August 11-13, 2021
Maison Glad, Jeju, Korea

Accepted Posters



F2FS-Based IoT Filesystem Forensics for Cyber-Physical Systems

Sungbum Kim (Ajou University), Wooyeon Jo (Ajou University), Minju Kim (Ajou University) and Taeshik Shon (Ajou University)

 

Consideration for the Construction of Practical Wireless Covert Timing Channels

Hayoung Seong (University of Science and Technology) , Yongsung Jeon (ETRI), Sang-Woo Lee (ETRI) and Ikkyun Kim (ETRI)

 

ASTFuzz: Generic/Generative Language Fuzzer

Gyeongjin Son (Sungshin Women's University), Eunyeong Ahn (Sungshin Women's University) and Daehee Jang (Sungshin Women's University)

 

A Study on the Analysis of Illegal Content Propagation Path Based on Heavy Uploader

Jingang Kim (Hoseo University), Chanwoong Hwang (Hoseo University) and Taejin Lee (Hoseo University)

 

Towards Securing 5G Core Network Functions Using SGX

Heekyung Shin (Sungshin Women's University), Jiwoo Kang (Sungshin Women's University), Hyeon No (Sungshin Women's University), and Seongmin Kim (Sungshin Women's University)

 

A Study on Author Profiling based on Text Mining for Effective Forensic Investigation

Minho Kim (Catholic University of Pusan), Pyo-Gil Hong (Catholic University of Pusan) and Dohyun Kim (Catholic University of Pusan)

 

Design of Exploit-Helper for Penetrating into a Black-Box System

JaeGyeong Ju (Sejong University) and Ki-Woong Park (Sejong University)

 

High-Speed Software of Karatsuba Multiplication for SABER Round 3 on ARMv8-A Series

JinGyo Song (Kookmin University), YoungBeom Kim (Kookmin University), and Seog Chung Seo (Kookmin University)

 

A study on the Interpretability of Malware Detection based on Artificial Intelligence

Ahyeon Jeong (Hoseo University), Eungyu Lee (Hoseo University), Hongbi Kim (Hoseo University), Doyeon Kim (Hoseo University) and Taejin Lee (Hoseo University)

 

XTS-AES Parallel Optimization Implementation Technique for Fast FDE

Sang Woo An (Kookmin University) and Seog Chung Seo (Kookmin University)

 

Fast and Reversible Region-of-interest Hiding Scheme based on Chaotic Map

Sung-Won Kang (Pukyong National University), Cho Nwe Zin Latt (Pukyong National University), Zhuohao Qian (Pukyong National University), Seolah Jang (Pukyong National University), and Kyung-Hyune Rhee (Pukyong National University)

 

A Flooding Mitigator for Controller Area Networks

Jiwoo Shin (Seoul Women's University), Dongwoo Kang (Soongsil University), Jaewoong Heo (Soongsil University), and Hyo Jin Jo (Soongsil University)

 

Blockchain-Enabled 5G Edge Networks and Beyond: An Intelligent Cross-Silo Federated Learning Approach

Rahmadika, S. (Pukyong National University), Firdaus, M. (Pukyong National University), Jang, S. (Pukyong National University), & Rhee, K. H. (Pukyong National University)

 

PyRos: A State Channel-Based Access Control System for a Public Blockchain Network

Siwan Noh (Pukyong National University), Sang Uk Shin (Pukyong National University), and Kyung-Hyune Rhee (Pukyong National University)

 

Proposal of ZeroNet Content Search Technique

Hyunpyo Choi (Gachon University) and JungTaek Seo (Gachon University)

 

Security Analysis for Eavesdropping with Vo5G Mobile

Youngkwon Park (KISA), Seongmin Park (KISA), and Dowon Kim (KISA)

 

Countermeasure to Detecting Memory Forensics Tools and Evading Data Acquisition

Inyeung Kim (Seoul National University of Science and Technology), Seunghee Seo (Seoul National University of Science and Technology), Yeog Kim (Seoul National University of Science and Technology), and Changhoon Lee (Seoul National University of Science and Technology)

 

Inference of Compiler Provenance from Malware

Hohyeon Jang (Sungkyunkwan University) and Hyungjoon Koo (Sungkyunkwan University)