August 20-22, 2025
MAISON GLAD, Jeju Island, Korea

Program



 

DAY 1   August 20 (WED)

Time 

Crystal Hall

12:00~13:00

Registration in front of Crystal Hall

13:00~13:10

Opening Remarks

13:10~13:50

Keynote1: Cloud Computing Security: Challenging Issues and Future Directions
Prof. Willy Susilo (University of Wollongong, Australia)

Session Chair: Hwajeong Seo (Hansung University)

13:50~14:00

Coffee Break

14:00~15:00

Session 1: System & Application Security

Session Chair: DaeHun Nyang (Ewha Womans University)

15:00~15:20

Break Time

15:20~16:00

Invited Talk1: Overlaying Crypto Agility onto the N2SF in the Cloud Era
Dr. Jihoon Cho (Vice President, Samsung SDS, Republic of Korea)

Session Chair: Jungsoo Park (Kangnam University)

16:00~16:10

Coffee Break

16:10~17:10

Session 2: 5G & Network Security

Session Chair: CheolJun Park (Kyung Hee University)

17:10~17:20

Coffee Break

17:20~18:00

Session 3: Cybersecurity Education & Model Security

Session Chair: Deokgyu Lee (Seowon University)

 

DAY 2   August 21 (THU)

Time Crystal Hall Jade Hall
9:30~10:30

Session 4: Security Analysis & Verification

Session Chair: Hyunwoo Lee (KENTECH)

Session 5: Malware & Forensics

Session Chair: Wonsuk Choi
(Korea University)

10:30~10:50 Break Time

10:50~11:30

Keynote2: Security in the Age of AI
Dr. Wolfgang Richter (Director of Engineering, Soroco Co.Ltd, USA)

Session Chair: Ki-Woong Park (Sejong University)

11:30~11:50 Break Time
11:50~12:30

Invited Talk2: Digital Trust in the AI Era: Navigating the New Cybersecurity Landscape
Hosuk Lee (CISO of AWS Korea, Republic of Korea)

Session Chair: Hyungrok Jo (Yokohama National University)

12:30~14:00 Lunch Time (Convention Hall, 1F)
14:00~15:00 KIISC Board Meeting

Research Story

Session Chair: Wook Shin (NSR)

15:00~16:00

Poster Session 1

Session Chair: Joobeom Yun
(Sejong University)

16:00~17:00

Poster Session 2

Session Chair: Seyoung Lee
(Kangwon National University)

17:00~18:00

Poster Session 3

Session Chair: Jae Deok Lim (ETRI)

18:00~18:30 Break Time
18:30~End Banquet (Convention Hall, 1F)

 

 

DAY 3   August 22 (FRI)

Time Crystal Hall Jade Hall Ruby Hall
09:30~10:30

Session 6: Quantum & Cryptography

Session Chair: Dongjae Lee (Kangwon National University)

Session 7: AI/LLM for Security

Session Chair: Taekyoung Kwon (Yonsei University)
No Session
10:30~10:50 Break Time
10:50~11:50 Session 8: Privacy & Anonymity

Session Chair: Seunghun Han (Soongsil University)
Session 9: IoT & Traffic Analysis

Session Chair: Seonghan Shin (AIST)
11:50~13:20 Lunch Time (Crystal Hall, 2F)
13:20~14:50
No Session

No Session
Session 10: Poster paper Oral Session1
On-Site only
Session Chair: Jung Hoon Lee
(Hankuk University of Foreign Studies)
14:50~15:00 Break Time
15:00~16:15 Session 11: Poster paper Oral Session2
On-Site only
Session Chair: Jiyoon Kim
(Gyeongsang National University)

 

 

Paper Session

PAPER SESSIONS

Day 1: August 20 (Wednesday), 2025

Session 1: System & Application Security

Crashing or Freezing the Bot: LiDAR Spoofing Attacks on ROS 2 UGV
Hwaseong Lee (Agency for Defense Development), Hyunwoo Lee (Cyber Operations Command of Republic of Korea), Youngki Jung, Seondong Heo, Moosung Park and Changon Yoo (Agency for Defense Development)

