Abstract is missing.
- LOM: Lightweight Classifier for Obfuscation MethodsJeongWoo Kim, Seoyeon Kang, Eun-Sun Cho, Joon-Young Paik. 3-15 [doi]
- A Method for Collecting Vehicular Network Data for Enhanced Anomaly DetectionSamuel De La Motte, Jin B. Hong. 16-27 [doi]
- Unsupervised Driver Behavior Profiling Leveraging Recurrent Neural NetworksYoung Ah Choi, Kyung Ho Park, Eunji Park, Huy Kang Kim. 28-38 [doi]
- On the Robustness of Intrusion Detection Systems for Vehicles Against Adversarial AttacksJeongseok Choi, Hyoungshick Kim. 39-50 [doi]
- A Framework for Generating Evasion Attacks for Machine Learning Based Network Intrusion Detection SystemsRaymond Mogg, Simon Yusuf Enoch, Dong Seong Kim 0001. 51-63 [doi]
- Echo-Guard: Acoustic-Based Anomaly Detection System for Smart Manufacturing EnvironmentsChang-Bae Seo, Gyuseop Lee, Yeonjoon Lee, Seung-Hyun Seo. 64-75 [doi]
- Research on Improvement of Anomaly Detection Performance in Industrial Control SystemsSungho Bae, Chanwoong Hwang, TaeJin Lee. 76-87 [doi]
- Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve Discrete Logarithm ProblemHarashta Tatimma Larasati, Howon Kim. 91-104 [doi]
- Anonymous IBE from PEKS: A Generic ConstructionHyun Sook Rhee, Dong Hoon Lee 0001. 105-118 [doi]
- Secure Computation of Shared Secrets and Its ApplicationsXin Liu, Willy Susilo, Joonsang Baek. 119-131 [doi]
- Pattern Matching over Encrypted Data with a Short CiphertextJongkil Kim, Willy Susilo, Yang-Wai Chow, Joonsang Baek, Intae Kim. 132-143 [doi]
- Efficient Adaptation of TFHE for High End-to-End ThroughputKanghoon Lee, Ji Won Yoon. 144-156 [doi]
- AnyTRNG: Generic, High-Throughput, Low-Area True Random Number Generator Based on Synchronous Edge SamplingAsep Muhamad Awaludin, Derry Pratama, Howon Kim. 157-168 [doi]
- Masked Implementation of PIPO Block Cipher on 8-bit AVR MicrocontrollersHyunjun Kim, Minjoo Sim, Siwoo Eum, Kyungbae Jang, Gyeongju Song, HyunJi Kim, Hyeokdong Kwon, Wai-Kong Lee, Hwajeong Seo. 171-182 [doi]
- Parallel Implementation of PIPO Block Cipher on 32-bit RISC-V ProcessorYuJin Kwak, YoungBeom Kim, Seog Chung Seo. 183-193 [doi]
- No Silver Bullet: Optimized Montgomery Multiplication on Various 64-Bit ARM PlatformsHwajeong Seo, Pakize Sanal, Wai-Kong Lee, Reza Azarderakhsh. 194-205 [doi]
- ARMed Frodo - FrodoKEM on 64-Bit ARMv8 ProcessorsHyeokdong Kwon, Kyungbae Jang, Hyunjun Kim, HyunJi Kim, Minjoo Sim, Siwoo Eum, Wai-Kong Lee, Hwajeong Seo. 206-217 [doi]
- Quantitative Analysis on Attack Capacity in Meltdown-Type AttacksSeokMin Lee, Taehun Kim, Youngjoo Shin. 218-228 [doi]
- Adaptive Network Security Service Orchestration Based on SDN/NFVPriyatham Ganta, Kicho Yu, Dharma Dheeraj Chintala, Younghee Park. 231-242 [doi]
- A General Framework for Matching Pattern Hiding in Deep Packet InspectionJinghang Wen, Jia-Nan Liu, Axin Wu, Jia-Si Weng. 243-254 [doi]
- A Privacy-Preserving Payment Model for EV ChargingJane Kim, Soojin Lee, Seung-Hyun Seo. 255-264 [doi]
- Measuring Healthcare Data BreachesMohammed Alkinoon, Sung J. Choi, David Mohaisen. 265-277 [doi]
- BadASLR: Exceptional Cases of ASLR Aiding ExploitationDaeHee Jang. 278-289 [doi]