Date | Program | Time |
---|---|---|
1st day (Jan 8) |
Welcome Dinner (Aegineung Cafeteria) |
17:00 ~ 19:00 |
2nd day (Jan 9) |
Opening Remark (Heejo Lee) | 08:45 ~ 09:00 |
Session-1 (Keynote), 1-TalkChair: Heejo LeeContributions Related to Internet of Things Security Razouk Wissam (Kyushu ISIT) |
09:00 ~ 09:50 |
|
Coffee Break | 09:50 ~ 10:10 | |
Session-2 (Network Security), 5-TalksChair: Yoshiaki HoriAn Approach for Detecting Distributed Cyber-Attacks and Its Evaluation Feng Yaokai (Kyushu ISIT) Traffic Isolation using User Classification for DDoS Defense Kiryong Lee (Korea) Empirical Evaluation of C&C Traffic Detection by Using Machine Learning Kazumasa Yamauchi (Kyushu ISIT) A Post-quantum TLS/SSL for Embedded Systems Chen-Mou Cheng (Kyushu IMI) A Learning Algorithm for the Threshold in Behavior-based PortScan Detection and Its Evaluation Wang Can (Kyushu ISIT) |
10:10 ~ 10:30 10:30 ~ 10:50 10:50 ~ 11:10 11:10 ~ 11:30 11:30 ~ 11:50 |
|
Lunch (Packed lunch) | 11:50 ~ 13:10 | |
Session-3 (Cryptography), 5-TalksChair: Chen-Mou ChengOn Cayley Hash Functions Hyungrok Jo (Kyushu IMI) Anonymous Authentication and Its Application Scenarios Geonwoo Kim (POSTECH ISLab) Confirmer Signatures from McEliece Assumptions Rong Hu (Kyushu IMI) Privacy Preserving in Graph Data Publishing Nguyen Phuong Binh (Postech HPC) A New Progressive BKZ Algorithm Yuntao Wang (Kyushu IMI) |
13:10 ~ 13:30 13:30 ~ 13:50 13:50 ~ 14:10 14:10 ~ 14:30 14:30 ~ 14:50 |
|
Coffee Break | 14:50 ~ 15:10 | |
Session-4 (Malware & System security), 5-TalksChair: Jong KimDroidGraph: Discovering Android Malware by Analyzing Semantic Behavior Jihwan Jeong (Korea) Secure VM-vTPM Live Migration in Vehicular Cloud Nkenyereye Lewis (Pukyong) Integrity Verification Scheme of Video Frames in a Surveillance Camera for Digital Forensic Investigation Choongin Lee (Korea) Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication Kirill Morozov (Kyushu IMI) Detection of Heap-Spraying Attacks using String Trace Graph Beumjin Cho (Postech HPC) |
15:10 ~ 15:30 15:30 ~ 15:50 15:50 ~ 16:10 16:10 ~ 16:30 16:30 ~ 16:50 |
|
Dinner (Aegineung Cafeteria) |
16:50 ~ 19:00 | |
Beer Party (Beer Brothers) |
19:00 ~ | |
3rd day (Jan 10) |
Session-5 (Privacy), 5-TalksChair: Kyung-Hyune RheeA Memory Efficient Variant of an Implementation of the F4 Algorithm for Computing Groebner Bases Yun-ju Huang (Kyushu IMI) Location Obfuscation and Optimization Ngo Xuan Hoa (Postech HPC) Private k-NN Query on Outsourced Database Rui Xu (Kyushu IMI) Size-Efficient Digital Signatures with Appendix by Truncating Unnecessarily Long Hashcode Jinwoo Lee (POSTECH ISLab) On Homomorphic Authentication for Network Coding Chi Cheng (Kyushu IMI) |
09:00 ~ 09:20 09:20 ~ 09:40 09:40 ~ 10:00 10:00 ~ 10:20 10:20 ~ 10:40 |
Coffee Break | 10:40 ~ 11:00 | |
Session-6 (IoT Security), 3-TalksChair: Pil Joong LeeAnalysis of BYOD and Advanced Insider Threat for Evolving Cyber Threat Attacks in Corporate Networks Bright Mawudor Gameli (Pukyong) Exploring and Mitigating Privacy Threats of HTML5 Geolocation API Yoonji Kim (Postech HPC) Study on Security System for V2V Applications in US DoT Myeonghak Heo (Pukyong) |
11:00 ~ 11:20 11:20 ~ 11:40 11:40 ~ 12:00 |
|
Closing Remark (Heejo Lee) | 12:00 ~ |
Payment type | Category | Registration Fee |
---|---|---|
Cash | Student | ₩ 100,000 |
Faculty | ₩ 200,000 | |
Credit Card (10% tax included) |
Student | ₩ 110,000 |
Faculty | ₩ 220,000 |