PodBeater: Exploiting Multi-Value Affinity for Efficient Co-Location Attacks in Kubernetes
Yiju Jung, Hyerean Jang and Youngjoo Shin (Korea University)

GUARD-CAN: Graph-Understanding and Recurrent Architecture for CAN Anomaly Detection
Hyeong Seon Kim and Huy Kang Kim (Korea University)

Session 2: 5G & Network Security

A Real-World Dataset to Enhance Intrusion Detection in SDN-IoT Systems
Chau Nguyen, Hoang Anh Nguyen, Yang-Wai Chow and Willy Susilo (University of Wollongong)

Toward a Stealth Mode of 5G-AKA
Seonghan Shin (National Institute of Advanced Industrial Science and Technology)

Denial-of-Service Risks in 5G Devices: Empirical Analysis on Connection Restriction Mechanisms
Beomseok Oh, Mincheol Son, Kwangmin Kim, Jiho Lee, Duckwoo Kim, Taekkyung Oh (Korea Advanced Institute of Science and Technology), Cheoljun Park (Kyunghee University) and Yongdae Kim (Korea Advanced Institute of Science and Technology)

Session 3: Cybersecurity Education & Model Security

Real Environment Tolerance Curve (RETC): Assessing Machine Learning Model Performance Degradation Under Extreme Class Imbalance
Yuki Tanaka and Mamoru Mimura (National Defense Academy of Japan)

TALOS: An Empirical Approach to Building Portable Hands-On Labs for Fundamental Cybersecurity Education using Open-Source
Young Han Choi and Ki Tae Park (National Security Research Institute)

Day 2: August 21 (Thursday), 2025

Session 4: Security Analysis & Verification

Impossible Differential Attack on SAND-64
Nobuyuki Sugio (Hokkaido University of Science)

Formal Verification of Labyrinth Encrypted Message Storage Protocol in Messenger
Kakeru Watanabe and Kazuki Yoneyama (Ibaraki University)

Automated VEX Generation and Vulnerability Prioritization using Inter-Module Symbol Graphs
Jeongho Lee and Seyoung Lee (Kangwon National University)

Session 5: Malware & Forensics

User Conversation Recovery from ChatGPT Local Artifacts in Web Browsers for Digital Forensic Investigations
Minjung Yoo, Seunghyun Park and Seongmin Kim (Sungshin Women’s University)

Criminal Network Detection in Ethereum Using Change-Point Analysis: A Case Study of OFAC-Listed North Korean Wallet Addresses
Geon Woo Jeon and Ji Won Yoon (Korea University)

Interaction-Aware System Call Sequence Analysis for Android Malware Classification
Jae-Min Choi, Sang-Hoon Choi and Ki-Woong Park (Sejong University)

Day 3: August 22 (Friday), 2025

Session 6: Quantum & Cryptography

Depth-Optimized Quantum Implementation of CHAM
Kyoungbae Jang, Yujin Oh and Hwajeong Seo (Hansung University)

Quantum Implementation and Analysis of SHA-1
Seyoung Yoon, Gyeongju Song, Kyungbae Jang and Hwajeong Seo (Hansung University)

PoC Hash: A Power-of-Commutators Hash over Hamiltonian Quaternions
Hyungrok Jo and Junji Shikata (Yokohama National University)

Session 7: AI/LLM for Security

Detecting Malicious JavaScript Code by Code-Specialized LLM
Keiichi Kinoshita and Mamoru Mimura (National Defence Academy of Japan)

A Framework for Assessing Nation-State Cyber Attack Capabilities Using MITRE ATT&CK and Large Language Models
Hyungkwan Kim, Hyunggyu Lee and Wook Shin (National Security Research Institute)

Understanding Encrypted Network Anomalies with LLMs: A Post-hoc Cognitive Framework
Seon Woo Lee (Gachon University), Hyeon Woo Park (Hoseo University) and Tae Jin Lee (Gachon University)

Session 8: Privacy & Anonymity

Towards Sender Anonymity for Singleton Sets
Yamya Reiki and Yudhveer Singh (Amity University Rajasthan)

