Accepted Posters

  • POSTER: How to securely record logs based on ARM TrustZone
    Seungho Lee (Samsung Electronics, Korea University); Wonsuk Choi (Korea University); Hyo Jin Jo (Hallym University) Dong Hoon Lee (Korea University)
  • POSTER: Characterizing Adversarial Subspaces by Mutual Information
    Chia-Yi Hsu (National Chung Hsing University); Pin-Yu Chen (IBM Research AI); Chia-Mu Yu (National Chung Hsing University)
  • POSTER: A Data Life Cycle Modeling Proposal by means of Formal Methods
    Madalina (Ciobanu);Fausto (Fasano);Fabio Martinelli (National Research Council of Italy (CNR), Pisa, Italy); Francesco Mercaldo (National Research Council of Italy (CNR), Pisa, Italy); Antonella (Santone)
  • POSTER: Cracking the Graph Routes in WirelessHART Networks
    Xia Cheng (State University of New York at Binghamton);Junyang Shi (State University of New York at Binghamton); Mo Sha (State University of New York at Binghamton)
  • POSTER: Fidelity: A Property of Deep Neural Networks to Measure the Trustworthiness of Prediction Results
    Ziqi Yang (National University of Singapore)
  • POSTER: Towards Identifying Early Indicators of a Malware Infection
    Sareena Karapoola:Indian Institute of Technology Madras;Chester Rebeiro (IIT Madras); Unnati Parekh (Unaffiliated); Kamakoti V (Indian Institute of Technology Madras)
  • POSTER: Vendor-Independent Monitoring on Programmable Logic Controller Status for ICS Security Log Management
    Jongwon Choi (The affiliated institute of ETRI); HyungKwan Kim (The affiliated institute of ETRI); Seungoh Choi (The affiliated institute of ETRI);Jeong-Han Yun (The Affiliated Institute of ETRI); Byung-Gil Min (The Affiliated Institute of ETRI); HyoungChun Kim (The affiliated institute of ETRI)
  • POSTER: IoT Application-Centric Access Control (ACAC)
    Mohammed Al-Shaboti (School of Computer Science and Engineering, Victoria University of Wellington);Ian Welch (School of Computer Science and Engineering, Victoria University of Wellington); Aaron Chen (School of Computer Science and Engineering, Victoria University of Wellington)
  • POSTER: High efficiency, low-noise Meltdown attack by using a return stack buffer
    Tae Hyun Kim (Kwangwoon University); Youngjoo Shin (Kwangwoon University)
  • POSTER: Smart contract-based miner registration and block validation
    Shijie Zhang (Sangmyung University); Jong-Hyouk Lee (Sangmyung University)