MOBISEC 2025: THE 9TH INTERNATIONAL CONFERENCE ON MOBILE INTERNET SECURITY
PROGRAM

Days: Tuesday, December 16th Wednesday, December 17th Thursday, December 18th Friday, December 19th

Tuesday, December 16th

View this program: with abstractssession overviewtalk overview

09:00-10:30 Session 1A: System Operation Security
09:00
TGPOA: Task and Geography Privacy-Preserving Offloading Algorithm in 6G Network (abstract)
09:18
Proxy-CAN: Multi-Resolution Feature Fusion for In-Vehicle Signal Regression (abstract)
PRESENTER: Woong-Kyo Jung
09:36
Error-driven Prompting Strategy to enhance Policy as Code Generation for Kubernetes (abstract)
09:54
Development and Evaluation of a Disaster Response Task Visualization System Aimed at Supporting Decision-Making by Local Government Employees (abstract)
PRESENTER: Yuta Seri
10:12
Federated Learning-based Intrusion Detection System for Internet of Autonomous Vehicles against Poisoning Attacks (abstract)
09:00-10:30 Session 1B: AI-driven Security 1
09:00
PoisoningGuard: An Agentic LLM Framework for Explainable Red-Teaming Against Poisoning Attacks (abstract)
09:18
Self-HarmLLM: Can Large Language Model Harm Itself? (abstract)
09:36
Beyond Fixed and Dynamic Prompts: Embedded Jailbreak Templates for Advancing LLM Security (abstract)
09:54
On the Effectiveness of Instruction-Tuning Local LLMs for Identifying Software Vulnerabilities (abstract)
10:12
Aligning AI-Driven Cyber Threat with Policy Responses: A CCI-Based Framework (abstract)
PRESENTER: Su Kyeong Heo
09:00-10:30 Session 1C: Industry Security
Location: Crown Room (3F)
09:00
VoiceShield: Real-Time Speech Protection with Preserved Machine Recognizability (abstract)
PRESENTER: Jeeeun Park
09:18
Preliminary Visualization of Outdoor Video Content Using Principal Component Analysis (abstract)
09:36
From Cookie and Passport.js to JWT: Secure and Scalable Web Authentication (abstract)
09:54
Analysis of a Cybersecurity Training Curriculum for Nuclear Facilities and Suggestions for Improvement (abstract)
PRESENTER: Sooyon Seo
10:12
Adaptive Privacy-Preserving Framework for Network Traffic Anomaly Detection (abstract)
PRESENTER: Yu-ran Jeon
10:45-12:00 Session 2A: IoT Security
10:45
3D5G-O: DDoS Detection and Defense System of 5G on O-RAN (abstract)
11:03
Field Validation of Multiple IoT Sensors for Detecting Geographical Phenomena in an Early Warning System for Heavy Rainfall (abstract)
PRESENTER: Noriki Uchida
11:21
IWOA-LightGBM: Hyperparameter Optimization for Sensor Data Anomaly Detection (abstract)
PRESENTER: Qiqiang Wu
11:39
The Effect of Increased Dimensionality on Detecting Malicious IoMT Network Traffic (abstract)
10:45-12:00 Session 2B: Advanced Cryptography
10:45
An Efficient Revocable Attribute-based Encryption Scheme Supporting Data Integrity (abstract)
11:03
Deniable Kyber: A Post-Quantum Deniable KEM Scheme (abstract)
11:21
Multi-Keyword Searchable Identity-Based Proxy Re-Encryption with Validity Period Control from Lattices (abstract)
11:39
Multi-Authority Attribute-Based Multi-Keyword Searchable Encryption with Dynamic Membership from Lattices (abstract)
10:45-12:00 Session 2C: Network Threat Detection
Chair:
Location: Crown Room (3F)
10:45
An LLM-Based Method for the Analysis of Multiple Network Behaviors (abstract)
11:03
Autoencoder-Based Multi-Classification for TCP Attack Detection in Private 5G Network (abstract)
PRESENTER: Jinha Kim
11:21
Impact of Data Extraction Methods on Pseudo-Label Quality in Malicious Behavior Detection of Encrypted Network Traffic (abstract)
11:39
A Cross-Modal Deep Learning Framework for Joint Semantic and Structural Threat Detection in Provenance Graphs (abstract)
