August 24-26, 2017
Lotte City Hotel, Jeju Island, Korea

Accepted Papers



===== Accepted as full paper Under Top 25% =====
 
          #5     Lightweight Fault Attack Resistance in Software Using Intra-Instruction Redundancy, Revisited
Authors: hwajeong seo (hansung university); taehwan park, janghyun ji, howon kim (pusan national university)
          #7     The Search Successive Minima Problem is Equivalent to Its Optimization Version
Authors: Haoyu Li, Yanbin Pan (Key Laboratory of Mathematics Mechanization, Academy of Mathematics and Systems Science, NCMIS, Chinese Academy of Sciences, Beijing 100190, China &Science and Technology on Communication Security Laboratory, Chengdu 610041, China)
          #16   WheelLogger : Driver Tracking using Smart Watch
Authors: Joon Young Park, Jong Pil Yun, Dong Hoon Lee (Graduated School of Information Security, Korea University)
          #19   An Improved Algorithm to Solve the Systems of Univariate Modular Equations
Authors: Jingguo Bi (Institute for Advanced Study,Tsinghua University); Mingqiang Wang (School of Mathematics,Shandong University)
          #28   O2TR: Offline Off-the-Record (OTR) messaging
Authors: Mahdi Daghmehchi Firoozjaei, Sang Min Lee, Hyoungshick Kim (Sungkyunkwan University)
          #33   Breaking Text CAPTCHA by Repeated Information
Authors: Jae Hyeon Woo (Korea University); Moosung Park (Agency for Defense Development); Kyungho Lee (Center for Information Security technologies(CIST), Korea University)

          #42   Robust 3D Mesh Watermarking Scheme for an Anti-Collusion Fingerprint Code
Authors: Jong-Uk Hou, In-Jae Yu, Hyun-Ji Song, Heung-Kyu Lee (KAIST)
          #43   ARM/NEON Co-Design of Multiplication/Squaring
Authors: hwajeong seo (hansung university); taehwan park, janghyun ji (pusan national university); zhi hu (Central South University, China); howon kim (pusan national university)
          #46   Exposing Digital Forgeries by Detecting a Contextual Violation Using Deep Neural Networks C
Authors: Jong-Uk Hou, Hanul Jang, Jin-Seok Park, Heung-Kyu Lee (KAIST)
          #48   Evolution of Spamming Attacks on Facebook  
Authors: Minsu Lee (KAIST); Hyungu Lee, Ji Sun Shin (Sejong University)
          #49   Detecting Online Game Payment Fraud based on Transaction Sequence Modeling using Recurrent Neural Network
Authors: Namsub Lee, Hyunsoo Yoon (KAIST); Daeseon Choi (Kongju National University)
          #54   Model Parameter Estimation and Inference on Encrypted domain: Application to Noise Reduction in Encrypted Images
Authors: Saetbyeol Lee, Jiwon Yoon (Korea University)
 
===== Accepted as short paper Under Top 50% acceptance rate =====
 
          #1     A Protection Technique for Screen Image-based Authentication Protocols Utilizing the SetCursorPos function
Authors: Kyungroul Lee, Insu Oh, Kangbin Yim (Soonchunhyang University)
          #3     Automatic Mitigation of Kernel Rootkits in Cloud Environments
Authors: Jonathan Grimm, Irfan Ahmed, Vassil Roussev, Manish Bhatt (University of New Orleans), Manpyo Hong (Ajou University)
          #4     Legal Consideration on the Use of Artificial Intelligence Technology and Self-Regulation: Focused on Robo-Advisors
Authors: Keun Young Lee (Korea University, Financial Security Institute); Heon Young Kwon, Jong In Lim (Korea University)
          #6     Abusing TCP retransmission for DoS Attack inside virtual network
Authors: Son Duc Nguyen, Mamoru Mimura, Hidema Tanaka (National Defense Academy of Japan)
          #9     Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning
Authors: Muhamad Erza Aminanto, Kwangjo Kim (Korea Advanced Institute of Science and Technology (KAIST))
          #13   A General Two-Server Cryptosystem Supporting Complex Queries
Authors: Sha Ma (College of Mathematics and Informatics, South China Agricultural University, Guangzhou, Guangdong, China)
          #17   Efficient Software Implementation of Modular Multiplication in Prime Fields on TI's DSP TMS320C6678
Authors: Eito Miyamoto, Takeshi Sugawara, Kazuo Sakiyama (The University of Electro-Communications)
          #18   Improved EM Side-Channel Authentication Using Profile-Based XOR Model
Authors: Momoka Kasuya, Kazuo Sakiyama (The University of Electro-Communications)
          #21   Holistic Tracking of Products on the Blockchain using NFC and Verified Users
Authors: Vanesco A. J. Boehm, Jong Kim, James Won Ki Hong (POSTECH (Pohang University of Science and Technology))
          #23   Design and Implementation of Android Container Monitoring Server and Agent
Authors: Kwon-Jin Yoon (Lotte data communication, Korea); Jaehyeon Yoon (Department of Software Convergence, Soongsil University); Souhwan Jung (School of Electronic Engineering, Soongsil University)
          #25   The Digits Hidden in the Virtual World: Approximate Estimation Applying Capture and Recapture Method
Authors: Da-Mi Hwang, In-Seok Kim (Korea University, Center for Information Security Technologies(CIST))
          #26   Parallel Implementations of SIMON and SPECK, Revisited
Authors: Park Taehwan (Pusan National University); Seo Hwajeong (Hansung University); Lee Garam (Pusan National University); Khandaker Md. Al-Amin, Yasuyuki Nogami (Okayama University); Kim Howon (Pusan National University)
          #30   Cyber Influence Attacks: Changes in Cyber Threats Seen in the Russian Scandal
Authors: Mookyu Park (Center for Information Security Technologies (CIST), Korea University); Moosung Park (Agency for Defense Development); Kyungho Lee (Center for Information Security Technologies (CIST), Korea University)
          #53   Key managements of Underwater Acoustic Communication Environments
Authors: Hyunki Kim, Jaehoon Lee, Okyeon Yi (Kookmin Univ.)
          #55   Glitch Recall: A Hardware Trojan Exploiting Natural Glitches in Logic Circuits
Authors: Jungwoo Joh, Yezee Seo (Yonsei University); Hoon-Kyu Kim (Agency for Defense Development); Taekyoung Kwon (Yonsei University)