홈 > 학회행사

학회행사

    WISA 2025 Call for Participation



 
WISA 2025
- 일시 : 2025년 8월 20일(수) ~ 8월 22일(금)
- 장소 : 메종글래드제주 
 
Program
 

DAY 1 August 20 (WED)

TIme

Crystal Hall (2F)

12:00~13:00

Registration

13:00~13:10

Opening Remarks

13:10~13:50

Keynote1: Cloud Computing Security: Challenging Issues and Future Directions

Prof. Willy Susilo (University of Wollongong)

13:50~14:00

Coffee Break

14:00~14:20

Session 1 (System & Application Security)

Crashing or Freezing the Bot: LiDAR Spoofing Attacks on ROS 2 UGV

( Hwaseong Lee, Hyunwoo Lee, Youngki Jung, Seondong Heo, Moosung Park and Changon Yoo)

14:20~14:40

PodBeater: Exploiting Multi-Value Affinity for Efficient Co-Location Attacks in Kubernetes ( Yiju Jung, Hyerean Jang and Youngjoo Shin)

14:40~15:00

GUARD-CAN: Graph-Understanding and Recurrent Architecture for CAN Anomaly Detection ( Hyeong Seon Kim and Huy Kang Kim)

15:00~15:20

Break Time

15:20~16:00

Invtied Talk1: Overlaying Crypto Agility onto the N2SF in the Cloud Era

Dr. Jihoon Cho (Vice President, Samsung SDS)

16:00~16:10

Coffee Break

16:10~16:30

Session 2 (5G & Network Security)

A Real-World Dataset to Enhance Intrusion Detection in SDN-IoT Systems

(Chau Nguyen, Hoang Anh Nguyen, Yang-Wai Chow and Willy Susilo)

16:30~16:50

Toward a Stealth Mode of 5G-AKA

( Seonghan Shin)

16:50~17:10

Denial-of-Service Risks in 5G Devices: Empirical Analysis on Connection Restriction Mechanisms

( Beomseok Oh, Mincheol Son, Kwangmin Kim, Jiho Lee, Duckwoo Kim, Taekkyung Oh, Cheoljun Park and Yongdae Kim)

17:10~17:20

Coffee Break

17:20~17:40

Session 3 (Cybersecurity Education & Model Security)

Real Environment Tolerance Curve (RETC): Assessing Machine Learning Model Performance Degradation Under Extreme Class Imbalance

( Yuki Tanaka and Mamoru Mimura)

17:40~18:00

TALOS: An Empirical Approach to Building Portable Hands-On Labs for Fundamental Cybersecurity Education using Open-Source

(Young Han Choi and Ki Tae Park)

 

DAY 2 August 21 (THU)

Time

Crystal Hall

Jade Hall

09:30~09:50

Session 4

(Security Analysis & Verification)

Session 5

(Malware & Forensics)

Impossible Differential Attack on SAND-64

(Nobuyuki Sugio)

User Conversation Recovery from ChatGPT Local Artifacts in Web Browsers for Digital Forensic Investigations

( Minjung Yoo, Seunghyun Park and Seongmin Kim)

09:50~10:10

Formal Verification of Labyrinth Encrypted Message Storage Protocol in Messenger

( Kakeru Watanabe and Kazuki Yoneyama)

Criminal Network Detection in Ethereum Using Change-Point Analysis: A Case Study of OFAC-Listed North Korean Wallet Addresses

( Geon Woo Jeon and Ji Won Yoon)

10:10~10:30

Automated VEX Generation and Vulnerability Prioritization using Inter-Module Symbol Graphs

(Jeongho Lee and Seyoung Lee)

Interaction-Aware System Call Sequence Analysis for Android Malware Classification

( Jae-Min Choi, Sang-Hoon Choi and Ki-Woong Park)

10:30~10:50

Break Time

10:50~11:30

Keynote2: Security in the Age of AI

Dr. Wolfgang Richter (Director of Engineering, Soroco Co.Ltd)

11:30~11:50

Break Time

11:50~12:30

Invtied Talk2: Digital Trust in the AI Era: Navigating the New Cybersecurity Landscape

