Program
DAY 1 August 20 (WED)
Time |
Crystal Hall |
12:00~13:00 |
Registration in front of Crystal Hall |
13:00~13:10 |
Opening Remarks |
13:10~13:50 |
Keynote1: Cloud Computing Security: Challenging Issues and Future Directions Session Chair: Hwajeong Seo (Hansung University) |
13:50~14:00 |
Coffee Break |
14:00~15:00 |
Session 1: System & Application Security Session Chair: DaeHun Nyang (Ewha Womans University) |
15:00~15:20 |
Break Time |
15:20~16:00 |
Invited Talk1: Overlaying Crypto Agility onto the N2SF in the Cloud Era Session Chair: Jungsoo Park (Kangnam University) |
16:00~16:10 |
Coffee Break |
16:10~17:10 |
Session 2: 5G & Network Security Session Chair: CheolJun Park (Kyung Hee University) |
17:10~17:20 |
Coffee Break |
17:20~18:00 |
Session 3: Cybersecurity Education & Model Security Session Chair: Deokgyu Lee (Seowon University) |
DAY 2 August 21 (THU)
Time | Crystal Hall | Jade Hall |
---|---|---|
9:30~10:30 |
Session 4: Security Analysis & Verification Session Chair: Hyunwoo Lee (KENTECH) |
Session 5: Malware & Forensics Session Chair: Wonsuk Choi |
10:30~10:50 | Break Time | |
10:50~11:30 |
Keynote2: Security in the Age of AI Session Chair: Ki-Woong Park (Sejong University) |
|
11:30~11:50 | Break Time | |
11:50~12:30 |
Invited Talk2: Digital Trust in the AI Era: Navigating the New Cybersecurity Landscape Session Chair: Hyungrok Jo (Yokohama National University) |
|
12:30~14:00 | Lunch Time (Convention Hall, 1F) | |
14:00~15:00 | KIISC Board Meeting |
Research Story Session Chair: Wook Shin (NSR) |
15:00~16:00 |
Poster Session 1 Session Chair: Joobeom Yun |
|
16:00~17:00 |
Poster Session 2 Session Chair: Seyoung Lee |
|
17:00~18:00 |
Poster Session 3 Session Chair: Jae Deok Lim (ETRI) |
|
18:00~18:30 | Break Time | |
18:30~End | Banquet (Convention Hall, 1F) |
DAY 3 August 22 (FRI)
Time | Crystal Hall | Jade Hall | Ruby Hall |
---|---|---|---|
09:30~10:30 |
Session 6: Quantum & Cryptography |
Session 7: AI/LLM for Security Session Chair: Taekyoung Kwon (Yonsei University) |
No Session |
10:30~10:50 | Break Time | ||
10:50~11:50 | Session 8: Privacy & Anonymity Session Chair: Seunghun Han (Soongsil University) |
Session 9: IoT & Traffic Analysis Session Chair: Seonghan Shin (AIST) |
|
11:50~13:20 | Lunch Time (Crystal Hall, 2F) | ||
13:20~14:50 | No Session |
No Session |
Session 10: Poster paper Oral Session1 On-Site only Session Chair: Jung Hoon Lee (Hankuk University of Foreign Studies) |
14:50~15:00 | Break Time | ||
15:00~16:15 | Session 11: Poster paper Oral Session2 On-Site only Session Chair: Jiyoon Kim (Gyeongsang National University) |
Paper Session
PAPER SESSIONS |
Day 1: August 20 (Wednesday), 2025 |
Session 1: System & Application Security |
Crashing or Freezing the Bot: LiDAR Spoofing Attacks on ROS 2 UGV |
PodBeater: Exploiting Multi-Value Affinity for Efficient Co-Location Attacks in Kubernetes |
GUARD-CAN: Graph-Understanding and Recurrent Architecture for CAN Anomaly Detection |
Session 2: 5G & Network Security |
A Real-World Dataset to Enhance Intrusion Detection in SDN-IoT Systems |
Toward a Stealth Mode of 5G-AKA |
Denial-of-Service Risks in 5G Devices: Empirical Analysis on Connection Restriction Mechanisms |
Session 3: Cybersecurity Education & Model Security |
Real Environment Tolerance Curve (RETC): Assessing Machine Learning Model Performance Degradation Under Extreme Class Imbalance |
TALOS: An Empirical Approach to Building Portable Hands-On Labs for Fundamental Cybersecurity Education using Open-Source |
