Mon. 20 Oct 2025 (Day 1) | |
| Time (ET) | Event |
| 08:00 - 09:20 | Registrations |
| 09:20 - 09:40 | Welcome Statement by General and PC Co-chairs |
| 09:40 - 10:40 | Keynote by Hyoungshick Kim - Session chair: Jeongeun Park |
| 10:40 - 11:00 | Break 1 (20 min) |
| 11:00 - 12:00 | Session 1: Cryptanalysis and Cipher Security (3 talks) - Session chair: Jeongeun Park |
| 11:00 - 11:20 | Improving the Differential-Linear Attack with Applications to GIFT-COFB, GIFT-64 and HyENA |
| 11:20 - 11:40 | Keyless Physical-Layer Cryptography |
| 11:40 - 12:00 | The Multi-User Security of GCM-SST and Further Enhancements |
| 12:00 - 13:30 | Lunch |
| 13:30 - 14:30 | Session 2: Network Security (3 talks) - Session chair: Jaeseung Choi |
| 13:30 - 13:50 | SimSeq:A Robust TLS Traffic Classification Method |
| 13:50 - 14:10 | EvoFuzz: Enhancing State Space Exploration and Seed Prioritization in Stateful Protocol Fuzzing using Evolutionary Game Theory |
| 14:10 - 14:30 | A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection? |
| 14:30 - 14:50 | Break 2 (20 min) |
| 14:50 - 15:30 | Session 3: Post quantum cryptography (2 talks) - Session chair: Hyung Tae Lee |
| 14:50 - 15:10 | Conditional Attribute-Based PRE: Definition and Construction from LWE |
| 15:10 - 15:30 | LastRings: Lattice-based Scalable Threshold Ring Signatures |
| 15:30 - 16:00 | Break 3 (30 min) |
| 16:00 - 17:00 | Session 4: Systems - Side-Channel Attacks and Countermeasures (3 talks) - Session chair: Hyunwoo Choi |
| 16:00 - 16:20 | Simulation-based Software Leakage Evaluation for the RISC-V Platform |
| 16:20 - 16:40 | GIR-Cache: Mitigating Conflict-Based Cache Side-Channel Attacks Via Global Indirect Replacement |
| 16:40 - 17:00 | Inference Attacks on Encrypted Online Voting via Traffic Analysis |
| 18:00 - 20:00 | Reception (at the ChoByungDoo International Conference Hall) |
Tue. 21 Oct 2025 (Day 2) | |
| Time (ET) | Event |
| 08:00 - 09:30 | Registrations |
| 09:30 - 10:30 | Keynote by Mehdi Tibouchi - Session chair: Sang Kil Cha |
| 10:30 - 11:00 | Break 1 (30 min) |
| 11:00 - 12:00 | Session 5: AI security (3 talks) - Session chair: Gihyuk Ko |
| 11:00 - 11:20 | MSPP-Net: Fine-grained image privacy identification via multi-stage semantic perception |
| 11:20 - 11:40 | Exploring Backdoor Attacks in Federated Learning Under Parameter-Efficient Fine-Tuning |
| 11:40 - 12:00 | Spoofing Camera Source Attribution via PRNU Transfer Attacks on Physical and AI Generated Images |
| 12:00 - 13:30 | Lunch |
| 13:30 - 14:30 | Session 6: Access Control & Privacy (3 talks) - Session chair: Ilaria Chillotti |
| 13:30 - 13:50 | CryptNyx: Password-hardened encryption with strong anonymity guarantees |
| 13:50 - 14:10 | Efficient Dynamic Group Signatures with Forward Security |
| 14:10 - 14:30 | Zero Trust Continuous Authentication Models and Automated Policy Formulation |
| 14:30 - 14:50 | Break 2 (20 min) |
| 14:50 - 15:30 | Session 7: Biometric Security (2 talks) - Session chair: Damien Ligier |
| 14:50 - 15:10 | Comparative Evaluation of Lattices for Fuzzy Extractors and Fuzzy Signatures |
| 15:10 - 15:30 | A New Code-Based Formulation of the Fuzzy Vault Scheme |
| 15:30 - 16:00 | Break 3 (30 min) |
| 16:00 - 17:00 | Session 8: Malware Analysis (3 talks) - Session chair: Soomin Kim |
| 16:00 - 16:20 | HoneySentry: A High-Fidelity Interactive IoT Honeypot for Advanced Threat Detection |
| 16:20 - 16:40 | Towards Architecture-Independent Function Call Analysis for IoT Malware |
| 16:40 - 17:00 | HGANN-Mal: A Hypergraph Attention Neural Network Approach for Android Malware Detection |
| 18:00 - 21:00 | Banquet (at the ChoByungDoo International Conference Hall) |
Wed. 22 Oct 2025 (Day 3) | |
| Time (ET) | Event |
| 08:00 - 09:20 | Registrations |
| 09:20 - 10:40 | Session 9: Systems Security (4 talks) - Session chair: Daehee Jang |
| 09:20 - 09:40 | A Graph-Based Approach to Alert Contextualisation in Security Operations Centres |
| 09:40 - 10:00 | HyperSec: An Extensible Hypervisor-Assisted Framework for Kernel Rootkit Detection |
| 10:00 - 10:20 | BootMarker: UEFI Bootkit Defense via Control-Flow Verification |
| 10:20 - 10:40 | Ali2Vul: Binary Vulnerability Dataset Expansion via Cross-Modal Alignment |
| 10:40 - 11:10 | Break 1 (30 min) |
| 11:10 - 11:50 | Session 10: Smart Contracts and Blockchain Security (2 talks) - Session chair: Soomin Kim |
| 11:10 - 11:30 | Jakiro: A Cross-modal Contrastive Learning Framework for Detecting Vulnerabilities in Smart Contracts |
| 11:30 - 11:50 | BlockLens: Detecting Malicious Transactions in Ethereum Using LLM Techniques |
| 11:50 - 12:00 | Concluding Remarks |
| 12:00 - 13:30 | Lunch |