Hosuk Lee (CISO of AWS Korea)

12:30~14:00

Lunch Time

14:00~14:20

KIISC Board Meeting

Research Story

KIISC Board Meeting

From Page to Stage: Returning to Top Security Venue

(Taekyoung Kwon, Yonsei University)

14:20~14:40

Recommendations for Writing Research Papers in Security Area

( DaeHun Nyang, Ewha Womans University)

14:40~15:00

Lesson: Simple Is Always Best

(Hyunwoo Lee, Korea Institute of Energy Technology (KENTECH))

15:00~16:00

KIISC Board Meeting

Poster Session

KIISC Board Meeting

Poster Session 1

16:00~17:00

Poster Session 2

17:00~18:00

Poster Session 3

18:00~18:30

Break Time

18:30~End

Banquet (Convention Hall, 1F)

 

DAY 3 August 22 (FRI)

Time

Crystal Hall

Jade Hall

Ruby Hall

09:30~09:50

Session 6

(Quantum & Cryptography)

Session 7

(AI/LLM for Security)

No Session

Depth-Optimized Quantum Implementation of CHAM

( Kyoungbae Jang, Yujin Oh and Hwajeong Seo)

Detecting Malicious JavaScript Code by Code-Specialized LLM

( Keiichi Kinoshita and Mamoru Mimura)

09:50~10:10

Quantum Implementation and Analysis of SHA-1

( Seyoung Yoon, Gyeongju Song, Kyungbae Jang and Hwajeong Seo)

A Framework for Assessing Nation-State Cyber Attack Capabilities Using MITRE ATT&CK and Large Language Models

( Hyungkwan Kim, Hyunggyu Lee and Wook Shin)

10:10~10:30

PoC Hash: A Power-of-Commutators Hash over Hamiltonian Quaternions

( Hyungrok Jo and Junji Shikata)

Understanding Encrypted Network Anomalies with LLMs: A Post-hoc Cognitive Framework

(Lee Seon Woo, Park Hyeon Woo and Lee Tae Jin)

10:30~10:50

Break Time

10:50~11:10

Session 8

(Privacy & Anonymity)

Session 9

(IoT & Traffic Analysis)

Towards Sender Anonymity for Singleton Sets

( Yamya Reiki and Yudhveer Singh )

IoT Botnet Detection Based on the Behaviors of DNS over TLS Queries

( Cheng-Han Shie, Yu-Chun Tseng and Chun-I Fan)

11:10~11:30

LeakGuard: Detecting and Mitigating Attribute Leakage in Fine-Tuned Diffusion Models

( A Yeon Kim, Jung Yup Rhee and Taekyoung Kwon)

Bootstrap-based Evaluation of Clustering Suitability Across TCP Payload Dataset Structures

( Dung Ta Anh, Yasuhiro Nakamura and Hidema Tanaka)

11:30~11:50

Privacy-Preserving Logistic Regression Using Homomorphic Encryption: An Adaptive Optimization Approach

( Hye-Yeon Shim, Yeon-Ji Lee and Il-Gu Lee)

Comparative Eval. of SSL Feature Extractors & Classifiers for DFAD

( Seong Bean Park and Hyun Min Song)

11:50~13:20

Lunch Time

13:20~13:35

No Session

Session 10 (Poster paper Oral Session1)

Machine Learning-Based Power Allocation for Secure MISO Communication Systems assisted by a Cooperative Jammer

(Min Jeong Kang, Jung Hoon Lee and Il-Gu Lee)

13:35~13:50

Towards Symbolic Formalization of PoW Integrity in Blockchain

(Kengo Matsui and Shigeki Hagihara)

13:50~14:05

Secure Restricted Access Window-Based Group Coordination for Mission-Critical Low-Latency and High Throughput Applications

(Seung-ha Jee, Yu-ran Jeon and Il-Gu Lee)

14:05~14:20

Invisible Watermarking Based on DWT-SVD for Protecting Generative AI Content

(Seo-Yi Kim, Na-Eun Park and Il-Gu Lee)