16:30-18:00 Session 6A: Quantum/Post-Quantum Security
16:30
Hybrid Quantum Key Distribution and Post-Quantum Cryptography for Secure 5G-AKA Authentication with Forward Secrecy (abstract)
16:48
Known IV attack on PANAMA Stream Cipher using Grover's Algorithm (abstract)
PRESENTER: Rajeswari S
17:06
Isogeny-based KEMs for TLS 1.3: A Comparative Study of CSIDH/PEGASIS and POKÉ (abstract)
PRESENTER: Hyungrok Jo
17:24
Quantum-Enhanced Detection Mechanisms for Mobile Network Security (abstract)
17:42
Multivariate Quadratic Signatures in the NIST Process: A Survey and Comparative Analysis (abstract)
PRESENTER: Jian Zhang
16:30-18:00 Session 6B: Key Exchange & Management System
16:30
Key management mechanism with non-stored and user authentication-based key recovery (abstract)
PRESENTER: Su Jin Shin
16:48
Lightweight Time-Indexed Secure Communication Protocol with Dual-Layer Defense for UAV Swarm Networks (abstract)
17:06
Privacy-Preserving Zero Trust Network Access Control System Using Chameleon Hash Functions and Fully Homomorphic Encryption (abstract)
PRESENTER: Hideaki Miyaji
17:24
A Scripting Language for Security Patching in Open RAN (abstract)
17:42
An Anomaly Detection Using Multi-Modal Datasets in Industrial Control Systems (abstract)
PRESENTER: Yunsung Kim
16:30-18:00 Session 6C: Blockchain/Distributed Trust
Location: Crown Room (3F)
16:30
IoMT-Driven Emergency Data Access for Unidentified and Unconscious Patients in Road Accidents Leveraging Privacy-Preserving Blockchain Protocols and Cryptographic Primitives (abstract)
PRESENTER: V Maruthi
16:48
ZKR-TEE: A Zero-Knowledge Rollup Framework in Trusted Execution Environments (abstract)
17:06
Circuit Normalization Bottlenecks in Trivial Zero-Knowledge Decision Tree Evaluation (abstract)
PRESENTER: Kai-Che Shih
17:24
HEPFS: Homomorphic Encryption-based Privacy Forwarding Scheme for Efficient Ciphertext-Domain Routing (abstract)
Wednesday, December 17th

View this program: with abstractssession overviewtalk overview

09:00-10:30 Session 7A: 6G and Next Generation Network Security 1
09:00
Reconstruction attack on Wi-Fi sensing obfuscation (abstract)
09:18
Service-level Threat Scenarios and Resilience Approaches in Private 5G Networks (abstract)
PRESENTER: Seungjoon Na
09:36
Toward Agentic AI in 6G Security: Specialized Small Language Model for False Base Station Detection (abstract)
09:54
Cooperative Global Detection with Dynamic Multi-Link Recovery for Jamming Resilience of Internet of Things (abstract)
10:12
Semantic Relations Analysis of Safety and Security Requirements in Industrial Control Systems using Natural Language Inference (abstract)
09:00-10:30 Session 7B: AI-driven Security 2
09:00
VulnRemediate AI : An Integrated Framework for Semantic Vulnerability Detection and Generative Remediation (abstract)
09:18
Embedding Semantic Backdoors into Anomaly Detection Models in Industrial Control Systems (abstract)
09:36
Design and Implementation of an AI-based IDS xApp for Open RAN (abstract)
PRESENTER: Hyeonsoo Yu
09:54
Implementing an Image-based Intruder Detection System using YOLOtalk (abstract)
PRESENTER: Yun-Wei Lin
10:12
Security Evaluation Frameworks for AI Agents: A Comparative Analysis and Future Directions (abstract)
09:00-10:30 Session 7C: 2025 Mobisec Workshop 1
Location: Crown Room (3F)
09:00
Toward Quantum-Resilient eSIM Provisioning: Integrating ML-KEM and OQS-TLS into Consumer RSP (abstract)
09:18
Formal Verification of the PRINS: Secure Application Layer Protection for 5G Roaming (abstract)
PRESENTER: Tae Ho Won
09:36
Adaptive Circuit Breaker Configuration for Transition from Istio Sidecar to Ambient Mode (abstract)
09:54
