August 23-25, 2023
MAISON GLAD, Jeju Island, Korea

POSTER PROGRAM



Poster Session 1 : 15:00 - 16:30, August 24 (Thursday), 2023

 

A Survey on Attack Cases with Living-Off-The-Land Techniques in Windows and Linux

Gyuhyun Jeon, Seungho Jeon and Jung Taek Seo


Data Calibration to Enhance Security and Accuracy of Federated Learning

Na-Eun Park, So-Yeon Kim, Yuran Jeon, Seoyi Kim and Il-Gu Lee


Anomaly Detection using LSTM-Based Autoencoder with Time Series Dataset over a network

Hyewon Suk and Minsuk Kim


V2V-MHT:Accelerated V2V Authentication Framework using Merkle Hash Tree

YoonSun Han, YoungBeom Kim and Seog Chung Seo


Vehicle CAN Network Imbalance Intrusion Detection and Explanation Based on XGBoost and SHAP

Thi-Thu-Huong Le, Naufal Suryanto, Aji Teguh Prihatno, Yustus Eko Oktian, Hyoeun Kang and Howon Kim


Enhancing Cyber Strategies through Reinforcement Learning: A CyberBattleSim(CBS)

Bumsok Kim, Minsuk Kim, Junghyun Kim, Yonghoon Choi and Seungseo Roh


A Model for Collecting and Analyzing Network Logs DataSets

Jaehan Jeong and Go Woong


Decision Tree Based Poising Backdoor Attacks and Mutation model SPRT detection defense in NSL-KDD Dataset

Jinhyeok Jang, Yoonsoo An, Dowan Kim and Daeseon Choi


A Method of GML-based Software Structuring for Verification of Open-source Software License Compatibility

Won-Bin Kim, Yongjoon Joe, Kyung-Yeob Park and Dong-Myung Shin


Designing a Deceptive Honeypot Architecture for Industrial Control Systems

Dong-Hyuk Shin, Jong-Bum Lee and Ieck-Chae Euom


Suboptimal Feature Selection Technique for Efficient Machine Learning-based Malicious Traffic Detection

So-Eun Jeon, Ye-Sol Oh, Ye-Seul Kil, Yeon-Ji Lee and Il-Gu Lee


Identity Concealing Steganography-based Data Sharing Mechanism

Jinsu Kim and Namje Park


Poster: SGX-Enabled Edge Cloud Architecture for Secure Data Augmentation

Jiwon Ock and Seongmin Kim


Solid Pod-based medical data sharing system to ensure data sovereignty

Sohui Kim, Minjeong Kim and Ilgu Lee


A Study on Establishing a Secure Remote Work Environment in a VDI Environment Based on Zero Trust

Chang Hoon Kim, Howon Kim, Sokjoon Lee, Young Rang Kim and Jungsoo Park


Analyzing Risk Attitudes in DeFi Crypto Credit Lending through On-chain Data

Simon Oh, Yeongjae Shin, Uk Jo, Hyoeun Kang, Kyeongwoo Oh, Jaehyun Kim, Bogeum Kim, Hyejin Sim, Changwoo Choi and Howon Kim


Parameter Optimization Techniques for Privacy and Utility Trade-off of Differential Privacy

Jung-Hwa Ryu, Sun-Jin Lee, Hye-Yeon Shim and Il-Gu Lee


A Study on Digital Human Ownership Management Techniques in Metaverse Based on NFT

Changhyun Roh, Changjun Choi, HyunSoo Kim and DongMyung Shin


Exploring Hybrid Quantum-Classical Approaches for Information Security

Dedy Septono Catur Putranto, Rini Wisnu Wardhani and Howon Kim


Analysis of international trends for the introduction of Zero Trust

Jeong Hyeop Hong, Sun Woo Kim, Ui Hyun Park and Kyung-ho Son


TrustVoice: Detecting Voice Phishing Apps Using Their Runtime Behaviors

Chanjong Lee and Hyoungshick Kim


The RSA Algorithm’s Quantum Cryptanalysis Posture

Rini Wisnu Wardhani, Dedy Septono Catur Putranto and Howon Kim


Blockchain-based Zero Trust System for Medical Data Exchange

Yohan Kim, Hanho Jeong, Jaehan Cho, Donggyu Kim, SangBong Oh and Howon Kim


Metaverse Copyright Ownership Verification using Redundant Verification for Virtual Performance