LeakGuard: Detecting and Mitigating Attribute Leakage in Fine-Tuned Diffusion Models
A Yeon Kim, Jung Yup Rhee and Taekyoung Kwon (Yonsei University)

Privacy-Preserving Logistic Regression Using Homomorphic Encryption: An Adaptive Optimization Approach
Hye-Yeon Shim, Yeon-Ji Lee and Il-Gu Lee (Sungshin Women’s University)

Session 9: IoT & Traffic Analysis

IoT Botnet Detection Based on the Behaviors of DNS over TLS Queries
Cheng-Han Shie, Yu-Chun Tseng and Chun-I Fan (National Sun Yat-sen University)

Bootstrap-based Evaluation of Clustering Suitability Across TCP Payload Dataset Structures
Dung Ta Anh, Yasuhiro Nakamura and Hidema Tanaka (National Defense Academy of Japan)

Comparative Eval. of SSL Feature Extractors & Classifiers for DFAD
Seong Bean Park and Hyun Min Song (Dankook University)

Session 10: Poster paper Oral Session1

Machine Learning-Based Power Allocation for Secure MISO Communication Systems assisted by a Cooperative Jammer
Min Jeong Kang, Jung Hoon Lee(Hankuk University of Foreign Studies) and Il-Gu Lee (Sungshin Women's University)

Towards Symbolic Formalization of PoW Integrity in Blockchain
Kengo Matsui and Shigeki Hagihara (Chitose Institute of Science and Technology)

Secure Restricted Access Window-Based Group Coordination for Mission-Critical Low-Latency and High Throughput Applications
Seung-ha Jee, Yu-ran Jeon and Il-Gu Lee (Sungshin Women’s University)

Invisible Watermarking Based on DWT-SVD for Protecting Generative AI Content
Seo-Yi Kim, Na-Eun Park and Il-Gu Lee (Sungshin Women's University)

Security Policy Dissemination Scheme Between Satellite Ground Stations Based on CCSDS AOS Frames
Dongphil Kim (National Security Research Institute)

Security Vulnerability Analysis of Real-time Content Popularity Prediction-based Dynamic Memory Allocation System
Ga-Yeong Kim, Na-Eun Park and Il-Gu Lee (Sungshin Women's University)

Session 11: Poster paper Oral Session2

A Lightweight Authentication Scheme for Securing IoT with Dual-Layer Verification
Ye-Hyeon Ahn, Sun-Jin Lee and Il-Gu Lee (Sungshin Women's University)

Physical Layer-based Obfuscated Data Transmission Technique for Internet of Battlefield Things
Chae Yeon Park, So Eun Jeon and Il-Gu Lee (Sungshin Women's University)

Detection of Concurrent Hardware Trojan (HT) Using EM and Backscattering Side-Channel Approah
Na-Hyun Kim, Sungbin Moon, Yewon Hwang, Seungho Jung, Seong-Cheon Park and Youngjae Lee (ETRI)

Air-Gap Exfiltration via High-Order Modulation-Based Screen Saver Covert Channels: Design, Implementation, and Defense
Ye-Rim Jeong, Yeon-Jin Kim, Chae-Yeon Park and Il-Gu Lee (Sungshin Women's University)

Enhancing Inter-Satellite Link Security with Shamir’s Secret Sharing-Based Frequency Hopping
Sukyoung Kim, Soyeon Kim and Ilgu Lee (Sungshin Women’s University)

 

 

Poster Session

 

Poster Session 1
15:00 - 16:00, August 21 (Thursday), 2025
Session Chair: Joobeom Yun (Sejong University)

 

PS1-1 Smart Jamming with User Data: Redefining Wireless Secrecy in Multi-AP Networks
So-Eun Jeon (Sungshin Women's University), Jung Hoon Lee (Hankuk University of Foreign Studies) and Il-Gu Lee (Sungshin Women's University)

 

PS1-2 A Hybrid Sensitive Data Detection Framework for Structured Enterprise Data
Sobirova Khusnora Bakhtiyor Kizi, Cho Nwe Zin Latt, Eunhye-Jeong, Kyung-Hyung Rhee (Pukyong National University)

 