14:20~14:35

Security Policy Dissemination Scheme Between Satellite Ground Stations Based on CCSDS AOS Frames

(Dongphil Kim)

14:35~14:50

Security Vulnerability Analysis of Real-time Content Popularity Prediction-based Dynamic Memory Allocation System

(Ga-Yeong Kim, Na-Eun Park and Il-Gu Lee)

14:50~15:00

Break Time

15:00~15:15

 

 

 

 

 

No Session

Session 11 (Poster paper Oral Session2)

A Lightweight Authentication Scheme for Securing IoT with Dual-Layer Verification

(Ye-Hyeon Ahn, Sun-Jin Lee and Il-Gu Lee)

15:15~15:30

Physical Layer-based Obfuscated Data Transmission Technique for Internet of Battlefield Things

(Chae Yeon Park, So Eun Jeon and Il-Gu Lee)

15:30~15:45

Detection of Concurrent Hardware Trojan (HT) Using EM and Backscattering Side-Channel Approah

(Na-Hyun Kim, Sungbin Moon, Yewon Hwang, Seungho Jung, Seong-Cheon Park and Youngjae Lee)

15:45~16:00

Air-Gap Exfiltration via High-Order Modulation-Based Screen Saver Covert Channels: Design, Implementation, and Defense

(Ye-Rim Jeong, Yeon-Jin Kim, Chae-Yeon Park and Il-Gu Lee)

16:00~16:15

Enhancing Inter-Satellite Link Security with Shamir’s Secret Sharing-Based Frequency Hopping

(Sukyoung Kim, Soyeon Kim and Ilgu Lee)

 

Paper Session

Paper

Number

Authors

Title

2

Nobuyuki Sugio

Impossible Differential Attack on SAND-64

3

Beomseok Oh, Mincheol Son, Kwangmin Kim, Jiho Lee, Duckwoo Kim, Taekkyung Oh, Cheoljun Park and Yongdae Kim

Denial-of-Service Risks in 5G Devices: Empirical Analysis on Connection Restriction Mechanisms

6

Yiju Jung, Hyerean Jang and Youngjoo Shin

PodBeater: Exploiting Multi-Value Affinity for Efficient Co-Location Attacks in Kubernetes

17

Kyoungbae Jang, Yujin Oh and Hwajeong Seo

Depth-Optimized Quantum Implementation of CHAM

18

Cheng-Han Shie, Yu-Chun Tseng and Chun-I Fan

IoT Botnet Detection Based on the Behaviors of DNS over TLS Queries

19

Hwaseong Lee, Hyunwoo Lee, Youngki Jung, Seondong Heo, Moosung Park and Changon Yoo

Crashing or Freezing the Bot: LiDAR Spoofing Attacks on ROS 2 UGV

21

Yamya Reiki and Yudhveer Singh

Towards Sender Anonymity for Singleton Sets

22

Dung Ta Anh, Yasuhiro Nakamura and Hidema Tanaka

Bootstrap-based Evaluation of Clustering Suitability Across TCP Payload Dataset Structures

24

Yuki Tanaka and Mamoru Mimura

Real Environment Tolerance Curve (RETC): Assessing Machine Learning Model Performance Degradation Under Extreme Class Imbalance

25

Kakeru Watanabe and Kazuki Yoneyama

Formal Verification of Labyrinth Encrypted Message Storage Protocol in Messenger

28

Seyoung Yoon, Gyeongju Song, Kyungbae Jang and Hwajeong Seo

Quantum Implementation and Analysis of SHA-1

29

Young Han Choi and Ki Tae Park

TALOS: An Empirical Approach to Building Portable Hands-On Labs for Fundamental Cybersecurity Education using Open-source

32

Hyeong Seon Kim and Huy Kang Kim

GUARD-CAN: Graph-Understanding and Recurrent Architecture for CAN Anomaly Detection

33

A Yeon Kim, Jung Yup Rhee and Taekyoung Kwon

LeakGuard: Detecting and Mitigating Attribute Leakage in Fine-Tuned Diffusion Models

