top of page
SVCC_2024_Banner_Image.webp


Silicon Valley Cybersecurity Conference 

June 17-19, 2024

South Korea

Screen Shot 2024-01-10 at 6_58_27 PM.webp

Note that the SVCC registered users can also attend the HackTheon Conference by 6/20.

Technically Co-Sponsored

IEEE-Logo-Watermark-1-copie.png
ieee.png
golden-svcsi.webp

Keynote Speakers

Proud to bring inspirational speakers from across the globe.
Speakers
alvaro-cardenas.webp
1574931407672_e=1713398400&v=beta&t=QBZ8a4XQ9toBBUsc2bVZJxJ4A5PSnaPI0nM4G70-iJ4.webp
스크린샷 2024-03-21 오후 12_23_20.webp
Alvaro Cardenas
Dr. David Magias
Vikrant Nanda

Associate Professor, University of California at Santa Cruz

Senior Program Manager in Security & Privacy, Google

Computer Science, IN3, Universitat Oberta de Catalunya(UOC)

CONFERENCE ORGANIZERS

General chairs

  • Nima Karimian, West Virginia University 

  • Taesoo Kim, Georgia Institute of Technology

  • Alvaro A. Cardenas, UC Santa Cruz

Program Chairs

  • Sara Tehranipoor, West Virginia University  

  • Vikrant Nanda, Google

  • Dooho Choi, Korea University

Local Chairs

  • Ikkyun Kim, ETRI

  • Jinoh Kim, Texas A&M University-Commerce

  • ​Sangman Lee, Korea University

Hackathon Chairs

  • Kelei (Jackie) Zhang, Fort Hays State University

  • Jun-Seob Kim, Korea University

Industry Program Chairs

  • Vishnu Pendyala, Chair of IEEE Computer Society in Santa Clara

  • Younghee Park, San Jose State University

Tutorial Chairs 

  • Xiaoyan Sun, Worester Polytechnic Institute

  • Gokay Saldamli, San Jose State University

Special Program & Research Forum Chairs 

  • Sang-Yoon Chang, University of Colorado, Colorado Springs

  • Woojin Seok, KISTI

  • Dong-Guk Han, Kookmin University

Publicity Chairs

  • Eric Chan-Tin, Loyola University Chicago

  • Sangman Lee, Korea University

  • Jun Dai, Worester Polytechnic Institute

  • Hwankook Kim, Sangmyung University

Publication Chairs

  • Seokhie Hong, Korea University

  • Eric Chan-Tin, Loyola University Chicago

Registration Chair

  • Hana Lee, SVCSI

Webmaster 

  • Kelsey Nguyen, San Jose State University

Technical Program Committee

(Note that this is not the final list since we are waiting for their acceptance at EasyChair. Please contact event.manager@svcsi.org if you have any questions about the PC members.)​​

  • Fatima Rivera, Google Inc.

  • Michael Maximilien, IBM

  • Daisuke Mashima, Illinois Advanced Research Center, Singapore

  • Huy Kang Kim, Korea University

  • Francesco Mercaldo, Università degli Studi del Molise, Italy

  • Kiwook Sohn, SEOULTECH

  • Shabnam Kasra Kermanshahi, UNSW, Sydney

  • Seung-Hyun Seo, Hanyang University

  • Ahyoung Lee, Kennesaw State University, USA

  • Sean Choi, Santa Clara University, USA

  • Junggab Son, University of Nevada, Las Vegas

  • Hwajeong Seo, Hansung University

  • Rakesh Datta, Microsoft

  • Sokjoon Lee, Gachon University

  • Ioannis Demertzis, UC Santa Cruz, USA

  • Nathalie Baracaldo, IBM research, USA

  • Gokay Saldamli, SVCSI

  • Yeongjin Jang, Samsung Inc.

