Accepted Posters
Poster Sessions
Poster Session 1: 15:00 - 16:30, August 24 (Thursday), 2023
A Survey on Attack Cases with Living-Off-The-Land Techniques in Windows and Linux
Gyuhyun Jeon, Seungho Jeon and Jung Taek Seo (Gachon University)
Data Calibration to Enhance Security and Accuracy of Federated Learning
Na-Eun Park, So-Yeon Kim, Yuran Jeon, Seoyi Kim and Il-Gu Lee (Sungshin Women's University)
Anomaly Detection using LSTM-Based Autoencoder with Time Series Dataset over a network
Hyewon Suk and Minsuk Kim (Sangmyung University)
V2V-MHT: Accelerated V2V Authentication Framework using Merkle Hash Tree
YoonSun Han, YoungBeom Kim and Seog Chung Seo (Kookmin University)
Vehicle CAN Network Imbalance Intrusion Detection and Explanation Based on XGBoost and SHAP
Thi-Thu-Huong Le, Naufal Suryanto, Aji Teguh Prihatno, Yustus Eko Oktian, Hyoeun Kang and Howon Kim (Pusan National University)
Enhancing Cyber Strategies through Reinforcement Learning: A CyberBattleSim (CBS)
Bumsok Kim, Minsuk Kim, Junghyun Kim, Yonghoon Choi and Seungseo Roh (Sangmyung University)
A Model for Collecting and Analyzing Network Logs DataSets
Jaehan Jeong and Go Woong (Korea Internet & Security Agency)
Decision Tree Based Poising Backdoor Attacks and Mutation model SPRT detection defense in NSL-KDD Dataset
Jinhyeok Jang, Yoonsoo An, Dowan Kim and Daeseon Choi (Soongsil University)
A Method of GML-based Software Structuring for Verification of Open-source Software License Compatibility
Won-Bin Kim, Yongjoon Joe, Kyung-Yeob Park and Dong-Myung Shin (LSware Inc.)
Designing a Deceptive Honeypot Architecture for Industrial Control Systems
Dong-Hyuk Shin, Jong-Bum Lee and Ieck-Chae Euom (Chonnam National University)
Suboptimal Feature Selection Technique for Efficient Machine Learning-based Malicious Traffic Detection
So-Eun Jeon, Ye-Sol Oh, Ye-Seul Kil, Yeon-Ji Lee and Il-Gu Lee (Sungshin Women's University)
Identity Concealing Steganography-based Data Sharing Mechanism
Jinsu Kim and Namje Park (Jeju National University)
Poster: SGX-Enabled Edge Cloud Architecture for Secure Data Augmentation
Jiwon Ock and Seongmin Kim (Sungshin Women's University)
Solid Pod-based Medical Data Sharing System to Ensure Data Sovereignty
Sohui Kim, Minjeong Kim and Il-Gu Lee (Sungshin Women's University)
A Study on Establishing a Secure Remote Work Environment in a VDI Environment Based on Zero Trust
Chang Hoon Kim (Daegu University), Howon Kim (Pusan National University), Sokjoon Lee (Gachon University), Young Rang Kim (Pribit Technology) and Jungsoo Park (Hoseo University)
Analyzing Risk Attitudes in DeFi Crypto Credit Lending through On-chain Data
Simon Oh, Yeongjae Shin (Pusan National University), Uk Jo, Hyoeun Kang (SmartM2M), Kyeongwoo Oh, Jaehyun Kim, Bogeum Kim, Hyejin Sim, Changwoo Choi and Howon Kim (Pusan National University)
Parameter Optimization Techniques for Privacy and Utility Trade-off of Differential Privacy
Jung-Hwa Ryu, Sun-Jin Lee, Hye-Yeon Shim and Il-Gu Lee (Sungshin Womens' University)
A Study on Digital Human Ownership Management Techniques in Metaverse Based on NFT
Changhyun Roh, Changjun Choi, HyunSoo Kim and DongMyung Shin (LSWare Inc.)
Exploring Hybrid Quantum-Classical Approaches for Information Security
Dedy Septono Catur Putranto, Rini Wisnu Wardhani and Howon Kim (Pusan National University)
Analysis of International Trends for the Introduction of Zero Trust
Jeong Hyeop Hong, Sun Woo Kim, Ui Hyun Park and Kyung-ho Son (Kangwon National University)
TrustVoice: Detecting Voice Phishing Apps Using Their Runtime Behaviors
Chanjong Lee and Hyoungshick Kim (Sungkyunkwan University)
The RSA Algorithm’s Quantum Cryptanalysis Posture
Rini Wisnu Wardhani, Dedy Septono Catur Putranto and Howon Kim (Pusan National University)
Blockchain-based Zero Trust System for Medical Data Exchange
Yohan Kim, Hanho Jeong, Jaehan Cho, Donggyu Kim, SangBong Oh and Howon Kim (Pusan National University)
Metaverse Copyright Ownership Verification using Redundant Verification for Virtual Performance
Won-Bin Kim, Changhyun Roh, Yongjoon Joe and Dong-Myung Shin (LSware Inc.)