Day 2: August 21 (Thursday), 2025 |
Session 4: Security Analysis & Verification |
Impossible Differential Attack on SAND-64 |
Formal Verification of Labyrinth Encrypted Message Storage Protocol in Messenger |
Automated VEX Generation and Vulnerability Prioritization using Inter-Module Symbol Graphs |
Session 5: Malware & Forensics |
User Conversation Recovery from ChatGPT Local Artifacts in Web Browsers for Digital Forensic Investigations |
Criminal Network Detection in Ethereum Using Change-Point Analysis: A Case Study of OFAC-Listed North Korean Wallet Addresses |
Interaction-Aware System Call Sequence Analysis for Android Malware Classification |
Day 3: August 22 (Friday), 2025 |
Session 6: Quantum & Cryptography |
Depth-Optimized Quantum Implementation of CHAM |
Quantum Implementation and Analysis of SHA-1 |
PoC Hash: A Power-of-Commutators Hash over Hamiltonian Quaternions |
Session 7: AI/LLM for Security |
Detecting Malicious JavaScript Code by Code-Specialized LLM |
A Framework for Assessing Nation-State Cyber Attack Capabilities Using MITRE ATT&CK and Large Language Models |
Understanding Encrypted Network Anomalies with LLMs: A Post-hoc Cognitive Framework |
Session 8: Privacy & Anonymity |
Towards Sender Anonymity for Singleton Sets |
LeakGuard: Detecting and Mitigating Attribute Leakage in Fine-Tuned Diffusion Models |
Privacy-Preserving Logistic Regression Using Homomorphic Encryption: An Adaptive Optimization Approach |
Session 9: IoT & Traffic Analysis |
IoT Botnet Detection Based on the Behaviors of DNS over TLS Queries |
Bootstrap-based Evaluation of Clustering Suitability Across TCP Payload Dataset Structures |
Comparative Eval. of SSL Feature Extractors & Classifiers for DFAD |
Session 10: Poster paper Oral Session1 |
Machine Learning-Based Power Allocation for Secure MISO Communication Systems assisted by a Cooperative Jammer |
Towards Symbolic Formalization of PoW Integrity in Blockchain |
Secure Restricted Access Window-Based Group Coordination for Mission-Critical Low-Latency and High Throughput Applications |
Invisible Watermarking Based on DWT-SVD for Protecting Generative AI Content |
Security Policy Dissemination Scheme Between Satellite Ground Stations Based on CCSDS AOS Frames |
Security Vulnerability Analysis of Real-time Content Popularity Prediction-based Dynamic Memory Allocation System |
Session 11: Poster paper Oral Session2 |
A Lightweight Authentication Scheme for Securing IoT with Dual-Layer Verification |
Physical Layer-based Obfuscated Data Transmission Technique for Internet of Battlefield Things |
Detection of Concurrent Hardware Trojan (HT) Using EM and Backscattering Side-Channel Approah |
Air-Gap Exfiltration via High-Order Modulation-Based Screen Saver Covert Channels: Design, Implementation, and Defense |
Enhancing Inter-Satellite Link Security with Shamir’s Secret Sharing-Based Frequency Hopping |
Poster Session
Poster Session 1
15:00 - 16:00, August 21 (Thursday), 2025
Session Chair: Joobeom Yun (Sejong University)
PS1-1 Smart Jamming with User Data: Redefining Wireless Secrecy in Multi-AP Networks
So-Eun Jeon (Sungshin Women's University), Jung Hoon Lee (Hankuk University of Foreign Studies) and Il-Gu Lee (Sungshin Women's University)
PS1-2 A Hybrid Sensitive Data Detection Framework for Structured Enterprise Data
Sobirova Khusnora Bakhtiyor Kizi, Cho Nwe Zin Latt, Eunhye-Jeong, Kyung-Hyung Rhee (Pukyong National University)
