Accepted Poster Papers
-
PoE: A Domain-Specific Language for Exploitation
Jung Hyun Kim, Steve Gustaman, and Sang Kil Cha
-
Simplified Quantum Circuit Implementation for ASCON Security Analysis against Grover’s Algorithm
Jinseob Oh, Chanho Choi, and Dooho Choi
-
Human-to-Device (H2D) Authentication Using Biometrics
Mohammadreza Hosseinzadehketilateh, Sara Tehranipoor, and Nima Karimian
-
The Threat of Password Guessing Attacks Exploiting Linguistic Characteristics: A Case Study on the Korean Domains
Minah Chae, Wongeun Shin, Sangyun Jung, Jihun Yeom, Dongho Jeon, and Heeseok Kim
-
Toward Post-Quantum Digital Certificate for eSIM.
Qaiser Khan, Sourav Purification, Rono Cheruiyot, Jinoh Kim, Jonghyun Kim, and Sang-Yoon Chang
-
Hop-Count Authentication with Moving Keys for Mobile Ad Hoc Networks
Seonho Choi
-
Combating Deepfakes: A Novel Hybrid Hardware-Software Approach
Kamrul Hasan, Nima Karimian, and Sara Tehranipoor
-
Wireless Link Routing to Secure Against Fake Base Station in 5G
Sourav Purification, Kyungmin Park, Jinoh Kim, Jonghyun Kim, and Sang-Yoon Chang
-
ProtectNIC: SmartNIC-based Ransomware Detection
Anson Xu, Arnav Choudhury, Eason Liu, and Sean Choi
-
Analyzing the container security threat on the 5G Core Network
Jihyeon Song, Kyungmin Park, Cheolhee Park, Jonghyun Kim, and Ikkyun Kim
-
Exploring Reinforcement Learning to Aid Tor Latency Performance
Kelei Zhang and Sang-Yoon Chang
-
Side-Channel Protected PIPO Implementation in Hardware
Jaeseung Han, Yeon-Jae Kim, and Dong-Guk Han
-
Graph Neural Networks for_Network Intrusion Detection An IP Behavioral Analysis Perspective
Lee Seonwoo, Lee Juyoung, and Lee Taejin
-
5G Remote eSIM Provisioning: Blockchain-based Public Key Delivery
Raymond Cheruiyot, Sourav Purification, Simeon Wuthier, and Sang-Yoon Chang
-
Simulating Intelligent Driving Attacks to Detect Safety Failures in Autonomous
Vehicles
Carlos Hernandez, Diego Ortiz Barbosa, Luis Burbano, Younghee Park, and Alvaro A Cardenas
-
Constructing GPS Spoofing Environment Using SDR
Hoyeong Kim, Seung-A Park, Chanho Choi, Kyungmi Jung, Dooho Choi, Mee Ran Han, and Sangman Lee
-
Efficient Homomorphic PCA over Encrypted Data by CKKS using Fast Matrix-Vector Multiplication
Han Sanghoon, Shin Jaewon, and Lee Younho
-
Reliable Detection of Location Spoofing Attacks and Variants
Chiho Kim, Sang-Yoon Chang, Jonghyun Kim, Kyungmin Park, and Jinoh Kim
-
Trajectory-based Approach to UAV Location Spoofing Detection
Mincheol Shin, Sang-Yoon Chang, Jonghyun Kim, Kyungmin Park, and Jinoh Kim
-
A SCA-Resistant Lowdropout Regulator (LDO) with Power Reduction
Ayeon Gwon, Yeseul Song, Suyeon Lee, Sihyun Jung, Woong Choi, and Junwon Jeong