  • Bathen, Luis, IBM research, USA

  • Jin-Hee Cho, Virginia Tech, USA

  • Sangho Lee, Microsoft Research, USA

  • Hongda Li, Palo Alto Networks, USA

  • Hongxin Hu, University at Buffalo - SUNY, USA

  • Jun Dai, Worester Polytechnic Institute

  • Lorenzo-De Carli, University of Calgary, Canada

  • Rolf Oppliger, eSECURITY Technologies, Swiss

  • Kang, Min Suk, KAIST, USA

  • Paul Wortman, University of Connecticut, USA

  • ​Byoungyoung Lee, Seoul National University, USA

  • Malek Ben Salem, Accenture Inc., USA

  • Yonghwi Kwon, University of Virgina, USA

  • Sang Kil Cha, KAIST, Korea

  • Yuseok Jeon, UNIST, Korea

  • Heejo Lee, Korea University, Korea

  • Jinoh Kim, Texas University-Commerce, USA

  • Igor Vasiltsov, Samsung Electronics, USA

  • Chang-Wu Chen, imToken, Taiwan

  • Hsiang-Jen Hong, University of Colorado, Colorado Springs, USA

  • Wenjun Fan, Xi'an Jiaotong-Liverpool University, China

  • Ben Reed, San Jose State University, USA

  • Junbeom Hur, Korea University, Korea

  • Attila Altay-Yavuz, University of South Florida, USA

  • Hyoungshick Kim, Sungkyunkwan University, USA

  • Ning Zhang, Washington University in St.Louis, USA

  • Daehee Seo, SangMyung University, Korea

  • Luca Vigano, King's College London, UK

  • Jingqiang Lin, University of Science and Technology of China, China

  • Thomas Austin, San Jose State University, USA

  • Chang, Sang-Yoon, University of Colorado, Colorado Springs, USA

  • Byeong Cheol Choi, ETRI, Korea

  • S.J. Hong, NSRI, Korea

  • Vasyltsov, Ihor, Samsung, Korea

  • Pendyala, Vishnu, San Jose State University, USA

  • Hossein Sayadi, California State University, Long Beach, USA

  • Sherry Sun, California State University, Sacramento, USA

  • Eric Chan-Tin, Loyola University, USA

  • Jun Dai, California State University, Sacramento, USA

  • Fabio Di Troia, San Jose State University, USA

  • Kyu Hyung Lee, University of Georgia, USA

  • Sara Tehranipoor, West Virginia University, USA

  • Chintan Bhat, Pandit Deendayal Energy University, India

  • Antonio Mauro, University of Northwest, Italy

  • Lei Xu, University of Texas Rio Grande Valley, USA

  • Carlos Rubio Medrano, Texas A&M University Corpus Christi, USA

  • Arman Roohi, University of Nebraska at Lincoln, USA

  • Francesco Mercaldo, Università degli Studi del Molise, Italy

  • Terrence O'Connor, Florida Institute of Technology, USA

  • Young Choi, Regent University, USA

  • Sangwon Hyun, Myongji University, South Korea

  • Sven Dietrich, The City University of New York, USA

  • Hyo Jung Song, San Francisco State University, USA

  • Subhash Lakshminarayana, University of Warwick, School of Engineering, UK

  • Arman Roohi, University of Nebraska-Lincoln, USA

  • Younghyun Oh, IBM

  • Xiaoyan Sun, Worester Polytechnic Institute

 

 

Conference Program Overview

SVCC 2024 has various programs: 5 distinguished keynote speakers from industry and academia, various research tracks, a research poster session, a tutorial session, and two special sessions including AI Security on Tuesday and Quantum Security on Wed. In addition, students can participate in a cybersecurity competition (called HackTheon) and you can also attend the industry exhibitions on Wed.

Beyond the conference program, conference users will build up a great professional network throughout the SVCC 2024 event. 

Here is the summary of program 

  1. Five Distinguished Keynote Speakers on 6/17-6/19, 2024

  2. Three Research Paper Sessions on 6/17-6/18, 2024

  3. Poster Competitions on 6/17/2024

  4. A Tutorial Session on 6/17/2024

  5. Two Special Security Sessions on 6/18 - 6/19/2024

  6. Industry Presentation on 6/17/2024

  7. The HackTheon Cybersecurity Final Competition at 10 a.m. - 6 p.m. on 6/19/2024

  8. The 2024 HackTheon Sejong ICT Exhibition will be on 6/19 - 6/20/2024 all day.

Keynote Speakers

  • Keynote Speaker #1: Yuseung Kim

    • Short Bio: Yuseung Kim has been working on the analysis of threats in mission-critical systems including telecommunication systems, medical devices, connected-automated vehicles, mobility services, and the development of countermeasures. He received PhD in Electrical and Computer Engineering from Carnegie Mellon University and was a member of the Mobile, Embedded, Wireless Security group led by Dr. Patrick Tague.

