Program
Network Security (2:00 PM ~ 3:00 PM) |
Assessment of Tor’s Next Generation Onion Services Jinho Choi, Jin Jeong, Seunggeun Baek Analysis Man-in-the-Middle Attack on LTE Soobin Lee SDN Controller Code Coverage-Driven Fuzz Testing Assuming South Bound Interface Adversary Hyuntae Kim, Hyunjoo Lee |
Cryptography and Theory (3:00 PM ~ 4:00 PM) |
Homomorphic-Friendly Cipher: Implementation and Revision Hwigyeom Kim, Jincheol Ha Analysis on Korean Blockchains Daegeun Yoon, Hyunjin Choo, Jaewan Hong Likelihood-based Surprise Adequacy Euihyun Lee |
10 Minutes Break (4:00 PM ~ 4:10 PM) |
Software Security (4:10 PM ~ 5:30 PM) |
FuzzRL: Enhancing Fuzzing Scheduling with Reinforcement Learning Seonghwan Cho, Minkyu Jung, Hyeonwoo Kang, Daejun Kim, Doyeon Kim THE PIE COOKBOOK: Now, Re-assemble your PIE Hyungseok Kim Crash the Flash Yohan Choi Side Channel Attack on Zero-Skip Machine Learning Processor Changhun Song, Myojoon Kil, Kangsu Kim, Dohyeok Kim, Jaeguk Ahn |