POSTER PROGRAM
Poster Session 1 : 15:00 - 16:30, August 24 (Thursday), 2023
A Survey on Attack Cases with Living-Off-The-Land Techniques in Windows and Linux
Gyuhyun Jeon, Seungho Jeon and Jung Taek Seo
Data Calibration to Enhance Security and Accuracy of Federated Learning
Na-Eun Park, So-Yeon Kim, Yuran Jeon, Seoyi Kim and Il-Gu Lee
Anomaly Detection using LSTM-Based Autoencoder with Time Series Dataset over a network
Hyewon Suk and Minsuk Kim
V2V-MHT:Accelerated V2V Authentication Framework using Merkle Hash Tree
YoonSun Han, YoungBeom Kim and Seog Chung Seo
Vehicle CAN Network Imbalance Intrusion Detection and Explanation Based on XGBoost and SHAP
Thi-Thu-Huong Le, Naufal Suryanto, Aji Teguh Prihatno, Yustus Eko Oktian, Hyoeun Kang and Howon Kim
Enhancing Cyber Strategies through Reinforcement Learning: A CyberBattleSim(CBS)
Bumsok Kim, Minsuk Kim, Junghyun Kim, Yonghoon Choi and Seungseo Roh
A Model for Collecting and Analyzing Network Logs DataSets
Jaehan Jeong and Go Woong
Decision Tree Based Poising Backdoor Attacks and Mutation model SPRT detection defense in NSL-KDD Dataset
Jinhyeok Jang, Yoonsoo An, Dowan Kim and Daeseon Choi
A Method of GML-based Software Structuring for Verification of Open-source Software License Compatibility
Won-Bin Kim, Yongjoon Joe, Kyung-Yeob Park and Dong-Myung Shin
Designing a Deceptive Honeypot Architecture for Industrial Control Systems
Dong-Hyuk Shin, Jong-Bum Lee and Ieck-Chae Euom
Suboptimal Feature Selection Technique for Efficient Machine Learning-based Malicious Traffic Detection
So-Eun Jeon, Ye-Sol Oh, Ye-Seul Kil, Yeon-Ji Lee and Il-Gu Lee
Identity Concealing Steganography-based Data Sharing Mechanism
Jinsu Kim and Namje Park
Poster: SGX-Enabled Edge Cloud Architecture for Secure Data Augmentation
Jiwon Ock and Seongmin Kim
Solid Pod-based medical data sharing system to ensure data sovereignty
Sohui Kim, Minjeong Kim and Ilgu Lee
A Study on Establishing a Secure Remote Work Environment in a VDI Environment Based on Zero Trust
Chang Hoon Kim, Howon Kim, Sokjoon Lee, Young Rang Kim and Jungsoo Park
Analyzing Risk Attitudes in DeFi Crypto Credit Lending through On-chain Data
Simon Oh, Yeongjae Shin, Uk Jo, Hyoeun Kang, Kyeongwoo Oh, Jaehyun Kim, Bogeum Kim, Hyejin Sim, Changwoo Choi and Howon Kim
Parameter Optimization Techniques for Privacy and Utility Trade-off of Differential Privacy
Jung-Hwa Ryu, Sun-Jin Lee, Hye-Yeon Shim and Il-Gu Lee
A Study on Digital Human Ownership Management Techniques in Metaverse Based on NFT
Changhyun Roh, Changjun Choi, HyunSoo Kim and DongMyung Shin
Exploring Hybrid Quantum-Classical Approaches for Information Security
Dedy Septono Catur Putranto, Rini Wisnu Wardhani and Howon Kim
Analysis of international trends for the introduction of Zero Trust
Jeong Hyeop Hong, Sun Woo Kim, Ui Hyun Park and Kyung-ho Son
TrustVoice: Detecting Voice Phishing Apps Using Their Runtime Behaviors
Chanjong Lee and Hyoungshick Kim
The RSA Algorithm’s Quantum Cryptanalysis Posture
Rini Wisnu Wardhani, Dedy Septono Catur Putranto and Howon Kim
Blockchain-based Zero Trust System for Medical Data Exchange
Yohan Kim, Hanho Jeong, Jaehan Cho, Donggyu Kim, SangBong Oh and Howon Kim