    • Title: Cybersecurity perspectives on rapidly evolving industries 

    • Abstract: More than ever we are now experiencing the technological advances directly shifting our daily life. Retrospecting the past decade, cybersecurity professionals would be able to observe how different industries have reacted against the rapidly evolving threat landscape. From those lessons, we as a cybersecurity community would hopefully anticipate and prepare for the upcoming challenges.

  • Keynote Speaker #2: Guofei Gu

    • Short Bio: Dr. Guofei Gu is a professor and holder of the Eppright Professorship in Engineering at the Department of Computer Science & Engineering at Texas A&M University (TAMU). Before coming to Texas A&M, he received his Ph.D. degree in Computer Science from the College of Computing, Georgia Institute of Technology. His research interests are in network and systems security. Dr. Gu is a recipient of the 2010 NSF CAREER Award, 2013 AFOSR Young Investigator Award, 2010 IEEE S&P Best Student Paper Award, 2015 ICDCS Best Paper Award, 2022 ASIACCS Best Paper Award, Texas A&M Dean of Engineering Excellence Award, and Presidential Impact Fellow, among several others. He is an active member of the security research community and has pioneered several new research directions such as botnet detection defense and SDN security. Dr. Gu has frequently served on the program committees of top-tier security conferences such as IEEE S&P, ACM CCS, USENIX Security, and NDSS. He is an IEEE Fellow and an ACM Distinguished Member. He is currently directing the SUCCESS Lab at TAMU.​

    • Title: Revisiting Security in the Age of Software-Defined Everything

    • AbstractSoftware is not only eating the world, but also defining the new world. With the increasing examples such as software-defined compute/storage (aka, cloud), software-defined networking, software-defined radio/5G, and software-defined vehicle, we are now living in a world of software-defined everything (SDx). Infosys estimated that the global SDx market will reach USD 160 billion by 2024 and grow at a compound annual growth rate of 25%. The security of SDx is becoming more interesting and important. On one hand, SDx presents new attack surfaces and security challenges. On the other hand, SDx also provides new opportunities to rethink the design of security. In this talk, we will revisit the security at both sides and demonstrate with our recent research results. In particular, we show that we can well leverage software-defined principles to enhance zero-trust security and design new programmable security frameworks, thus also making this software-defined world more secure. 

  • Keynote Speaker #3: Alvaro Cardenas

    • Short Bio: Alvaro A. Cardenas is an Associate Professor of Computer Science and Engineering at the University of California, Santa Cruz. Before joining UCSC he was the Eugene McDermott Associate Professor of Computer Science at the University of Texas at Dallas, a postdoctoral scholar at the University of California, Berkeley, and a research staff member at Fujitsu Laboratories. He holds M.S. and Ph.D. degrees from the University of Maryland, College Park, and a B.S. from Universidad de Los Andes in Colombia. His
      research interests focus on the security and privacy of emerging technologies and cyber-physical systems,
      including autonomous vehicles, drones, and SCADA systems controlling the power grid and other critical
      infrastructures.​

    • Title: A Tale of Two Industroyers: It was the Season of Darkness 

    • Abstract: In this talk, we discuss the first two known pieces of malware that attempted to create power grid blackouts. While previous research had described the malware at a high level, in this talk, we take a deep dive into the payload targetting the operational equipment of power grid networks. Our findings include new malware behavior that was not previously documented, the software bugs of the malware, and the evolution of attacks against the power grid in Ukraine. We end our talk by discussing how similar malware may evolve in the future and the risks they pose to the power grid. 

  • Keynote Speaker #4: Vikrant Nanda

    • Short Bio: Vikrant Nanda is an engineering leader and people manager at Google, where he currently heads Information Integrity & Data Protection for Google Search. Over the course of his career, Vik has created strategic programs and led diverse teams across a range of industries: Banking & Financial Services, Consulting, Internet, and Telecom. Along the way, he has also tinkered with startup ideas in education, and mentors many brilliant minds to help them achieve the next step in their journey. He also serves as VP and Industry Leader for the Silicon Valley Cybersecurity Institute (SVCSI). Vik holds a Bachelor’s degree in Electrical & Computer Engineering from Cornell University and an MBA from the Indian Institute of Management at Ahmedabad. He is also credentialed as a CISSP and CIPP/US.​

    • Title: Adventures in Security, Privacy, and Risk

    • Abstract: What does an Electrical Engineer + MBA have to do with Information Security, Privacy, and Risk? What does the career graph of an industry practitioner look like in our field? Are there key insights or perspectives we can glean for the future? In this talk, I will share my career journey spanning almost two decades, sampling some of the “big” problems tackled across industry sectors and layers of the tech stack. Taking a reflective approach, I will track major platform shifts and draw out some inspiring themes from a multi-disciplinary adventure.

