Loading...

 Online Proceeding  

Track 1 + Main Session  : Live (3 Days) Yotube Live

Track 2 : Live (3 Days) Yotube Live

Track 3 : Live (3 Days) Yotube Live


 Keynote Session  

 Keynote/Special Session
No. Time Title/authors/Institution PDF
Keynote-1
Dec. 16, 2025
14:00 ~ 15:00
Cellular Metasploit: A Penetration Testing Framework for Cellular Networks
Yongdae Kim (KAIST, South Korea)
Keynote-2
Dec. 16, 2025
15:15 ~ 16:15
Quantum Technologies for Anomaly Detection in Future Networks
Christian Esposito (University of Salerno, Italy)
Keynote-3
Dec. 17, 2025
13:30 ~ 14:30
Post-Quantum Advanced Cryptography and its Application to B5G
Junji Shikata (Yokohama National University, Japan)
Special Session Invited Speaker
Dec. 17, 2025
09:00 ~ 10:45
First-Order Theories for Secure Protocol Proofs: From Indistinguishability to Overwhelming Truth
Gergei Bana (Keio University, Japan)


 Oral/Poster Presentation  

 Oral Presentation
Session Article Id Time Title/authors/Institution Abstract
1A-1
1
Dec. 16, 2025 09:00 ~ 10:30
TGPOA: Task and Geography Privacy-Preserving Offloading Algorithm in 6G Network
Aoran Huang, Huachun Zhou (Beijing Jiaotong University)
1A-2
2
Dec. 16, 2025 09:00 ~ 10:30
Proxy-CAN: Multi-Resolution Feature Fusion for In-Vehicle Signal Regression
Woong Kyo Jung, Byung-Il Kwak, Meelan Han (Korea University)
1A-3
3
Dec. 16, 2025 09:00 ~ 10:30
Error-driven Prompting Strategy to enhance Policy as Code Generation for Kubernetes
Jeongeun Ryu, Jueun Son, Yumin Lee, Seoyun Kang, Seongmin Kim(Sungshin Women’s University)
1A-4
4
Dec. 16, 2025 09:00 ~ 10:30
Development and Evaluation of a Disaster Response Task Visualization SystemAimed at Supporting Decision-Making by Local Government Employees
Yuta Seri, Tomoyuki Ishidan (Fukuoka Institute of Technology)
1A-5
5
Dec. 16, 2025 09:00 ~ 10:30
Federated Learning-based Intrusion Detection System for Internet of AutonomousVehicles against Poisoning Attacks
Ulysses Lam, Hyunjae Kang, Dan Dongseong Kim (The University of Queensland)Jin-Hee Cho (Virginia Tech)Hyuk Lim (Korea Institute of Energy Technology)Terrence Moore, Frederica Free-Nelson (US DEVCOM Army Research Laboratory)
1B-1
6
Dec. 16, 2025 09:00 ~ 10:30
PoisoningGuard: An Agentic LLM Framework for Explainable Red-Teaming Against Poisoning Attacks
Junseok Shin, Jinhyuk Jang, Daeseon Cho (Soongsil University)
1B-2
7
Dec. 16, 2025 09:00 ~ 10:30
Self-HarmLLM: Can Large Language Model Harm Itself
Heehwan Kim, Sungjune Park, Daeseon Choi (Soongsil University)
1B-3
8
Dec. 16, 2025 09:00 ~ 10:30
Beyond Fixed and Dynamic Prompts: Embedded Jailbreak Templates for Advancing LLM Security
Hajun Kim, Hyunsik Na, Daeseon Choi (Soongsil University)
1B-4
9
Dec. 16, 2025 09:00 ~ 10:30
On the Effectiveness of Instruction-Tuning Local LLMs for Identifying SoftwareVulnerabilities
Sangryu Park, Gihyuk Ko, Homook Cho (KAIST Cyber Security Research Center)
1B-5
10
Dec. 16, 2025 09:00 ~ 10:30
Aligning AI-Driven Cyber Threat with Policy Responses: A CCI-Based Framework
Su Kyeong Heo, Jungmin Kang, Dooho Choi (Korea University)
1C-1
11
Dec. 16, 2025 09:00 ~ 10:30
VoiceShield: Real-Time Speech Protection with Preserved Machine Recognizability
Jeeeun Park, Soona Lee, Yeonhee Kim, Gyurim Kim, Jongkil Kim (Ewha Womans University)
1C-2
12
Dec. 16, 2025 09:00 ~ 10:30
Preliminary Visualization of Outdoor Video Content Using Principal ComponentAnalysis
Kaoru Sugita (Fukuoka Institute of Technology)
1C-3
13
Dec. 16, 2025 09:00 ~ 10:30
From Cookie and Passport.js to JWT: Secure and Scalable Web Authentication
Cheng-Yuan Ho, Yi-Shiuan Lin, Yi-Jhen Li, Li-Sheng Wei, Tai-Ju Yang, Meng-Syuan Tsai (National Taiwan University)
1C-4
14
Dec. 16, 2025 09:00 ~ 10:30
Analysis of a Cybersecurity Training Curriculum for Nuclear Facilities and Suggestions for Improvement
Sooyon Seo, Dongmin Kim, Damin Kim, Moohong Min (Sungkyunkwan University)Jae-Jun Han, Junghyun Na, Hyun-Kyung Lee (Korea Institute of Nuclear Nonproliferation and Control)Aram Kim (Suwon University)
1C-5
15
Dec. 16, 2025 09:00 ~ 10:30
Adaptive Privacy-Preserving Framework for Network Traffic Anomaly Detection
Yu-ran Jeon, Seungha Jee, Su-Kyoung Kim, Il-Gu Lee(Sungshin Women’s University)
2A-1
16
Dec. 16, 2025 10:45 ~ 12:00
3D5G-O: DDoS Detection and Defense System of 5G on O-RAN
Shih-Ting Chiu, Fang-Yie Leu, Kun-Lin Tsai (Tunghai University)Heru Susanto (Universiti Teknologi Brunei)
2A-2
17
Dec. 16, 2025 10:45 ~ 12:00
Field Validation of Multiple IoT Sensors for Detecting Geographical Phenomena in an Early Warning System for Heavy Rainfall
Noriki Uchida, Tomoyuki Ishida (Fukuoka Institute of Technology)Yoshitaka Shibata (Iwate Prefectural University)
2A-3
18
Dec. 16, 2025 10:45 ~ 12:00
IWOA-LightGBM: A Hybrid Optimization Approach for Sensor Data Anomaly Detection