34

Keiichi Kinoshita and Mamoru Mimura

Detecting Malicious JavaScript Code by Code-Specialized LLM

41

Minjung Yoo, Seunghyun Park and Seongmin Kim

User Conversation Recovery from ChatGPT Local Artifacts in Web Browsers for Digital Forensic Investigations

46

Jeongho Lee and Seyoung Lee

Automated VEX Generation and Vulnerability Prioritization using Inter-Module Symbol Graphs

47

Geon Woo Jeon and Ji Won Yoon

Criminal Network Detection in Ethereum Using Change-Point Analysis: A Case Study of OFAC-Listed North Korean Wallet Addresses

51

Hyungkwan Kim, Hyunggyu Lee and Wook Shin

A Framework for Assessing Nation-State Cyber Attack Capabilities Using MITRE ATT&CK and Large Language Models

54

Jae-Min Choi, Sang-Hoon Choi and Ki-Woong Park

Interaction-Aware System Call Sequence Analysis for Android Malware Classificatio

59

Seong Bean Park and Hyun Min Song

Comparative Eval. of SSL Feature Extractors & Classifiers for DFAD

60

Hye-Yeon Shim, Yeon-Ji Lee and Il-Gu Lee

Privacy-Preserving Logistic Regression Using Homomorphic Encryption: An Adaptive Optimization Approach

64

Chau Nguyen, Hoang Anh Nguyen, Yang-Wai Chow and Willy Susilo

A Real-World Dataset to Enhance Intrusion Detection in SDN-IoT Systems

66

Lee Seon Woo, Park Hyeon Woo and Lee Tae Jin

Understanding Encrypted Network Anomalies with LLMs: A Post-hoc Cognitive Framework

67

Hyungrok Jo and Junji Shikata

PoC Hash: A Power-of-Commutators Hash over Hamiltonian Quaternions

69

Seonghan Shin

Toward a Stealth Mode of 5G-AKA

 

Poster Session

Poster Session 1

 

Authors

Title

So-Eun Jeon, Jung Hoon Lee and Il-Gu Lee

Smart Jamming with User Data: Redefining Wireless Secrecy in Multi-AP Networks

Sobirova Khusnora Bakhtiyor Kizi, Cho Nwe Zin Latt and Kyung Hyune Rhee

A Hybrid Sensitive Data Detection Framework for Structured Enterprise Data with Extension to Unstructured Text

Sayeon Kim, Olmi Lee and Woohyun Jang

Executable Protection via TPM-Sealed Key Unsealing and Memory-Only Execution in Embedded Systems

Su Jin Shin, Siwan Noh and Sang Uk Shin

BNPKM: Biometric Non-stored Private Key Management

Chanhee Han, Kyeongseok Lee and Homook Cho

DisTORbution Crawler: Active Tor Configuration for Efficient Dark Web Crawling

So Yeon Kim, Dong Woo Lee, Seong Hyun Min, Jung Hun Lim, Ma Il Jo, In Jae Kim, Ja Sil Choi, Min Ho Jung, Seong Eun Park and Won Gyum Kim

Context-Aware and Attention-Driven Deepfake Detection via Enhanced Residual Architectures

Seoyun Kang, Jeongeun Ryu, Yumin Lee, Jueun Son and Seongmin Kim

Empirical Study on Consistency of LLM-Based Policy as Code Generation for Network Policies

Yumin Lee, Jeongeun Ryu Ryu, Seoyun Kang, Jueun Son and Seongmin Kim

Exploring Prompt Strategy of LLM-based PaC Generation in Kubernetes Environment

Junghyun Mok and Sokjoon Lee

A Zero Trust Based Framework for xApp Access Control in O-RAN

Juhyeon Lee, Il Whan Ji and Jung Taek Seo

A Reinforcement Learning-Based Model for Multi-Step Attack Sequence Prediction in Industrial Control Systems

Dong-Kwon Jung and Woong-Sik Kim

Forecasting Stock Prices in the Korean Market Using News Sentiment

Kyu-Hyun Kang, Jae Yoon Kim, Nam-Su Jho and Taek-Young Yoon

Quantum-Secure Timestamp for the Integrity of Classical Signatures in Quantum Transition