PS1-3 Executable Protection via TPM-Sealed Key Unsealing and Memory-Only Execution in Embedded Systems
Sayeon Kim, Olmi Lee and Woohyun Jang (LIGnex1)
PS1-4 BNPKM: Biometric Non-stored Private Key Management
Su Jin Shin (Pukyong National University), Siwan Noh (Dong-Eui University) and Sang Uk Shin (Pukyong National University)
PS1-5 DisTORbution Crawler: Active Tor Configuration for Efficient Dark Web Crawling
Chanhee Han, Kyeongseok Lee and Homook Cho (Korea Advanced Institute of Science and Technology)
PS1-6 Context-Aware and Attention-Driven Deepfake Detection with Enhanced Residual Architectures Regarding Generative Forgetting
So Yeon Kim, Dong Woo Lee, Seong Hyun Min, Jung Hun Lim, Ma Il Jo, In Jae Kim, Ja Sil Choi, Min Ho Jung, Sung Eun Park, Won Gyum Kim (AIDEep)
PS1-7 Empirical Study on Consistency of LLM-Based Policy as Code Generation for Network Policies
Seoyun Kang, Jeongeun Ryu, Yumin Lee, Jueun Son and Seongmin Kim (Sungshin Women's University)
PS1-8 Exploring Prompt Strategy of LLM-based PaC Generation in Kubernetes Environment
Yumin Lee, Jeongeun Ryu, Seoyun Kang, Jueun Son, Seongmin Kim (Sungshin Women's University)
PS1-9 A Zero Trust Based Framework for xApp Access Control in O-RAN
Jung-Hyun Mok, Sokjoon Lee (Gachon University)
PS1-10 A Reinforcement Learning-Based Model for Multi-Step Attack Sequence Prediction in Industrial Control Systems
JuHyeon Lee, Ilhwan Ji, Jung Taek Seo (Gachon University)
PS1-11 Forecasting Stock Prices in the Korean Market Using News Sentiment
Dong-Kwon Jung and Woong-Sik Kim (Konyang University)
PS1-12 Quantum-Secure Timestamp for the Integrity of Classical Signatures in Quantum Transition
Kyu-Hyun Kang, Jae Yoon Kim, Nam-Su Jho and Taek-Young Yoon (Dankook University)
PS1-13 Homomorphic Stationarity Testing using CKKS for Outsourced Time-series Data Analysis
Donghwan Lee, Hojune Shin and Younho Lee (Seoul National University of Science and Technology)
PS1-14 FingerRatchet: A Lightweight Anonymous P2P Protocol with Out-of-Band Fingerprint Exchange
Sehwa Ko, Kyeongmin Lee, Eunse Kang and Junyoung Son (Pusan National University)
PS1-15 Enhancing Private 5G Networks for IIoT: EAP-AKA’ Implementation in Open5GS
I Wayan Adi Juliawan Pawana (Kookmin University, Udayana University), Hoseok Kwon, Bonam Kim, Ilsun You (Kookmin University)
PS1-16 A Survey of Speculative Load Prediction Attacks Exploiting Memory Disambiguation Units
Selynn Kim, Taehun Kim and Youngjoo Shin (Korea University)
PS1-17 Privacy-Preserving GAN-Based Data Augmentation for Intrusion Detection Without Accuracy Degradation
Sun-Jin Lee and Il-Gu Lee (Sungshin Women's University)
PS1-18 Optimizing Synthetic-to-Original Data Ratio for Reliable Model Training
Yu-Na Kim, Yeon-Jin Kim and Il-Gu Lee (Sungshin Women's University)
PS1-19 UGVScan: Automated Tool for Multi-layer Rule Profiling on ROS 2-based UGV platforms
Hwaseong Lee, Hyunwoo Lee (Cyber Operations Command of Republic of Korea), Yongki Jung, Seongdong Heo, Moosung Park, Changon Yoo (Agency for Defense Development)
PS1-20 Recent Trends in Space Cybersecurity: Attack and Defense
KiHoon Kim, DongYeop Kim, TaeUk Ha, JinSoo Jang (Chungnam National University)
PS1-21 AnonC2PA: C2PA-based Anonymous Proof of Content Authenticity
Hye-eun Son and Hyoseung Kim (Hallym University)
PS1-22 Comparative Analysis of HTML Structure Between Legal and Illegal Streaming Websites
Da-hyung Kim, Jeong-hwa Ryu, Su-bin Lee, Seongmin Kim (Sungshin Women’s University)