PS1-3 Executable Protection via TPM-Sealed Key Unsealing and Memory-Only Execution in Embedded Systems
Sayeon Kim, Olmi Lee and Woohyun Jang (LIGnex1)

 

PS1-4 BNPKM: Biometric Non-stored Private Key Management
Su Jin Shin (Pukyong National University), Siwan Noh (Dong-Eui University) and Sang Uk Shin (Pukyong National University)

 

PS1-5 DisTORbution Crawler: Active Tor Configuration for Efficient Dark Web Crawling
Chanhee Han, Kyeongseok Lee and Homook Cho (Korea Advanced Institute of Science and Technology)

 

PS1-6 Context-Aware and Attention-Driven Deepfake Detection with Enhanced Residual Architectures Regarding Generative Forgetting
So Yeon Kim, Dong Woo Lee, Seong Hyun Min, Jung Hun Lim, Ma Il Jo, In Jae Kim, Ja Sil Choi, Min Ho Jung, Sung Eun Park, Won Gyum Kim (AIDEep)

 

PS1-7 Empirical Study on Consistency of LLM-Based Policy as Code Generation for Network Policies
Seoyun Kang, Jeongeun Ryu, Yumin Lee, Jueun Son and Seongmin Kim (Sungshin Women's University)

 

PS1-8 Exploring Prompt Strategy of LLM-based PaC Generation in Kubernetes Environment
Yumin Lee, Jeongeun Ryu, Seoyun Kang, Jueun Son, Seongmin Kim (Sungshin Women's University)

 

PS1-9 A Zero Trust Based Framework for xApp Access Control in O-RAN
Jung-Hyun Mok, Sokjoon Lee (Gachon University)

 

PS1-10 A Reinforcement Learning-Based Model for Multi-Step Attack Sequence Prediction in Industrial Control Systems
JuHyeon Lee, Ilhwan Ji, Jung Taek Seo (Gachon University)

 

PS1-11 Forecasting Stock Prices in the Korean Market Using News Sentiment
Dong-Kwon Jung and Woong-Sik Kim (Konyang University)

 

PS1-12 Quantum-Secure Timestamp for the Integrity of Classical Signatures in Quantum Transition
Kyu-Hyun Kang, Jae Yoon Kim, Nam-Su Jho and Taek-Young Yoon (Dankook University)

 

PS1-13 Homomorphic Stationarity Testing using CKKS for Outsourced Time-series Data Analysis
Donghwan Lee, Hojune Shin and Younho Lee (Seoul National University of Science and Technology)

 

PS1-14 FingerRatchet: A Lightweight Anonymous P2P Protocol with Out-of-Band Fingerprint Exchange
Sehwa Ko, Kyeongmin Lee, Eunse Kang and Junyoung Son (Pusan National University)

 

PS1-15 Enhancing Private 5G Networks for IIoT: EAP-AKA’ Implementation in Open5GS
I Wayan Adi Juliawan Pawana (Kookmin University, Udayana University), Hoseok Kwon, Bonam Kim, Ilsun You (Kookmin University)

 

PS1-16 A Survey of Speculative Load Prediction Attacks Exploiting Memory Disambiguation Units
Selynn Kim, Taehun Kim and Youngjoo Shin (Korea University)

 

PS1-17 Privacy-Preserving GAN-Based Data Augmentation for Intrusion Detection Without Accuracy Degradation
Sun-Jin Lee and Il-Gu Lee (Sungshin Women's University)

 

PS1-18 Optimizing Synthetic-to-Original Data Ratio for Reliable Model Training
Yu-Na Kim, Yeon-Jin Kim and Il-Gu Lee (Sungshin Women's University)

 

PS1-19 UGVScan: Automated Tool for Multi-layer Rule Profiling on ROS 2-based UGV platforms
Hwaseong Lee, Hyunwoo Lee (Cyber Operations Command of Republic of Korea), Yongki Jung, Seongdong Heo, Moosung Park, Changon Yoo (Agency for Defense Development)

 

PS1-20 Recent Trends in Space Cybersecurity: Attack and Defense
KiHoon Kim, DongYeop Kim, TaeUk Ha, JinSoo Jang (Chungnam National University)