Prompt-Conditioned Scene Reconstruction based on Stable Diffusion for Investigative Hypothesis Testing (abstract)
10:12
A Prefetch-based LLM System Using Response Reuse (abstract)
10:45-12:00 Session 8A: 6G and Next Generation Network Security 2
10:45
Slicing and Filtering security orchestration for cyberattacks mitigation in 5G/6G networks (abstract)
11:03
Deriving Security Controls through Verification on Open-Source 5G Testbeds (abstract)
PRESENTER: Toshiro Sawamoto
11:21
Private 5G Security Assessment Framework: Development and Validation from Testbed to Operational Network (abstract)
11:39
XDP-FlowOpt: Lightweight Flow Optimization for 5G Private Networks (abstract)
PRESENTER: Yongyoon Shin
10:45-12:00 Session 8B: (Special Session) Formal Verification 1
10:45
TBD
11:15
Toward Formal Analysis of the IVXV Voting Protocol using Computationally Complete Symbolic Attacker (abstract)
11:33
Symbolic Formalization of PoW Integrity in Blockchain (abstract)
11:51
A PBFT-Based Consensus Approach for Secure ENC Update Protocol (abstract)
PRESENTER: Seungbin Lee
10:45-12:00 Session 8C: 2025 Mobisec Workshop 2
Location: Crown Room (3F)
10:45
Information Leakage Attacks Using Multi Modulation on Air-Gapped Systems (abstract)
PRESENTER: Ye-Rim Jeong
11:03
Deepfake Dataset Privacy: A Comprehensive Survey and Framework for Safer Sharing (abstract)
11:21
Energy-Efficient Deep Q-Learning Framework for Federated-Inspired Cooperative Control in Overlapping Wi-Fi Networks (abstract)
PRESENTER: Jin-Min Lee
15:00-16:15 Session 10A: Air & Space Security
Chair:
15:00
A Comparative Analysis of Cyber Attacks against Satellite Internet (abstract)
PRESENTER: Seungjin Baek
15:18
Intelligent Orchestration Method for Cybersecurity Services in Satellite-Terrestrial Integrated Network (abstract)
15:36
Machine Learning-Based Power Allocation for Covert Communication in LEO-UAV Cooperative Networks (abstract)
15:54
Secure Satellite Communication Using Shamir’s Secret Sharing-Based Frequency Hopping Technique (abstract)
PRESENTER: Kim Su-Kyoung
15:00-16:15 Session 10B: (Special Session) Formal Verification 2
15:00
UE-Guard: Formal Specification-Based Cellular Attack Detection of False Base Stations and Attacks on UE (abstract)
15:18
A Hybrid EDHOC Protocol (abstract)
15:36
Unified Formal Verification of Security Requirements in the TLS Family (abstract)
15:54
A Scneario Generation for Model-based Testing of TLS using Maude Strategy (abstract)
16:30-17:15 Session 11
Analyzing Temporal Effects of Cumulative Malicious User Injections in Sequential Recommendation (abstract)
PRESENTER: Minje Kim
TLSVerifier: An Automated TLS software Verification Tool Using Model-Based Testing (abstract)
PRESENTER: Jaedeok Lim
A Detection Framework for Identity Protection in Cloud-Based 5G Core Networks (abstract)
PRESENTER: Mirae Kim
A Multi-Agent Framework for Autonomous Generation and Validation of IaC and PaC (abstract)
PRESENTER: Jueun Son
Open-Source Software Supply Chain Attacks: Workflow and Recent Cases (abstract)
PRESENTER: Yejun Lee
A Rate-Distortion Framework for Compressing User Interaction Sequences with Adaptive Preference Disentanglement (abstract)
PRESENTER: Wooseung Kang
An Analysis of Gemini on the Malicious Use of Generative AI for Email Phishing and Malware Creation (abstract)
PRESENTER: Jaebin Lee
Explainable Adversarial-Robust Vision-Language-Action Model for Robotic Manipulation (abstract)
PRESENTER: Ju-Young Kim
Adaptive Circuit Breaker Thresholds in Istio: Comparative Analysis of Sidecar and Ambient Modes (abstract)
PRESENTER: Seoyeon Kang
Fortifying Federated Learning: Advanced Mitigation Strategy for Data Poisoning Attacks (abstract)
PRESENTER: Ming-Feng Tsai