Rong Huang (The Academy of Digital China (Fujian))Qiqiang Wu, Mingwei Yang, Yanhua Liu (Fuzhou University)(Engineering Research Center of Big Data Intelligence, Ministry of Education)Baokang Zhao (National University of Defense Technology)
2A-4
19
Dec. 16, 2025 10:45 ~ 12:00
The Effect of Increased Dimensionality on Detecting Malicious IoMT Network Traffic
Jayden Alonzo-Estrada, Anthony Mora, Abraham Avila, Ram Basnet (Colorado Mesa University)
2B-1
20
Dec. 16, 2025 10:45 ~ 12:00
An Efficient Revocable Attribute-based Encryption Scheme Supporting DataIntegrity
Yue Zhang, Meijuan Huang (Baoji University of Arts and Sciences)Bo Yang (Shaanxi Normal University)Haijun Liu (Shaanxi Aerospace Time Navigation Equipment Co.,Ltd)
2B-2
21
Dec. 16, 2025 10:45 ~ 12:00
Deniable Kyber: A Post-Quantum Deniable KEM Scheme
Shih-Ming Sun, Po-Wen Chi (National Taiwan Normal University)
2B-3
22
Dec. 16, 2025 10:45 ~ 12:00
Multi-Keyword Searchable Identity-Based Proxy Re-Encryption with Validity Period Control from Lattices
Er-Shuo Zhuang, Kai-Him Lam, Ming-Feng Tsai, Wei-Cheng Hung, Chun-I Fan(National Sun Yat-sen University)
2B-4
23
Dec. 16, 2025 10:45 ~ 12:00
Multi-Authority Attribute-Based Multi-Keyword Searchable Encryption with Dynamic Membership from Lattices
Er-Shuo Zhuang, Wei-Lin Lai, Xu-Zhi L, Chun-I Fan (National Sun Yat-sen University)
2C-1
24
Dec. 16, 2025 10:45 ~ 12:00
An LLM-Based Method for the Analysis of Multiple Network Behaviors
Sinuo Zhang, Aoran Huang, Huachun Zhou (Beijing Jiaotong University)
2C-2
25
Dec. 16, 2025 10:45 ~ 12:00
Autoencoder-Based Multi-Classification for TCP Attack Detection in Private 5GNetwork
Jinha Kim, Seung Joon Na, Hwankuk Kim (Kookmin University)Nakyung Lee (Sangmyung University)
2C-3
26
Dec. 16, 2025 10:45 ~ 12:00
Impact of Data Extraction Methods on Pseudo-Label Quality in Malicious BehaviorDetection of Encrypted Network Traffic
Chaeeun Won, Yeasul Kim, Hwankuk Kim (Kookmin University)
2C-4
27
Dec. 16, 2025 10:45 ~ 12:00
A Cross-Modal Deep Learning Framework for Joint Semantic and Structural Threat Detection in Provenance Graphs
Seong-Su Yoon, Hui-Seok Yang, Ieck-Chae Euom (Chonnam National University)
3A-1
28
Dec. 16, 2025 16:30 ~ 18:00
Hybrid Quantum Key Distribution and Post-Quantum Cryptography for Secure 5G-AKA Authentication with Forward Secrecy
Wibby Aldryani Astuti Praditasari (Universitas Pertahanan Indonesia)Hyejin Yoon, Hyeongyeop Kim, Okyeon Yi (Kookmin University)
3A-2
29
Dec. 16, 2025 16:30 ~ 18:00
Known IV attack on PANAMA Stream Cipher using Grover’s Algorithm
Rajeswari S, Kunwar Singh, Sanakaranarayanan R (National Institute of Technology)
3A-3
30
Dec. 16, 2025 16:30 ~ 18:00
Isogeny-based KEMs for TLS 1.3: A Comparative Study of CSIDH/PEGASIS and POKÉ
Hyungrok Jo, Shunsuke Toyoda, Junji Shikata (Yokohama National University)
3A-4
31
Dec. 16, 2025 16:30 ~ 18:00
Quantum-Enhanced Detection Mechanisms for Mobile Network Security
Antonio Baggiano, Franco Cirillo, Christian Esposito (University of Salerno)
3A-5
32
Dec. 16, 2025 16:30 ~ 18:00
Multivariate Quadratic Signatures in the NIST Process: A Survey and ComparativeAnalysis
Jian Zhang (Graduate School of Hanyang University)Seong-Min Cho (Electronics and Telecommunications Research Institute (ETRI))Seung-Hyun Seo (Hanyang University ERICA)
3B-1
33
Dec. 16, 2025 16:30 ~ 18:00
Key management mechanism with non-stored and user authentication-based key recovery
Su Jin Shin, Kyung-Hyune Rhee (Graduate School Pukyong National University)Siwan Noh (Dong-Eui University)Kyung-Hyune Rhee (Pukyong National University and the Industrial Science Technology Research Institute)Sang Uk Shin (Pukyong National University)
3B-2
34
Dec. 16, 2025 16:30 ~ 18:00
Lightweight Time-Indexed Secure Communication Protocol with Dual-LayerDefense for UAV Swarm Networks
Kun-Lin Tsai, Guo-Wei Wang, Fang-Yie Leu, Chao-Tung Yang (TungHai University)
3B-3
35
Dec. 16, 2025 16:30 ~ 18:00
Privacy-Preserving Zero Trust Network Access Control System Using ChameleonHash Functions and Fully Homomorphic Encryption
Ankita Jagadish, Hideaki Miyaji, Noriaki Kamiyama (Ritsumeikan University)
3B-4
36
Dec. 16, 2025 16:30 ~ 18:00
A Scripting Language for Security Patching in Open RAN
Dong Hyeok Kim, Jinseo Lee, Min Suk Kang (KAIST)
3B-5
37
Dec. 16, 2025 16:30 ~ 18:00
An Anomaly Detection Using Multi-Modal Datasets in Industrial Control Systems
Yunsung Kim, Gyeongdeok An, Jaecheol Ha (Hoseo University), Jongbae Hwang (NNSP Inc)
3C-1
38
Dec. 16, 2025 16:30 ~ 18:00
IoMT-Driven Emergency Data Access for Unidentified and Unconscious Patients in Road Accidents Leveraging Privacy-Preserving Blockchain Protocols and Cryptographic Primitives
V Maruthi, Kunwar Singh (National Institute of Technology)Sk Karthika (Vellore Institute of Technology)
3C-2
39
Dec. 16, 2025 16:30 ~ 18:00
ZKR-TEE: A Zero-Knowledge Rollup Framework in Trusted ExecutionEnvironments