 

PS1-21 AnonC2PA: C2PA-based Anonymous Proof of Content Authenticity
Hye-eun Son and Hyoseung Kim (Hallym University)

 

PS1-22 Comparative Analysis of HTML Structure Between Legal and Illegal Streaming Websites
Da-hyung Kim, Jeong-hwa Ryu, Su-bin Lee, Seongmin Kim (Sungshin Women’s University)

 

PS1-23 NMEA Under Siege: Dynamic Flooding Attacks and Defenses
Taeyong Lee, Inseo You(Soonchunhyang University), Ju-Chan Kim (Dongguk University), Kyumin Lee (Inha Technical College), Hyeonggwon Jin (Sejong University), Seungwon Yang (Joongbu University), Hyeonbin Yoon (Korea University), Yonghun No (Korea University, CYTUR), Minwoo Lee (Korea Maritime & Ocean University)

 

 

Poster Session 2
16:00 - 17:00, August 21 (Thursday), 2025
Session Chair: Seyoung Lee (Kangwon National University)

 

PS2-1 Visual Tampering in S-52: Threats and Protections
Taeyong Lee (Soonchunhyang University), Inseo You (Soonchunhyang University), Ju-chan Kim (Dongguk University), Kyumin Lee (Inha Technical College), Hyeonggwon Jin (Sejong University), Seunggwon Yang (Joongbu University), Hyeonbin Yoon (Korea University), Yonghun No (CYTUR), Minwoo Lee (Korea Maritime & Ocean University)

 

PS2-2 A Method for Selecting Security Checklist Items Associated with Incidents by Analyzing Security Incident Reports and Vulnerability Checklists Using LLM
Jueon Choi (Chonnam National University), Gunjin Cha (Good First Information Technology), Misoo Kim, Ieck-Chae Eum, Kwanghoon Choi (Chonnam National University)

 

PS2-3 A Study on the Analysis and Improvement of Web-Based DRM Bypass Techniques for OTT Content Protection
Kiyeon Kim, Minyoung Choi, Jumi Kim, Eunjin Kim and Gibum Kim (Sungkyunkwan University)

 

PS2-4 PCFG-Based Framework for Cracking Korean Users’ Passwords
Yong Heon Lim, Jong Chan Seo and Hae Young Lee (Cheongju University)

 

PS2-5 Blockchain-Assisted Explainable AI Framework for Accountability in Autonomous Driving Systems
Heechan Kim, Jaehyun Kim, Kyungyun Lee and Junyoung Son (Pusan National University)

 

PS2-6 PHANTOM: Predictive Heuristic AI Network for Threat Orchestration and Mitigation
Yujeong Seo, Hyunwoo Lee (KENTECH)

 

PS2-7 Evaluating Domain-Specific Hallucinations in LLMs Triggered by Jeju Dialect Inputs
Seokjae Gwon, GyeongHoe Kim, Seyoung Lee (Kangwon National University)

 

PS2-8 Design and Implementation of a Security Vulnerability Practice Testbed in Agentic LLM Environments
Seokjae Gwon (Kangwon National University), Esther Kim (Seoul Women's University), HuiJin Lim (Mokwon University), Nahyun Kim (Seoul National University of Science and Technology), Seyoung Lee (Kangwon National University)

 

PS2-9 Forensic Analysis of Mattermost Server
Gunseung Jin, Minseo Park and Jinsoo Jang (Chungnam National University)

 

PS2-10 Multi-class Attack Detection in CAN Networks using Lightweight 1D CNN
Hyunjin Jang, Jiwon Yun, Yeonjeong Hwang, Morsheda Akter, Howon Kim and Junyoung Son (Pusan National University)

 

PS2-11 Quantum-Rekeyed Privacy for AI-Powered Financial Assistants
Wibby Aldryani Astuti Praditasari, Hyejin Yoon, Hyeongyeop Kim and Okyeon Yi (Kookmin University)

 

PS2-12 Blockchain-Assisted Handover Authentication: A Lightweight and Scalable Approach for 5G
Adi Panca Saputra Iskandar, Yongho Ko, Bonam Kim and Ilsun You (Kookmin University)