Won-Bin Kim, Changhyun Roh, Yongjoon Joe and Dong-Myung Shin


 

Poster Session 2 : 16:30 - 18:00, August 24 (Thursday), 2023

 

Physical Layer Security Mechanism for Secure Trigger- based Uplink Multi-user Transmission

So-Hyun Park and Il-Gu Lee


Efficient Implementation of Kyber on MSP430 Environment

DongHyun Shin, YoungBeom Kim and Seog Chung Seo


Optimization Study of Parallel Implementation for Scrypt: A Memory Hard Function

Seongjun Choi, Dongcheon Kim and Seog Chung Seo


High-Performance Kyber implementation on ARMv7 Neon Technology

YoungBeom Kim, Jeonghwan Shin, Hojoong Park and Seog Chung Seo


Defense Against Adversarial Evasion Attacks on Self-Driving Car Using Image Quantization

Seungyeol Lee, Hyeonro Lee and Jaecheol Ha


Face Verifiable Anonymization in Video Surveillance

Sungjune Park, Hyunsik Na, Seungmin Kim and Daeseon Choi


A Multi-step Framework for Botnet Attack Detection in IoT Environment

Hojun Jin, Seungho Jeon and Jung Taek Seo


Implementation of Montgomery Reduction and Butterflies for CRYSTALS-Dilithium on RISC-V

Yongryeol Choi, YoungBeom Kim and Seog Chung Seo


The Sky's Betrayal: Drone Hijacking on DJI Enhanced WiFi Protocol

Derry Pratama, Jaegeun Moon, Agus Mahardika Ari Laksmono, Dongwook Yun, Byeonguk Jeong, Iqbal Muhammad, Jang Hyun Ji and Howon Kim


Efficient implementation of multiplication reduction over NIST prime P-384 for 8‑bit AVR Processor

Mingi Kim, YoungBeom Kim and Seog Chung Seo


A Study on Tor Traffic Identification Technology for Blocking Dark Web Access in a LAN Environment

Hongbi Kim, Daeil Jang and Seunggoo Ji


Contact PUF: Highly Stable Physical Unclonable Functions Based on Contact Failure Probability in 180 nm, 130 nm, and 28 nm CMOS Processes

Duhyun Jeon, Dongmin Lee and Byong-Deok Choi


An Implementation of Lightweight RISC-V Trusted Execution Environment with Memory Encryption and Task Isolation

Woojung Park, Janghyun Ji and Jaegeun Moon


Analysis of current status for secure IoT-based payment

Hyeon No, Heekyung Shin, Jiwon Ock, Yeeun Kim and Seongmin Kim


Tri-band-based Wi-Fi Indoor Localization to Defend against Jamming Attacks

Jin-Min Lee, Na-Yeon Shin, Jung-Hyun Moon and Il-Gu Lee


On Secrecy of RSMA-enabled UAV Downlink Communications: Problem and Research Trends

Tri-Hai Nguyen, Heejae Park and Laihyuk Park


Accelerating Key Derivation Function on GPU Architectures

Dong-Cheon Kim and Seog Chung Seo


Enhancing Robustness of Self-Driving Car Regression Models through Feature Squeezing

Hyeonro Lee, Seungyeol Lee, Seongwoo Hong and Jaecheol Ha


Privacy-Preserving DTx Data with Differential Privacy

Gee-Hee Yun and Kyoung-Jin Kim


Side channel attack resistant Binarized Neural Network Accelerator

Junho Lee, Haeyoung Kim, Dongwook Yun and Howon Kim


Tabling GHASH in LEA-GCM on GPU and optimization

Jaeseok Lee, Dongcheon Kim and Seog Chung Seo


Research on Identification of Cyber Attacker Groups and Interpretation of Results

Sungtaek Oh and Woong Go


Evaluation Criteria for Cyberattack Scenarios Used in Training Exercises

Insung Song, Seungho Jeon and Jung Taek Seo


Malextension: Malicious Extension to Hack your Browser

Jiwon Jang, Ye-Sol Oh, Hyunwoo Choi and Il-Gu Lee