PROGRAM
Days: Tuesday, December 16th Wednesday, December 17th Thursday, December 18th Friday, December 19th
Tuesday, December 16th
View this program: with abstractssession overviewtalk overview
09:00-10:30 Session 1A: System Operation Security
Chair:
Location: Palace Ball Room (East) (3F)
| 09:00 | TGPOA: Task and Geography Privacy-Preserving Offloading Algorithm in 6G Network (abstract) |
| 09:18 | Proxy-CAN: Multi-Resolution Feature Fusion for In-Vehicle Signal Regression (abstract) PRESENTER: Woong-Kyo Jung |
| 09:36 | Error-driven Prompting Strategy to enhance Policy as Code Generation for Kubernetes (abstract) |
| 09:54 | Development and Evaluation of a Disaster Response Task Visualization System Aimed at Supporting Decision-Making by Local Government Employees (abstract) PRESENTER: Yuta Seri |
| 10:12 | Federated Learning-based Intrusion Detection System for Internet of Autonomous Vehicles against Poisoning Attacks (abstract) |
09:00-10:30 Session 1B: AI-driven Security 1
Chair:
Location: Palace Ball Room (West) (3F)
| 09:00 | PoisoningGuard: An Agentic LLM Framework for Explainable Red-Teaming Against Poisoning Attacks (abstract) |
| 09:18 | Self-HarmLLM: Can Large Language Model Harm Itself? (abstract) |
| 09:36 | Beyond Fixed and Dynamic Prompts: Embedded Jailbreak Templates for Advancing LLM Security (abstract) |
| 09:54 | On the Effectiveness of Instruction-Tuning Local LLMs for Identifying Software Vulnerabilities (abstract) |
| 10:12 | Aligning AI-Driven Cyber Threat with Policy Responses: A CCI-Based Framework (abstract) PRESENTER: Su Kyeong Heo |
09:00-10:30 Session 1C: Industry Security
Chair:
Location: Crown Room (3F)
| 09:00 | VoiceShield: Real-Time Speech Protection with Preserved Machine Recognizability (abstract) PRESENTER: Jeeeun Park |
| 09:18 | Preliminary Visualization of Outdoor Video Content Using Principal Component Analysis (abstract) |
| 09:36 | From Cookie and Passport.js to JWT: Secure and Scalable Web Authentication (abstract) |
| 09:54 | Analysis of a Cybersecurity Training Curriculum for Nuclear Facilities and Suggestions for Improvement (abstract) PRESENTER: Sooyon Seo |
| 10:12 | Adaptive Privacy-Preserving Framework for Network Traffic Anomaly Detection (abstract) PRESENTER: Yu-ran Jeon |
10:45-12:00 Session 2A: IoT Security
Chair:
Location: Palace Ball Room (East) (3F)
| 10:45 | 3D5G-O: DDoS Detection and Defense System of 5G on O-RAN (abstract) |
| 11:03 | Field Validation of Multiple IoT Sensors for Detecting Geographical Phenomena in an Early Warning System for Heavy Rainfall (abstract) PRESENTER: Noriki Uchida |
| 11:21 | IWOA-LightGBM: Hyperparameter Optimization for Sensor Data Anomaly Detection (abstract) PRESENTER: Qiqiang Wu |
| 11:39 | The Effect of Increased Dimensionality on Detecting Malicious IoMT Network Traffic (abstract) PRESENTER: Jayden Alonzo-Estrada |
10:45-12:00 Session 2B: Advanced Cryptography
Chair:
Location: Palace Ball Room (West) (3F)
| 10:45 | An Efficient Revocable Attribute-based Encryption Scheme Supporting Data Integrity (abstract) |
| 11:03 | Deniable Kyber: A Post-Quantum Deniable KEM Scheme (abstract) |
| 11:21 | Multi-Keyword Searchable Identity-Based Proxy Re-Encryption with Validity Period Control from Lattices (abstract) |
| 11:39 | Multi-Authority Attribute-Based Multi-Keyword Searchable Encryption with Dynamic Membership from Lattices (abstract) |
10:45-12:00 Session 2C: Network Threat Detection
Chair:
Location: Crown Room (3F)