Gianni Canavero, Gaurav Choudhary, Nicola Dragoni (Technical University of Denmark)
3C-3
40
Dec. 16, 2025 16:30 ~ 18:00
Circuit Normalization Bottlenecks in Trivial Zero-Knowledge Decision TreeEvaluation
Kai-Che Shih, Tzu-Yu Fan Chiang, Wen-Chi Lai, Tzu-Chen Huang, Chen-Hao Kao, Yu-Chi Chen(National Taipei University of Technology)Wei-Chung Teng (National Taiwan University of Science and Technology)
3C-4
41
Dec. 16, 2025 16:30 ~ 18:00
HEPFS: Homomorphic Encryption-based Privacy Forwarding Scheme for Efficient Ciphertext-Domain Routing
Jianbang Chen, Yizhong Hu, Jianfeng Guan (Beijing University of Posts and Telecommunications)
4A-1
42
Dec. 17, 2025 09:00 ~ 10:30
Reconstruction attack on Wi-Fi sensing obfuscation
Chae-Yeon Park, So-Eun Jeon, Il-Gu Lee (Sungshin Women's University)
4A-2
43
Dec. 17, 2025 09:00 ~ 10:30
Service-level Threat Scenarios and Resilience Approaches in Private 5G Networks
Seungjoon Na, Jinha Kim and Hwankuk Kim (Kookmin University)
4A-3
44
Dec. 17, 2025 09:00 ~ 10:30
Toward Agentic AI in 6G Security: Specialized Small Language Model for False Base Station Detection
I Wayan Adi Juliawan Pawana, Vincent Abella, Hoseok Kwon, Bonam Kim, Ilsun You (Kookmin University)
4A-4
45
Dec. 17, 2025 09:00 ~ 10:30
Cooperative Global Detection with Dynamic Multi-Link Recovery for Jamming Resilience of Internet of Things
Min-Ji Cho, So-Eun Jeon, Il-Gu Lee (Sungshin Women's University)
4A-5
46
Dec. 17, 2025 09:00 ~ 10:30
Semantic Relations Analysis of Safety and Security Requirementsin Industrial Control Systems using Natural Language Inference
Joon-Seok Kim, Ka-Kyung Kim, Ieck-Chae Euom (Chonnam National University)
4B-1
47
Dec. 17, 2025 09:00 ~ 10:30
VulnRemediate AI : An Integrated Framework for Semantic Vulnerability Detectionand Generative Remediation
Pranta Mazumder, Raj Mutsuddy, Adnan Mobarok, Nay Nang, Mahir Daiyan, Arbid Chakma, Tanjim Mahmud (Rangamati Science and Technology University)Rakhimjon Rajapboyevich Rakhimov (Urgench State University Urgench)Sabirov Sardor (Mamun University)Barno Matchanova (Urgench state pedagogical institute)Kuanishbay Kenesbaevich Seitnazarov (Nukus state pedagogical institute)Mohammad Shahadat Hossain (University of Chittagong)Karl Andersson (Lule˚a University of Technology)
4B-2
48
Dec. 17, 2025 09:00 ~ 10:30
Embedding Semantic Backdoors into AI-Powered Anomaly Detection Models in Industrial Control Systems
Ka-Kyung Kim, Joon-Seok Kim, Ieck-Chae Euom (Chonnam National University)
4B-3
49
Dec. 17, 2025 09:00 ~ 10:30
Design and Implementation of an AI-based IDS xApp for Open RAN
Hyeonsoo Yu, Suhyeon Lee, Hwankuk Kim (Kookmin University)
4B-4
50
Dec. 17, 2025 09:00 ~ 10:30
Implementing an Image-based Intruder Detection System using YOLOtalk
Yun-Wei Lin, Min-Tong Lin (National Yang Ming Chiao Tung University)
4B-5
51
Dec. 17, 2025 09:00 ~ 10:30
Security Evaluation Frameworks for AI Agents: A Comparative Analysis and Future Directions
Seong Bean Park, Hyun Min Song (Dankook University)
4C-1
W1
Dec. 17, 2025 09:00 ~ 10:30
Toward Quantum-Resilient eSIM Provisioning: Integrating ML-KEM and OQS-TLSinto Consumer RSP
Jhury Kevin Lastre, Hoseok Kwon, Bonam Kim, Ilsun You (Kookmin University)
4C-2
W2
Dec. 17, 2025 09:00 ~ 10:30
Formal Verification of the PRINS: Secure Application Layer Protection for 5G Roaming
Tae Ho Won, Bonam Kim, Ilsun You (Kookmin University)
4C-3
W3
Dec. 17, 2025 09:00 ~ 10:30
Adaptive Circuit Breaker Configuration for Transition from Istio Sidecar to Ambient Mode
Jiwon Yoo, Seoyeon Kang, Kahyun Kim, Hyeyeon Hyeon, Seongmin Kim (Sungshin Women’s University)
4C-4
W4
Dec. 17, 2025 09:00 ~ 10:30
Prompt-Conditioned Scene Reconstruction based on StableDiffusion for Investigative Hypothesis Testing
Jeong-Hwa Ryu, Da-Hyung Kim, Su-bin Lee, Seongmin Kim (Sungshin Women’s University)
4C-5
W5
Dec. 17, 2025 09:00 ~ 10:30
A Prefetch-based LLM System Using Response Reuse
Yeonju Han, Sohyun Park, Il-Gu Lee (Sungshin Women’s University)
5A-1
52
Dec. 17, 2025 10:45 ~ 12:00
Slicing and Filtering security orchestration for cyberattacks mitigation in 5G/6G networks
Diego Sánchez García, Pablo Benlloch-Caballero, Jorge Bernal Bernabe, Jose Maria Alcaraz Calero, Alejandro Molina Zarca, Antonio Fernando Skarmeta Gómez(University of Murcia)
5A-2
53
Dec. 17, 2025 10:45 ~ 12:00
Deriving Security Controls through Verification on Open-Source 5G Testbeds
Toshiro Sawamoto, Mio Suzuki, Takahiro Kasama and Koji Nakao(National Institute of Information and Communications Technology (NICT))Yutaro Osako (The University of Osaka)
5A-3
54
Dec. 17, 2025 10:45 ~ 12:00
Private 5G Security Assessment Framework: Development and Validation from Testbed to Operational Network
Jieon Oh, Youngjae Kim, Bonam Kim, Ilsun You (Kookmin University)
5A-4
55
Dec. 17, 2025 10:45 ~ 12:00
XDP-FlowOpt: Lightweight Flow Optimization for 5G Private Networks