  • Keynote Speaker #5: David Magias

    • Short Bio: Prof. David Megías is a full Professor and the Principal Investigator of the KISON research group of the Internet Interdisciplinary Institute (IN3), at the Universitat Oberta de Catalunya (UOC). He received a Ph.D. degree in computer science from the Universitat Autònoma de Barcelona (UAB) in July 2000. Since October 2001, he has been at the UOC in a permanent position (currently as Professor). At the UOC, he held several academic positions, until he was appointed director of the IN3 in April 2015. His current teaching is mostly related to computer networks, information security (watermarking and steganography), and research techniques and methodologies in network and information technologies. His current research interests focus on information security and privacy, and include the security and privacy in multimedia content distribution (mainly in the watermarking and fingerprinting topics), steganography and steganalysis, and privacy concerns in different applications of decentralized networks. He has published more than 130 research papers in numerous international journals and conferences, 42 of them in journals indexed in JCR, and has participated in several national joint research projects both as a contributor and as principal investigator. He has supervised four doctoral theses and is a member of the editorial board and program
      committees of several journals and conferences in security and privacy.​

    • Title: Data Hiding in the Third Millennium: From Traditional Applications to Emerging Scenarios

    • Abstract: Data hiding techniques have evolved significantly, offering diverse applications within cybersecurity and privacy frameworks. From safeguarding user privacy during multimedia content streaming to bolstering cybersecurity in IoT networks through its integration with machine learning, data hiding plays a crucial role. However, this evolution also presents challenges as malicious actors exploit these techniques for harmful purposes. This keynote provides an overview of traditional data hiding applications while highlighting current trends, including the emerging use of watermarking in disinformation detection. It explores prospective uses of data hiding in enhancing information security and privacy, while also addressing potential threats posed to users and society when these techniques are misused.

Special Sessions

  • Session 1: Hands-on Tutorial Session about Anonymous Network on Monday (6/17/2024)
    • Speaker: Jackie Zhang, University of Colorado Colorado Springs/Fort Hays State University, USA 
  • Session 2: Poster Competition on Monday (6/17/2024) at 3-6 p.m. 
  • Session 3: AI Security on Tuesday (6/18/2024)
    • Talk ​Title #1: Understanding and Mitigating the Risks of LLMs in Security-Critical Applications
      • Ting Wang, Stony Brook University, USA
        Abstract: The recent advances in large language models (LLMs) have led to their increasing use in security-critical applications (e.g., code generation, threat detection, and information forensics). However, our understanding of the potential risks associated with deploying LLMs in these settings is still largely lagging behind. In this talk, I will share two of our ongoing studies aimed at understanding and mitigating the security risks of LLMs in critical environments, including i) detecting and counteracting LLM-based backdoor attacks and ii) developing self-destructive LLMs to prevent malicious modifications. I will also highlight several areas that merit further investigation.
        Bio: Ting Wang is currently an Associate Professor and Empire Innovation Scholar in the Computer Science Department at Stony Brook University. His research explores the intersection of machine learning, privacy, and security, aiming to develop safe and trustworthy artificial intelligence (AI) technologies. His recent work focuses on enhancing AI methods and systems across three major areas: security assurance, privacy preservation, and decision-making transparency. Prior to joining Stony Brook, Dr. Wang was an Associate Professor in the College of IST at Penn State. His research has been extensively published in leading computer security and machine learning venues and has received multiple best paper awards and media coverage. Dr. Wang completed his Ph.D. at Georgia Tech and his undergraduate studies at Zhejiang University.
    • Talk Title #2: Improved Time-Series Anomaly Detection from Data Augmentation and Valuation
      • Gihyuk Ko, KAIST, South Korea
      • Bio: Gihyuk Ko is a Senior Research Scientist / Leader of the AI Security Research Team at Cyber Security Research Center (CSRC), KAIST. He received his B.S. degree in Electrical and Computer Engineering from Seoul National University, Korea, and his M.S. and Ph.D. candidacy in Electrical and Computer Engineering from Carnegie Mellon University, Pittsburgh. His research mostly focuses on using formal methods to analyze and enhance security, privacy, and fairness of artificially intelligent systems. He is also interested in improving performance, robustness and privacy of ML systems based on input or neural explanations. He was a recipient of the Distinguished Paper Award in USENIX Security 2023. He served as a co-workshop chair of WiseML 2024. He has also served as External Reviewer in a number of security- and privacy-related symposiums and journals, including IEEE S&P, ACM CCS, PoPETs, IEEE TDSC, and more.
    • Talk Title #3: Sensing and Machine Learning to Secure Networking ​
      • ​Sang-Yoon Chang, University of Colorado, Colorado Spring, USA​

