Mon. 20 Oct 2025 (Day 1)

Time (ET)Event
08:00 - 09:20Registrations
09:20 - 09:40Welcome Statement by General and PC Co-chairs
09:40 - 10:40Keynote by Hyoungshick Kim - Session chair: Jeongeun Park
10:40 - 11:00Break 1 (20 min)
11:00 - 12:00Session 1: Cryptanalysis and Cipher Security (3 talks) - Session chair: Jeongeun Park
11:00 - 11:20Improving the Differential-Linear Attack with Applications to GIFT-COFB, GIFT-64 and HyENA
11:20 - 11:40Keyless Physical-Layer Cryptography
11:40 - 12:00The Multi-User Security of GCM-SST and Further Enhancements
12:00 - 13:30Lunch
13:30 - 14:30Session 2: Network Security (3 talks) - Session chair: Jaeseung Choi
13:30 - 13:50SimSeq:A Robust TLS Traffic Classification Method
13:50 - 14:10EvoFuzz: Enhancing State Space Exploration and Seed Prioritization in Stateful Protocol Fuzzing using Evolutionary Game Theory
14:10 - 14:30A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection?
14:30 - 14:50Break 2 (20 min)
14:50 - 15:30Session 3: Post quantum cryptography (2 talks) - Session chair: Hyung Tae Lee
14:50 - 15:10Conditional Attribute-Based PRE: Definition and Construction from LWE
15:10 - 15:30LastRings: Lattice-based Scalable Threshold Ring Signatures
15:30 - 16:00Break 3 (30 min)
16:00 - 17:00Session 4: Systems - Side-Channel Attacks and Countermeasures (3 talks) - Session chair: Hyunwoo Choi
16:00 - 16:20Simulation-based Software Leakage Evaluation for the RISC-V Platform
16:20 - 16:40GIR-Cache: Mitigating Conflict-Based Cache Side-Channel Attacks Via Global Indirect Replacement
16:40 - 17:00Inference Attacks on Encrypted Online Voting via Traffic Analysis
18:00 - 20:00Reception (at the ChoByungDoo International Conference Hall)

Tue. 21 Oct 2025 (Day 2)

Time (ET)Event
08:00 - 09:30Registrations
09:30 - 10:30Keynote by Mehdi Tibouchi - Session chair: Sang Kil Cha
10:30 - 11:00Break 1 (30 min)
11:00 - 12:00Session 5: AI security (3 talks) - Session chair: Gihyuk Ko
11:00 - 11:20MSPP-Net: Fine-grained image privacy identification via multi-stage semantic perception
11:20 - 11:40Exploring Backdoor Attacks in Federated Learning Under Parameter-Efficient Fine-Tuning
11:40 - 12:00Spoofing Camera Source Attribution via PRNU Transfer Attacks on Physical and AI Generated Images
12:00 - 13:30Lunch
13:30 - 14:30Session 6: Access Control & Privacy (3 talks) - Session chair: Ilaria Chillotti
13:30 - 13:50CryptNyx: Password-hardened encryption with strong anonymity guarantees
13:50 - 14:10Efficient Dynamic Group Signatures with Forward Security
14:10 - 14:30Zero Trust Continuous Authentication Models and Automated Policy Formulation
14:30 - 14:50Break 2 (20 min)
14:50 - 15:30Session 7: Biometric Security (2 talks) - Session chair: Damien Ligier
14:50 - 15:10Comparative Evaluation of Lattices for Fuzzy Extractors and Fuzzy Signatures
15:10 - 15:30A New Code-Based Formulation of the Fuzzy Vault Scheme
15:30 - 16:00Break 3 (30 min)
16:00 - 17:00Session 8: Malware Analysis (3 talks) - Session chair: Soomin Kim
16:00 - 16:20HoneySentry: A High-Fidelity Interactive IoT Honeypot for Advanced Threat Detection
16:20 - 16:40Towards Architecture-Independent Function Call Analysis for IoT Malware
16:40 - 17:00HGANN-Mal: A Hypergraph Attention Neural Network Approach for Android Malware Detection
18:00 - 21:00Banquet (at the ChoByungDoo International Conference Hall)

Wed. 22 Oct 2025 (Day 3)

Time (ET)Event
08:00 - 09:20Registrations
09:20 - 10:40Session 9: Systems Security (4 talks) - Session chair: Daehee Jang
09:20 - 09:40A Graph-Based Approach to Alert Contextualisation in Security Operations Centres
09:40 - 10:00HyperSec: An Extensible Hypervisor-Assisted Framework for Kernel Rootkit Detection
10:00 - 10:20BootMarker: UEFI Bootkit Defense via Control-Flow Verification
10:20 - 10:40Ali2Vul: Binary Vulnerability Dataset Expansion via Cross-Modal Alignment
10:40 - 11:10Break 1 (30 min)
11:10 - 11:50Session 10: Smart Contracts and Blockchain Security (2 talks) - Session chair: Soomin Kim
11:10 - 11:30Jakiro: A Cross-modal Contrastive Learning Framework for Detecting Vulnerabilities in Smart Contracts
11:30 - 11:50BlockLens: Detecting Malicious Transactions in Ethereum Using LLM Techniques
11:50 - 12:00Concluding Remarks
12:00 - 13:30Lunch