| 10:45 | An LLM-Based Method for the Analysis of Multiple Network Behaviors (abstract) |
| 11:03 | Autoencoder-Based Multi-Classification for TCP Attack Detection in Private 5G Network (abstract) PRESENTER: Jinha Kim |
| 11:21 | Impact of Data Extraction Methods on Pseudo-Label Quality in Malicious Behavior Detection of Encrypted Network Traffic (abstract) |
| 11:39 | A Cross-Modal Deep Learning Framework for Joint Semantic and Structural Threat Detection in Provenance Graphs (abstract) |
14:00-15:00 Session 4: Keynote 1: Prof. Yongdae Kim (Title: Cellular Metasploit: A Penetration Testing Framework for Cellular Networks)
Location: Palace Ball Room (3F)
15:15-16:15 Session 5: Keynote 2: Prof. Christian Esposito (Title: Quantum Technologies for Anomaly Detection in Future Networks)
Location: Palace Ball Room (3F)
16:30-18:00 Session 6A: Quantum/Post-Quantum Security
Chair:
Location: Palace Ball Room (East) (3F)
| 16:30 | Hybrid Quantum Key Distribution and Post-Quantum Cryptography for Secure 5G-AKA Authentication with Forward Secrecy (abstract) PRESENTER: Wibby Aldryani Astuti Praditasari |
| 16:48 | Known IV attack on PANAMA Stream Cipher using Grover's Algorithm (abstract) PRESENTER: Rajeswari S |
| 17:06 | Isogeny-based KEMs for TLS 1.3: A Comparative Study of CSIDH/PEGASIS and POKÉ (abstract) PRESENTER: Hyungrok Jo |
| 17:24 | Quantum-Enhanced Detection Mechanisms for Mobile Network Security (abstract) |
| 17:42 | Multivariate Quadratic Signatures in the NIST Process: A Survey and Comparative Analysis (abstract) PRESENTER: Jian Zhang |
16:30-18:00 Session 6B: Key Exchange & Management System
Chair:
Location: Palace Ball Room (West) (3F)
| 16:30 | Key management mechanism with non-stored and user authentication-based key recovery (abstract) PRESENTER: Su Jin Shin |
| 16:48 | Lightweight Time-Indexed Secure Communication Protocol with Dual-Layer Defense for UAV Swarm Networks (abstract) |
| 17:06 | Privacy-Preserving Zero Trust Network Access Control System Using Chameleon Hash Functions and Fully Homomorphic Encryption (abstract) PRESENTER: Hideaki Miyaji |
| 17:24 | A Scripting Language for Security Patching in Open RAN (abstract) |
| 17:42 | An Anomaly Detection Using Multi-Modal Datasets in Industrial Control Systems (abstract) PRESENTER: Yunsung Kim |
16:30-18:00 Session 6C: Blockchain/Distributed Trust
Chair:
Location: Crown Room (3F)
| 16:30 | IoMT-Driven Emergency Data Access for Unidentified and Unconscious Patients in Road Accidents Leveraging Privacy-Preserving Blockchain Protocols and Cryptographic Primitives (abstract) PRESENTER: V Maruthi |
| 16:48 | ZKR-TEE: A Zero-Knowledge Rollup Framework in Trusted Execution Environments (abstract) |
| 17:06 | Circuit Normalization Bottlenecks in Trivial Zero-Knowledge Decision Tree Evaluation (abstract) PRESENTER: Kai-Che Shih |
| 17:24 | HEPFS: Homomorphic Encryption-based Privacy Forwarding Scheme for Efficient Ciphertext-Domain Routing (abstract) |
Wednesday, December 17th
View this program: with abstractssession overviewtalk overview
09:00-10:30 Session 7A: 6G and Next Generation Network Security 1
Chair:
Location: Palace Ball Room (East) (3F)
| 09:00 | Reconstruction attack on Wi-Fi sensing obfuscation (abstract) |
| 09:18 | Service-level Threat Scenarios and Resilience Approaches in Private 5G Networks (abstract) PRESENTER: Seungjoon Na |
| 09:36 | Toward Agentic AI in 6G Security: Specialized Small Language Model for False Base Station Detection (abstract) |