PS1-23 NMEA Under Siege: Dynamic Flooding Attacks and Defenses
Taeyong Lee, Inseo You(Soonchunhyang University), Ju-Chan Kim (Dongguk University), Kyumin Lee (Inha Technical College), Hyeonggwon Jin (Sejong University), Seungwon Yang (Joongbu University), Hyeonbin Yoon (Korea University), Yonghun No (Korea University, CYTUR), Minwoo Lee (Korea Maritime & Ocean University)
Poster Session 2
16:00 - 17:00, August 21 (Thursday), 2025
Session Chair: Seyoung Lee (Kangwon National University)
PS2-1 Visual Tampering in S-52: Threats and Protections
Taeyong Lee (Soonchunhyang University), Inseo You (Soonchunhyang University), Ju-chan Kim (Dongguk University), Kyumin Lee (Inha Technical College), Hyeonggwon Jin (Sejong University), Seunggwon Yang (Joongbu University), Hyeonbin Yoon (Korea University), Yonghun No (CYTUR), Minwoo Lee (Korea Maritime & Ocean University)
PS2-2 A Method for Selecting Security Checklist Items Associated with Incidents by Analyzing Security Incident Reports and Vulnerability Checklists Using LLM
Jueon Choi (Chonnam National University), Gunjin Cha (Good First Information Technology), Misoo Kim, Ieck-Chae Eum, Kwanghoon Choi (Chonnam National University)
PS2-3 A Study on the Analysis and Improvement of Web-Based DRM Bypass Techniques for OTT Content Protection
Kiyeon Kim, Minyoung Choi, Jumi Kim, Eunjin Kim and Gibum Kim (Sungkyunkwan University)
PS2-4 PCFG-Based Framework for Cracking Korean Users’ Passwords
Yong Heon Lim, Jong Chan Seo and Hae Young Lee (Cheongju University)
PS2-5 Blockchain-Assisted Explainable AI Framework for Accountability in Autonomous Driving Systems
Heechan Kim, Jaehyun Kim, Kyungyun Lee and Junyoung Son (Pusan National University)
PS2-6 PHANTOM: Predictive Heuristic AI Network for Threat Orchestration and Mitigation
Yujeong Seo, Hyunwoo Lee (KENTECH)
PS2-7 Evaluating Domain-Specific Hallucinations in LLMs Triggered by Jeju Dialect Inputs
Seokjae Gwon, GyeongHoe Kim, Seyoung Lee (Kangwon National University)
PS2-8 Design and Implementation of a Security Vulnerability Practice Testbed in Agentic LLM Environments
Seokjae Gwon (Kangwon National University), Esther Kim (Seoul Women's University), HuiJin Lim (Mokwon University), Nahyun Kim (Seoul National University of Science and Technology), Seyoung Lee (Kangwon National University)
PS2-9 Forensic Analysis of Mattermost Server
Gunseung Jin, Minseo Park and Jinsoo Jang (Chungnam National University)
PS2-10 Multi-class Attack Detection in CAN Networks using Lightweight 1D CNN
Hyunjin Jang, Jiwon Yun, Yeonjeong Hwang, Morsheda Akter, Howon Kim and Junyoung Son (Pusan National University)
PS2-11 Quantum-Rekeyed Privacy for AI-Powered Financial Assistants
Wibby Aldryani Astuti Praditasari, Hyejin Yoon, Hyeongyeop Kim and Okyeon Yi (Kookmin University)
PS2-12 Blockchain-Assisted Handover Authentication: A Lightweight and Scalable Approach for 5G
Adi Panca Saputra Iskandar, Yongho Ko, Bonam Kim and Ilsun You (Kookmin University)
PS2-13 Analyzing the Limitations of CVE-Based Source-Code Vulnerability Slice Extraction
Se-Ok Jeon (Chonnam National University), SeokHwi Kim (KSign), Kwanghoon Choi (Chonnam National University)
PS2-14 Forensic Analysis of Siri on iOS
Hyunji Cho, Jiyeon Yang, Woojin Im and Jinsoo Jang (Chungnam National University)
PS2-15 Enhancing Face Forgery Detection through Dual-branch Transformer and Contrastive Pretraining
Soo In Kim (Dankook University), Seong Hyun Min, Jung Hoon Lim, Ji Young Shin, Won Gyum Kim (AIDeep Co. Ltd.)
