Program

Day 1 | July 26

 

08:30-09:00 Registration

 

09:00-09:30 Welcome by Conference Chairs and Local Chair

 

09:30-10:30 Keynote

TBA

Simon Tjoa

St. Pölten University of Applied Sciences, Austria

 

10:30-11:00 Networking Break

 

11:00-12:00 Session 1: Malware

Session Chair: TBA

 

Android Malware Detection using Feature Selections and Random Forest

Taehoon Eom1, Heesu Kim1, SeongMo An1, Jong Sou Park1 and Dong Seong Kim2

1Korea Aerospace University, Korea

2University of Canterbury, New Zealand

 

Dynamic Internet of Things Malware Detection Using Machine Learning

Jonathan Myers1, Tae (Tom) Oh1, Ohan Filbach1, William McDonnell1, Tappan Ajmera1, Young Ho Kim2 and Jeong Neyo Kim2

1Rochester Institute of Technology, USA

2ETRI, Korea

 

An Adaptive Dataset for the Evaluation of Android Malware Detection Techniques

Omar Hreirati, Shahrear Iqbal and Mohammad Zulkernine

Queen’s University, Canada

 

12:00-13:30 Lunch

 

13:30-15:10 Session 2: Crypto & Cryptocurrencies

Session Chair: TBA

 

Preventing Bitcoin Selfish Mining Using Transaction Creation Time

Jihye Lee and Yoonjeong Kim

Seoul Women’s University, Korea

 

Detecting Cryptography through IR Visualization

Patrick Kochberger and Florian Seitly

St. Pölten University of Applied Sciences, Austria

 

A Study on Document Password Management using the Trust-chain based SPT

Hyung-Jong Kim and Soyeon Park

Seoul Women’s University, Korea

 

Blockchain and the Protection of Patient Information: Using Blockchain to Protect the Information of Patients in Line with HIPAA

Colin DeLeon1, Young B. Choi1 and Jungwoo Ryoo2

1Regent University, USA

2Penn State Altoona, USA

 

HNF Implementation Strategy Analysis for Lattice Cryptography

Hyemin Yun1, Yoonjeong Kim1 and Seongan Lim2

1Seoul Women’s University, Korea

2Ewha Womans University, Korea

 

15:10-15:40 Networking Break

 

15:40-17:00 Session 3: IoT

Session Chair: TBA

 

An Attack Vector for IoT Networks

Ryan Pipetti, Nicholas McIntyre, Jonathan Todd and Syed Rizvi

Penn State Altoona, USA

 

A Case Study: BDA Model for Standalone Radar System

Seungcheol Choi1, Yonghyun Kim2, Donghwa Kim2, Oh-Jin Kwon1 and Joonhyung Cho1

1Sejong University, Korea

2Agency for Defense Development, Korea

 

An IoT Risk Analysis Approach for Smart Homes

Jungwoo Ryoo1 and Simon Tjoa2

1Penn State Altoona, USA

2St. Pölten University of Applied Sciences, Austria

 

A Study on the Privacy Protection Layer for Android IoT Services

Hyung-Jong Kim and Hae-Young Lee

Seoul Women’s University, Korea

 

18:00-20:00 Conference Dinner

 


Day 2 | July 27

 

09:00-09:30 Registration

 

09:30-10:30 Invited Speech

TBA

Simon Woo

SUNY Korea, Korea

 

10:30-11:00 Networking Break

 

11:00-12:00 Session 4: Secure Development

Session Chair: TBA

 

Towards Eliciting and Analyzing Security Requirements using Ontologies through Use Case Scenarios

Omar Ochoa, Jessica Steinmann and Yevgeniy Lischuk

Embry-Riddle Aeronautical University, USA

 

A comparison of online JavaScript obfuscators

Sampsa Rauti and Ville Leppänen

University of Turku

 

Integrating Security in Cloud Application Development Cycle

Marwa Elsayed and Mohammad Zulkernine

Queen’s University, Canada

 

12:00-13:30 Lunch

 

13:30-14:50 Session 5: Multimedia Security

Session Chair: TBA

 

Hey Siri – are you there?: Jamming of voice commands using the resonance effect

Taekkyung Oh, William Aiken, Hyoungshick Kim

Sungkyunkwan University, Korea

 

Discrimination of Facial Image Generated via GAN

Hyo-Kyung Choi and Eun-Jung Choi

Seoul Women’s University, Korea

 

Ignore the Noise: Using Autoencoders against Adversarial Attacks in Reinforcement Learning

William Aiken and Hyoungshick Kim

Sungkyunkwan University, Korea

 

The Image Forensics Analysis of Jpeg Image Manipulation

SeungJu Cha, UiJung Kang and EunJung Choi

Seoul Women’s University, Korea

 

14:50-15:20 Networking Break

 

15:20-16:20 Session 6: Security Education

Session Chair: TBA

 

An Analysis of Research Trends in Computer Security over the Last Decade

Daehwa Lee and Hyoungshick Kim

Sungkyunkwan University, Korea

 

Proposal for a Capture The Flag competition to take place at a future conference

Adam D. Brogdon

Penn State Altoona, USA

 

Building a DNS Security Range in a Closed Network

Hae Young Lee, Hyun Min Park, Kyu Don Hwang, GyeongTae Min and Young Sun Park

DuDu IT, Korea

 

How to Measure Similarity between Source Codes of Cryptocurrencies for Detecting Plagiarism

Wonseok Choi and Hyoungshick Kim

Sungkyunkwan University, Korea

 

16:20-16:50 Closing