Donghwan Lee, Hojune Shin and Younho Lee

Homomorphic Stationarity Testing using CKKS for Outsourced Time-series Data Analysis

Sehwa Ko, Kyeongmin Lee, Eunse Kang and Junyoung Son

FingerRatchet: A Lightweight Anonymous P2P Protocol with Out-of-Band Fingerprint Exchange

I Wayan Adi Juliawan Pawana, Hoseok Kwon, Bonam Kim and Ilsun You

Enhancing Private 5G Networks for IIoT: EAP-AKA’ Implementation in Open5GS

Selynn Kim, Taehun Kim and Youngjoo Shin

A Survey of Speculative Load Prediction Attacks Exploiting Memory Disambiguation Units

Sun-Jin Lee and Il-Gu Lee

Privacy-Preserving GAN-Based Data Augmentation for Intrusion Detection Without Accuracy Degradation

Yu-Na Kim, Yeon-Jin Kim and Il-Gu Lee

Optimizing Synthetic-to-Original Data Ratio for Reliable Model Training

Hwaseong Lee, Hyunwoo Lee, Youngki Jung, Seondong Heo, Moosung Park and Changon Yoo

UGVScan: Automated Tool for Multi-layer Rule Profiling on ROS 2-based UGV platforms

Kihoon Kim, Dongyeop Kim, Taeuk Ha and Jinsoo Jang

Recent Trends in Space Cybersecurity: Attack and Defense

Hye-eun Son and Hyoseung Kim

AnonC2PA: C2PA-based Anonymous Proof of Content Authenticity

Da-hyung Kim, Jeong-hwa Ryu, Su-bin Lee and Seong-min Kim

Comparative Analysis of HTML Structure Between Legal and Illegal Streaming Websites

Lee Taeyong, You Inseo, Kim Ju-Chan, Lee Kyumin, Jin Hyeonggwon, Yang Seunggwon, Yoon Hyenonbin, Park Jihoo, No Yonghun and Lee Minwoo

NMEA Under Siege: Dynamic Flooding Attacks and Defenses

Poster Session 2

 

Lee Taeyong, You Inseo, Kim Ju-Chan, Lee Kyumin, Jin Hyeonggwon, Yang Seunggwon, Yoon Hyenonbin, Park Jihoo, No Yonghun and Lee Minwoo

Visual Tampering in S-52: Threats and Protections

Jueon Choi, Gunjin Cha, Misoo Kim, Ieck-Chae Eum and Kwanghoon Choi

A Method for Selecting Security Checklist Items Associated with Incidents by Analyzing Security Incident Reports and Vulnerability Checklists Using LLM

Kiyeon Kim, Minyoung Choi, Jumi Kim, Eunjin Kim and Gibum Kim

A Study on the Analysis and Improvement of Web-Based DRM Bypass Techniques for OTT Content Protection

Yong Heon Lim, Jong Chan Seo and Hae Young Lee

PCFG-Based Framework for Cracking Korean Users’ Passwords

Heechan Kim, Jaehyun Kim, Kyungyun Lee and Junyoung Son

Blockchain-Assisted Explainable AI Framework for Accountability in Autonomous Driving Systems

Yujeong Seo and Hyunwoo Lee

PHANTOM: Predictive Security Policy Orchestration for Detecting Multi-stage Stealthy Attacks

Seokjae Gwon, Gyeonghoe Kim and Seyoung Lee

Evaluating Domain-Specific Hallucinations in LLMs Triggered by Jeju Dialect Inputs

Seokjae Gwon, Esther Kim, Huijin Lim, Nahyun Kim and Seyoung Lee

Design and Implementation of a Security Vulnerability Practice Testbed in Agentic LLM Environments

Gunseung Jin, Minseo Park and Jinsoo Jang

Forensic Analysis of Mattermost Server

Hyunjin Jang, Jiwon Yun, Yeonjeong Hwang, Morsheda Akter, Howon Kim and Junyoung Son