      • Abstract: Sensing and data collection play critical roles in artificial intelligence. The success and effectiveness of the machine learning models and intelligence processing rely on the quality of the data they ingest. In this research talk, I will share how prototype implementations and simulations for sensing and collecting data enable AI and ML research. More specifically, I will share how we adapt our system implementations and simulations to apply ML to secure networking in the contexts of cryptocurrency blockchain (requiring anonymity and distributed computing) and 4G/5G mobile networks (using open-source implementations).

      • Bio: Sang-Yoon Chang is an Associate Professor at the Computer Science (CS) Department at University of Colorado Colorado Springs (UCCS). My main research interest is in security of networked systems. He is the PI and the Director of the CyberCorps Scholarship for Service (SFS) program at UCCS and he is also the board member and part of the executive team at Silicon Valley Cybersecurity Institute (SVCSI). He received my PhD and Bachelor's degrees from the Electrical and Computer Engineering (ECE) department of University of Illinois at Urbana-Champaign (UIUC) in 2013 and 2007, respectively. . Before joining UCCS CS, I was a postdoctoral fellow at Advanced Digital Sciences Center (ADSC), a UIUC research center at Singapore.

    • Talk Title #4: From Vulnerability to Defense: The Role of Large Language Models in Enhancing Cybersecurity​​
      • Yassine Himeur, University of Dubai, Dubai
      • Bio: Dr. Yassine Himeur is presently an Assistant Professor of Engineering & Information Technology at the University of Dubai. He completed both his M.Sc. and Ph.D. degrees in Electrical Engineering in 2011 and 2015, respectively. Following his doctoral studies, he obtained the Habilitation to Direct Research, which granted him the official authorization to supervise research, in July 2017. His academic journey led him to join the faculty at the University of Dubai after serving as a Postdoctoral Research Fellow at Qatar University from 2019 to 2022. Prior to that, he held the position of Senior Researcher from 2013 to 2019 at the Algerian Center for Development of Advanced Technologies (CDTA), where he also served as the Head of the TELECOM Division from 2018 to 2019. Throughout his career, he has been actively involved in conducting R&D projects and has played a significant role in proposing and co-leading several research proposals under the NPRP grant (QNRF, Qatar). With more than 150 research publications in high-impact venues, he has made valuable contributions to the field. He was honored to receive the Best Paper Award at the 11th IEEE SIGMAP in Austria in 2014 and the Best Student Paper Award at IEEE GPECOM 2020 in Turkey. His current research interests encompass AI/ML/DL, Generative AI, Big Data and IoTs, Healthcare Technologies, Recommender Systems, Building Energy Management, and Cybersecurity.
    • Talk Title #5: DeepVoice Detection: A Practical Approach
      • ​Souhwan Jung, Soongsil University, South Korea