PS2-16 CNN-based Trace Interval Detection for Fault Injection Point Identification on DNN Models
Yunsung Kim, Gyeongdeok An, Sangwon Lee and Jaecheol Ha (Hoseo University)
PS2-17 Enhancing Vulnerability Fix Commit Identification via Data Augmentation with Security Unrelated Commits
YoonJung Cho (Seoul Women's University), Jeongwoo Lee (Korea University), Baikjin Jung (Labrador labs, Inc.), Heejo Lee (Korea University)
PS2-18 HatBOM, An Automated Analysis Platform for SBOM and VEX Generation
Kyeongseok Yang (Korea University), Sungyu Kim (Center for Software Security & Assurance), Jeongwoo Lee, Yoongjong Na, Duyeong Kim, Heejo Lee (Korea University)
PS2-19 On-Device RAG System with Role-Based Document Access Control: A PropertyGPT-Based Approach
Yeonhee Kim, Soona Lee and Jongkil Kim (Ewha Womans University)
PS2-20 A Quantitative Assessment Framework for Cyber Incident Response Exercises in Nuclear Facilities
Dongjun Choi and Jungtaek Seo (Gachon University)
PS2-21 Isogeny Based Quantum Secure Bootstrapping Against Fake Base Stations in 6G Networks
Yoonsun Han, Mingi Kim, Chearin Kim and Seog Chung Seo (Kookmin university)
PS2-22 Quantum Machine Learning for Intrusion Detection: Analyzing QSVM on CIC-IDS2017
Shin Dawit, Cho Jaehan, Son Junyoung and Kim Howon (Pusan National University)
PS2-23 A New DPKI_Based Model for Certificate Validation against FBS Attacks
Mingi Kim, Yoonsun Han, Chaerin Kim and Seog Chung Seo (Kookmin University)
Poster Session 3
17:00 - 18:00, August 21 (Thursday), 2025
Session Chair: Jae Deok Lim (ETRI)
PS3-1 Post Quantum Cryptography Migration for IoT–NTN Communications in 6G Networks
ChaeRin Kim, YoonSun Han, MinGi Kim, Seog Chung Seo (Kookmin University)
PS3-2 Speak One, Leak All? Exploiting Multilingual LLMs via Monolingual Mode
Heeyeong Suh, Nayeon Ryu, Seyoung Lee (Kangwon National University)
PS3-3 Slope-based Sum of Absolute Differences (S-SAD) Method for Improving Pattern-matching Accuracy on Side-Channel Signal
Gyeongdeok An, Yunsung Kim, Sangwon Lee and Jaecheol Ha (Hoseo University)
PS3-4 A Survey on AI-Based Anomaly Detection Using Type-Specific Datasets in Industrial Control Systems
Jung Kyu Seo, Ju Hyeon Lee, Jung Taek Seo (Gachon University)
PS3-5 Feature Selection Optimization Based on Data Characteristics for Ransomware Detection
Chae-wan Hong, Seung-ha Jee and Il-Gu Lee (Sungshin Women's University)
PS3-6 Choices Beneath the Surface: How Dark Patterns Operate in Kiosk Interfaces Across Countries
Nayeon Ryu, Heeyeong Suh, Seyoung Lee (Kangwon National University)
PS3-7 Cooperative Machine Learning Framework for Efficient Detection of Wireless Availability Attacks in Internet of Things Networks
Min-Ji Cho, So-Eun Jeon, Il-Gu Lee (Sungshin Women's University)
PS3-8 Enhancing DeFi Smart Contract Security via LangChain and Retrieval-Augmented Generation
