Accepted Papers
LOM: Lightweight classifier for obfuscation methods
Jeong-Woo Kim (Chungnam National University), Seoyeon Kang (Chungnam National University), Eun-Sun Cho (Chungnam National University) and Joon-Young Paik (Tiangong University)
A Method for Collecting Vehicular Network Data for Enhanced Anomaly Detection
Samuel De La Motte (University of Western Australia) and Jin Hong (University of Western Australia)
Unsupervised Driver Behavior Profiling leveraging Recurrent Neural Networks
Young Ah Choi (Korea University), Kyung Ho Park (SOCAR), Eunji Park (Korea University) and Huy Kang Kim (Korea University)
Quantum Cryptanalysis Landscape of Shor’s Algorithm for Elliptic Curve Discrete Logarithm Problem
Harashta Tatimma Larasati (Pusan National University) and Howon Kim (Pusan National University)
Anonymous IBE from PEKS : A Generic Construction
Hyun Sook Rhee (Samsung Electronics) and Dong Hoon Lee (Korea University)
Secure Computation of Shared Secrets and Its Applications
Xin Liu (University of Wollongong), Willy Susilo (University of Wollongong) and Joonsang Baek (University of Wollongong)
Adaptive Network Security Service Orchestraction based on SDN/NFV
Priyatham Ganta (San Jose State University), Kicho Yu (Northeastern University), Dharma Dheeraj Chintala (San Jose State University) and Younghee Park (San Jose State University)
A General Framework for Matching Pattern Hiding in Deep Packet Inspection
Jinghang Wen (Jinan University), Jianan Liu (Jinan University), Jian Weng (Jinan University), Jiasi Weng (Jinan University) and Axin Wu (Jinan University)
A Privacy-Preserving Payment Model for EV Charging
Jane Kim (Hanyang University), Soojin Lee (Hanyang University) and Seung-Hyun Seo (Hanyang University)
Measuring Healthcare Data Breaches
Mohammed Alkinoon (University of Central Florida), Sung Choi Yoo (University of Central Florida) and David Mohaisen (University of Central Florida)
BadASLR: Exceptional cases of ASLR aiding Exploitation
Daehee Jang (Sungshin W. University)
Quantitative Analysis on Attack Capacity in Meltdown-type Attacks
Seokmin Lee (Kwangwoon University), Taehun Kim (Korea University) and Youngjoo Shin (Korea University)
On the robustness of intrusion detection systems for vehicles against adversarial attacks
Jeongseok Choi (Sungkyunkwan University) and Hyoungshick Kim (Sungkyunkwan University)
A Framework for Generating Evasion Attacks for Machine Learning based Network Intrusion Detection Systems
Raymond Mogg (The University of Queensland), Simon Yusuf Enoch (The University of Queensland) and Dan Kim (The University of Queensland)
HAT: Hybrid Adversarial Training for Simultaneous Training of Deep Learning Model and Denoising Network
Gwonsang Ryu (Soongsil University) and Daeseon Choi (Soongsil University)
Pattern Matching over Encrypted Data with a Short Ciphertext
Jongkil Kim (University of Wollongong), Willy Susilo (University of Wollongong), Joonsang Baek (University of Wollongong), Intae Kim (University of Wollongong) and Yang-Wai Chow (University of Wollongong)
Efficient adaptation of TFHE for high end-to-end throughput
Kang Hoon Lee (Korea University) and Ji Won Yoon (Korea University)
AnyTRNG: Generic, High-throughput, Low-area True Random Number Generator based on Synchronous Edge Sampling
Asep Muhamad Awaludin (Pusan National University), Derry Pratama (Pusan National University) and Howon Kim (Pusan National University)
Echo-Guard : Acoustic-based Anomaly Detection System for Smart Manufacturing Environments
Chang-Bae Seo (Hanyang University), Gyuseop Lee (Hanyang University), Yeonjoon Lee (Hanyang University) and Seung-Hyeon Seo (Hanyang University)
Research on improvement of anomaly detection performance in industrial control systems
Sungho Bae (Hoseo University), Chanwoong Hwang (Hoseo University) and Taejin Lee (Hoseo University)
ARMed Frodo: FrodoKEM on 64-bit ARMv8 Processors
Hyeokdong Kwon (Hansung University), Kyoungbae Jang (Hansung University), Hyunjun Kim (Hansung University), Hyunji Kim (Hansung University), Minjoo Sim (Hansung University), Siwoo Eum (Hansung University), Wai-Kong Lee (Gachon University) and Hwajeong Seo (Hansung University)
Masked Implementation of PIPO Block Cipher on 8-bit AVR Microcontrollers
Hyunjun Kim (Hansung University), Minjoo Sim (Hansung University), Eum Si Woo (Hansung University), Kyoungbae Jang (Hansung University), Gyeong Ju Song (Hansung University), Hyunji Kim (Hansung University), Hyeokdong Kwon (Hansung University), Wai-Kong Lee (Gachon University) and Hwajeong Seo (Hansung University)
Parallel Implementation of PIPO Block Cipher on 32-bit RISC-V Processor
Yujin Kwak (Kookmin University), Youngbeom Kim (Kookmin University) and Seog Chung Seo (Kookmin University)
No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms
Hwajeong Seo (Hansung University), Pakize Sanal (Florida Atlantic University), Wai-Kong Lee (Gachon University) and Reza Azarderakhsh (Florida Atlantic University)