https://kiisc.or.kr
/society/kiisc/homepage/bbs/pe/article/1339
https://kiisc.or.kr/society/kiisc/homepage/bbs/pe/article/1339


홈 > 학회행사

학회행사    WISA 2020 (KOREAN PARTICIPANTS)



WISA 2020 

일시 : 2020년 8월 26일(수) ~ 28(금)

장소 : 제주메종글래드호텔 (온오프 병행 학술대회), 유튜브 온라인 실시간 중계

*현장 유튜브 생중계 진행 (크리스탈룸1 세션 1,3,5,7,9)

- 해외 거주 외국저자, 구두논문 중 국내 일부논문(3): 사전에 촬영된 동영상이 유튜브로 중계 (크리스탈룸2 세션2,4,6,8,10)

- 포스터세션: 학회 유튜브 계정에 행사 기간 내 동영상 업로드

- Keynote, Tutorial: Zoom, 유튜브 중계

등록비:

일반 학생
700,000 500,000

사전등록
- 학회 홈페이지(www.kiisc.or.kr)에서 접속할 경우학술행사 → 학회행사 → 사전등록 바로가기 → 학술행사 선택
- 학생의 경우 kiisc@kiisc.or.kr 로 학생증 사본 송부
- 계좌번호 : 국민은행 754-01-0008-146 (예금주 : 한국정보보호학회)
- 사전등록 시 등록비는 위의 계좌로 송금하시고, 입금자가 대리일 경우 통보바랍니다.
- 신용카드 결제 시 계산서 발급이 불가합니다. (부가가치세법 시행령 제57조)
- 사전등록 시 (2~3일 이내) 기재해주신 이메일로 청구용 계산서가 발행되오니 영수용 계산서가 필요하신 경우 미리 학회로 연락바랍  니다.

-LNCS (Lecture Notes in Computer Science, Springer 출판) 인쇄물 책자 구매를 원하시는 경우, 등록창에서 등록비 + LNCS를 선택하여 결제해 주시기 바랍니다. (행사 종료 후 6개월 후 발행)

 

- 저자 등록 마감 8/10(월)
- 일반 등록자 사전등록 마감: 8/18(화)

 

* 메모에  제주 메종글래드 호텔에서 진행 예정인 paper discussion session 참석 여부 기재해 주시기 바랍니다.

* 구두논문과 포스터 논문 리스트는 첨부파일 다운로드 하시기 바랍니다.

[프로그램]

- Recorded Online Presentation: Keynote 1, Keynote 2, Tutorial 1, Tutorial2, Session 2, Session 4, Session 6, Session 8, Session 10
- Live Online Presentation: Session 1, Session 3, Session 5, Session 7, Session 9

* indicates that the associate session is based on live online presentation and its presenters should give the presentation at the venue (for example: Session 1*)

<< Aug. 25 (Tuesday) >>

 16:30~18:30 Welcome Reception (Jade Room)

..................................................................................................................................

<< Aug. 26 (Wednesday) >>

13:30~14:30 Opening Ceremony (Crystal Room)

 

14:30~15:00 Break Time

 

15:00~16:30 Session 1*: AI Security and Intrusion Detection 1 (Crystal Room1)

Session Chair: TBD

 

Spatially Localized Perturbation GAN (SLP-GAN) for Generating Invisible Adversarial Patches

Yongsu Kim, Hyoeun Kang, Afifatul Mukaroh, Naufal Suryanto, Harashta Tatimma Larasati and Howon Kim

 

Detecting Block Cipher Encryption for Defense against Crypto Ransomware on Low-end Internet of Things

Hyunji Kim, Jaehoon Park, Hyeokdong Kwon, Kyoungbae Jang, Seungju Choi and Hwajeong Seo

 

CAPTCHAs Are Still in Danger: An Efficient Scheme to Bypass Adversarial CAPTCHAs

Dongbin Na, Namgyu Park, Sangwoo Ji and Jong Kim

 

 

15:00~16:30 Session 2: Cryptography 1 (Crystal Room2)

Session Chair: TBD

 

3-Party Adversarial Steganography

Ishak Meraouche, Sabyasachi Dutta and Kouichi Sakurai

 

Accessibility Service Utilization Rates in Android Applications Shared on Twitter

Shuichi Ichioka, Estelle Pouget, Takao Mimura, Jun Nakajima and Toshihiro Yamauchi

 

Novel Reversible Acoustic Steganography Based on Carrier Orthogonality

Hung-Jr Shiu, Fang-Yie Leu, Chun-Ming Lai, and Yu-Chun Huang

 