| 09:54 | Cooperative Global Detection with Dynamic Multi-Link Recovery for Jamming Resilience of Internet of Things (abstract) |
| 10:12 | Semantic Relations Analysis of Safety and Security Requirements in Industrial Control Systems using Natural Language Inference (abstract) |
09:00-10:30 Session 7B: AI-driven Security 2
Chair:
Location: Palace Ball Room (West) (3F)
| 09:00 | VulnRemediate AI : An Integrated Framework for Semantic Vulnerability Detection and Generative Remediation (abstract) |
| 09:18 | Embedding Semantic Backdoors into Anomaly Detection Models in Industrial Control Systems (abstract) |
| 09:36 | Design and Implementation of an AI-based IDS xApp for Open RAN (abstract) PRESENTER: Hyeonsoo Yu |
| 09:54 | Implementing an Image-based Intruder Detection System using YOLOtalk (abstract) PRESENTER: Yun-Wei Lin |
| 10:12 | Security Evaluation Frameworks for AI Agents: A Comparative Analysis and Future Directions (abstract) |
09:00-10:30 Session 7C: 2025 Mobisec Workshop 1
Chair:
Location: Crown Room (3F)
| 09:00 | Toward Quantum-Resilient eSIM Provisioning: Integrating ML-KEM and OQS-TLS into Consumer RSP (abstract) PRESENTER: Jhury Kevin Lastre |
| 09:18 | Formal Verification of the PRINS: Secure Application Layer Protection for 5G Roaming (abstract) PRESENTER: Tae Ho Won |
| 09:36 | Adaptive Circuit Breaker Configuration for Transition from Istio Sidecar to Ambient Mode (abstract) |
| 09:54 | Prompt-Conditioned Scene Reconstruction based on Stable Diffusion for Investigative Hypothesis Testing (abstract) |
| 10:12 | A Prefetch-based LLM System Using Response Reuse (abstract) |
10:45-12:00 Session 8A: 6G and Next Generation Network Security 2
Chair:
Location: Palace Ball Room (East) (3F)
| 10:45 | Slicing and Filtering security orchestration for cyberattacks mitigation in 5G/6G networks (abstract) PRESENTER: Diego Sánchez García |
| 11:03 | Deriving Security Controls through Verification on Open-Source 5G Testbeds (abstract) PRESENTER: Toshiro Sawamoto |
| 11:21 | Private 5G Security Assessment Framework: Development and Validation from Testbed to Operational Network (abstract) |
| 11:39 | XDP-FlowOpt: Lightweight Flow Optimization for 5G Private Networks (abstract) PRESENTER: Yongyoon Shin |
10:45-12:00 Session 8B: (Special Session) Formal Verification 1
Chair:
Location: Palace Ball Room (West) (3F)
| 10:45 | TBD |
| 11:15 | Toward Formal Analysis of the IVXV Voting Protocol using Computationally Complete Symbolic Attacker (abstract) |
| 11:33 | Symbolic Formalization of PoW Integrity in Blockchain (abstract) |
| 11:51 | A PBFT-Based Consensus Approach for Secure ENC Update Protocol (abstract) PRESENTER: Seungbin Lee |
10:45-12:00 Session 8C: 2025 Mobisec Workshop 2
Chair:
Location: Crown Room (3F)
| 10:45 | Information Leakage Attacks Using Multi Modulation on Air-Gapped Systems (abstract) PRESENTER: Ye-Rim Jeong |
| 11:03 | Deepfake Dataset Privacy: A Comprehensive Survey and Framework for Safer Sharing (abstract) |
| 11:21 | Energy-Efficient Deep Q-Learning Framework for Federated-Inspired Cooperative Control in Overlapping Wi-Fi Networks (abstract) PRESENTER: Jin-Min Lee |
13:30-14:30 Session 9: Keynote 3: Prof. Junji Shikata (Title: Post- Quantum Advanced Cryptography and its Application to B5G)
Location: Palace Ball Room (3F)
15:00-16:15 Session 10A: Air & Space Security
Chair:
Location: Palace Ball Room (East) (3F)
