Program
Awards
Best Paper Awards π
- CHRONOHUNT: Determining Optimal Pace For Automated Alert Analysis in Threat Hunting using Reinforcement Learning
Boubakr Nour (Ericsson Security Research), Makan Pourzandi (Ericsson Security Research), Jesus Alatorre (Ericsson Cyber Defense Center), Jan Willekens (Ericsson Cyber Defense Center), Mourad Debbabi (Concordia University) - An analysis of the relationship between Black-hat SEO malware families leveraging information from redirected fake E-commerce scam sites
Makoto Shimamura (Trend Micro Inc.), Shingo Matsugaya (Trend Micro Inc. / Japan Cybercrime Control Center), Keisuke Sakai (Kanagawa Prefectural Police Headquarters / Kagawa University), Kousuke Takeshige (Chiba Prefectural Police Headquarters / Kagawa University), Masaki Hashimoto (Kagawa University)
Best Poster Award π
- A Proactive Detection of IoT Botnet using Darknet Traffic on SOC Gunyang Park (Korea Institute of Science and Technology Information), Taeyong Kim (Korea Institute of Science and Technology Information), Younsu Lee (Korea Institute of Science and Technology Information), Jun Lee (Korea Institute of Science and Technology Information)
Notes
- All times in the program are JST (Japan Standard Time; UTC+9) time zone.
- The presentation time, including Q&A, is as follows:
- Main Track:
- Regular papers: 25 minutes
- Short papers: 20 minutes
- Experience and Practice Track: 15 minutes
- Workshop session:
2015 minutes
- Main Track:
- Meals will be provided at each conference lunch time.
- The program is subject to minor changes.
Day 1 - November 6, 2024
08:30 - 09:30 | Registration |
09:30 - 10:00 | Conference Opening Session |
10:00 - 11:00 |
Keynote Speech 1 |
Enhancing ML-based system detection and monitoring through model fusion and cognitive diversity |
|
11:00 - 11:30 | Coffee Break |
11:30 - 12:40 |
Session 1 - Advanced Threat Detection and Hunting |
CHRONOHUNT: Determining Optimal Pace For Automated Alert Analysis in Threat Hunting using Reinforcement Learning (Best Paper π) |
|
Inherited Threat Reproduction on Open Source 5G Testbed |
|
[Short Paper] Traceability Measurement Analysis of Sustained Internet-Wide Scanners via Darknet |
|
12:40 - 13:40 | Conference Lunch |
13:40 - 15:15 |
Session 2 - Machine Learning and AI in Cybersecurity |
One Pixel Adversarial Attack for Fooling Deep Learning-Based Facial Expression Recognition Systems |
|
Enhancing Cybersecurity with Transformers: Preventing Phishing Emails and Social Media Scams |
|
Sockpuppets Detection Using Markov-Driven Graph Convolutional Networks with Ensemble Learning |
|
[Short Paper] Fine-Tuning Large Language Models For Network Traffic Analysis in Cyber Security |
|
15:15 - 15:30 |
Sponsor session |
15:30 - 16:00 | Coffee Break |
16:00 - 17:15 |
Session 3 - Hardware and System-Level Security |
Information Flow Tracking for Hardware Trojan Detection: a Feasibility Study |
|
Vulnerabilities and Challenges in the Development of PUF-Based Authentication Protocols on FPGAs: A Brief Review |
|
kdMonitor: Kernel Data Monitor for Detecting Kernel Memory Corruption |
Day 2 - November 7, 2024
08:30 - 09:30 | Registration |
09:30 - 11:10 |
Workshop on Blockchain and Distributed Ledger Technologies |
[Invited Talk] Blockchain for IoT with Applications to Agriculture |
|
[Invited Talk] Development of ISO 25126 Information security controls based on ISO/IEC 27002 for distributed ledger services |
|
[Workshop Paper] A Multi-Package Trust Model for Improving the Trustworthiness of Traceability Data in Blockchain-Based Beef Supply Chain |
|
[Invited Talk] Concept of session Root-of-Trust |
|
[Invited Talk] Blockchain-Driven Ledger Systems for IoT in LPWAN: Design, Disaster Management, and Transmission Optimization |
|
[Invited Talk] Security Issues in Public Blockchains |
|
11:10 - 11:40 | Coffee Break |
11:40 - 12:40 |
Session 4 - Experience and Practice Track 1 |
Detection Evasion Using eBPF for Linux Fileless Malware |
|
Exploring the Impact of LLM Assisted Malware Variants on Anti-Virus Detection |
|
Enhancing Microcontroller Security Through Volatile Memory-Resident Encrypted Code |
|
Efficient and Secure Multi-Point Communication Framework Supporting Resource Constraints Environment |
|
12:40 - 13:40 | Conference Lunch |
13:40 - 14:40 |
Keynote Speech 2 |
Title: Adversarial Attacks Against Emerging Deep Encoder Networks |
|
14:40 - 16:20 | Poster Session w/ Coffee |
|
|
16:20 - 16:30 | Break |
16:30 - 17:45 |
Session 5 - Fraud and Scam Detection |
Can We Determine Whether a Set of Ethereum Transaction Data Contains Fraudulent Transactions? |
|
Threat of Technical Support Scams in Japan |
|
An analysis of the relationship between Black-hat SEO malware families leveraging information from redirected fake E-commerce scam sites (Best Paper π) |
|
18:00 - 20:00 | Conference Banquet |
Day 3 - November 8, 2024
08:30 - 09:30 | Registration |
09:30 - 10:35 |
Session 6 - Quantum and Cryptographic Solutions |
Systematic Construction of Adaptively Decodable Visual Secret Sharing Scheme on Background Color |
|
[Short Paper] Enhanced Analysis of Cryptographic Library Usage Patterns and Trends in Android Applications |
|
[Short Paper] Quantum Guard: Pioneering Quantum-Based Malware Defense for IoT Devices |
|
10:35 - 11:05 | Coffee Break |
11:05 - 12:05 |
Session 7 - Experience and Practice Track 2 |
A Case Study of URL Blocklist Maintenance |
|
Control Displaying of Web Push Notifications Inducing Users to Phishing Websites |
|
Blockchain-Enabled IoV: Secure Communication and Trustworthy Decision-Making |
|
Investigating Black-Market Jobs on Social Networking Service |
|
12:05 - 13:05 | Conference Lunch |
13:05 - 14:20 |
Session 8 - Authentication and Intrusion Detection |
InstaMAuth: Instant Mobile Authentication Service Based on 5G Authenticated Call Sessions |
|
An Approach to Multi-Class Intrusion Detection Based on Feature Subspaces and Weighted Fusion |
|
Enhancing Decision-Making of Network Intrusion Analysis Assisted by Explainable AI for Real-Time Security Monitoring |
|
14:20 - 14:50 | Conference Closing Ceremony |