Multi-class Attack Detection in CAN Networks using Lightweight 1D CNN

Wibby Aldryani Astuti Praditasari, Hyejin Yoon, Hyeongyeop Kim and Okyeon Yi

Quantum-Rekeyed Privacy for AI-Powered Financial Assistants

Adi Panca Saputra Iskandar, Yongho Ko, Bonam Kim and Ilsun You

Blockchain-Assisted Handover Authentication: A Lightweight and Scalable Approach for 5G

Se-Ok Jeon, Seokhwi Kim and Kwanghoon Choi

Analyzing the Limitations of CVE‑Based Source‑Code Vulnerability Slice Extraction

Hyunji Cho, Jiyeon Yang, Woojin Im and Jinsoo Jang

Forensic Analysis of Siri on iOS

Sooin Kim, Seonghyun Min, Limjung Hoon, Jiyoung Shin and Wongyum Kim

Enhancing Face Forgery Detection through Dual-branch Transformer and contrastive pretraining

Yunsung Kim, Gyeongdeok An, Sangwon Lee and Jaecheol Ha

CNN-based Trace Interval Detection for Fault Injection Point Identification on DNN Models

Yoonjung Cho, Jeongwoo Lee, Baikjin Jung and Heejo Lee

Poster: Enhancing Vulnerability Fix Commit Identification via Data Augmentation with Security Unrelated Commits

Kyeongseok Yang, Sungyu Kim, Jeongwoo Lee, Yoongjong Na, Duyeong Kim and Heejo Lee

Poster: HatBOM, An Automated Analysis Platform for SBOM and VEX Generation

Yeonhee Kim, Soona Lee and Jongkil Kim

On-Device RAG System with Role-Based Document Access Control: A PropertyGPT-Based Approach

Dongjun Choi and Jungtaek Seo

A Quantitative Assessment Framework for Cyber Incident Response Exercises in Nuclear Facilities

Yoonsun Han, Mingi Kim, Chearin Kim and Seog Chung Seo

Isogeny Based Quantum Secure Bootstrapping Against Fake Base Stations in 6G Networks

Shin Dawit, Cho Jaehan, Son Junyoung and Kim Howon

Quantum Machine Learning for Intrusion Detection: Analyzing QSVM on CIC-IDS2017

Mingi Kim, Yoonsun Han, Chaerin Kim and Seog Chung Seo

A New DPKI_Based Model for Certificate Validation against FBS Attacks

Poster Session 3

 

Chaerin Kim, Yoonsun Han, Mingi Kim and Seog Chung Seo

Post Quantum Cryptography Migration for IoT–NTN Communications in 6G Networks

Heeyeong Suh, Nayeon Ryu and Seyoung Lee

Speak One, Leak All? Exploiting Multilingual LLMs via Monolingual Mode

Gyeongdeok An, Yunsung Kim, Sangwon Lee and Jaecheol Ha

Slope-based Sum of Absolute Differences (S-SAD) Method for Improving Pattern-matching Accuracy on Side-Channel Signal

Jung Kyu Seo, Ju Hyeon Lee and Jung Taek Seo

A Survey on AI-Based Anomaly Detection Using TypeSpecific Datasets in Industrial Control Systems

Chae-wan Hong, Seung-ha Jee and Il-Gu Lee

Feature Selection Optimization Based on Data Characteristics for Ransomware Detection

Nayeon Ryu, Heeyeong Suh and Seyoung Lee

Choices Beneath the Surface : How Dark Patterns Operate in Kiosk Interfaces Across Countries

Min-ji Cho, So-Eun Jeon and Il-gu Lee

Cooperative Machine Learning Framework for Efficient Detection of Wireless Availability Attacks in Internet of Things Networks

Hyobeen Cho, Namryeong Kim, Sunwoo Jeong and Ilgu Lee

Enhancing DeFi Smart Contract Security via LangChain and Retrieval-Augmented Generation

Suji Park, Yeon-Ji Lee and Il-Gu Lee

A Revocable Multimodal EEG Authentication Paradigm Using P300 Responses

Yeonwoo Lee, Yeonji Lee and Ilgu Lee

Improving Decision Accuracy in Multi-Sensor-Based Machine Learning Systems through Drift-Resilient Contribution Analysis

