| 4 |
Dedy Septono Catur Putranto, Rini Wisnu Wardhani, Jo Jaehan and Howon Kim |
ECPM Cryptanalysis Resource Estimation |
| 16 |
Gyeongsup Lim, Wonjun Oh and Junbeom Hur |
VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators |
| 18 |
Yujin Oh, Kyungbae Jang and Hwajeong Seo |
Quantum Implementation of LSH |
| 19 |
Manu Jo Varghese, Adnan Anwar, Robin Doss, Frank Jiang and Abdur Rakib |
Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection |
| 20 |
Naufal Suryanto, Andro Aprila Adiputra, Ahmada Yusril Kadiptya, Yongsu Kim and Howon Kim |
Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Segmentation Models with Patch Attack |
| 26 |
Norihiro Okui, Shotaro Fukushima, Ayumu Kubota and Takuya Yoshida |
Unsupervised Contextual Anomalous Communication Detection Using VQ Tokenization with Flow Data |
| 27 |
Arpita Dinesh Sarang, Sang-hoon Choi and Ki-woong Park |
Plotting OSS-based Supply Chain attack strategies and the defense failure |
| 28 |
Mai Bui, Thien-Phuc Doan, Kihun Hong and Souhwan Jung |
Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking |
| 29 |
Yu-Tse Shih, Shih-Ming Huang and Chun-I Fan |
PUF-Based Authentication and Authorization Protocol for IoT |
| 31 |
Kibeom Park and Huy Kang Kim |
Field Testing and Detection of Camera Interference for Autonomous Driving |
| 34 |
Byunggeon Choi, Hongjoo Jin, Dong Hoon Lee and Wonsuk Choi |
ChatDEOB: An Effective Deobfuscation Method based on Large Language Model |
| 41 |
En-Wei Zhang, Luo-Fan Wu and Chun-Wei Tsai |
An effective ensemble algorithm for short-term load forecasting |
| 42 |
Keun Young Lee and Ji-yeon Yoo |
A Proposal of a Supply Chain Security Model for Generative AI |
| 43 |
Ahod Alghuried and David Mohaisen |
Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Emperical Analysis |
| 44 |
Xiaofeng Lu and Tianze Cheng |
A Black-box Adversarial Attack Against Graph Neural Network Based on Random Walk |
| 45 |
Dong Young Kim and Huy Kang Kim |
Who ruins the game?: unveiling cheating users in the “Battlefield" game |
| 50 |
Rion Matsuzaki and Masaya Sato |
Detecting Phishing-targeted Web Push Notifications through Image Similarity Analysis |
| 53 |
Ilhwan Ji, Changjin Choi, Cheolho Lee, Seungho Jeon and Jung Taek Seo |
One-class Classification-based Position Falsification Detection System in C-ITS Communication Network |
| 54 |
Naoki Shibayama and Yasutaka Igarashi |
Integral Attack with Bit-based Division Property on the Lightweight Block Cipher LBC |
| 57 |
Oğuz Yayla and Yunus Emre Yılmaz |
An AIS-20/31 Compliant and Improved for Acceleration PLL-TRNG Implementation |
| 60 |
Ayodeji Adeniran, Kieran Human and David Mohaisen |
Dissecting the Infrastructure Used in Web-based Cryptojacking: A Measurement Perspective |
| 62 |
Bogeum Kim, Hyejin Sim, Jiwon Yun, Howon Kim and Jaehan Cho |
LLM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture |
| 66 |
Taeyang Lee and Jong-Hyouk Lee |
Privacy Enhanced P2P Power Trading Using DID-based Identity Verification in a Microgrid |
| 68 |
Jihye Kim, Jaehyoung Park and Jong-Hyouk Lee |
ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach |
| 72 |
Mariama Mbow, Rodrigo Román, Ayan Seal, Sraban Kumar Mohanty, Kevin I-Kai Wang and Kouichi Sakurai |
Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints |
| 78 |
Yeon-Jin Kim, Na-Eun Park and Il-Gu Lee |
Air-Fuzz: Feasibility analysis of fuzzing-based side-channel information leakage attack in air-gapped networks |
| 83 |
Jaehyoung Park, Jihye Kim and Jong-Hyouk Lee |
Security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing |
| 85 |
Jung Yup Rhee, Leo Hyun Park and Taekyoung Kwon |
Enhancing Robustness in NIDS via Coverage Guided Fuzzing and Adversarial Training |
| 87 |
Gyuhyun Jeon, Seungho Jeon and Jung Taek Seo |
A Survey on Attack Cases with VBS Malware in Windows |
| 88 |
Cheng-Han Shie, Pin-Huang Fang and Chun-I Fan |
Fuzzing JavaScript Engines with Diversified Mutation Strategies |