Poster Session 2: 16:30 - 18:00, August 24 (Thursday), 2023
Physical Layer Security Mechanism for Secure Trigger- based Uplink Multi-User Transmission
So-Hyun Park and Il-Gu Lee (Sungshin Women's University)
Efficient Implementation of Kyber on MSP430 Environment
DongHyun Shin, YoungBeom Kim and Seog Chung Seo (Kookmin University)
Optimization Study of Parallel Implementation for Scrypt: A Memory Hard Function
Seongjun Choi, Dongcheon Kim and Seog Chung Seo (Kookmin University)
High-Performance Kyber Implementation on ARMv7 Neon Technology
YoungBeom Kim (Kookmin University), Jeonghwan Shin, Hojoong Park (KT R&D Center Infra DX Lab), and Seog Chung Seo (Kookmin University)
Defense Against Adversarial Evasion Attacks on Self-Driving Car Using Image Quantization
Seungyeol Lee, Hyeonro Lee and Jaecheol Ha (Hoseo University)
Face Verifiable Anonymization in Video Surveillance
Sungjune Park, Hyunsik Na, Seungmin Kim and Daeseon Choi (Soongsil University)
A Multi-step Framework for Botnet Attack Detection in IoT Environment
Hojun Jin, Seungho Jeon and Jung Taek Seo (Gachon University)
Implementation of Montgomery Reduction and Butterflies for CRYSTALS-Dilithium on RISC-V
Yongryeol Choi, YoungBeom Kim and Seog Chung Seo (Kookmin University)
The Sky's Betrayal: Drone Hijacking on DJI Enhanced WiFi Protocol
Derry Pratama (Pusan National University), Jaegeun Moon (SmartM2M), Agus Mahardika Ari Laksmono, Dongwook Yun, Byeonguk Jeong, Iqbal Muhammad (Pusan National University), Janghyun Ji (SmartM2M) and Howon Kim (Pusan National University)
Efficient Implementation of Multiplication Reduction over NIST Prime P-384 for 8-bit AVR Processor
Mingi Kim, YoungBeom Kim and Seog Chung Seo (Kookmin University)
A Study on Tor Traffic Identification Technology for Blocking Dark Web Access in a LAN Environment
Hongbi Kim, Daeil Jang and Seunggoo Ji (Korea Internet & Security Agency)
Contact PUF: Highly Stable Physical Unclonable Functions Based on Contact Failure Probability in 180 nm, 130 nm, and 28 nm CMOS Processes
Duhyun Jeon (ICTK Holdings), Dongmin Lee and Byong-Deok Choi (Hanyang University)
An Implementation of Lightweight RISC-V Trusted Execution Environment with Memory Encryption and Task Isolation
Woojung Park, Janghyun Ji and Jaegeun Moon (SmartM2M)
Strengthening Secure Payment Systems in 5G-based IoT: A Comprehensive Analysis of Tokenization and PCI DSS Compliance
Hyeon No, Heekyung Shin, Jiwon Ock, Yeeun Kim and Seongmin Kim (Sungshin Women's University)
Tri-band-based Wi-Fi Indoor Localization to Defend against Jamming Attacks
Jin-Min Lee, Na-Yeon Shin, Jung-Hyun Moon and Il-Gu Lee (Sungshin Women's University)
On Secrecy of RSMA-enabled UAV Downlink Communications: Problem and Research Trends
Tri-Hai Nguyen, Heejae Park and Laihyuk Park (Seoul National University of Science and Technology)
Accelerating Key Derivation Function on GPU Architectures
Dong-Cheon Kim and Seog Chung Seo (Kookmin University)
Enhancing Robustness of Self-Driving Car Regression Models through Feature Squeezing
Hyeonro Lee, Seungyeol Lee, Seongwoo Hong and Jaecheol Ha (Hoseo University)
Privacy-Preserving DTx Data with Differential Privacy
Gee-Hee Yun and Kyoung-Jin Kim (Sungshin Women's University)
Side Channel Attack Resistant Binarized Neural Network Accelerator
Junho Lee, Haeyoung Kim, Dongwook Yun and Howon Kim (Pusan National University)
Tabling GHASH in LEA-GCM on GPU and Optimization
Jaeseok Lee, Dongcheon Kim and Seog Chung Seo (Kookmin University)
Research on Identification of Cyber Attacker Groups and Interpretation of Results
Sungtaek Oh and Woong Go (Korea Internet Security Agency)
Evaluation Criteria for Cyberattack Scenarios Used in Training Exercises
Insung Song, Seungho Jeon and Jung Taek Seo (Gachon University)
Malextension: Malicious Extension to Hack Your Browser
Jiwon Jang, Ye-Sol Oh ((Sungshin Women's University), and Il-Gu Lee (Sungshin Women's University)