Forensic Analysis of Data Leakage Indicators in Mobile Gemini User Content Interactions (abstract)
PRESENTER: Yewon Kim
Automated Allowed-Only Detection Scenario Based on AWS CloudTrail and Athena (abstract)
PRESENTER: Yeeun Shin
Dynamic Privilege Validation in AWS Environments via CloudTrail-Athena Analysis (abstract)
PRESENTER: Soo-Min Nam
A Survey of MCP Environments: Threats, Vulnerabilities, and Evaluations (abstract)
PRESENTER: Hyungbeom Jang
Spike-Aware Local Music Recommendation: Detecting Event-Driven Anomalies for Secure Streaming (abstract)
PRESENTER: Tae-Han Kim
Training-to-Runtime Supply Chain Attacks on AI Agents (abstract)
PRESENTER: Ilhwan Ha
OpticalFBP: A Deep Optical Imaging Model for Privacy-Protective Facial Beauty Prediction (abstract)
PRESENTER: Jiho Bae
A Realistic Multi-Modal Attack for LiDAR Systems (abstract)
PRESENTER: Minjae Lee
CPU-Based Optimizations Do Not Transfer to CUDA k-Means under Homomorphic Encryption (abstract)
PRESENTER: Ungsik Kim
LLM-based Detection Framework of Memory Vulnerabilities in Stripped Binaries (abstract)
PRESENTER: Youngho Choi
An Optimization Algorithm for Medical Tabular Data Analysis Using Machine Learning and Deep Learning (abstract)
PRESENTER: So-Hee Lim
Structure-Aware NGAP Fuzzer Design for Procedural and State Anomaly Analysis (abstract)
PRESENTER: Nakyung Lee
Predictive Clock-Drift-Aware Wake-up Correction for Wireless Sensor Networks (abstract)
PRESENTER: Yeon-Woo Lee
A MITRE ATT&CK-Based Anomaly Detection System Using Privacy-Preserving Security Data (abstract)
PRESENTER: Hongil Ju
Maritime Cybersecurity: Operational Threat Analysis and Defensive Strategies in OT·IT Convergence (abstract)
PRESENTER: Sarang Na
Effective Strategies for Implementing and Operating a Zero Trust Environment (abstract)
PRESENTER: Seulgi Choi
A Study on the Analysis of Personal Data Stored in Vehicle Telematics Devices (abstract)
PRESENTER: Kyungrok Park
AI-Based Automated Threat Scenario Generation Leveraging the ATT&CK Framework (abstract)
PRESENTER: Sarang Na
A WBC-MAC Framework for Secure Integrity Verification of On-Device AI Models (abstract)
PRESENTER: Junyoung Cho
A Proactive Cyber Threat Response Framework Integrating Real-Time CTI with MITRE ATT&CK and D3FEND Mapping (abstract)
PRESENTER: Rino Jo
Analyzing the Limitations of LLM-Based Multi-cloud Terraform Code Transformation (abstract)
PRESENTER: Yesol Sim
Enhancing LLM-Based IaC Transformation Accuracy Using an AST-Based Approach (abstract)
PRESENTER: Seohee Kim
Orchestrating Security Measures for Legacy Devices in Far-Edge Computing Scenarios (abstract)
Forensic Analysis of Gemini's Facilitation of Malware Generation and Distribution (abstract)
PRESENTER: Gayoon Kim
Enhancing the Flexibility of Cross Domain Solutions through a Zero Trust Overlay Approach (abstract)
PRESENTER: Sangkyu Ham
Proposal for a Linkage between Zero Trust and MLS CDS (abstract)
PRESENTER: Yongjae Lee
Never Trust, Verify Every Transfer: A Zero Trust Perspective on CDS (abstract)
PRESENTER: Yujin Kim
Noninvasive Glucose Prediction and Diabetes Classification With ECG and PPG Derived Domain-Specific Features (abstract)
PRESENTER: Sujin Park
Key Considerations for User Management and Roaming in Military Private 5G (abstract)
PRESENTER: Juseoung Lee
17:15-18:00 Session 12: Poster 2
A Study on Enhancing Security in Private 5G Networks Using Post-Quantum Cryptography (PQC)-Based X.509 Certificates (abstract)
PRESENTER: Juseoung Lee
Validation of Traceability Attacks in NAS Registration Procedure (abstract)
PRESENTER: Donghoon Lee
Research study on the introduction of CDS into ZTA’s 5 Pillars (abstract)
PRESENTER: Yeomin Lee
