bit Embedding Technique
Chaewon Song, Sohyun Park, Il-Gu Lee (Sungshin Women's University)
P-50
157
Dec. 18, 2024 17:15 ~ 18:00
Performance Analysis of Federated Learning in Non-IID Network Intrusion Detection
You Jeong Lee, Jakyoung Yun, Yeonsup Lim (Sungshin Women's University)
P-51
158
Dec. 18, 2024 17:15 ~ 18:00
An Anti-Drone System Leveraging Targeted Battery Drain Attack
Heeyeong Suh, Seyoung Lee (Kangwon National University)
P-52
159
Dec. 18, 2024 17:15 ~ 18:00
Containerized DDoS Botnet Detection with eBPF-based Monitoring
Jeongeun Ryu, Ri-Yeong Kim (Sungshin Women's University), Seongmin Kim (Sungshin Women's University)
P-53
160
Dec. 18, 2024 17:15 ~ 18:00
Preventing illegal tampering of road signs using steganography
Kyung-Mo Sung, Wonseok Choi (Telecommunications Technology Association), Laihyuk Park (Seoul National University of Science & Technology), Woongsoo Na (Kongju National University)
P-54
161
Dec. 18, 2024 17:15 ~ 18:00
NTT-Based Polynomial Multiplication for SMAUG-T
Woohyung Ko, Youngbeom Kim, Ilsun You, Okyeon Yi, Seog Chung Seo (Kookmin University)
P-55
162
Dec. 18, 2024 17:15 ~ 18:00
Patching Sequential Recommendation for Long User History Sequences
Wooseung Kang (Gyeongsang National University), Seongho Lim, Gihyun Na, Junseok Byun (National Forensic Service Digital division), Sang-Min Choi (Gyeongsang National University)
P-56
163
Dec. 18, 2024 17:15 ~ 18:00
BIS-MDEI: Blockchain-Based Integrated System for Management of Digital Evidence Integrity
Min-Gyu Jang, Woo-Seok Kim, Hye-Jin Jeong (Gyeongsang National University), Seongho Lim, Gihyun Na, Junseok Byun (National Forensic Service Digital division), Sang-Min Choi (Gyeongsang National University)
P-57
164
Dec. 18, 2024 17:15 ~ 18:00
Dual Core-Based Anti-Ransomware System for Mission-Critical Applications
Moon Jungmin, Il-Gu Lee (Sungshin Women’s University)
P-58
165
Dec. 18, 2024 17:15 ~ 18:00
Proactive insider threat management to prevent leakage of confidential information in high-tech industries
Hyun-Che Song, Hye-In Lee, Il-Gu Lee (Sungshin Women's University)
P-59
166
Dec. 18, 2024 17:15 ~ 18:00
Exploring Trade-off between Utility and Fairness of Machine Learning in Finance
Yiseul Choi, Junga Kim, Seongmin Kim (Sungshin Women's University)
P-60
167
Dec. 18, 2024 17:15 ~ 18:00
Preventing Voice Phishing Using Digital Signatures in Audio Streams
Gyujeong Jin, Seyoung Lee (Kangwon National University)
P-61
168
Dec. 18, 2024 17:15 ~ 18:00
Research on an Internal Asset Risk Assessment System Using STIX Information
Hyeonsu Yoo (Sangmyung University), Hwankuk Kim (Kookmin University)
P-62
169
Dec. 18, 2024 17:15 ~ 18:00
Framework to Quantify the Trustworthiness of Digital Watermarks
Kim Sukyoung, Ryu Junghwa, Jeon Yuran, Lee Ilgu (Sungshin Women's University)
P-63
170
Dec. 18, 2024 17:15 ~ 18:00
Design of Digital Human Ownership Verification Architecture Using Hierarchical NFT and Merkle Tree
Kyung-Yeob Park, Chang-Hyun Roh, Chang-Jun Choi, Dong-Myung Shin (LSware Inc.)
P-64
171
Dec. 18, 2024 17:15 ~ 18:00
Analysis of the Importance of Ethics and Information Security in Digital Literacy Education
Hye-In Lee, Hyun-Che Song, Il-Gu Lee (Sungshin Women's University)
P-65
172
Dec. 18, 2024 17:15 ~ 18:00
A Study on Applying X.509 Certificate-Based LBAC Access Control to Hyperledger Fabric
Changhyun Roh, Kyung-Yeob Park, Dong-Wan Kim, Dong-Myung Shin (LSware Inc.)
P-67
174
Dec. 18, 2024 17:15 ~ 18:00
ML-DSA Cryptographic Algorithm Validation Program`
Donghyun Shin, Youngbeom Kim, Ilsun You, Okyeon Yi, Seog Chung Seo (Kookmin University)
P-68
175
Dec. 18, 2024 17:15 ~ 18:00
Botnet Detection with eBPF-based Traffic Monitoring
Soomin Lee, Ri-Yeong Kim, Seongmin Kim (Sungshin Women's University)
P-69
176
Dec. 18, 2024 17:15 ~ 18:00
InterPlanetary File System-based Firmware Over-The-Air Mechanism for the Internet of Things
Seungeun Lee, Jinmin Lee, Ilgu Lee (Sungshin Women's University)
P-70
177
Dec. 18, 2024 17:15 ~ 18:00
Multi-embedded and Non-Fungible Digital Watermark for Digital Content Protection
Ayoung Jeon, Yeon-Ji Lee, Il-Gu Lee (Sungshin Women's University)
P-71
178
Dec. 18, 2024 17:15 ~ 18:00
Mitra: Real-time Behavior-based Anomaly Detection for Secure SSH Sessions
Hyunjong Moon, Juyong Shin, Jaehyun Nam (Dankook University)
P-72
179
Dec. 18, 2024 17:15 ~ 18:00
Exploring the Possibility of Ransomware Profiling Using Ransom Notes Analysis
Yejin Jang, Jihun Han, Da Seul Kim, Jungmin Kang, Mee Lan Han (Korea University)
P-73
180
Dec. 18, 2024 17:15 ~ 18:00
A Proposal for Secure Medical Insurance Data Sharing with Blockchain and Proxy Re-encryption
Jeong Eunhye, Rhee Kyung-Hyune (Pukyong National University)
P-74
181
Dec. 18, 2024 17:15 ~ 18:00
Detecting Roach Motel Dark Patterns Through Visual, Behavioral, and Semantic Analysis
Nayeon Ryu, Seyoung Lee (Kangwon National University)
P-75
182
Dec. 18, 2024 17:15 ~ 18:00
Enhancing Security of Web API with Specification-based Intrusion Detection System
Vincent Abella, Jhury Kevin Lastre, Wayan Adi Juliawan Pawana, Bonam Kim, Ilsun You (Kookmin University)
P-76
183
Dec. 18, 2024 17:15 ~ 18:00
Research on ways to punish digital sex crimes using generative AI
Cheolhee Yoon, Soojin Oh (Korean National Police University)
P-77
184
Dec. 18, 2024 17:15 ~ 18:00
Development of VR Fire Evacuation Simulation Using Locomotion Platform
Minho Han, Hyogyeom Kim, Yeongjae Lee, Junho Lee, Woong Choi (Division of ICT Convergence Engineering)







Previous Page