 

 

16:30~17:00 Break Time

17:00~18:30 Session 3*: Application, System, and Hardware Security 1 (Crystal Room1)

Session Chair: TBD

 

Compact Implementation of CHAM Block Cipher on Low-End Microcontrollers

Hyeokdong Kwon, Hyunji Kim, Seung Ju Choi, Kyoungbae Jang, Jaehoon Park, Hyunjun Kim and Hwajeong Seo

 

The Gravy Value: A Set of Features for Pinpointing BOT Detection Method

Semi Park and Kyungho Lee

 

Impact of Optimized Operations A · B, A · C for Binary Field Inversion on Quantum Computers

Kyoungbae Jang, Seung Ju Choi, Hyeokdong Kwon, Zhi Hu and Hwajeong Seo

 

 

17:00~18:30 Session 4: Cryptography 2 (Crystal Room2)

Session Chair: TBD

 

Identity-based Unidirectional Proxy Re-Encryption in Standard Model: A Lattice-based Construction

Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Joonsang Baek and Partha Sarathi Roy

 

Efficient algorithm for computing odd-degree isogenies on Montgomery curves

Kenta Kodera, Chen-Mou Cheng and Atsuko Miyaji

 

An Efficient Implementation of AES on 8-bit AVR-based Sensor Nodes

Youngbeom Kim and Seog Chung Seo

 

..................................................................................................................................

<< Aug. 27 (Thursday) >>

 

09:00~10:30 Session 5*: Application, System, and Hardware Security 2 (Crystal Room 1)

Session Chair: TBD

 

Virtualization Technologies in the Android Framework and Compatibility with SEAndroid

Jaehyeon Yoon, Tu Chau Ngoc, Hoang Nguyen Huy and Souhwan Jung

 

Toward a Fine-Grained Evaluation of the Pwnable CTF: Extracting Common Assessment Points

Sungkyung Kim, Euntae Jang and Ki-Woong Park

 

A Statistical Approach Towards Fraud Detection in the Horse Racing

Moohong Min, Jemin Lee, Hyunbeom Park, Hyojoung Shin and Kyungho Lee

 

 

09:00~10:30 Session 6: Cryptography 3 (Crystal Room2)

Session Chair: TBD

 

Revisiting the Minrank Problem on Multivariate Cryptography

Yacheng Wang, Yasuhiko Ikematsu, Shuhei Nakamura and Tsuyoshi Takagi

 

Paid And Anonymous Usage Of Cloud Software

Kun Peng

 

Optimization of PBKDF2-HMAC-SHA256 and PBKDF2-HMAC-LSH256 in CPU Environments

Hojin Choi and Seog Chung Seo

 

Cryptanalysis of Two Fully Anonymous Attribute-Based Group Signature Schemes with Verifier-Local Revocation from Lattices

Yanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia

 

10:30~11:00 Break Time

 

11:00~12:00 Keynote 1 (Crystal Room)

Session Chair: TBD

 

Title: An Extended View of Resilience

Prof. Matt Bishop (University of California, Davis, USA)

12:00~13:30 Lunch Break

 

13:30~14:30 Keynote 2 (Crystal Room)

Session Chair: TBD

 

 

Title: Training Verifiably Robust Malware Classifiers

Prof. Suman Jana (Columbia University, USA)

 

 

14:30~15:00 Break Time

 

15:00~16:30 Session 7*: Cyber Security (Crystal Room 1)

Session Chair: TBD

 

Filtering-based Correlation Power Analysis (CPA) with signal envelopes against shuffling methods

Youngbae Jeon and Ji Won Yoon

 

The Proposal of Risk Informed Cyber Security Assessment Methodology in Nuclear Power Plant

Ieck-Chae Euom and Sangjoon Lee

 

Security Problems of 5G Voice Communication

Seongmin Park, Hyungjin Cho, Youngkwon Park, Bomin Park, Dowon Kim and Kangbin Yim

 

 

15:00~16:30 Session 8: Application, System, and Hardware Security 2 (Crystal Room 2)

Session Chair: TBD

 

On the Cost-Effectiveness of TrustZone Defense on ARM Platform

Naiwei Liu, Meng Yu, Wanyu Zang and Ravi Sandhu

 

Detection on GPS spoofing in location based mobile games

Shing Ki Wong and Siu Ming Yiu

 

Push For More: On Comparison of Data Augmentation and SMOTE With Optimised Deep Learning Architecture For Side-Channel

Yoo-Seung Won, Dirmanto Jap and Shivam Bhasin

 

16:30~17:00 Break Time

17:00~18:30 Tutorial 1 (Crystal Room1)

Session Chair: TBD

 

Title: Graphical Models and Analysis for Cybersecurity

Prof. Dongseong Kim (The University of Queensland, Australia)

 

 

17:00~18:30 Tutorial 2 (Crystal Room2)

Session Chair: TBD

 

Title: Authenticated Key Exchange from Weak Secrets

Dr. SeongHan Shin (National Institute of Advanced Industrial Science and Technology, Japan)

 

 

...........................................................................................................................................................................................