Yongyoon Shin, Jonghoon Lee, Mikyong Han, Hoonki Lee, Nohsam Park, Jungtae Kim, Jonggeun Park (ETRI)
5B-1
56
Dec. 17, 2025 10:45 ~ 12:00
Toward Formal Analysis of the IVXV Voting Protocol using ComputationallyComplete Symbolic Attacker
Hideki Sakurada (ZEN University)
5B-2
57
Dec. 17, 2025 10:45 ~ 12:00
Symbolic Formalization of PoW Integrity in Blockchain
Kengo Matsui (Chitose Institute of Scince and Technology)Shigeki Hagihara (Chitose Silicon Research Center)
5B-3
58
Dec. 17, 2025 10:45 ~ 12:00
A PBFT-Based Consensus Approach for Secure ENC Update Protocol
Seungbin Lee, Soowang Lee, Jiyoon Kim (Gyeongsang National University)
5C-1
W6
Dec. 17, 2025 10:45 ~ 12:00
Information Leakage Attacks on Air-Gapped Systems UsingInaudible-Band Multi-Element Encoding
Ye-Rim Jeong, Yeon-Jin Kim, Il-Gu Lee (Sungshin Women’s University)
5C-2
W7
Dec. 17, 2025 10:45 ~ 12:00
Deepfake Dataset Privacy: A Comprehensive Survey and Framework for Safer Sharing
Ayoung Jeon, Yu-ran Jeon, Il-Gu Lee (Sungshin Women’s University)
5C-3
W8
Dec. 17, 2025 10:45 ~ 12:00
Energy-Efficient Deep Q-Learning Framework for Federated-Inspired CooperativeControl in Overlapping Wi-Fi Networks
Jin-Min Lee, Hye-Yeon Shim, Il-Gu Lee (Sungshin Women’s University)
6A-1
59
Dec. 17, 2025 15:00 ~ 16:15
A Comparative Analysis of Cyber Attacks against Satellite Internet
Seungjin Baek, Hocheol Nam, Min Suk Kang (KAIST)
6A-2
60
Dec. 17, 2025 15:00 ~ 16:15
Intelligent Orchestration Method for Cybersecurity Services in Satellite-Terrestrial Integrated Network
Wangjian Zhou, Xiaojing Fan, Huachun Zhou (Beijing Jiaotong University)
6A-3
61
Dec. 17, 2025 15:00 ~ 16:15
Machine Learning-Based Power Allocation for Covert Communication in LEO-UAV Cooperative Networks
Minjeong Kang, Jung Hoon Lee (Hankuk University of Foreign Studies)Il-Gu Lee (Sungshin Women’s University)
6A-4
62
Dec. 17, 2025 15:00 ~ 16:15
Secure Satellite Communication Using Shamir’s Secret Sharing-Based Frequency Hopping Technique
Kim Su-Kyoung, Kim So-Yeon, Lee Il-Gu (Sungshin Women’s University)
6B-1
63
Dec. 17, 2025 15:00 ~ 16:15
UE-Guard: Formal Specification-Based Cellular Attack Detection of False Base Stations and Signal Overshadowing
Vincent Abella, Ilsun You (Kookmin University)Philip Virgil Astillo (University of San Carlos)I Wayan Adi Juliawan Pawana (Udayana University)
6B-2
64
Dec. 17, 2025 15:00 ~ 16:15
A Hybrid EDHOC Protocol
Seonghan Shin (National Institute of Advanced Industrial Science and Technology (AIST))Adi Panca Saputra Iskandar, Yongho Ko, Ilsun You (Kookmin University)
6B-3
65
Dec. 17, 2025 15:00 ~ 16:15
Unified Formal Verification of Security Requirements in the TLS Family
Yongho Ko, Hoseok Kwon, Ilsun You (Kookmin University)
6B-4
66
Dec. 17, 2025 15:00 ~ 16:15
A Scneario Generation for Model-based Testing of TLS using Maude Strategy
Jaehun Lee, Kyungmin Bae (Pohang University of Science and Technology)
7A-1
67
Dec. 18, 2025 9:00 ~ 10:45
ET-BERT with Adapter Fusion: Time-Efficient Continual Learning Framework for Encrypted Traffic Classification
Minsu Kim, Daeho Choi, Younghyo Cho, Changhoon Lee, Kiwook Sohn(Seoul National University of Science and Technology)Yeog Kim (Research Center of Electrical and Information Technology)Jungsuk Song (Korea Institute of Science and Technology Information)
7A-2
68
Dec. 18, 2025 9:00 ~ 10:45
Split Credential Authentication: A Privacy-Preserving Protocol with Decoupled Authority and Issuer Roles
Nuttapong Attrapadung, Goichiro Hanaoka, Keisuke Hara, Ryuya Hayashi, Takahiro Matsuda(National Institute of Advanced Industrial Science and Technology (AIST))Junichiro Hayata, Masaki Kamizono, Hiroshi Kumagai, Kenta Nomura, Tsunekazu Saito, Yuta Takata (Deloitte Tohmatsu Cyber LLC)
7A-3
69
Dec. 18, 2025 9:00 ~ 10:45
Ghost Recon: An Orchestration-based, Non-Intrusive, Persistent MultimodalAuthentication System
Su-Hyeok Jang, Jin-yoon Jeong, Seo-hyun Lee, Hye-Lim Jung, Ki-Woong Park (Sejong University)
7A-4
70
Dec. 18, 2025 9:00 ~ 10:45
An Efficient Security Protocol for Bluetooth Secure Simple Pairing Based on ID-Based Signature
Bae Woori, Youn Taek-Young (Dankook University)
7A-5
71
Dec. 18, 2025 9:00 ~ 10:45
Non-Recoverable Signature: Digital Signatures Torelant to Partial Disclosures
Daiki Sasame, Sohto Chiku and Junji Shikata (Yokohama National University)Keisuke Hara (National Institute of Advanced Industrial Science and Technology (AIST))
7A-6
72
Dec. 18, 2025 9:00 ~ 10:45
Education Framework of SOME/IP Security Enhancement through Game-Based Learning and Testing Tool Development
Johee Park, Sung Bum Park, Dong Hoon Lee (Korea University)
7B-1
73
Dec. 18, 2025 9:00 ~ 10:45
Power-Saving IoT Anomaly Detection: Pareto Front-Optimized Dynamic Tuner
Gyuha Son, Seo-Yi Kim, Il-Gu Lee (Sungshin Women’s University)
7B-2
74
Dec. 18, 2025 9:00 ~ 10:45
Real-time Channel Adaptive Guard Interval Adjustment and Secondary Data Transmission Framework