| 15:00 | A Comparative Analysis of Cyber Attacks against Satellite Internet (abstract) PRESENTER: Seungjin Baek |
| 15:18 | Intelligent Orchestration Method for Cybersecurity Services in Satellite-Terrestrial Integrated Network (abstract) |
| 15:36 | Machine Learning-Based Power Allocation for Covert Communication in LEO-UAV Cooperative Networks (abstract) |
| 15:54 | Secure Satellite Communication Using Shamir’s Secret Sharing-Based Frequency Hopping Technique (abstract) PRESENTER: Kim Su-Kyoung |
15:00-16:15 Session 10B: (Special Session) Formal Verification 2
Chair:
Location: Palace Ball Room (West) (3F)
| 15:00 | UE-Guard: Formal Specification-Based Cellular Attack Detection of False Base Stations and Attacks on UE (abstract) |
| 15:18 | A Hybrid EDHOC Protocol (abstract) |
| 15:36 | Unified Formal Verification of Security Requirements in the TLS Family (abstract) |
| 15:54 | A Scneario Generation for Model-based Testing of TLS using Maude Strategy (abstract) |
16:30-17:15 Session 11
Analyzing Temporal Effects of Cumulative Malicious User Injections in Sequential Recommendation (abstract) PRESENTER: Minje Kim |
TLSVerifier: An Automated TLS software Verification Tool Using Model-Based Testing (abstract) PRESENTER: Jaedeok Lim |
A Detection Framework for Identity Protection in Cloud-Based 5G Core Networks (abstract) PRESENTER: Mirae Kim |
A Multi-Agent Framework for Autonomous Generation and Validation of IaC and PaC (abstract) PRESENTER: Jueun Son |
Open-Source Software Supply Chain Attacks: Workflow and Recent Cases (abstract) PRESENTER: Yejun Lee |
A Rate-Distortion Framework for Compressing User Interaction Sequences with Adaptive Preference Disentanglement (abstract) PRESENTER: Wooseung Kang |
An Analysis of Gemini on the Malicious Use of Generative AI for Email Phishing and Malware Creation (abstract) PRESENTER: Jaebin Lee |
Explainable Adversarial-Robust Vision-Language-Action Model for Robotic Manipulation (abstract) PRESENTER: Ju-Young Kim |
Adaptive Circuit Breaker Thresholds in Istio: Comparative Analysis of Sidecar and Ambient Modes (abstract) PRESENTER: Seoyeon Kang |
Fortifying Federated Learning: Advanced Mitigation Strategy for Data Poisoning Attacks (abstract) PRESENTER: Ming-Feng Tsai |
Forensic Analysis of Data Leakage Indicators in Mobile Gemini User Content Interactions (abstract) PRESENTER: Yewon Kim |
Automated Allowed-Only Detection Scenario Based on AWS CloudTrail and Athena (abstract) PRESENTER: Yeeun Shin |
Dynamic Privilege Validation in AWS Environments via CloudTrail-Athena Analysis (abstract) PRESENTER: Soo-Min Nam |
A Survey of MCP Environments: Threats, Vulnerabilities, and Evaluations (abstract) PRESENTER: Hyungbeom Jang |
Spike-Aware Local Music Recommendation: Detecting Event-Driven Anomalies for Secure Streaming (abstract) PRESENTER: Tae-Han Kim |
Training-to-Runtime Supply Chain Attacks on AI Agents (abstract) PRESENTER: Ilhwan Ha |
OpticalFBP: A Deep Optical Imaging Model for Privacy-Protective Facial Beauty Prediction (abstract) PRESENTER: Jiho Bae |
A Realistic Multi-Modal Attack for LiDAR Systems (abstract) PRESENTER: Minjae Lee |
CPU-Based Optimizations Do Not Transfer to CUDA k-Means under Homomorphic Encryption (abstract) PRESENTER: Ungsik Kim |
LLM-based Detection Framework of Memory Vulnerabilities in Stripped Binaries (abstract) PRESENTER: Youngho Choi |
An Optimization Algorithm for Medical Tabular Data Analysis Using Machine Learning and Deep Learning (abstract) PRESENTER: So-Hee Lim |