      • Bio: Souhwan Jung is a professor at the School of Electronic Engineering in Soongsil University, Seoul, Korea since 1997. He has spent about 25 years on the area of information security. He served as a government R&D program director of information security during 2009–2010. He also served as the president of KIISC in 2020. Currently, he leads an AI security research center (AISRC) funded by government since 2020. AISRC focuses on developing robust and trustworthy AI systems. Currently, seven faculty members from three universities and six companies are participating in the consortium. His research interest includes deep voice detection and other AI security issues.
  • Session 4: Quantum Security on Wed. (6/19/2024)
    • Talk Title #1: Quantum security evaluation and Migration plan for PQC in Korea
      • Yousung Kang, ETRI, South Korea
      • Abstract: With the acceleration of quantum computing development, expectations for its utilization are rising. While there are bright prospects, there also exists a threat that it could break existing cryptographic systems. In response to such threats, many mathematicians and cryptographers are taking the lead in developing Post-Quantum Cryptography (PQC). This talk introduces a methodology for analyzing the strength of existing cryptographic algorithms and PQC algorithms, along with ETRI's development results. Additionally, it briefly outlines Korea's PQC transition policy and plans. This talk expected to be helpful in understanding a new PQC-based cryptographic infrastructure for preparing for the quantum era.
      • Bio: Dr. Yousung Kang joined Electronics and Telecommunications Research Institute (ETRI) in 1999, and he is now the Director leading ETRI’s Cryptography and Authentication Research Section. He was a visiting researcher at Queen’s University Belfast, Northern Ireland, UK, from 2011 to 2012. Since 2004, he has been the IT international standard expert of Telecommunications Technology Association (TTA). He has successfully led several government R&D projects related to cybersecurity, including international collaborative project. He obtained his BS and MS in Electronics Engineering from Chonnam National University, Gwangju, Korea in 1997 and in 1999, respectively. He received his Ph.D in Electrical and Electronic Engineering from KAIST, Daejeon, Korea in 2015. His research interests include quantum security, drone/IoT security, key-hiding technology, side channel analysis, and the areas of cryptographic engineering.
    • Talk Title #2: Towards an Interoperable Quantum Safe Network
      • Hao Qin, National Quantum Office, Singapore
      • Bio: Hao Qin is a senior researcher in National Quantum-Safe Network, affiliated with Centre for Quantum Technologies (CQT), National University of Singapore (NUS). He is the co-chair of Quantum Communication Networks Task Force under Infocomm Media Development Authority (IMDA) in Singapore. He has been contributing to standardization works on quantum communication in ITU-T, ISO and ETSI. He is the NUS focal point for ETSI and ITU. He has more than ten years of academic and industry experiences on quantum communication. His research focus on practical aspects of quantum communication, including implementation security & testing, key managements, use cases, standardization & certification.
    • Talk Title #3: Post Quantum Cryptography for Space based Applications
      • Ayesha Khalid, Queen's University (QUB), UK
      • Bio: Dr. Ayesha Khalid is a Senior Lecturer in the Centre for Secure Information Technologies (CSIT) at the Queen’s University Belfast (QUB), where she leads the research in Post-Quantum Cryptography. She has been co investigator of Innovate UK funded Project Agile Quantum Safe Communications (called AQuaSec), EPSRC funded UK Quantum Communications Hub and the Rolls Royce funded Cyber Technology Research Network project SEQURED with Carnegie Mellon and Purdue. She is a senior member of IEEE and member of the IEEE Technical Committee on VLSI Systems and Applications (VSA). Her expertise lies in the design, optimization, and implementation of quantum secure cryptography hardware targeting embedded devices.
    • Talk Title #4: InterQnet: A System Approach to Realize a Scalable Quantum Network
      • Rajkumar Kettimuthu, Argonne National Lab, USA
      • Bio: Dr. Rajkumar Kettimuthu is a Computer Scientist and Group Leader at Argonne National Laboratory, a Senior Scientist at The University of Chicago and a Senior Fellow at Northwestern University. His research interests include AI for science, advanced wired and wireless communications for science, and Quantum networks. Data transfer tools developed by him and his colleagues are used by numerous scientific communities across the world to move multiple Petabytes of data every day. He has co-authored 150+ peer-reviewed articles. He is a recipient of the prestigious R&D 100 award. He is a distinguished member of ACM and a senior member of IEEE.
    • Talk Title #5: Quantum Key Distribution: Network System R&D and Use-case Trials
      • Yoshimichi Tanizawa, Toshiba, Japan
      • Bio: Yoshimichi Tanizawa is a chief research scientist at Toshiba Corporation Corporate Research & Development Center. His research interests include QKD (quantum key distribution) and its network system technologies. He is a vice chairperson of Quantum Key Distribution Technology Promotion Committee, Quantum ICT Forum. He was a recipient of the IPSJ Best Paper Award in 2012 and the Best Paper Award at SAINT 2012. He is rapporteur of ETSI GS QKD 014 “Quantum Key Distribution (QKD); Protocol and data format of REST-based key delivery API” in ETSI ISG-QKD.
    • Talk Title #6: Research on Quantum-secured Networking: Network Perspective
      • Chankyun Lee, KISTI, South Korea
      • Bio: Dr. Chankyun Lee is a senior researcher in Quantum Network Research Center at KISTI since June 2019. Before joining the center, he was a senior researcher at Samsung Electronics from Jan. 2018 to Dec. 2017. He received his Ph.D degree in Electrical Engineering from KAIST in 2016. He also received his M.S. and B.S. in the same school in 2011 and in 2009. ​
  • Session 5: Industry Security Forum & HackTheon  ICT Industry Exhibition on 6/19/2024 