Hyo-been Cho, Nam-Ryeong Kim, Sun-Woo Jeong, Il-Gu Lee (Sungshin Women's University)
PS3-9 A Revocable Multimodal EEG Authentication Paradigm Using P300 Responses
Suji Park, Yeon-Ji Lee, Il-Gu Lee (Sungshin Women's University)
PS3-10 Improving Decision Accuracy in Multi-Sensor-Based Machine Learning Systems through Drift- Resilient Contribution Analysis
Yeon-woo Lee, Yeon-ji Lee, Il-Gu Lee (Sungshin Women's University)
PS3-11 An Analysis of the Impact of Dataset Preprocessing on the Performance of Homomorphic Encryption-Based Machine Learning
Su-Yeong Kim, Hye-Yeon Shim, Il-Gu Lee (Sungshin Women’s University)
PS3-12 Design of a Web-Based Verification Tool for Ensuring the Reliability of PQC Algorithm Implementations
Chanhyuk Kim, Changuk Jang, Okyeon Yi (Kookmin University)
PS3-13 Integrated Detection and Response Framework for DDoS and Ransomware Attacks
Da-eun Yu, Seung-ha Jee, Il-gu Lee (Sungshin Women’s University)
PS3-14 Lightweight Anomaly Detection for Internet of Things: Integrating Feature Selection and Dimensionality Reduction
Gyuha Son, Seo-Yi Kim, Il-Gu Lee (Sungshin Women’s University)
PS3-15 Privacy-Preserving Grid-Based Clustering of Medical Data Using Homomorphic Encryption
Chae-Won Song, Hye-Yeon Shim, Il-Gu Lee (Sungshin Women’s University)
PS3-16 An Integrated Privacy Decision-Making Model for Multi-Factor Authentication Adoption
Jungjoo Oh, Il-Gu Lee (Sungshin Women’s University)
PS3-17 Revealing Hidden Contention through Disk I/O Analysis in Multi-Tenant Containers
Mi-Yeon Kim, Sang-Hoon Choi, Ki-Woong Park (Sejong University)
PS3-18 Feedback-Driven False Alarm Detection for Network Attacks
Hye-Ran Jung, Yeon-Su Jeong, Seon-Woo Lee, Tae-Jin Lee (Gachon University)
PS3-19 A Multi-Link Selective Access Control Framework for Secure and Reliable IoT Communications
So-Yeon Kim, Il-Gu Lee (Sungshin Women’s University)
PS3-20 An Interference-Aware Channel Selection Algorithm for Secure and Reliable Multi-Link Operation
Ye-Sin Kim, Jin-Min Lee, Il-Gu Lee (Sungshin Women’s University)
PS3-21 Privacy at Risk: Evaluating Data Protection Practices in South Korea’s Leading Digital Mental Health Apps
Hye-In Lee, Hyun-Che Song, Il-Gu Lee (Sungshin Women’s University)
PS3-22 Dynamic Guard Interval Allocation with Opportunistic Secondary Data Transmission for Enhanced Spectral Efficiency
Jung-Min Moon, Na-Eun Park, Il-Gu Lee (Sungshin Women’s University)
PS3-23 OBSS Interference Management via Distributed ML-based Joint TX Power and RX Sensitivity Control
Jin-Min Lee, Hye-Yeon Shim, Il-Gu Lee (Sungshin Women’s University)
▶ Research Story(Crystal Hall)
August 21 (Thursday)
•14:00~14:20 From Page to Stage: Returning to Top Security Venues / Taekyoung Kwon (Yonsei University)
•14:20~14:40 Recommendations for Writing Research Papers in Security Area / DaeHun Nyang (Ewha Womans University)
•14:40~15:00 Lesson: Simple Is Always Best / Hyunwoo Lee (KENTECH)