Structure-Aware NGAP Fuzzer Design for Procedural and State Anomaly Analysis (abstract) PRESENTER: Nakyung Lee |
Predictive Clock-Drift-Aware Wake-up Correction for Wireless Sensor Networks (abstract) PRESENTER: Yeon-Woo Lee |
A MITRE ATT&CK-Based Anomaly Detection System Using Privacy-Preserving Security Data (abstract) PRESENTER: Hongil Ju |
Maritime Cybersecurity: Operational Threat Analysis and Defensive Strategies in OT·IT Convergence (abstract) PRESENTER: Sarang Na |
Effective Strategies for Implementing and Operating a Zero Trust Environment (abstract) PRESENTER: Seulgi Choi |
A Study on the Analysis of Personal Data Stored in Vehicle Telematics Devices (abstract) PRESENTER: Kyungrok Park |
AI-Based Automated Threat Scenario Generation Leveraging the ATT&CK Framework (abstract) PRESENTER: Sarang Na |
A WBC-MAC Framework for Secure Integrity Verification of On-Device AI Models (abstract) PRESENTER: Junyoung Cho |
A Proactive Cyber Threat Response Framework Integrating Real-Time CTI with MITRE ATT&CK and D3FEND Mapping (abstract) PRESENTER: Rino Jo |
Analyzing the Limitations of LLM-Based Multi-cloud Terraform Code Transformation (abstract) PRESENTER: Yesol Sim |
Enhancing LLM-Based IaC Transformation Accuracy Using an AST-Based Approach (abstract) PRESENTER: Seohee Kim |
Orchestrating Security Measures for Legacy Devices in Far-Edge Computing Scenarios (abstract) PRESENTER: Gaetano Francesco Pittalà |
Forensic Analysis of Gemini's Facilitation of Malware Generation and Distribution (abstract) PRESENTER: Gayoon Kim |
Enhancing the Flexibility of Cross Domain Solutions through a Zero Trust Overlay Approach (abstract) PRESENTER: Sangkyu Ham |
Proposal for a Linkage between Zero Trust and MLS CDS (abstract) PRESENTER: Yongjae Lee |
Never Trust, Verify Every Transfer: A Zero Trust Perspective on CDS (abstract) PRESENTER: Yujin Kim |
Noninvasive Glucose Prediction and Diabetes Classification With ECG and PPG Derived Domain-Specific Features (abstract) PRESENTER: Sujin Park |
Key Considerations for User Management and Roaming in Military Private 5G (abstract) PRESENTER: Juseoung Lee |
17:15-18:00 Session 12: Poster 2
A Study on Enhancing Security in Private 5G Networks Using Post-Quantum Cryptography (PQC)-Based X.509 Certificates (abstract) PRESENTER: Juseoung Lee |
Validation of Traceability Attacks in NAS Registration Procedure (abstract) PRESENTER: Donghoon Lee |
Research study on the introduction of CDS into ZTA’s 5 Pillars (abstract) PRESENTER: Yeomin Lee |
A Multimodal Framework for Phishing Detection (abstract) PRESENTER: Gi Hong Kim |
Federated Learning in LEO Constellations: A Simulation-Based Study (abstract) PRESENTER: You Jeong Lee |
Analysis of Data Tampering Possibilities and Attack Techniques for EDR Data (abstract) PRESENTER: Suji Lee |
A STIX Schema Design for Interoperable Feature Sharing Among AI Security Models (abstract) PRESENTER: Taehun Kim |
A study on CAN Communication Security Software Design Using Intrusion Alert Messages (abstract) PRESENTER: Minyoung Chang |
A Proposal for a Method to Detect Malicious Nodes Using CAN ACK-Bit Voltage (abstract) PRESENTER: Dongwon Lee |
A Genetic Algorithm Approach to Attack Path Optimization Using Attack Graphs (abstract) PRESENTER: Lee Jong Eun |
High-speed detection technique for encrypted steganography using GPU (abstract) PRESENTER: Won Seok Choi |
PX4 autopilot hijacking strategy (abstract) PRESENTER: Jiwoo Suh |
