default search action
24th WISA 2023: Jeju Island, South Korea
- Howon Kim, Jonghee M. Youn:
Information Security Applications - 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers. Lecture Notes in Computer Science 14402, Springer 2024, ISBN 978-981-99-8023-9
Cryptography
- Naoki Shibayama, Yasutaka Igarashi:
A New Higher Order Differential of LCB. 3-15 - Hyungrok Jo, Junji Shikata:
Bloomier Filters on 3-Hypergraphs. 16-26 - Hyun Jung Doh, Joon Soo Yoo, Miyeon Hong, Kang Hoon Lee, Tae Min Ahn, Ji Won Yoon:
Principal Component Analysis over the Boolean Circuit Within TFHE Scheme. 27-39 - Yasuhiko Ikematsu, Hyungrok Jo, Takanori Yasuda:
A Security Analysis on MQ-Sign. 40-51
Network and Application Security
- Eunyoung Kim, Kiwook Sohn:
Research on Security Threats Using VPN in Zero Trust Environments. 55-66 - Yan Zhang, Yuhao Bai, Soojin Lee, Ming Li, Seung-Hyun Seo:
A Blockchain-Based Mobile Crowdsensing and Its Incentive Mechanism. 67-78 - Aji Teguh Prihatno, Naufal Suryanto, Harashta Tatimma Larasati, Yustus Eko Oktian, Thi-Thu-Huong Le, Howon Kim:
A New Frontier in Digital Security: Verification for NFT Image Using Deep Learning-Based ConvNeXt Model in Quantum Blockchain. 79-90 - Ilhwan Ji, Seungho Jeon, Jung-Taek Seo:
AE-LSTM Based Anomaly Detection System for Communication Over DNP 3.0. 91-104
Privacy and Management
- Hyunsik Na, Yoonju Oh, Wonho Lee, Daeseon Choi:
Systematic Evaluation of Robustness Against Model Inversion Attacks on Split Learning. 107-118 - Seong-Su Yoon, Do-Yeon Kim, Ga-Gyeong Kim, Ieck-Chae Euom:
Vulnerability Assessment Framework Based on In-The-Wild Exploitability for Prioritizing Patch Application in Control System. 119-130 - Yustus Eko Oktian, Uk Jo, Simon Oh, Hanho Jeong, Jaehyun Kim, Thi-Thu-Huong Le, Howon Kim:
Patchman: Firmware Update Delivery Service Over the Blockchain for IoT Environment. 131-142 - Hiroki Kuzuno, Tomohiko Yano, Kazuki Omo, Jeroen van der Ham, Toshihiro Yamauchi:
Security Risk Indicator for Open Source Software to Measure Software Development Status. 143-156
Attacks and Defenses
- Hattan Althebeiti, Ran Gedawy, Ahod Alghuried, Daehun Nyang, David Mohaisen:
Defending AirType Against Inference Attacks Using 3D In-Air Keyboard Layouts: Design and Evaluation. 159-174 - Jaewoo Park, Hong Eun Ahn, Leo Hyun Park, Taekyoung Kwon:
Robust Training for Deepfake Detection Models Against Disruption-Induced Data Poisoning. 175-187 - Irshad Khan, Young-Woo Kwon:
Multi-class Malware Detection via Deep Graph Convolutional Networks Using TF-IDF-Based Attributed Call Graphs. 188-200 - Donghyun Kim, Seungho Jeon, Jiho Shin, Jung-Taek Seo:
OCR Meets the Dark Web: Identifying the Content Type Regarding Illegal and Cybercrime. 201-212 - Hattan Althebeiti, David Mohaisen:
Enriching Vulnerability Reports Through Automated and Augmented Description Summarization. 213-227
Hardware and Software Security
- Seon Ha, Hyungon Moon:
Protecting Kernel Code Integrity with PMP on RISC-V. 231-243 - Seungyeon Bae, Taehun Kim, Woomin Lee, Youngjoo Shin:
Exploiting Memory Page Management in KSM for Remote Memory Deduplication Attack. 244-256 - Yonggon Park, Youngjoo Ko, Jong Kim:
Mutation Methods for Structured Input to Enhance Path Coverage of Fuzzers. 257-268 - Ryo Watanabe, Nasratullah Ghafoori, Atsuko Miyaji:
Improved Differential-Linear Cryptanalysis of Reduced Rounds of ChaCha. 269-281 - Seungho Jeon, Jung-Taek Seo:
SP-Fuzz: Fuzzing Soft PLC with Semi-automated Harness Synthesis. 282-293
Post-Quantum Cryptography and Quantum Cryptanalysis
- Harashta Tatimma Larasati, Howon Kim:
Quantum Circuit Designs of Point Doubling Operation for Binary Elliptic Curves. 297-309 - Wonwoong Kim, Yeajun Kang, Hyunji Kim, Kyungbae Jang, Hwajeong Seo:
PQ-DPoL: An Efficient Post-Quantum Blockchain Consensus Algorithm. 310-323 - Minjoo Sim, Hyeokdong Kwon, Siwoo Eum, Gyeongju Song, Minwoo Lee, Hwajeong Seo:
Efficient Implementation of the Classic McEliece on ARMv8 Processors. 324-337 - Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, Minwoo Lee, Hwajeong Seo:
Evaluating KpqC Algorithm Submissions: Balanced and Clean Benchmarking Approach. 338-348
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.