Program

Network Security (2:00 PM ~ 3:00 PM)

Assessment of Tor’s Next Generation Onion Services

Jinho Choi, Jin Jeong, Seunggeun Baek

Analysis Man-in-the-Middle Attack on LTE

Soobin Lee

SDN Controller Code Coverage-Driven Fuzz Testing Assuming South Bound Interface Adversary

Hyuntae Kim, Hyunjoo Lee

 

Cryptography and Theory (3:00 PM ~ 4:00 PM)

Homomorphic-Friendly Cipher: Implementation and Revision

Hwigyeom Kim, Jincheol Ha

Analysis on Korean Blockchains

Daegeun Yoon, Hyunjin Choo, Jaewan Hong

Likelihood-based Surprise Adequacy

Euihyun Lee

 

10 Minutes Break (4:00 PM ~ 4:10 PM)

 

Software Security (4:10 PM ~ 5:30 PM)

FuzzRL: Enhancing Fuzzing Scheduling with Reinforcement Learning

Seonghwan Cho, Minkyu Jung, Hyeonwoo Kang, Daejun Kim, Doyeon Kim

THE PIE COOKBOOK: Now, Re-assemble your PIE

Hyungseok Kim

Crash the Flash

Yohan Choi

Side Channel Attack on Zero-Skip Machine Learning Processor

Changhun Song, Myojoon Kil, Kangsu Kim, Dohyeok Kim, Jaeguk Ahn