The Confident Liar: Measuring and Governing Assertive Falsehoods in Persona-Conditioned LLMs (abstract) PRESENTER: Seokjae Gwon |
A Private Blockchain-Based System for Managing the Originality of Digital Evidence (abstract) PRESENTER: Hae-Yeong Cho |
A Privacy-Preserving Framework for Personalized Recommendation Systems (abstract) PRESENTER: Ye-Jin Lee |
A Differential Privacy Noise Allocation Method Based on Attribute Sensitivity (abstract) PRESENTER: Yu-Na Kim |
Comparative Analysis of Reactive-based Obstacle Avoidance for Free Floating Space Robots (abstract) PRESENTER: Myeongjun Kim |
Rank-Based Approach to T-Gate Reduction in Q-Circuits (abstract) PRESENTER: Jinseob Oh |
Multi-factor authentication using electrostatic capacitance (abstract) PRESENTER: Hohyeon Lim |
Formal Verification of Mixing Preshared Keys in IKEv2 Protocol Using Proverif (abstract) PRESENTER: Changhyeon Woo |
Sentra: A Kubernetes Sidecar-Based Multi-Layer Security Gateway for Protecting LLM APIs (abstract) PRESENTER: Chanuk Park |
Weaponizing Infrared Against Lane Detection Systems in Autonomous Vehicles (abstract) PRESENTER: Hyunmin Ju |
Network Fuzzing Framework for Communication Protocol (abstract) PRESENTER: Hyeon Park |
Intrusion Detection Approaches for RESTful Communication in 5G Service-Based Architecture (abstract) PRESENTER: Youngjae Kim |
An LSTM-based Forgery Detection Method for V2X Messages (abstract) PRESENTER: Kyung-Mo Sung |
Selective Adaptive Video Watermarking Technique Against Compression and Frame Deletion Attacks (abstract) PRESENTER: Chaewan Hong |
Real-time Anomaly Detection-enhanced Defense for Dynamic Memory Allocation (abstract) PRESENTER: Ga-Yeong Kim |
Dynamic Link-State-Based Hybrid Communication Scheme for Low Earth Orbit Satellite Networks (abstract) PRESENTER: Da-eun Yu |
A Data-Firmware Aggregated Transmission Mechanism for Efficient Firmware-Over-The-Air of Low Earth Orbit (abstract) PRESENTER: Na-Hyun Kim |
DSWEC: A Saliency-Weighted Defense against Camera Exposure Tampering (abstract) PRESENTER: Seohyun Kim |
Improved Hybrid BKZ-MITM Attack on LWE via Noisy-Search (abstract) PRESENTER: Sieun Bak |
Devilray: Reconfigurable, Evasive and Reference-grade LTE Fake Base Station (abstract) PRESENTER: Duckwoo Kim |
Activation-Guided Fuzzing for Neural Network Analysis (abstract) PRESENTER: Kim Beomjun |
Practical Fault Attacks on DNN Model Using Slope-based SAD Pattern Matching (abstract) PRESENTER: Gyeongdeok An |
On-Device DNN Model Binding with TPM-Backed Selective Layer Encryption (abstract) PRESENTER: Jiseok Bang |
LLM-Agent-Based Legal Compliance Evaluation System (abstract) PRESENTER: Nara Shin |
Frequency-Domain Watermarking-Based QR Code Authentication Against Q-Phishing (abstract) PRESENTER: Taejin Jung |
Reverse-Character Obfuscation for LLM Jailbreak: Bypassing Zero-Shot Safety Filters (abstract) PRESENTER: Nahyun Kim |
Enhanced Security Architecture for Direct Interworking between Commercial 5G and Defense Networks (abstract) PRESENTER: Jisoo Shin |
Thursday, December 18th
View this program: with abstractssession overviewtalk overview
09:00-10:45 Session 13A: Cryptographic Applications and Analysis
Chair:
Location: Palace Ball Room (East) (3F)
| 09:00 | ET-BERT with Adapter Fusion: Time-Efficient Continual Learning Framework for Encrypted Traffic Classification (abstract) |
| 09:18 | Split Credential Authentication: A Privacy-Preserving Protocol with Decoupled Authority and Issuer Roles (abstract) |