Jung-Min Moon, Na-Eun Park, Il-Gu Lee (Sungshin Women’s University)
7B-3
75
Dec. 18, 2025 9:00 ~ 10:45
Protecting the Preamble: An Adaptive Scheduling Approach for Reliable Multi-Link Operation
Ye-Sin Kim, Jin-Min Lee, Il-Gu Lee (Sungshin Women’s University)
7B-4
76
Dec. 18, 2025 9:00 ~ 10:45
Adversarial Attacks on Plausibility Checks in V2X Security
Jungwoo Park, Kunho Park, Sanghoon Jeon (Kookmin University)
7B-5
77
Dec. 18, 2025 9:00 ~ 10:45
Design and Evaluation of a Management Target Control Mechanism in a Function for Tracing Diffusion of Classified Information on KVM
Hideaki Moriyama (Ariake College)Toshihiro Yamauchi, Hideo Taniguchi (Okayama University)Masaya Sato (Okayama Prefectural University)
7C-1
S1
Dec. 18, 2025 9:00 ~ 10:45
One Passport to Govern Them All: Bringing Order to IoT Security and Compliance
Sara Nieves Matheu Garcia, Antonio Skarmeta (University of Murcia)
7C-2
S2
Dec. 18, 2025 9:00 ~ 10:45
Replicating Network Topologies through the use of LLMs
Ramon Sanchez-Iborra, Jorge Gallego Madrid, Antonio Skarmeta (University of Murcia)Javier Prieto, Mahmoud Abbasi (University of Salamanca)
7C-3
S3
Dec. 18, 2025 9:00 ~ 10:45
Prioritized Multi-Criteria Optimization for Efficient Cloud-Native ApplicationResource Allocation
Polyzois Soumplis, Georgios Kontos, Konstantinos Christodoulopoulos, Aristotelis Kretsis, Panagiotis Kokkinos, Emmanouel Varvarigos
7C-4
S4
Dec. 18, 2025 9:00 ~ 10:45
Enhancing Privacy in Multi-Domain Network Intent Negotiation
Pedro Martinez-Julia, Ved Kafle, Hitoshi Asaeda(National Institute of Information and Communications Technology)Diego Lopez (Telefonica I+D)Antonio Skarmeta (University of Murcia)
7C-5
S5
Dec. 18, 2025 9:00 ~ 10:45
Defending Minds, Not Just Machines: An Agentic Approach to Cognitive Security
Roberto Gonzalez, Jaime Fúster, Michele Gucciardo, Davide Sanvito, Giuseppe Siracusano,Roberto Bifulco (NEC Labs)
7C-6
S6
Dec. 18, 2025 9:00 ~ 10:45
Lightweight Secure Federated Learning for Energy-Constrained IoT :A Case Study in Smart Irrigation
Zohra Dakhia (University Federico II of Naples)Massimo Merenda (University Mediterranea of Reggio Calabria)Adrián Cánovas-Rodríguez, Aurora González-Vidal, Antonio Fernando Skarmeta-Gómez(University of Murcia)Mariateresa Russo (University Mediterranea of Reggio Calabria)
8A-1
78
Dec. 18, 2025 11:00 ~ 12:00
Invisible Watermarking with DWT-SVD for Safeguarding Copyrighted Imagesagainst Unauthorized Generative AI Training
Seo-Yi Kim, Na-Eun Park, Il-Gu Lee (Sungshin Women’s University)
8A-2
79
Dec. 18, 2025 11:00 ~ 12:00
Hidden in the Noise: Noise-Embedded Watermarking for Black-Box ImageClassifiers
Yeon-Ji Lee, Hye-Yeon Shim, Yeon-Woo Lee, Su-Ji Park, Il-Gu Lee(Sungshin Women’s University)
8A-3
80
Dec. 18, 2025 11:00 ~ 12:00
Cross-Artifact Comparative Analysis of Legal and Illegal Streaming Sites
Su-bin Lee, Da-hyung Kim, Jeong-hwa Ryu, Seongmin Kim (Sungshin Women’s University)
8B-1
81
Dec. 18, 2025 11:00 ~ 12:00
Spatio-Temporal Adaptive Reinforcement Learning for Task Offloading in Mobile Edge Computing
Boyao Qu, Mingqiang Zhu, Tianhao Peng, Boyang Shang, Yuyin Ma
8B-2
82
Dec. 18, 2025 11:00 ~ 12:00
Drain-Like Log Parsing for Distributed Systems: Efficient Template Mining on HDFS Datasets
Gobinda Bhattacharjee, Joy Dey, Soumitra Biswas, Jannatul Sifat, Nusrat Neha, Sufal Chakma,Tanjim Mahmud (Rangamati Science and Technology University)Nazokat Tukhtaeva (Termez University of Economic and Service)Yuldasheva Gulora (Urgench State University)Bekzod Madaminov (Mamun University)Barno Matchanova (Urgench state pedagogical institute)Mohammad Shahadat Hossain (University of Chittagong)Karl Andersson (Lulea University of Chittagong)
8B-3
83
Dec. 18, 2025 11:00 ~ 12:00
Friendly-fire: Measurement and Analysis of the Interaction Dynamics Between Anti-Malware and PETs
Carl Dickinson, Shishir Nagaraja and Mujeeb Ahmed (Newcastle University) Amin Sahebi (CAME Entrotec Ltd)
8C-1
84
Dec. 18, 2025 11:00 ~ 12:00
Binary Lifting into LLVM IR with Large Language Models
Sieun Jo, Jiwon Lee, Dong Hoon Lee, Wonsuk Choi (Korea University)
8C-2
85
Dec. 18, 2025 11:00 ~ 12:00
Classification of Tor Metadata Combinations for Investigation
Yiseul Choi, Junga Kim, Seongmin Kim (Sungshin Women’s University)
8C-3
86
Dec. 18, 2025 11:00 ~ 12:00
ObfSwin: Transformer-based Multi-class Obfuscation Classification for Windows Portable Executable
Junhyuk Kang, Jaewoo Lee, Wonsuk Choi, Dong Hoon Lee (Korea University)

 Poster Presentation
Session Article Id Time Title/authors/Institution Abstract
P-1
P-1
Dec. 17, 2025 16:30 ~ 17:15
Analyzing Temporal Effects of Cumulative Malicious User Injections in Sequential Recommendation
Minje Kim, Sang-Min Choi (Gyeongsang National University)
P-2
P-2
Dec. 17, 2025 16:30 ~ 17:15
TLSVerifier: An Automated TLS software Verification Tool Using Model-Based Testing
