August 23-25, 2023
MAISON GLAD, Jeju Island, Korea

Accepted Posters



Poster Sessions

Poster Session 1: 15:00 - 16:30, August 24 (Thursday), 2023

 

A Survey on Attack Cases with Living-Off-The-Land Techniques in Windows and Linux

Gyuhyun Jeon, Seungho Jeon and Jung Taek Seo (Gachon University)
 

Data Calibration to Enhance Security and Accuracy of Federated Learning

Na-Eun Park, So-Yeon Kim, Yuran Jeon, Seoyi Kim and Il-Gu Lee (Sungshin Women's University)
 

Anomaly Detection using LSTM-Based Autoencoder with Time Series Dataset over a network

Hyewon Suk and Minsuk Kim (Sangmyung University)
 

V2V-MHT: Accelerated V2V Authentication Framework using Merkle Hash Tree

YoonSun Han, YoungBeom Kim and Seog Chung Seo (Kookmin University)
 

Vehicle CAN Network Imbalance Intrusion Detection and Explanation Based on XGBoost and SHAP

Thi-Thu-Huong Le, Naufal Suryanto, Aji Teguh Prihatno, Yustus Eko Oktian, Hyoeun Kang and Howon Kim (Pusan National University)
 

Enhancing Cyber Strategies through Reinforcement Learning: A CyberBattleSim (CBS)

Bumsok Kim, Minsuk Kim, Junghyun Kim, Yonghoon Choi and Seungseo Roh (Sangmyung University)
 

A Model for Collecting and Analyzing Network Logs DataSets

Jaehan Jeong and Go Woong (Korea Internet & Security Agency)

 

Decision Tree Based Poising Backdoor Attacks and Mutation model SPRT detection defense in NSL-KDD Dataset

Jinhyeok Jang, Yoonsoo An, Dowan Kim and Daeseon Choi (Soongsil University)

 

A Method of GML-based Software Structuring for Verification of Open-source Software License Compatibility

Won-Bin Kim, Yongjoon Joe, Kyung-Yeob Park and Dong-Myung Shin (LSware Inc.)

 

Designing a Deceptive Honeypot Architecture for Industrial Control Systems

Dong-Hyuk Shin, Jong-Bum Lee and Ieck-Chae Euom (Chonnam National University)

 

Suboptimal Feature Selection Technique for Efficient Machine Learning-based Malicious Traffic Detection

So-Eun Jeon, Ye-Sol Oh, Ye-Seul Kil, Yeon-Ji Lee and Il-Gu Lee (Sungshin Women's University)

 

Identity Concealing Steganography-based Data Sharing Mechanism

Jinsu Kim and Namje Park (Jeju National University)

 

Poster: SGX-Enabled Edge Cloud Architecture for Secure Data Augmentation

Jiwon Ock and Seongmin Kim (Sungshin Women's University)

 

Solid Pod-based Medical Data Sharing System to Ensure Data Sovereignty

Sohui Kim, Minjeong Kim and Il-Gu Lee (Sungshin Women's University)

 

A Study on Establishing a Secure Remote Work Environment in a VDI Environment Based on Zero Trust

Chang Hoon Kim (Daegu University), Howon Kim (Pusan National University), Sokjoon Lee (Gachon University), Young Rang Kim (Pribit Technology) and Jungsoo Park (Hoseo University)

 

 Analyzing Risk Attitudes in DeFi Crypto Credit Lending through On-chain Data

Simon Oh, Yeongjae Shin (Pusan National University), Uk Jo, Hyoeun Kang (SmartM2M), Kyeongwoo Oh, Jaehyun Kim, Bogeum Kim, Hyejin Sim, Changwoo Choi and Howon Kim (Pusan National University)

 

Parameter Optimization Techniques for Privacy and Utility Trade-off of Differential Privacy

Jung-Hwa Ryu, Sun-Jin Lee, Hye-Yeon Shim and Il-Gu Lee (Sungshin Womens' University)

 

A Study on Digital Human Ownership Management Techniques in Metaverse Based on NFT

Changhyun Roh, Changjun Choi, HyunSoo Kim and DongMyung Shin (LSWare Inc.)

 

Exploring Hybrid Quantum-Classical Approaches for Information Security

Dedy Septono Catur Putranto, Rini Wisnu Wardhani and Howon Kim (Pusan National University)

 

Analysis of International Trends for the Introduction of Zero Trust

Jeong Hyeop Hong, Sun Woo Kim, Ui Hyun Park and Kyung-ho Son (Kangwon National University)

 

TrustVoice: Detecting Voice Phishing Apps Using Their Runtime Behaviors

Chanjong Lee and Hyoungshick Kim (Sungkyunkwan University)

 

The RSA Algorithm’s Quantum Cryptanalysis Posture

Rini Wisnu Wardhani, Dedy Septono Catur Putranto and Howon Kim (Pusan National University)

 

Blockchain-based Zero Trust System for Medical Data Exchange

Yohan Kim, Hanho Jeong, Jaehan Cho, Donggyu Kim, SangBong Oh and Howon Kim (Pusan National University)

 

Metaverse Copyright Ownership Verification using Redundant Verification for Virtual Performance

Won-Bin Kim, Changhyun Roh, Yongjoon Joe and Dong-Myung Shin (LSware Inc.)