| 09:36 | Ghost Recon: An Orchestration-based, Non-Intrusive, Persistent Multimodal Authentication System (abstract) |
| 09:54 | Closing Early Attack Surfaces in Bluetooth Secure Simple Pairing using Identity-Based Signatures (abstract) PRESENTER: Bae Woori |
| 10:12 | Non-Recoverable Signature: Digital Signatures Torelant to Partial Disclosures (abstract) PRESENTER: Daiki Sasame |
| 10:30 | Education Framework of SOME/IP Security Enhancement through Game-Based Learning and Testing Tool Development (abstract) |
09:00-10:45 Session 13B: Adaptive Intelligence and System Security 1
Chair:
Location: Palace Ball Room (West) (3F)
| 09:00 | Pareto-Optimized Dynamic Tuner for Anomaly Detection of Battery-Constrained Internet of Things (abstract) |
| 09:18 | Real-time Channel Adaptive Guard Interval Adjustment and Secondary Data Transmission Framework (abstract) PRESENTER: Jung-Min Moon |
| 09:36 | Protecting the Preamble: An Adaptive Scheduling Approach for Reliable Multi-Link Operation (abstract) PRESENTER: Ye-Sin Kim |
| 09:54 | Adversarial Attacks on Plausibility Checks in V2X Security (abstract) PRESENTER: Jungwoo Park |
| 10:12 | Design and Evaluation of a Management Target Control Mechanism in a Function for Tracing Diffusion of Classified Information on KVM (abstract) |
09:00-10:45 Session 13C: Special Session
Chair:
Location: Crown Room (3F)
| 09:00 | One Passport to Govern Them All: Bringing Order to IoT Security and Compliance (abstract) PRESENTER: Sara Nieves Matheu Garcia |
| 09:18 | Replicating Network Topologies through the use of LLMs (abstract) |
| 09:36 | Prioritized Multi-Criteria Optimization for Efficient Cloud-Native Application Resource Allocation (abstract) PRESENTER: Polyzois Soumplis |
| 09:54 | Enhancing Privacy in Multi-Domain Network Intent Negotiation (abstract) |
| 10:12 | Defending Minds, Not Just Machines: An Agentic Approach to Cognitive Security (abstract) PRESENTER: Jaime Fúster |
| 10:30 | Lightweight Secure Federated Learning for Energy-Constrained IoT: A Case Study in Smart Irrigation (abstract) |
11:00-12:00 Session 14A: Digital Asset Protection
Chair:
Location: Palace Ball Room (East) (3F)
| 11:00 | Invisible Watermarking with DWT-SVD for Safeguarding Copyrighted Images against Unauthorized Generative AI Training (abstract) |
| 11:18 | Hidden in the Noise: Noise-Embedded Watermarking for Black-Box Image Classifiers (abstract) |
| 11:36 | Cross-Artifact Comparative Analysis of Legal and Illegal Korean Streaming Sites (abstract) |
11:00-12:00 Session 14B: Adaptive Intelligence and System Security 2
Chair:
Location: Palace Ball Room (West) (3F)
| 11:00 | Spatio-Temporal Adaptive Reinforcement Learning for Task Offloading in Mobile Edge Computing (abstract) |
| 11:18 | Drain-Like Log Parsing for Distributed Systems: Efficient Template Mining on HDFS Datasets (abstract) |
| 11:36 | Friendly-fire: Measurement and Analysis of the Interaction Dynamics Between Anti-Malware and PETs (abstract) |
11:00-12:00 Session 14C: Covert Threat Analysis
Chair:
Location: Crown Room (3F)
| 11:00 | Binary Lifting into LLVM IR with Large Language Models (abstract) |
| 11:18 | Classification of Tor Metadata Combinations for Investigation (abstract) PRESENTER: Yiseul Choi |
| 11:36 | ObfSwin: Transformer-based Multi-class Obfuscation Classification for Windows Portable Executable (abstract) |
Friday, December 19th
View this program: with abstractssession overviewtalk overview