Jaedeok Lim, Minsuk Choi (ETRI)
P-3
P-3
Dec. 17, 2025 16:30 ~ 17:15
A Detection Framework for Identity Protection in Cloud-Based 5G Core Networks
Mirae Kim, Mijin Shin, Hyunji Lee, Seongmin Kim (Sungshin Women's University)
P-4
P-4
Dec. 17, 2025 16:30 ~ 17:15
A Multi-Agent Framework for Autonomous Generation and Validation of IaC and PaC
Jueun Son, Jeongeun Ryu, Seongmin Kim (Sungshin Women's University)
P-5
P-5
Dec. 17, 2025 16:30 ~ 17:15
Open-Source Software Supply Chain Attacks: Workflow and Recent Cases
Yejun Lee, HyoJin Jo (Yonsei University)
P-6
P-6
Dec. 17, 2025 16:30 ~ 17:15
A Rate-Distortion Framework for Compressing User Interaction Sequences with Adaptive Preference Disentanglement
Wooseung Kang, Sang-Min Choi (Gyeongsang National University)
P-7
P-7
Dec. 17, 2025 16:30 ~ 17:15
An Analysis of Gemini on the Malicious Use of Generative AI for Email Phishing and Malware Creation
Jaebin Lee, Minjung Yoo, Seunghyun Park, Seongmin Kim (Sungshin Women’s University)
P-8
P-8
Dec. 17, 2025 16:30 ~ 17:15
Explainable Adversarial-Robust Vision-Language-Action Model for Robotic Manipulation
Ju-Yong Kim, Ji-Hong Park, Myeongjun Kim, Gun-Woo Kim (Gyeongsang National University)
P-9
P-9
Dec. 17, 2025 16:30 ~ 17:15
Adaptive Circuit Breaker Thresholds in Istio: Comparative Analysis of Sidecar and Ambient Modes
Seoyeon Kang, Jiwon Yoo, Kahyun Kim, Hyeyeon Hyeon, Seongmin Kim (Sungshin Women’s University)
P-10
P-10
Dec. 17, 2025 16:30 ~ 17:15
Fortifying Federated Learning: Advanced Mitigation Strategy for Data Poisoning Attacks
Ming-Feng Tsai, Tao Ban, Takeshi Takahashi, Tomohiro Morikawa, Chun-I Fan (National Sun Yat-sen University, NICT, University of Hyogo)
P-11
P-11
Dec. 17, 2025 16:30 ~ 17:15
Forensic Analysis of Data Leakage Indicators in Mobile Gemini User Content Interactions
Yewon Kim, Minjung Yoo, Seunghyun Park, Seongmin Kim (Sungshin Women's University)
P-12
P-12
Dec. 17, 2025 16:30 ~ 17:15
Automated Allowed-Only Detection Scenario Based on AWS CloudTrail and Athena
Yeeun Shin, Sunwoo Kwon, Soomin Nam, Seongmin Kim (Sungshin Women's University)
P-13
P-13
Dec. 17, 2025 16:30 ~ 17:15
Dynamic Privilege Validation in AWS Environments via CloudTrail-Athena Analysis
Soo-Min Nam, Sun-Woo Kwon, Ye-Eun Shin, Seongmin Kim (Sungshin Women's Univeristy)
P-14
P-14
Dec. 17, 2025 16:30 ~ 17:15
A Survey of MCP Environments: Threats, Vulnerabilities, and Evaluations
Hyungbeom Jang, Hyojin Jo (Yonsei University)
P-15
P-15
Dec. 17, 2025 16:30 ~ 17:15
Spike-Aware Local Music Recommendation: Detecting Event-Driven Anomalies for Secure Streaming
Tae-Han Kim, Sang-Min Choi (Gyeongsang National University)
P-16
P-16
Dec. 17, 2025 16:30 ~ 17:15
Training-to-Runtime Supply Chain Attacks on AI Agents
Ilhwan Ha, Suwon Lee (Gyeongsang National University)
P-17
P-17
Dec. 17, 2025 16:30 ~ 17:15
OpticalFBP: A Deep Optical Imaging Model for Privacy-Protective Facial Beauty Prediction
Jiho Bae, Minjae Lee, Suwon Lee (Gyeongsang National University)
P-18
P-18
Dec. 17, 2025 16:30 ~ 17:15
A Realistic Multi-Modal Attack for LiDAR Systems
Minjae Lee, Jiho Bae, Ungsik Kim, Suwon Lee (Gyeongsang National University)
P-19
P-19
Dec. 17, 2025 16:30 ~ 17:15
CPU-Based Optimizations Do Not Transfer to CUDA k-Means under Homomorphic Encryption
Ungsik Kim, Suwon Lee (Gyeongsang National University)
P-20
P-20
Dec. 17, 2025 16:30 ~ 17:15
LLM-based Detection Framework of Memory Vulnerabilities in Stripped Binaries
Youngho Choi, Geumhwan Cho, Dooho Choi (Korea University)
P-21
P-21
Dec. 17, 2025 16:30 ~ 17:15
An Optimization Algorithm for Medical Tabular Data Analysis Using Machine Learning and Deep Learning
So-Hee Lim, Yu-Jin Ha, Jong-Chan Park, Gun-Woo Kim (Gyeongsang National University)
P-22
P-22
Dec. 17, 2025 16:30 ~ 17:15
Structure-Aware NGAP Fuzzer Design for Procedural and State Anomaly Analysis
Nakyung Lee, Youngseo Nam, Jinha Kim, Hwankuk Kim (Sangmyung University, Kookmin University)
P-23
P-23
Dec. 17, 2025 16:30 ~ 17:15
A MITRE ATT&CK-Based Anomaly Detection System Using Privacy-Preserving Security Data
Yeon-Woo Lee, Yeon-Ji Lee, Il-Gu Lee (Sungshin Women's University)
P-24
P-24
Dec. 17, 2025 16:30 ~ 17:15
Predictive Clock-Drift-Aware Wake-up Correction for Wireless Sensor Networks
Hongil Ju, Jongsik Moon, Dongho Kang (ETRI)
P-25
P-25
Dec. 17, 2025 16:30 ~ 17:15
Maritime Cybersecurity: Operational Threat Analysis and Defensive Strategies in OT·IT Convergence
Sarang Na, Seongmin Park, Daeun Kim, Jingang Kim, Jinseong Lee (KISA)
P-26
P-26
Dec. 17, 2025 16:30 ~ 17:15
Effective Strategies for Implementing and Operating a Zero Trust Environment
Seulgi Choi, Jiyong Choi, Youngju Lee, Byungwook Ha (KISA)
P-27
P-27
Dec. 17, 2025 16:30 ~ 17:15
A Study on the Analysis of Personal Data Stored in Vehicle Telematics Devices
Kyungrok Park, Samuel Woo (Dankook University)
P-28
P-28
Dec. 17, 2025 16:30 ~ 17:15