 

PS2-13 Analyzing the Limitations of CVE-Based Source-Code Vulnerability Slice Extraction
Se-Ok Jeon (Chonnam National University), SeokHwi Kim (KSign), Kwanghoon Choi (Chonnam National University)

 

PS2-14 Forensic Analysis of Siri on iOS
Hyunji Cho, Jiyeon Yang, Woojin Im and Jinsoo Jang (Chungnam National University)

 

PS2-15 Enhancing Face Forgery Detection through Dual-branch Transformer and Contrastive Pretraining
Soo In Kim (Dankook University), Seong Hyun Min, Jung Hoon Lim, Ji Young Shin, Won Gyum Kim (AIDeep Co. Ltd.)

 

PS2-16 CNN-based Trace Interval Detection for Fault Injection Point Identification on DNN Models
Yunsung Kim, Gyeongdeok An, Sangwon Lee and Jaecheol Ha (Hoseo University)

 

PS2-17 Enhancing Vulnerability Fix Commit Identification via Data Augmentation with Security Unrelated Commits
YoonJung Cho (Seoul Women's University), Jeongwoo Lee (Korea University), Baikjin Jung (Labrador labs, Inc.), Heejo Lee (Korea University)

 

PS2-18 HatBOM, An Automated Analysis Platform for SBOM and VEX Generation
Kyeongseok Yang (Korea University), Sungyu Kim (Center for Software Security & Assurance), Jeongwoo Lee, Yoongjong Na, Duyeong Kim, Heejo Lee (Korea University)

 

PS2-19 On-Device RAG System with Role-Based Document Access Control: A PropertyGPT-Based Approach
Yeonhee Kim, Soona Lee and Jongkil Kim (Ewha Womans University)

 

PS2-20 A Quantitative Assessment Framework for Cyber Incident Response Exercises in Nuclear Facilities
Dongjun Choi and Jungtaek Seo (Gachon University)

 

PS2-21 Isogeny Based Quantum Secure Bootstrapping Against Fake Base Stations in 6G Networks
Yoonsun Han, Mingi Kim, Chearin Kim and Seog Chung Seo (Kookmin university)

 

PS2-22 Quantum Machine Learning for Intrusion Detection: Analyzing QSVM on CIC-IDS2017
Shin Dawit, Cho Jaehan, Son Junyoung and Kim Howon (Pusan National University)

 

PS2-23 A New DPKI_Based Model for Certificate Validation against FBS Attacks
Mingi Kim, Yoonsun Han, Chaerin Kim and Seog Chung Seo (Kookmin University)

 

 

Poster Session 3
17:00 - 18:00, August 21 (Thursday), 2025
Session Chair: Jae Deok Lim (ETRI)

 

PS3-1 Post Quantum Cryptography Migration for IoT–NTN Communications in 6G Networks
ChaeRin Kim, YoonSun Han, MinGi Kim, Seog Chung Seo (Kookmin University)

 

PS3-2 Speak One, Leak All? Exploiting Multilingual LLMs via Monolingual Mode
Heeyeong Suh, Nayeon Ryu, Seyoung Lee (Kangwon National University)

 

PS3-3 Slope-based Sum of Absolute Differences (S-SAD) Method for Improving Pattern-matching Accuracy on Side-Channel Signal
Gyeongdeok An, Yunsung Kim, Sangwon Lee and Jaecheol Ha (Hoseo University)

 

PS3-4 A Survey on AI-Based Anomaly Detection Using Type-Specific Datasets in Industrial Control Systems
Jung Kyu Seo, Ju Hyeon Lee, Jung Taek Seo (Gachon University)

 

PS3-5 Feature Selection Optimization Based on Data Characteristics for Ransomware Detection
Chae-wan Hong, Seung-ha Jee and Il-Gu Lee (Sungshin Women's University)

 

PS3-6 Choices Beneath the Surface: How Dark Patterns Operate in Kiosk Interfaces Across Countries
Nayeon Ryu, Heeyeong Suh, Seyoung Lee (Kangwon National University)

 

