Accepted Papers
#5 Lightweight Fault Attack Resistance in Software Using Intra-Instruction Redundancy, Revisited
Authors: hwajeong seo (hansung university); taehwan park, janghyun ji, howon kim (pusan national university)
#7 The Search Successive Minima Problem is Equivalent to Its Optimization Version
Authors: Haoyu Li, Yanbin Pan (Key Laboratory of Mathematics Mechanization, Academy of Mathematics and Systems Science, NCMIS, Chinese Academy of Sciences, Beijing 100190, China &Science and Technology on Communication Security Laboratory, Chengdu 610041, China)
#16 WheelLogger : Driver Tracking using Smart Watch
Authors: Joon Young Park, Jong Pil Yun, Dong Hoon Lee (Graduated School of Information Security, Korea University)
#19 An Improved Algorithm to Solve the Systems of Univariate Modular Equations
Authors: Jingguo Bi (Institute for Advanced Study,Tsinghua University); Mingqiang Wang (School of Mathematics,Shandong University)
#28 O2TR: Offline Off-the-Record (OTR) messaging
Authors: Mahdi Daghmehchi Firoozjaei, Sang Min Lee, Hyoungshick Kim (Sungkyunkwan University)
#33 Breaking Text CAPTCHA by Repeated Information
Authors: Jae Hyeon Woo (Korea University); Moosung Park (Agency for Defense Development); Kyungho Lee (Center for Information Security technologies(CIST), Korea University)
#42 Robust 3D Mesh Watermarking Scheme for an Anti-Collusion Fingerprint Code
Authors: Jong-Uk Hou, In-Jae Yu, Hyun-Ji Song, Heung-Kyu Lee (KAIST)
#43 ARM/NEON Co-Design of Multiplication/Squaring
Authors: hwajeong seo (hansung university); taehwan park, janghyun ji (pusan national university); zhi hu (Central South University, China); howon kim (pusan national university)
#46 Exposing Digital Forgeries by Detecting a Contextual Violation Using Deep Neural Networks C
Authors: Jong-Uk Hou, Hanul Jang, Jin-Seok Park, Heung-Kyu Lee (KAIST)
#48 Evolution of Spamming Attacks on Facebook
Authors: Minsu Lee (KAIST); Hyungu Lee, Ji Sun Shin (Sejong University)
#49 Detecting Online Game Payment Fraud based on Transaction Sequence Modeling using Recurrent Neural Network
Authors: Namsub Lee, Hyunsoo Yoon (KAIST); Daeseon Choi (Kongju National University)
#54 Model Parameter Estimation and Inference on Encrypted domain: Application to Noise Reduction in Encrypted Images
Authors: Saetbyeol Lee, Jiwon Yoon (Korea University)
===== Accepted as short paper Under Top 50% acceptance rate =====
#1 A Protection Technique for Screen Image-based Authentication Protocols Utilizing the SetCursorPos function
Authors: Kyungroul Lee, Insu Oh, Kangbin Yim (Soonchunhyang University)
#3 Automatic Mitigation of Kernel Rootkits in Cloud Environments
Authors: Jonathan Grimm, Irfan Ahmed, Vassil Roussev, Manish Bhatt (University of New Orleans), Manpyo Hong (Ajou University)
#4 Legal Consideration on the Use of Artificial Intelligence Technology and Self-Regulation: Focused on Robo-Advisors
Authors: Keun Young Lee (Korea University, Financial Security Institute); Heon Young Kwon, Jong In Lim (Korea University)
#6 Abusing TCP retransmission for DoS Attack inside virtual network
Authors: Son Duc Nguyen, Mamoru Mimura, Hidema Tanaka (National Defense Academy of Japan)
#9 Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning
Authors: Muhamad Erza Aminanto, Kwangjo Kim (Korea Advanced Institute of Science and Technology (KAIST))
#13 A General Two-Server Cryptosystem Supporting Complex Queries
Authors: Sha Ma (College of Mathematics and Informatics, South China Agricultural University, Guangzhou, Guangdong, China)
#17 Efficient Software Implementation of Modular Multiplication in Prime Fields on TI's DSP TMS320C6678
Authors: Eito Miyamoto, Takeshi Sugawara, Kazuo Sakiyama (The University of Electro-Communications)
#18 Improved EM Side-Channel Authentication Using Profile-Based XOR Model
Authors: Momoka Kasuya, Kazuo Sakiyama (The University of Electro-Communications)
#21 Holistic Tracking of Products on the Blockchain using NFC and Verified Users
Authors: Vanesco A. J. Boehm, Jong Kim, James Won Ki Hong (POSTECH (Pohang University of Science and Technology))
#23 Design and Implementation of Android Container Monitoring Server and Agent
Authors: Kwon-Jin Yoon (Lotte data communication, Korea); Jaehyeon Yoon (Department of Software Convergence, Soongsil University); Souhwan Jung (School of Electronic Engineering, Soongsil University)
#25 The Digits Hidden in the Virtual World: Approximate Estimation Applying Capture and Recapture Method
Authors: Da-Mi Hwang, In-Seok Kim (Korea University, Center for Information Security Technologies(CIST))
#26 Parallel Implementations of SIMON and SPECK, Revisited
Authors: Park Taehwan (Pusan National University); Seo Hwajeong (Hansung University); Lee Garam (Pusan National University); Khandaker Md. Al-Amin, Yasuyuki Nogami (Okayama University); Kim Howon (Pusan National University)
#30 Cyber Influence Attacks: Changes in Cyber Threats Seen in the Russian Scandal
Authors: Mookyu Park (Center for Information Security Technologies (CIST), Korea University); Moosung Park (Agency for Defense Development); Kyungho Lee (Center for Information Security Technologies (CIST), Korea University)
#53 Key managements of Underwater Acoustic Communication Environments
Authors: Hyunki Kim, Jaehoon Lee, Okyeon Yi (Kookmin Univ.)
#55 Glitch Recall: A Hardware Trojan Exploiting Natural Glitches in Logic Circuits
Authors: Jungwoo Joh, Yezee Seo (Yonsei University); Hoon-Kyu Kim (Agency for Defense Development); Taekyoung Kwon (Yonsei University)