Suyeong Kim, Hyeyeon Shim and Ilgu Lee

An Analysis of the Impact of Dataset Preprocessing on the Performance of Homomorphic Encryption-Based Machine Learning

Chanhyuk Kim, Changuk Jang and Okyeon Yi

Design of a Web-Based Verification Tool for Ensuring the Reliability of PQC Algorithm Implementations

Da-eun Yu, Seung-ha Jee and Il-Gu Lee

Integrated Detection and Response Framework for DDoS and Ransomware Attacks

Gyuha Son, Seo-Yi Kim and Il-Gu Lee

Lightweight Anomaly Detection for Internet of Things: Integrating Feature Selection and Dimensionality Reduction

Chaewon Song, Hyeyeon Shim and Ilgu Lee

Privacy-Preserving Grid-Based Clustering of Medical Data Using Homommorphic Encryption

Jungjoo Oh and Il-Gu Lee

An Integrated Privacy Decision-Making Model for Multi-Factor Authentication Adoption

Mi-Yeon Kim, Sang-Hoon Choi and Ki-Woong Park

Revealing Hidden Contention through Disk I/O Analysis in Multi-Tenant Containers

Hyeran Jung, Yeonsu Jeong, Seonwoo Lee and Taejin Lee

Feedback-Driven False Alarm Detection for Network Attacks

So-Yeon Kim and Il-Gu Lee

A Multi-Link Selective Access Control Framework for Secure and Reliable IoT Communications

Ye-Sin Kim, Jin-Min Lee and Il-Gu Lee

An Interference-Aware Channel Selection Algorithm for Secure and Reliable Multi-Link Operation

Hyein Lee, Hyunche Song and Il-Gu Lee

Privacy at Risk: Evaluating Data Protection Practices in South Korea’s Leading Digital Mental Health Apps

Jung-Min Moon, Na-Eun Park and Il-Gu Lee

Wireless Channel Delay Spread-Based Dynamic Guard Interval Adjustment and Secondary Data Transmission Technique

Jin-Min Lee, Hye-Yeon Shim and Il-Gu Lee

OBSS Interference Management via Distributed ML-based Joint TX Power and RX Sensitivity Control

 
International Participants Payment Method
Registration Deadline: August 11, 2025 (UTC+09:00) 
Participants can register for the conference until August 11, 2025 (UTC+09:00)
 
Please read carefully the registration guidelines below.
We use online registration to complete the registration for participants.
Click on the registration page link: https://kiisc.or.kr/payment/pay/271
At least one presenter per accepted paper, poster must register for the conference as an attendance until Aug. 8, 2025 (UTC+09:00).
 
 ■ Registration Fee (International)
Online Attendance
 Student
350 USD
 General Participants
Offline Attendance
 Student
350 USD
 Offline Attendance General Participants
500 USD
(Online) Registration includes (a) access to the online conference and (b) the access to the online proceedings.
(Offline) Registration includes: (a) participation in the offline conference (b) access to the online conference (c) access to the online proceedings (d) two lunches and one banquet (e) a souvenir.
 
 Credit Card
 - Use a credit card payment system (EXIMBAY)
  Wire Transfer
- beneficiary' name : KIISC
- beneficiary's account number : 754-01-0008-146
- beneficiary's bank : Kookmin Bank
- the branch name : Yeoksamyeok Branch
- SWIFT code : CZNBKRSE
- beneficiary' address : Room 909, Seongji Heights 3-Cha Bldg., 507, Nonhyeon-ro, Gangnam-gu, Seoul, Korea 06132
* This payment method is provided by Eximbay and is billed as www.eximbay.com.
* Note: Please note that the billing descriptor will be listed as EXIMBAY.COM.
Registration-Related Inquiries
If you have any questions regarding your registrations, please contact the Registration Company via email at kiisc@kiisc.or.kr
 
한국인 (국내거주인) 등록 안내
* 사전등록: 2025년 8월 11일(월)까지 
(오프라인) 오프라인 학술대회 참가, 온라인 학술대회 참석 링크, 온라인 프로시딩, 점심2회, 만찬 1회, 기념품 제공
(온라인) 온라인 학술대회 참석 링크, 온라인 프로시딩 제공
 