AI-Based Automated Threat Scenario Generation Leveraging the ATT&CK Framework
Sarang Na, Seongmin Park, Daeun Kim, Jingang Kim, Joonhyung Lim (KISA) 
P-29
P-29
Dec. 17, 2025 16:30 ~ 17:15
A WBC-MAC Framework for Secure Integrity Verification of On-Device AI Models
Hanbin Lee, Junyoung Cho, Hyeon Park, Taesung Kwak, MeeLan Han, Taeguen Kim (Korea University)
P-30
P-30
Dec. 17, 2025 16:30 ~ 17:15
A Proactive Cyber Threat Response Framework Integrating Real-Time CTI with MITRE ATT&CK and D3FEND Mapping
Rino Jo, Hanbin Lee, Jihun Han, Woong-Kyo Jung, Jun-Yong Lee, Tae-Young Kang, Byung-Il Kwak, Mee Lan Han, Jungmin Kang (Korea University)
P-31
P-31
Dec. 17, 2025 16:30 ~ 17:15
Analyzing the Limitations of LLM-Based Multi-cloud Terraform Code Transformation
Yesol Sim, Mijin Kim, Seohee Kim, Seongmin Kim (Sungshin Women's University)
P-32
P-32
Dec. 17, 2025 16:30 ~ 17:15
Enhancing LLM-Based IaC Transformation Accuracy Using an AST-Based Approach
Seohee Kim, Mijin Kim, Yesol Sim, Seongmin Kim (Sungshin Women's University)
P-33
P-33
Dec. 17, 2025 16:30 ~ 17:15
Orchestrating Security Measures for Legacy Devices in Far-Edge Computing Scenarios
Gaetano Francesco Pittalà, Gianluca Davoli, Davide Borsatti, Walter Cerroni (University of Bologna)
P-34
P-34
Dec. 17, 2025 16:30 ~ 17:15
Forensic Analysis of Gemini's Facilitation of Malware Generation and Distribution
Gayoon Kim, Minjung Yoo, Seunghyun Park, Seongmin Kim (Sungshin Women's University)
P-35
P-35
Dec. 17, 2025 16:30 ~ 17:15
Enhancing the Flexibility of Cross Domain Solutions through a Zero Trust Overlay Approach
Sangkyu Ham, Jungsoo Park (Kangnam University)
P-36
P-36
Dec. 17, 2025 16:30 ~ 17:15
Never Trust, Verify Every Transfer: A Zero Trust Perspective on CDS
Yongjae Lee, Jungsoo Park (Kangnam University)
P-37
P-37
Dec. 17, 2025 16:30 ~ 17:15
Proposal for a Linkage between Zero Trust and MLS CDS
Yujin Kim, Jungsoo Park (Kangnam University)
P-38
P-38
Dec. 17, 2025 16:30 ~ 17:15
Noninvasive Glucose Prediction and Diabetes Classification With ECG and PPG Derived Domain-Specific Features
Sujin Park, Seyeon Lee, Gyuhyeok Lee, Gunwoo Kim (Gyeongsang National University)
P-39
P-39
Dec. 17, 2025 16:30 ~ 17:15
Key Considerations for User Management and Roaming in Military Private 5G
Juseoung Lee, Donghyun Kum, Jihoon Choi (TTA)
P-40
P-40
Dec. 17, 2025 17:15 ~ 18:00
A Study on Enhancing Security in Private 5G Networks Using Post-Quantum Cryptography (PQC)-Based X.509 Certificates
Juseoung Lee, Jihoon Choi, Sookhyun Jeon (TTA)
P-41
P-41
Dec. 17, 2025 17:15 ~ 18:00
Research study on the introduction of CDS into ZTA’s 5 Pillars
Donghoon Lee, Youngjae Kim, Taeho Won, Bonam Kim, Ilsun You (Kookmin University)
P-42
P-42
Dec. 17, 2025 17:15 ~ 18:00
Validation of Traceability Attacks in NAS Registration Procedure
Yeomin Lee, Jungsoo Park (Kangnam University)
P-43
P-43
Dec. 17, 2025 17:15 ~ 18:00
A Multimodal Framework for Phishing Detection
Gihong Kim, Sangmin Choi (Gyeongsang National University)
P-44
P-44
Dec. 17, 2025 17:15 ~ 18:00
Federated Learning in LEO Constellations: A Simulation-Based Study
YouJeong Lee, Jakyoung Yun, Yeon-Sup Lim (Sungshin Women's University)
P-45
P-45
Dec. 17, 2025 17:15 ~ 18:00
Analysis of Data Tampering Possibilities and Attack Techniques for EDR Data
Suji Lee, Daul Jeon, Junsik Yoon, Samuel Woo, Yousik Lee (Soonchunhyang University, Dankook University)
P-46
P-46
Dec. 17, 2025 17:15 ~ 18:00
A STIX Schema Design for Interoperable Feature Sharing Among AI Security Models
Taehun Kim, Hwankuk Kim (Kookmin University)
P-47
P-47
Dec. 17, 2025 17:15 ~ 18:00
A Proposal for a Method to Detect Malicious Nodes Using CAN ACK-Bit Voltage
Minyoung Chang, Samuel Woo (Dankook University)
P-48
P-48
Dec. 17, 2025 17:15 ~ 18:00
A study on CAN Communication Security Software Design Using Intrusion Alert Messages
Dongwon Lee, Samuel Woo (Dankook University)
P-49
P-49
Dec. 17, 2025 17:15 ~ 18:00
A Genetic Algorithm Approach to Attack Path Optimization Using Attack Graphs
JongEun Lee, Dongwook Kim (Gachon University)
P-50
P-50
Dec. 17, 2025 17:15 ~ 18:00
High-speed detection technique for encrypted steganography using GPU
WonSeok Choi, Kyung-Mo Sung, Laihyuk Park, Woongsoo Na (TTA, Seoul National University of Science & Technology, Kongju National University)
P-51
P-51
Dec. 17, 2025 17:15 ~ 18:00
PX4 autopilot hijacking strategy
Jiwoo Suh, Jaehoon Kim, Weonji Choi, Dohyun Kim, Sangmin Woo, Hyunmin Ju, Yongdae Kim (KAIST)
P-52
P-52
Dec. 17, 2025 17:15 ~ 18:00
The Confident Liar: Measuring and Governing Assertive Falsehoods in Persona-Conditioned LLMs
Seokjae Gwon, Seyoung Lee (Kangwon National University)
P-53
P-53
Dec. 17, 2025 17:15 ~ 18:00
A Private Blockchain-Based System for Managing the Originality of Digital Evidence
Hae-Yeong Cho, Seongho Lim, Nam-In Park, Junseok Byun, Sang-Min Choi (Gyeongsang National University, National Forensic Service Digital division)