A Multimodal Framework for Phishing Detection (abstract)
PRESENTER: Gi Hong Kim
Federated Learning in LEO Constellations: A Simulation-Based Study (abstract)
PRESENTER: You Jeong Lee
Analysis of Data Tampering Possibilities and Attack Techniques for EDR Data (abstract)
PRESENTER: Suji Lee
A STIX Schema Design for Interoperable Feature Sharing Among AI Security Models (abstract)
PRESENTER: Taehun Kim
A study on CAN Communication Security Software Design Using Intrusion Alert Messages (abstract)
PRESENTER: Minyoung Chang
A Proposal for a Method to Detect Malicious Nodes Using CAN ACK-Bit Voltage (abstract)
PRESENTER: Dongwon Lee
A Genetic Algorithm Approach to Attack Path Optimization Using Attack Graphs (abstract)
PRESENTER: Lee Jong Eun
High-speed detection technique for encrypted steganography using GPU (abstract)
PRESENTER: Won Seok Choi
PX4 autopilot hijacking strategy (abstract)
PRESENTER: Jiwoo Suh
The Confident Liar: Measuring and Governing Assertive Falsehoods in Persona-Conditioned LLMs (abstract)
PRESENTER: Seokjae Gwon
A Private Blockchain-Based System for Managing the Originality of Digital Evidence (abstract)
PRESENTER: Hae-Yeong Cho
A Privacy-Preserving Framework for Personalized Recommendation Systems (abstract)
PRESENTER: Ye-Jin Lee
A Differential Privacy Noise Allocation Method Based on Attribute Sensitivity (abstract)
PRESENTER: Yu-Na Kim
Comparative Analysis of Reactive-based Obstacle Avoidance for Free Floating Space Robots (abstract)
PRESENTER: Myeongjun Kim
Rank-Based Approach to T-Gate Reduction in Q-Circuits (abstract)
PRESENTER: Jinseob Oh
Multi-factor authentication using electrostatic capacitance (abstract)
PRESENTER: Hohyeon Lim
Formal Verification of Mixing Preshared Keys in IKEv2 Protocol Using Proverif (abstract)
PRESENTER: Changhyeon Woo
Sentra: A Kubernetes Sidecar-Based Multi-Layer Security Gateway for Protecting LLM APIs (abstract)
PRESENTER: Chanuk Park
Weaponizing Infrared Against Lane Detection Systems in Autonomous Vehicles (abstract)
PRESENTER: Hyunmin Ju
Network Fuzzing Framework for Communication Protocol (abstract)
PRESENTER: Hyeon Park
Intrusion Detection Approaches for RESTful Communication in 5G Service-Based Architecture (abstract)
PRESENTER: Youngjae Kim
An LSTM-based Forgery Detection Method for V2X Messages (abstract)
PRESENTER: Kyung-Mo Sung
Selective Adaptive Video Watermarking Technique Against Compression and Frame Deletion Attacks (abstract)
PRESENTER: Chaewan Hong
Real-time Anomaly Detection-enhanced Defense for Dynamic Memory Allocation (abstract)
PRESENTER: Ga-Yeong Kim
Dynamic Link-State-Based Hybrid Communication Scheme for Low Earth Orbit Satellite Networks (abstract)
PRESENTER: Da-eun Yu
A Data-Firmware Aggregated Transmission Mechanism for Efficient Firmware-Over-The-Air of Low Earth Orbit (abstract)
PRESENTER: Na-Hyun Kim
DSWEC: A Saliency-Weighted Defense against Camera Exposure Tampering (abstract)
PRESENTER: Seohyun Kim
Improved Hybrid BKZ-MITM Attack on LWE via Noisy-Search (abstract)
PRESENTER: Sieun Bak
Devilray: Reconfigurable, Evasive and Reference-grade LTE Fake Base Station (abstract)
PRESENTER: Duckwoo Kim
Activation-Guided Fuzzing for Neural Network Analysis (abstract)
PRESENTER: Kim Beomjun
Practical Fault Attacks on DNN Model Using Slope-based SAD Pattern Matching (abstract)
PRESENTER: Gyeongdeok An
On-Device DNN Model Binding with TPM-Backed Selective Layer Encryption (abstract)
PRESENTER: Jiseok Bang
LLM-Agent-Based Legal Compliance Evaluation System (abstract)
PRESENTER: Nara Shin
Frequency-Domain Watermarking-Based QR Code Authentication Against Q-Phishing (abstract)
PRESENTER: Taejin Jung
Reverse-Character Obfuscation for LLM Jailbreak: Bypassing Zero-Shot Safety Filters (abstract)
