POSTER PROGRAM
F2FS-Based IoT Filesystem Forensics for Cyber-Physical Systems
Sungbum Kim (Ajou University), Wooyeon Jo (Ajou University), Minju Kim (Ajou University) and Taeshik Shon (Ajou University)
https://gather.town/invite?token=xXWdH5HC
Consideration for the Construction of Practical Wireless Covert Timing Channels
Hayoung Seong (University of Science and Technology) , Yongsung Jeon (ETRI), Sang-Woo Lee (ETRI) and Ikkyun Kim (ETRI)
https://gather.town/invite?token=LSdHBwAI
ASTFuzz: Generic/Generative Language Fuzzer
Gyeongjin Son (Sungshin Women's University), Eunyeong Ahn (Sungshin Women's University) and Daehee Jang (Sungshin Women's University)
https://gather.town/app/fBtPLmlNdUZVX9RA/ASTFuzz
A Study on the Analysis of Illegal Content Propagation Path Based on Heavy Uploader
Jingang Kim (Hoseo University), Chanwoong Hwang (Hoseo University) and Taejin Lee (Hoseo University)
https://gather.town/invite?token=vglqIsFz
Towards Securing 5G Core Network Functions Using SGX
Heekyung Shin (Sungshin Women's University), Jiwoo Kang (Sungshin Women's University), Hyeon No (Sungshin Women's University), and Seongmin Kim (Sungshin Women's University)
https://gather.town/invite?token=0IN3lN0G
A Study on Author Profiling based on Text Mining for Effective Forensic Investigation
Minho Kim (Catholic University of Pusan), Pyo-Gil Hong (Catholic University of Pusan) and Dohyun Kim (Catholic University of Pusan)
https://gather.town/invite?token=029Y7RVq
Design of Exploit-Helper for Penetrating into a Black-Box System
JaeGyeong Ju (Sejong University) and Ki-Woong Park (Sejong University)
https://gather.town/invite?token=G9mmbxYB
High-Speed Software of Karatsuba Multiplication for SABER Round 3 on ARMv8-A Series
JinGyo Song (Kookmin University), YoungBeom Kim (Kookmin University), and Seog Chung Seo (Kookmin University)
https://gather.town/invite?token=KSLdn8fR
A study on the Interpretability of Malware Detection based on Artificial Intelligence
Ahyeon Jeong (Hoseo University), Eungyu Lee (Hoseo University), Hongbi Kim (Hoseo University), Doyeon Kim (Hoseo University) and Taejin Lee (Hoseo University)
https://gather.town/invite?token=KWJ3DdIA
XTS-AES Parallel Optimization Implementation Technique for Fast FDE
Sang Woo An (Kookmin University) and Seog Chung Seo (Kookmin University)
https://gather.town/invite?token=RlfOvISs
Fast and Reversible Region-of-interest Hiding Scheme based on Chaotic Map
Sung-Won Kang (Pukyong National University), Cho Nwe Zin Latt (Pukyong National University), Zhuohao Qian (Pukyong National University), Seolah Jang (Pukyong National University), and Kyung-Hyune Rhee (Pukyong National University)
https://gather.town/invite?token=ThUtqFwv
A Flooding Mitigator for Controller Area Networks
Jiwoo Shin (Seoul Women's University), Dongwoo Kang (Soongsil University), Jaewoong Heo (Soongsil University), and Hyo Jin Jo (Soongsil University)
https://gather.town/invite?token=Nhbh1GCR
Blockchain-Enabled 5G Edge Networks and Beyond: An Intelligent Cross-Silo Federated Learning Approach
Rahmadika, S. (Pukyong National University), Firdaus, M. (Pukyong National University), Jang, S. (Pukyong National University), & Rhee, K. H. (Pukyong National University)
https://gather.town/invite?token=xhclctGt
PyRos: A State Channel-Based Access Control System for a Public Blockchain Network
Siwan Noh (Pukyong National University), Sang Uk Shin (Pukyong National University), and Kyung-Hyune Rhee (Pukyong National University)
https://gather.town/invite?token=S6qQk7Y6
Proposal of ZeroNet Content Search Technique
Hyunpyo Choi (Gachon University) and JungTaek Seo (Gachon University)
https://gather.town/invite?token=AX0Sh1CW
Security Analysis for Eavesdropping with Vo5G Mobile
Youngkwon Park (KISA), Seongmin Park (KISA), and Dowon Kim (KISA)
https://gather.town/invite?token=OS6p8tzZ
Countermeasure to Detecting Memory Forensics Tools and Evading Data Acquisition
Inyeung Kim (Seoul National University of Science and Technology), Seunghee Seo (Seoul National University of Science and Technology), Yeog Kim (Seoul National University of Science and Technology), and Changhoon Lee (Seoul National University of Science and Technology)
https://gather.town/invite?token=YgDybTaY
Inference of Compiler Provenance from Malware
Hohyeon Jang (Sungkyunkwan University) and Hyungjoon Koo (Sungkyunkwan University)
https://gather.town/invite?token=tuufmZH4