Abstract is missing.
- A New Higher Order Differential of LCBNaoki Shibayama, Yasutaka Igarashi. 3-15 [doi]
- Bloomier Filters on 3-HypergraphsHyungrok Jo, Junji Shikata. 16-26 [doi]
- Principal Component Analysis over the Boolean Circuit Within TFHE SchemeHyun Jung Doh, Joon Soo Yoo, Miyeon Hong, Kang Hoon Lee, Tae Min Ahn, Ji Won Yoon. 27-39 [doi]
- A Security Analysis on MQ-SignYasuhiko Ikematsu, Hyungrok Jo, Takanori Yasuda. 40-51 [doi]
- Research on Security Threats Using VPN in Zero Trust EnvironmentsEunyoung Kim, Kiwook Sohn. 55-66 [doi]
- A Blockchain-Based Mobile Crowdsensing and Its Incentive MechanismYan Zhang, Yuhao Bai, Soojin Lee, Ming Li 0029, Seung-Hyun Seo. 67-78 [doi]
- A New Frontier in Digital Security: Verification for NFT Image Using Deep Learning-Based ConvNeXt Model in Quantum BlockchainAji Teguh Prihatno, Naufal Suryanto, Harashta Tatimma Larasati, Yustus Eko Oktian, Thi-Thu-Huong Le, Howon Kim 0001. 79-90 [doi]
- AE-LSTM Based Anomaly Detection System for Communication Over DNP 3.0Ilhwan Ji, Seungho Jeon, Jung-Taek Seo. 91-104 [doi]
- Systematic Evaluation of Robustness Against Model Inversion Attacks on Split LearningHyunsik Na, Yoonju Oh, Wonho Lee, Daeseon Choi. 107-118 [doi]
- Vulnerability Assessment Framework Based on In-The-Wild Exploitability for Prioritizing Patch Application in Control SystemSeong-Su Yoon, Do Yeon Kim, Ga-Gyeong Kim, Ieck-Chae Euom. 119-130 [doi]
- Patchman: Firmware Update Delivery Service Over the Blockchain for IoT EnvironmentYustus Eko Oktian, Uk Jo, Simon Oh, Hanho Jeong, Jaehyun Kim, Thi-Thu-Huong Le, Howon Kim 0001. 131-142 [doi]
- Security Risk Indicator for Open Source Software to Measure Software Development StatusHiroki Kuzuno, Tomohiko Yano, Kazuki Omo, Jeroen van der Ham, Toshihiro Yamauchi. 143-156 [doi]
- Defending AirType Against Inference Attacks Using 3D In-Air Keyboard Layouts: Design and EvaluationHattan Althebeiti, Ran Gedawy, Ahod Alghuried, DaeHun Nyang, David Mohaisen. 159-174 [doi]
- Robust Training for Deepfake Detection Models Against Disruption-Induced Data PoisoningJaewoo Park, Hong Eun Ahn, Leo Hyun Park, Taekyoung Kwon 0002. 175-187 [doi]
- Multi-class Malware Detection via Deep Graph Convolutional Networks Using TF-IDF-Based Attributed Call GraphsIrshad Khan, Young-Woo Kwon 0001. 188-200 [doi]
- OCR Meets the Dark Web: Identifying the Content Type Regarding Illegal and CybercrimeDonghyun Kim, Seungho Jeon, Jiho Shin, Jung-Taek Seo. 201-212 [doi]
- Enriching Vulnerability Reports Through Automated and Augmented Description SummarizationHattan Althebeiti, David Mohaisen. 213-227 [doi]
- Protecting Kernel Code Integrity with PMP on RISC-VSeon Ha, Hyungon Moon. 231-243 [doi]
- Exploiting Memory Page Management in KSM for Remote Memory Deduplication AttackSeungyeon Bae, Taehun Kim, Woomin Lee, Youngjoo Shin. 244-256 [doi]
- Mutation Methods for Structured Input to Enhance Path Coverage of FuzzersYonggon Park, Youngjoo Ko, Jong Kim 0001. 257-268 [doi]
- Improved Differential-Linear Cryptanalysis of Reduced Rounds of ChaChaRyo Watanabe, Nasratullah Ghafoori, Atsuko Miyaji. 269-281 [doi]
- SP-Fuzz: Fuzzing Soft PLC with Semi-automated Harness SynthesisSeungho Jeon, Jung-Taek Seo. 282-293 [doi]
- Quantum Circuit Designs of Point Doubling Operation for Binary Elliptic CurvesHarashta Tatimma Larasati, Howon Kim 0001. 297-309 [doi]
- PQ-DPoL: An Efficient Post-Quantum Blockchain Consensus AlgorithmWonwoong Kim, Yeajun Kang, HyunJi Kim, Kyungbae Jang, Hwajeong Seo. 310-323 [doi]
- Efficient Implementation of the Classic McEliece on ARMv8 ProcessorsMinjoo Sim, Hyeokdong Kwon, Siwoo Eum, Gyeongju Song, Minwoo Lee, Hwajeong Seo. 324-337 [doi]
- Evaluating KpqC Algorithm Submissions: Balanced and Clean Benchmarking ApproachHyeokdong Kwon, Minjoo Sim, Gyeongju Song, Minwoo Lee, Hwajeong Seo. 338-348 [doi]