PRESENTER: Nahyun Kim
Enhanced Security Architecture for Direct Interworking between Commercial 5G and Defense Networks (abstract)
PRESENTER: Jisoo Shin
Thursday, December 18th

View this program: with abstractssession overviewtalk overview

09:00-10:45 Session 13A: Cryptographic Applications and Analysis
09:00
ET-BERT with Adapter Fusion: Time-Efficient Continual Learning Framework for Encrypted Traffic Classification (abstract)
09:18
Split Credential Authentication: A Privacy-Preserving Protocol with Decoupled Authority and Issuer Roles (abstract)
09:36
Ghost Recon: An Orchestration-based, Non-Intrusive, Persistent Multimodal Authentication System (abstract)
09:54
Closing Early Attack Surfaces in Bluetooth Secure Simple Pairing using Identity-Based Signatures (abstract)
PRESENTER: Bae Woori
10:12
Non-Recoverable Signature: Digital Signatures Torelant to Partial Disclosures (abstract)
PRESENTER: Daiki Sasame
10:30
Education Framework of SOME/IP Security Enhancement through Game-Based Learning and Testing Tool Development (abstract)
09:00-10:45 Session 13B: Adaptive Intelligence and System Security 1
09:00
Pareto-Optimized Dynamic Tuner for Anomaly Detection of Battery-Constrained Internet of Things (abstract)
09:18
Real-time Channel Adaptive Guard Interval Adjustment and Secondary Data Transmission Framework (abstract)
PRESENTER: Jung-Min Moon
09:36
Protecting the Preamble: An Adaptive Scheduling Approach for Reliable Multi-Link Operation (abstract)
PRESENTER: Ye-Sin Kim
09:54
Adversarial Attacks on Plausibility Checks in V2X Security (abstract)
PRESENTER: Jungwoo Park
10:12
Design and Evaluation of a Management Target Control Mechanism in a Function for Tracing Diffusion of Classified Information on KVM (abstract)
09:00-10:45 Session 13C: Special Session
Location: Crown Room (3F)
09:00
One Passport to Govern Them All: Bringing Order to IoT Security and Compliance (abstract)
09:18
Replicating Network Topologies through the use of LLMs (abstract)
09:36
Prioritized Multi-Criteria Optimization for Efficient Cloud-Native Application Resource Allocation (abstract)
09:54
Enhancing Privacy in Multi-Domain Network Intent Negotiation (abstract)
10:12
Defending Minds, Not Just Machines: An Agentic Approach to Cognitive Security (abstract)
PRESENTER: Jaime Fúster
10:30
Lightweight Secure Federated Learning for Energy-Constrained IoT: A Case Study in Smart Irrigation (abstract)
11:00-12:00 Session 14A: Digital Asset Protection
11:00
Invisible Watermarking with DWT-SVD for Safeguarding Copyrighted Images against Unauthorized Generative AI Training (abstract)
11:18
Hidden in the Noise: Noise-Embedded Watermarking for Black-Box Image Classifiers (abstract)
11:36
Cross-Artifact Comparative Analysis of Legal and Illegal Korean Streaming Sites (abstract)
11:00-12:00 Session 14B: Adaptive Intelligence and System Security 2
Chair:
11:00
Spatio-Temporal Adaptive Reinforcement Learning for Task Offloading in Mobile Edge Computing (abstract)
11:18
Drain-Like Log Parsing for Distributed Systems: Efficient Template Mining on HDFS Datasets (abstract)
11:36
Friendly-fire: Measurement and Analysis of the Interaction Dynamics Between Anti-Malware and PETs (abstract)
11:00-12:00 Session 14C: Covert Threat Analysis
Location: Crown Room (3F)
11:00
Binary Lifting into LLVM IR with Large Language Models (abstract)
11:18
Classification of Tor Metadata Combinations for Investigation (abstract)
PRESENTER: Yiseul Choi
11:36
ObfSwin: Transformer-based Multi-class Obfuscation Classification for Windows Portable Executable (abstract)
Friday, December 19th

View this program: with abstractssession overviewtalk overview