P-54
P-54
Dec. 17, 2025 17:15 ~ 18:00
A Privacy-Preserving Framework for Personalized Recommendation Systems
Ye-Jin Lee, Sang-Min Choi (Gyeongsang National University)
P-55
P-55
Dec. 17, 2025 17:15 ~ 18:00
A Differential Privacy Noise Allocation Method Based on Attribute Sensitivity
Yu-Na Kim, Yeon-jin Kim, Il-Gu Lee (Sungshin Women's University)
P-56
P-56
Dec. 17, 2025 17:15 ~ 18:00
Comparative Analysis of Reactive-based Obstacle Avoidance for Free Floating Space Robots
Myeongjun Kim, Ju-Yong Kim, Ji-Hong Park, Gun-Woo Kim (Gyeongsang National University)
P-57
P-57
Dec. 17, 2025 17:15 ~ 18:00
Rank-Based Approach to T-Gate Reduction in Q-Circuits
Jinseob Oh, Hoyeong Kim, Soonwook Choi, Dooho Choi (Korea University)
P-58
P-58
Dec. 17, 2025 17:15 ~ 18:00
Multi-factor authentication using electrostatic capacitance
Hohyeon Lim, Seyoung Lee (Kangwon National University)
P-59
P-59
Dec. 17, 2025 17:15 ~ 18:00
Formal Verification of Mixing Preshared Keys in IKEv2 Protocol Using Proverif
Changhyeon Woo, Ilsun You, Bonam Kim (Kookmin University)
P-60
P-60
Dec. 17, 2025 17:15 ~ 18:00
Sentra: A Kubernetes Sidecar-Based Multi-Layer Security Gateway for Protecting LLM APIs
Jaeyoung Lee, Chanuk Park, Jaehyun Nam (Dankook University)
P-61
P-61
Dec. 17, 2025 17:15 ~ 18:00
Weaponizing Infrared Against Lane Detection Systems in Autonomous Vehicles
Hyunmin Ju, Sangmin Woo, Dohyun Kim, Weonji Choi, Yongdae Kim (KAIST)
P-62
P-62
Dec. 17, 2025 17:15 ~ 18:00
Network Fuzzing Framework for Communication Protocol
Hyeon Park, Taeguen Kim, Songha Ryu (Korea University)
P-63
P-63
Dec. 17, 2025 17:15 ~ 18:00
Intrusion Detection Approaches for RESTful Communication in 5G Service-Based Architecture
Youngjae Kim, Bonam Kim, Ilsun You (Kookmin University)
P-64
P-64
Dec. 17, 2025 17:15 ~ 18:00
An LSTM-based Forgery Detection Method for V2X Messages
Kyung-Mo Sung, Won-Seok Choi, Laihyuk Park, Woongsoo Na (TTA, Seoul National University of Science & Technology, Kongju National University)
P-65
P-65
Dec. 17, 2025 17:15 ~ 18:00
Selective Adaptive Video Watermarking Technique Against Compression and Frame Deletion Attacks
Chaewan Hong, Seung-ha Jee, Il-Gu Lee (Sungshin Women's University)
P-66
P-66
Dec. 17, 2025 17:15 ~ 18:00
Real-time Anomaly Detection-enhanced Defense for Dynamic Memory Allocation
Ga-Yeong Kim, Na-Eun Park, Il-Gu Lee (Sungshin Women's University)
P-67
P-67
Dec. 17, 2025 17:15 ~ 18:00
Dynamic Link-State-Based Hybrid Communication Scheme for Low Earth Orbit Satellite Networks
Da-eun Yu, Seung-ha Jee, Il-Gu Lee (Sungshin Women's University)
P-68
P-68
Dec. 17, 2025 17:15 ~ 18:00
A Data-Firmware Aggregated Transmission Mechanism for Efficient Firmware-Over-The-Air of Low Earth Orbit
Na-Hyun Kim, Yeon-Ji Lee, Il-Gu Lee (Sungshin Women's University)
P-69
P-69
Dec. 17, 2025 17:15 ~ 18:00
DSWEC: A Saliency-Weighted Defense against Camera Exposure Tampering
Seohyun Kim, Sanghoon Jeon (Kookmin University)
P-70
P-70
Dec. 17, 2025 17:15 ~ 18:00
Improved Hybrid BKZ-MITM Attack on LWE via Noisy-Search
Sieun Bak, Yujeong An, Yongha Son (Sungshin Women's University)
P-71
P-71
Dec. 17, 2025 17:15 ~ 18:00
Devilray: Reconfigurable, Evasive and Reference-grade LTE Fake Base Station
Taekkyung Oh, Duckwoo Kim, Beomseok Oh, Mincheol Son, Kwangmin Kim, Sangmin Woo, Jaehoon Kim, Cheoljun Park, Yongdae Kim (KAIST, Kyung Hee University)
P-72
P-72
Dec. 17, 2025 17:15 ~ 18:00
Activation-Guided Fuzzing for Neural Network Analysis
Beomjun Kim, Dongjae Lee (Kangwon National University)
P-73
P-73
Dec. 17, 2025 17:15 ~ 18:00
Practical Fault Attacks on DNN Model Using Slope-based SAD Pattern Matching
Gyeongdeok An, Yunsung Kim, Sangwon Lee, Jaecheol Ha (Hoseo University)
P-74
P-74
Dec. 17, 2025 17:15 ~ 18:00
On-Device DNN Model Binding with TPM-Backed Selective Layer Encryption
Jiseok Bang, Seungkwang Lee (Dankook University)
P-75
P-75
Dec. 17, 2025 17:15 ~ 18:00
LLM-Agent-Based Legal Compliance Evaluation System
Nara Shin, So-Hyun Park, Il-Gu Lee (Sungshin Women's University)
P-76
P-76
Dec. 17, 2025 17:15 ~ 18:00
Frequency-Domain Watermarking-Based QR Code Authentication Against Q-Phishing
Taejin Jung, Yeog Kim, Kiwook Sohn, Changhoon Lee (Seoul National University of Science & Technology, Research Center of Electrical and Information Technology)
P-77
P-77
Dec. 17, 2025 17:15 ~ 18:00
Reverse-Character Obfuscation for LLM Jailbreak: Bypassing Zero-Shot Safety Filters
Nahyun Kim, Younghyo Cho, Yeog Kim, Kiwook Sohn, Changhoon Lee (Seoul National University of Science & Technology, Research Center of Electrical and Information Technology)
P-78
P-78
Dec. 17, 2025 17:15 ~ 18:00
Enhanced Security Architecture for Direct Interworking between Commercial 5G and Defense Networks
Jisoo Shin, Yongyoon Shin, Hyunjin Kim, Jonggeun Park (ETRI)






Previous Page