SVCC 2024 Accepted Posters

  • PoE: A Domain-Specific Language for Exploitation

       Jung Hyun Kim, Steve Gustaman, and Sang Kil Cha

  • Simplified Quantum Circuit Implementation for ASCON Security Analysis against Grover’s Algorithm

       Jinseob Oh, Chanho Choi, and Dooho Choi

  • Human-to-Device (H2D) Authentication Using Biometrics

       Mohammadreza Hosseinzadehketilateh, Sara Tehranipoor, and Nima Karimian

  • The Threat of Password Guessing Attacks Exploiting Linguistic Characteristics: A Case Study on the Korean Domains

       Minah Chae, Wongeun Shin, Sangyun Jung, Jihun Yeom, Dongho Jeon, and Heeseok Kim

  • Toward Post-Quantum Digital Certificate for eSIM.

       Qaiser Khan, Sourav Purification, Rono Cheruiyot, Jinoh Kim, Jonghyun Kim, and Sang-Yoon Chang

  • Hop-Count Authentication with Moving Keys for Mobile Ad Hoc Networks

       Seonho Choi

  • Combating Deepfakes: A Novel Hybrid Hardware-Software Approach

       Kamrul Hasan, Nima Karimian, and Sara Tehranipoor

  • Wireless Link Routing to Secure Against Fake Base Station in 5G

       Sourav Purification, Kyungmin Park, Jinoh Kim, Jonghyun Kim, and Sang-Yoon Chang

  • ProtectNIC: SmartNIC-based Ransomware Detection

       Anson Xu, Arnav Choudhury, Eason Liu, and Sean Choi

  • Analyzing the container security threat on the 5G Core Network

      Jihyeon Song, Kyungmin Park, Cheolhee Park, Jonghyun Kim, and Ikkyun Kim

  • Exploring Reinforcement Learning to Aid Tor Latency Performance

       Kelei Zhang and Sang-Yoon Chang

  • Side-Channel Protected PIPO Implementation in Hardware

      Jaeseung Han, Yeon-Jae Kim, and Dong-Guk Han

  • Graph Neural Networks for_Network Intrusion Detection An IP Behavioral Analysis Perspective

       Lee Seonwoo, Lee Juyoung, and Lee Taejin​

  • 5G Remote eSIM Provisioning: Blockchain-based Public Key Delivery

       Raymond Cheruiyot, Sourav Purification, Simeon Wuthier, and Sang-Yoon Chang

  • Simulating Intelligent Driving Attacks to Detect Safety Failures in Autonomous
    Vehicles

       Carlos Hernandez, Diego Ortiz Barbosa, Luis Burbano, Younghee Park, and Alvaro A Cardenas

  • Constructing GPS Spoofing Environment Using SDR

       Hoyeong Kim, Seung-A Park, Chanho Choi, Kyungmi Jung, Dooho Choi, Mee Ran Han, and Sangman Lee

  • Efficient Homomorphic PCA over Encrypted Data by CKKS using Fast Matrix-Vector Multiplication

       Han Sanghoon, Shin Jaewon, and Lee Younho

  • Reliable Detection of Location Spoofing Attacks and Variants

       Chiho Kim, Sang-Yoon Chang, Jonghyun Kim, Kyungmin Park, and Jinoh Kim

  • Trajectory-based Approach to UAV Location Spoofing Detection

       Mincheol Shin, Sang-Yoon Chang, Jonghyun Kim, Kyungmin Park, and Jinoh Kim

  • A SCA-Resistant Lowdropout Regulator (LDO) with Power Reduction

       Ayeon Gwon, Yeseul Song, Suyeon Lee, Sihyun Jung, Woong Choi, and Junwon Jeong
 

  • On the Quantum Resource Estimation of Grover for Searching Vectors in Quantum Sieve
    Seong-Min Cho, Changyeol Lee, Seung-Hyun Seo

 

  • Quantum Circuit Designs of Efficient Squaring 

               Changyeol Lee, Seong-Min Cho, Seung-Hyun Seo

image.png
bottom of page