<< Aug. 28 (Friday) >>

 

09:00~10:30 Session 9*: AI Security and Intrusion Detection 2 (Crystal Room1)

Session Chair: TBD

 

Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less labeling Effort

Kyung Ho Park, Eunji Park and Huy Kang Kim

 

Entropy-based Feature Grouping in Machine Learning for Android Malware Classification

Hyunseok Shim and Souhwan Jung

 

DLDDO: Deep Learning to Detect Dummy Operations

Jonghyeok Lee and Dong-Guk Han

 

 

09:00~10:30 Session 10: Advances in Network Security and Attack Defense (Crystal Room2)

Session Chair: TBD

 

Analysis on Malicious Residential Hosts Activities Exploited by Residential IP Proxy Services

Akihiro Hanzawa and Hiroaki Kikuchi

 

Insights into Attacks' Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks

Ahmed Abusnaina, Mohammed Abuhamad, Daehun Nyang, Songqing Chen, An Wang
and David Mohaisen

 

Methods to Select Features for Android Malware Detection Based on the Protection Level Analysis

Chaeeun Lee, Eunnarae Ko and Kyungho Lee

 

 

10:30~11:00 Break Time

 

 

11:00~12:00 Closing Ceremony (Crystal Room)

.........................................................................................................................................................................................................................................................................................

 

The 2020 WISA Poster Session

 

Chair Hwankuk Kim (Sangmyung University, Korea)

 

(1) Cryptography & Authentication

 

Poster: Acceleration of Pairing Product Operation Using Precomputation
Seong-Yun Jeon and Mun-Kyu Lee

 

Poster: Ternary Encoding Algorithm for Integer Comparison using Multiple Inner Products
Turabek Gaybullaev and Mun-Kyu Lee

 

Poster: Compactly Committing Authenticated Encryption Based on Lesamnta-LW
Shoichi Hirose

 

Poster: Pilot Evaluation of BlindLoginV2 Graphical Password System for the Blind and Visually Impaired
Yean Li Ho, Michael Teck Hong Gan, Siong Hoe Lau and Afizan Azman

 

Poster: Random Word Error-based Improved Differential Fault Attack on LEA
Seong-Hyuck Lim, Jong-Hyeok Lee and Dong-Guk Han

 

Poster: TVLA Statistics Test for SEED Hardware Implementation
Jaegeun Moon, Tae-Ho Lee, Yoo-Jin Baek and Dong-Guk Han

 

Poster: Novel Single-Trace ML profiling Attack on NIST Round 2 Candidate Masked qTESLA Digital Signature Algorithm
Il-Ju Kim, Bo-yeon Sim, Taeho Lee, Jaeseung Han and Dong-Guk Han

 

Poster: Efficient Method of CPA on Bitslice Block Ciphers
Jaeseung Han, Yeon-Jae Kim, Soo-jin Kim, Bo-Yeon Sim and Dong-Guk Han

 

Poster: Novel Differential Fault Attack Utilizing Multiple Fault Injection
Han-Byeol Park, Han-Seop Lim, Jong-Hyeok Lee and Dong-Guk Han

 

Poster: Faster ECC Scalar Multiplication on FPGA
Asep Muhamad Awaludin, Jonguk Park and Howon Kim

 

 

Poster: Novel Single-Trace Attack on Countermeasures against Instruction-related Timing Attack
- NIST 2-Round LAC and HQC -
Bo-Yeon Sim and Dong-Guk Han

 

Poster: Proposal for User Authentication Method using FIDO based Password Management
Hyunjin Kim, Seongmin Yoo, Jaecheol Ryou and Seokjin Choi

 

 

(2) Advanced Cyber Threat Response

 

Poster: Ensuring Safety of Medical Cyber Physical Systems Through Misbehavior Detection of Integrated Medical Embedded IoT Devices - A Case Study of Patient-Controlled Analgesia
Philip Virgil Astillo, Gaurav Choudhary, Jiyoon Kim, Hoonyong Park, Ilsun You and Ing-Ray Chen