■ 등록비 
온라인 참가
 학생(전일제)/일반
250,000 원
오프라인 참가
 학생(전일제)
500,000 원
 군•공무원
500,000 원
 일반
700,000 원
시니어(63세 이상) 종신회원
 무료
0원
 ▷ 학회 홈페이지( www.kiisc.or.kr )접속 → 학회행사 → 사전등록바로가기 → WISA 2025 (Domestic) 클릭 (신용카드/계좌이체 결제 가능) 
▷ 사전등록 송금처
- 예금주 : 한국정보보호학회
- 계좌번호 : (국민은행) 754-01-0008-146
※ 사전등록 시 등록비는 위의 구좌로 송금하시고 입금자명이 대리인명이나 단체명으로 송금되는 경우, 등록자 본인 확인이 어려울 수 있습니다. 이 경우 등록 시 메모란에 입금자명과 신청자명을 기재하거나, 이메일 또는 전화로 별도로 알려주시기 바랍니다.
 
* 계산서 신청 시, 익일 안으로 등록하신 이메일로 청구용 계산서가 발행됩니다. 영수용 계산서가 필요하신 경우, 사전에 학회로 연락 바랍니다.
* 등록확인서는 한국정보보호학회 홈페이지 상단 행사 등록 및 참가확인서 바로 가기를 클릭하신 후 등록 시 기재하시 성함과 이메일을 기재하시면 출력 가능합니다. (결제 완료 후 발행 가능)
* 참가확인서는 행사 종료 후 익일부터 한국정보보호학회 홈페이지 상단 행사 등록 및 참가확인서 바로 가기를 클릭하신 후 등록 시 기재하시 성함과 이메일을 기재하시면 출력 가능합니다. (결제 완료 후 발행 가능)
* 학생은 다른 소속이 없는 전일제(학부생/대학원생)에 한합니다.
* 학생의 경우 kiisc@kiisc.or.kr로 학생증 사본 송부 바랍니다.
* 군·공무원 등록(오프라인에 한함)은 주무관청에 소속 중인 공무원증 소지자에 한합니다. (국공립 교직원 제외) kiisc@kiisc.or.kr로 공무원증 사본 송부해 주시기 바랍니다.
* 시니어 무료등록은 학회 종신회원으로 1963년 12월 31일 이전 출생자에 한합니다.
* PAPER/POSTER 논문 발표자(저자 중 최소 1인) 는 오프라인 참석 비용으로 등록해주시기 바랍니다. (저자 사전등록 8월 8일까지)
 
[행사 문의처] 한국정보보호학회 사무국 02-564-9333(내선2), kiisc@kiisc.or.kr 
[계산서 문의처] 한국정보보호학회 사무국 02-564-9333(내선5), kiisc@kiisc.or.kr 
 
■ 등록비 카드결제 내역 조회:  클릭! 카드내역 조회하기
■ 등록확인서 발행:  클릭! 등록확인서 발행하기 를 통하여 직접 발행받으실 수 있습니다.
                         - 등록비 신용카드 결제 시, 등록확인서는 바로 출력이 가능
                         - 등록비 계좌이체 시, 이체 확인 후 등록확인서 출력 가능 
■ 참가확인서 발행:  클릭! 참가확인서 발행하기 를 통하여 직접 발행받으실 수 있습니다.
                         - 행사 종료 익일부터 참가확인서 출력가능, 등록비 미입금 시 발행 불가 
 
Registration Policy
At least one presenter per accepted paper, poster must register for the conference as an author.
We are unable to offer refunds, cancellations, or substitutions for any registrations for this event.
 
Registration Contact Information
Korea Institute of Information Security & Cryptology
- Seongji Heights 3-Cha Bldg., Room 909 507, Nonhyeon-ro, Gangnam-gu, Seoul 06132, Korea
- Tel : +82-2-564-9333(ext.2)
- Fax : +82-2-564-9226
- Business Registration Number: 114-82-04432
 
 
 
 
 

사전등록 바로가기 목록