PS3-7 Cooperative Machine Learning Framework for Efficient Detection of Wireless Availability Attacks in Internet of Things Networks
Min-Ji Cho, So-Eun Jeon, Il-Gu Lee (Sungshin Women's University)

 

PS3-8 Enhancing DeFi Smart Contract Security via LangChain and Retrieval-Augmented Generation
Hyo-been Cho, Nam-Ryeong Kim, Sun-Woo Jeong, Il-Gu Lee (Sungshin Women's University)

 

PS3-9 A Revocable Multimodal EEG Authentication Paradigm Using P300 Responses
Suji Park, Yeon-Ji Lee, Il-Gu Lee (Sungshin Women's University)

 

PS3-10 Improving Decision Accuracy in Multi-Sensor-Based Machine Learning Systems through Drift- Resilient Contribution Analysis
Yeon-woo Lee, Yeon-ji Lee, Il-Gu Lee (Sungshin Women's University)

 

PS3-11 An Analysis of the Impact of Dataset Preprocessing on the Performance of Homomorphic Encryption-Based Machine Learning
Su-Yeong Kim, Hye-Yeon Shim, Il-Gu Lee (Sungshin Women’s University)

 

PS3-12 Design of a Web-Based Verification Tool for Ensuring the Reliability of PQC Algorithm Implementations
Chanhyuk Kim, Changuk Jang, Okyeon Yi (Kookmin University)

 

PS3-13 Integrated Detection and Response Framework for DDoS and Ransomware Attacks
Da-eun Yu, Seung-ha Jee, Il-gu Lee (Sungshin Women’s University)

 

PS3-14 Lightweight Anomaly Detection for Internet of Things: Integrating Feature Selection and Dimensionality Reduction
Gyuha Son, Seo-Yi Kim, Il-Gu Lee (Sungshin Women’s University)

 

PS3-15 Privacy-Preserving Grid-Based Clustering of Medical Data Using Homomorphic Encryption
Chae-Won Song, Hye-Yeon Shim, Il-Gu Lee (Sungshin Women’s University)

 

PS3-16 An Integrated Privacy Decision-Making Model for Multi-Factor Authentication Adoption
Jungjoo Oh, Il-Gu Lee (Sungshin Women’s University)

 

PS3-17 Revealing Hidden Contention through Disk I/O Analysis in Multi-Tenant Containers
Mi-Yeon Kim, Sang-Hoon Choi, Ki-Woong Park (Sejong University)

 

PS3-18 Feedback-Driven False Alarm Detection for Network Attacks
Hye-Ran Jung, Yeon-Su Jeong, Seon-Woo Lee, Tae-Jin Lee (Gachon University)

 

PS3-19 A Multi-Link Selective Access Control Framework for Secure and Reliable IoT Communications
So-Yeon Kim, Il-Gu Lee (Sungshin Women’s University)

 

PS3-20 An Interference-Aware Channel Selection Algorithm for Secure and Reliable Multi-Link Operation
Ye-Sin Kim, Jin-Min Lee, Il-Gu Lee (Sungshin Women’s University)

 

PS3-21 Privacy at Risk: Evaluating Data Protection Practices in South Korea’s Leading Digital Mental Health Apps
Hye-In Lee, Hyun-Che Song, Il-Gu Lee (Sungshin Women’s University)

 

PS3-22 Dynamic Guard Interval Allocation with Opportunistic Secondary Data Transmission for Enhanced Spectral Efficiency
Jung-Min Moon, Na-Eun Park, Il-Gu Lee (Sungshin Women’s University)

 

PS3-23 OBSS Interference Management via Distributed ML-based Joint TX Power and RX Sensitivity Control
Jin-Min Lee, Hye-Yeon Shim, Il-Gu Lee (Sungshin Women’s University)

 

 

 

▶ Research Story(Crystal Hall)

 

August 21 (Thursday)

14:00~14:20 From Page to Stage: Returning to Top Security Venues / Taekyoung Kwon (Yonsei University)

14:20~14:40 Recommendations for Writing Research Papers in Security Area  /  DaeHun Nyang (Ewha Womans University)

14:40~15:00 Lesson: Simple Is Always Best / Hyunwoo Lee (KENTECH)