Metaverse Copyright Ownership Verification using Redundant Verification for Virtual Performance
Won-Bin Kim, Changhyun Roh, Yongjoon Joe and Dong-Myung Shin
Poster Session 2 : 16:30 - 18:00, August 24 (Thursday), 2023
Physical Layer Security Mechanism for Secure Trigger- based Uplink Multi-user Transmission
So-Hyun Park and Il-Gu Lee
Efficient Implementation of Kyber on MSP430 Environment
DongHyun Shin, YoungBeom Kim and Seog Chung Seo
Optimization Study of Parallel Implementation for Scrypt: A Memory Hard Function
Seongjun Choi, Dongcheon Kim and Seog Chung Seo
High-Performance Kyber implementation on ARMv7 Neon Technology
YoungBeom Kim, Jeonghwan Shin, Hojoong Park and Seog Chung Seo
Defense Against Adversarial Evasion Attacks on Self-Driving Car Using Image Quantization
Seungyeol Lee, Hyeonro Lee and Jaecheol Ha
Face Verifiable Anonymization in Video Surveillance
Sungjune Park, Hyunsik Na, Seungmin Kim and Daeseon Choi
A Multi-step Framework for Botnet Attack Detection in IoT Environment
Hojun Jin, Seungho Jeon and Jung Taek Seo
Implementation of Montgomery Reduction and Butterflies for CRYSTALS-Dilithium on RISC-V
Yongryeol Choi, YoungBeom Kim and Seog Chung Seo
The Sky's Betrayal: Drone Hijacking on DJI Enhanced WiFi Protocol
Derry Pratama, Jaegeun Moon, Agus Mahardika Ari Laksmono, Dongwook Yun, Byeonguk Jeong, Iqbal Muhammad, Jang Hyun Ji and Howon Kim
Efficient implementation of multiplication reduction over NIST prime P-384 for 8‑bit AVR Processor
Mingi Kim, YoungBeom Kim and Seog Chung Seo
A Study on Tor Traffic Identification Technology for Blocking Dark Web Access in a LAN Environment
Hongbi Kim, Daeil Jang and Seunggoo Ji
Contact PUF: Highly Stable Physical Unclonable Functions Based on Contact Failure Probability in 180 nm, 130 nm, and 28 nm CMOS Processes
Duhyun Jeon, Dongmin Lee and Byong-Deok Choi
An Implementation of Lightweight RISC-V Trusted Execution Environment with Memory Encryption and Task Isolation
Woojung Park, Janghyun Ji and Jaegeun Moon
Analysis of current status for secure IoT-based payment
Hyeon No, Heekyung Shin, Jiwon Ock, Yeeun Kim and Seongmin Kim
Tri-band-based Wi-Fi Indoor Localization to Defend against Jamming Attacks
Jin-Min Lee, Na-Yeon Shin, Jung-Hyun Moon and Il-Gu Lee
On Secrecy of RSMA-enabled UAV Downlink Communications: Problem and Research Trends
Tri-Hai Nguyen, Heejae Park and Laihyuk Park
Accelerating Key Derivation Function on GPU Architectures
Dong-Cheon Kim and Seog Chung Seo
Enhancing Robustness of Self-Driving Car Regression Models through Feature Squeezing
Hyeonro Lee, Seungyeol Lee, Seongwoo Hong and Jaecheol Ha
Privacy-Preserving DTx Data with Differential Privacy
Gee-Hee Yun and Kyoung-Jin Kim
Side channel attack resistant Binarized Neural Network Accelerator
Junho Lee, Haeyoung Kim, Dongwook Yun and Howon Kim
Tabling GHASH in LEA-GCM on GPU and optimization
Jaeseok Lee, Dongcheon Kim and Seog Chung Seo
Research on Identification of Cyber Attacker Groups and Interpretation of Results
Sungtaek Oh and Woong Go
Evaluation Criteria for Cyberattack Scenarios Used in Training Exercises
Insung Song, Seungho Jeon and Jung Taek Seo
Malextension: Malicious Extension to Hack your Browser
Jiwon Jang, Ye-Sol Oh, Hyunwoo Choi and Il-Gu Lee