Linked e-resources
Details
Table of Contents
[I]. Short papers: 1. Security analysis of mobile web browser hardware accessibility : study with ambient light sensors / Sanghak Lee, Sangwoo Ji, Jong Kim
2. HapticPoints : the extended PassPoints graphical password / Trust Ratchasan, Rungrat Wiangsripanawan
3. ADSaS : comprehensive real-time anomaly detection system / Sooyeon Lee, Huy Kang Kim
4. One-pixel adversarial example that is safe for friendly deep neural networks / Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi
5. Efficient ate-based pairing over the attractive classes of BN curves / Yuki Nanjo, Md. Al-Amin Khandaker, Masaaki Shirase, Takuya Kusaka, Yasuyuki Nogami
6. A study on the vulnerability assessment of digital I&C system in nuclear power plant / SungCheol Kim, IeckChae Euom, ChangHyun Ha, JooHyuong Lee, BongNam Noh
7. IP address mutation scheme using vector projection for tactical wireless networks / Jong-Kwan Lee
8. Parallel implementations of CHAM / Hwajeong Seo, Kyuhwang An, Hyeokdong Kwon, Taehwan Park, Zhi Hu, Howon Kim
9. Logarithm design on encrypted data with Bitwise operation / Joon Soo Yoo, Baek Kyung Song, Ji Won Yoon
10. Network deployments of Bitcoin peers and malicious nodes based on Darknet sensor / Mitsuyoshi Imamura, Kazumasa Omote.
[II]. Systems security: 11. VODKA : virtualization obfuscation using dynamic key approach / Jae-Yung Lee, Jae Hyuk Suk, Dong Hoon Lee
12. Reliable rowhammer attack and mitigation based on reverse engineering memory address mapping algorithms / Saeyong Oh, Jong Kim
13. A study on analyzing risk scenarios about vulnerabilities of security monitoring system : focused on information leakage by insider / Kunwoo Kim, Jungduk Kim.
[III]. Analysis and visualization of threats: 14. AlertVision : visualizing security alerts / Jina Hong, JinKi Lee, HyunKyu Lee, YoonHa Chang, KwangHo Choi, Sang Kil Cha
15. A new Bayesian approach to exploring damaged assets by monitoring mission failures cased by undetected attack / Shinwoo Shim, Ji Won Yoon
16. Threat modeling and analysis of voice assistant applications / Geumhwan Cho, Jusop Choi, Hyoungshick Kim, Sangwon Hyun, Jungwoo Ryoo.
[IV]. Applied crypto: 17. Secure comparison protocol with encrypted output and the computation for proceeding 2 bits-by-2 bits / Takumi Kobayashi, Keisuke Hakuta
18. Blockchain-based decentralized key management system with quantum resistance / Hyeongcheol An, Rakyong Choi, Kwangjo Kim
19. A construction of a keyword search to allow partial matching with a block cipher / Yuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyaki Nogami
20. Compact LEA and HIGHT implementations on 8-bit AV and 16-bit MSP processors / Hwajeong Seo, Kyuhwang An, Hyeokdong Kwon.
2. HapticPoints : the extended PassPoints graphical password / Trust Ratchasan, Rungrat Wiangsripanawan
3. ADSaS : comprehensive real-time anomaly detection system / Sooyeon Lee, Huy Kang Kim
4. One-pixel adversarial example that is safe for friendly deep neural networks / Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi
5. Efficient ate-based pairing over the attractive classes of BN curves / Yuki Nanjo, Md. Al-Amin Khandaker, Masaaki Shirase, Takuya Kusaka, Yasuyuki Nogami
6. A study on the vulnerability assessment of digital I&C system in nuclear power plant / SungCheol Kim, IeckChae Euom, ChangHyun Ha, JooHyuong Lee, BongNam Noh
7. IP address mutation scheme using vector projection for tactical wireless networks / Jong-Kwan Lee
8. Parallel implementations of CHAM / Hwajeong Seo, Kyuhwang An, Hyeokdong Kwon, Taehwan Park, Zhi Hu, Howon Kim
9. Logarithm design on encrypted data with Bitwise operation / Joon Soo Yoo, Baek Kyung Song, Ji Won Yoon
10. Network deployments of Bitcoin peers and malicious nodes based on Darknet sensor / Mitsuyoshi Imamura, Kazumasa Omote.
[II]. Systems security: 11. VODKA : virtualization obfuscation using dynamic key approach / Jae-Yung Lee, Jae Hyuk Suk, Dong Hoon Lee
12. Reliable rowhammer attack and mitigation based on reverse engineering memory address mapping algorithms / Saeyong Oh, Jong Kim
13. A study on analyzing risk scenarios about vulnerabilities of security monitoring system : focused on information leakage by insider / Kunwoo Kim, Jungduk Kim.
[III]. Analysis and visualization of threats: 14. AlertVision : visualizing security alerts / Jina Hong, JinKi Lee, HyunKyu Lee, YoonHa Chang, KwangHo Choi, Sang Kil Cha
15. A new Bayesian approach to exploring damaged assets by monitoring mission failures cased by undetected attack / Shinwoo Shim, Ji Won Yoon
16. Threat modeling and analysis of voice assistant applications / Geumhwan Cho, Jusop Choi, Hyoungshick Kim, Sangwon Hyun, Jungwoo Ryoo.
[IV]. Applied crypto: 17. Secure comparison protocol with encrypted output and the computation for proceeding 2 bits-by-2 bits / Takumi Kobayashi, Keisuke Hakuta
18. Blockchain-based decentralized key management system with quantum resistance / Hyeongcheol An, Rakyong Choi, Kwangjo Kim
19. A construction of a keyword search to allow partial matching with a block cipher / Yuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyaki Nogami
20. Compact LEA and HIGHT implementations on 8-bit AV and 16-bit MSP processors / Hwajeong Seo, Kyuhwang An, Hyeokdong Kwon.