 

Poster: Research on cyber threat intelligence sharing model utilizing cloud computing in a smart city
Hoonyong Park, Jaejun Heo, Bonam Kim and Ilsun You

 

Poster: Analysis of SMB Protocol Vulnerability - Will there be a second WannaCry crisis? -
Woosung Yun, Yeseong Hwang, Jieon Kim, Jaeyeon Lee, Sukdea Yu and Sangjin Lee

 

Poster: Dynamic Mobile App Unpacking Based on Bytecode Instrumentation
Geochang Jeon, Sunjun Lee and Jeong Hyun Yi

 

Poster: Method of Generating a Blacklist for Mobile Devices by Searching Malicious Websites
Takashi Ishihara, Masaya Sato and Toshihiro Yamauchi

 

Poster: Parallel De-concealment of SUCI using GPU for 5G Multi-Access
Chan-Guk Jang, Juhong Han and Okyeon Yi

 

Poster: Study on Method to Evaluate Impact of Security Configuration Scanning Tool on PLC
Hansaem Wi, Jinhyeok Oh, Juhong Han, ChanGuk Jang, Yeop Chang, Okyeon Yi

Poster: Comparative Analysis of Security Vulnerability Response Policy and the Role of the Government

Ji-Hun Lim, Sang-Pil Yoon and Hun-Yeong Kwon

 

Poster: Identification of device motion status via Bluetooth discovery
Shing Ki Wong and Siu Ming Yiu

 

Poster: HAL based resource manipulation monitoring on AOSP
Thien Phuc Doan and Souhwan Jung

 

StreamingHyp Streaming Data in Lightweight Hypervisor Environment
Hoang Nguyen Huy and Souhwan Jung

 

 

Poster: The Impact of Almost Identical Techniques On Android Security
Ngoc-Tu Chau and Souhwan Jung

 

(3) Applying AI Security

 

Poster: Black-box Attacks by Retraining Substitute Model using Adversarial Training
Gwonsang Ryu, Hosung Park and Daeseon Choi

 

Poster: Comparison of Federated learning and Original learning using Numeric data
Jinhyeok Jang and Daeseon Choi

 

Poster: Building Novel CNN-Based Intrusion Detection System
Wooyeon Jo, Sungjin Kim and Taeshik Shon

 

Poster: Deep Mobile Malware Detection and Classification Based on Supervised CNN
Younghun Ban, Eunbyeol Ko, Jinsung Kim and Jeong Hyun Yi

 

Poster: Design of Machine Learning based Side Channel Attack Models for Effective Non-Profiling Analysis
Jaegeun Moon, Tae-Ho Lee, Yoo-Jin Baek and Dong-Guk Han

 

Poster: ML Profiling Attack with traces collected from other boards and cards
Taeho Lee, Seong-Hyuck Lim, Jaeseung Han and Dong-Guk Han

 

Poster: Anomaly Detection using Interpretable Probabilistic K Nearest Neighbor Classification
Hyeonjun Ju and Jiwon Yoon

 

Poster: AdMat: From Malware Detection To Image Classification
Long Nguyen-Vu and Souhwan Jung

 

(4) Blockchian & Data Security

Poster: Risk Assesment of “Ostrich ZIP”
Michihiro Nakayama and Akira Kanaoka

 

Poster: Proposal of a Data Sharing Framework for Implementing a Fully Decentralized Data Sharing Society
Siwan Noh and Kyung-Hyune Rhee

 

Poster: Linkability Concerns of Smart Contracts within Federated Learning Schemes
Siwan Noh and Kyung-Hyune Rhee

 

Poster: Implementation of Data Sharing Model for the Connected Car based on Hyperledger Fabric
Byeong-Gyu Jeong, Kangwoo Cho and Sang Uk Shin

 

Poster: On Blockchain Enhanced Secure Data Storage and Sharing in Vehicular Edge Computing Networks
Muhammad Firdaus and Kyung-Hyune Rhee

 

Poster: A Design of a Blockchain-based Auction Service for Understanding Performance Characteristics
Minsun Shim, Hyesong Kim, Hayoung You, Jiyoung Lee and Hyung-Jong Kim

 

Poster: Blockchain Service Model Framework for Fake News Prevention
Lee Won Park and Hangbae Chang

 

Poster: S-DEB : Self-Destructible Electronic Bracelets for personal information protection in Quarantine Monitoring System
Sung-Kyu Ahn, Hyelim Jung, Sung-Kyung Kim and Ki-Woong Park

 

 


사전등록 바로가기 목록