 

 

Poster Session 2: 16:30 - 18:00, August 24 (Thursday), 2023
 

Physical Layer Security Mechanism for Secure Trigger- based Uplink Multi-User Transmission

So-Hyun Park and Il-Gu Lee (Sungshin Women's University)

 

Efficient Implementation of Kyber on MSP430 Environment

DongHyun Shin, YoungBeom Kim and Seog Chung Seo (Kookmin University)

 

Optimization Study of Parallel Implementation for Scrypt: A Memory Hard Function

Seongjun Choi, Dongcheon Kim and Seog Chung Seo (Kookmin University)

 

High-Performance Kyber Implementation on ARMv7 Neon Technology

YoungBeom Kim (Kookmin University), Jeonghwan Shin, Hojoong Park (KT R&D Center Infra DX Lab), and Seog Chung Seo (Kookmin University)

 

Defense Against Adversarial Evasion Attacks on Self-Driving Car Using Image Quantization

Seungyeol Lee, Hyeonro Lee and Jaecheol Ha (Hoseo University)

 

Face Verifiable Anonymization in Video Surveillance

Sungjune Park, Hyunsik Na, Seungmin Kim and Daeseon Choi (Soongsil University)

 

A Multi-step Framework for Botnet Attack Detection in IoT Environment

Hojun Jin, Seungho Jeon and Jung Taek Seo (Gachon University)

 

Implementation of Montgomery Reduction and Butterflies for CRYSTALS-Dilithium on RISC-V

Yongryeol Choi, YoungBeom Kim and Seog Chung Seo (Kookmin University)

 

The Sky's Betrayal: Drone Hijacking on DJI Enhanced WiFi Protocol

Derry Pratama (Pusan National University), Jaegeun Moon (SmartM2M), Agus Mahardika Ari Laksmono, Dongwook Yun, Byeonguk Jeong, Iqbal Muhammad (Pusan National University), Janghyun Ji (SmartM2M) and Howon Kim (Pusan National University)

 

Efficient Implementation of Multiplication Reduction over NIST Prime P-384 for 8-bit AVR Processor

Mingi Kim, YoungBeom Kim and Seog Chung Seo (Kookmin University)

 

A Study on Tor Traffic Identification Technology for Blocking Dark Web Access in a LAN Environment

Hongbi Kim, Daeil Jang and Seunggoo Ji (Korea Internet & Security Agency)

 

Contact PUF: Highly Stable Physical Unclonable Functions Based on Contact Failure Probability in 180 nm, 130 nm, and 28 nm CMOS Processes

Duhyun Jeon (ICTK Holdings), Dongmin Lee and Byong-Deok Choi (Hanyang University)

 

An Implementation of Lightweight RISC-V Trusted Execution Environment with Memory Encryption and Task Isolation

Woojung Park, Janghyun Ji and Jaegeun Moon (SmartM2M)

 

Strengthening Secure Payment Systems in 5G-based IoT: A Comprehensive Analysis of Tokenization and PCI DSS Compliance

Hyeon No, Heekyung Shin, Jiwon Ock, Yeeun Kim and Seongmin Kim (Sungshin Women's University)

 

Tri-band-based Wi-Fi Indoor Localization to Defend against Jamming Attacks

Jin-Min Lee, Na-Yeon Shin, Jung-Hyun Moon and Il-Gu Lee (Sungshin Women's University)

 

On Secrecy of RSMA-enabled UAV Downlink Communications: Problem and Research Trends

Tri-Hai Nguyen, Heejae Park and Laihyuk Park (Seoul National University of Science and Technology)

 

Accelerating Key Derivation Function on GPU Architectures

Dong-Cheon Kim and Seog Chung Seo (Kookmin University)

 

Enhancing Robustness of Self-Driving Car Regression Models through Feature Squeezing

Hyeonro Lee, Seungyeol Lee, Seongwoo Hong and Jaecheol Ha (Hoseo University)

 

Privacy-Preserving DTx Data with Differential Privacy

Gee-Hee Yun and Kyoung-Jin Kim (Sungshin Women's University)

 

Side Channel Attack Resistant Binarized Neural Network Accelerator

Junho Lee, Haeyoung Kim, Dongwook Yun and Howon Kim (Pusan National University)

 

Tabling GHASH in LEA-GCM on GPU and Optimization

Jaeseok Lee, Dongcheon Kim and Seog Chung Seo (Kookmin University)

 

Research on Identification of Cyber Attacker Groups and Interpretation of Results

Sungtaek Oh and Woong Go (Korea Internet Security Agency)

 

Evaluation Criteria for Cyberattack Scenarios Used in Training Exercises

Insung Song, Seungho Jeon and Jung Taek Seo (Gachon University)

 

Malextension: Malicious Extension to Hack Your Browser

Jiwon Jang, Ye-Sol Oh ((Sungshin Women's University), and Il-Gu Lee (Sungshin Women's University)