Security@KAIST
๐ŸŽ‰ Security@KAIST Fair 2025 is coming soon!
ํ–‰์‚ฌ ํฌ์Šคํ„ฐ
2025 ํฌ์Šคํ„ฐ
์‚ฌ์ „๋“ฑ๋ก
์ง€๊ธˆ ๋ฐ”๋กœ ์‚ฌ์ „๋“ฑ๋กํ•˜์„ธ์š”!

Security@KAIST Fair 2025์— ์ฐธ์—ฌํ•˜์‹œ๋ ค๋ฉด ์‚ฌ์ „๋“ฑ๋ก์ด ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค.
์‚ฌ์ „๋“ฑ๋ก์„ ํ†ตํ•ด ๋” ๋‚˜์€ ํ–‰์‚ฌ ๊ฒฝํ—˜์„ ์ œ๊ณตํ•ด๋“œ๋ฆฝ๋‹ˆ๋‹ค.

์‚ฌ์ „๋“ฑ๋ก ํ•˜๋Ÿฌ๊ฐ€๊ธฐ
์™ธ๋ถ€์ธ (KAIST ์™ธ๋ถ€) ์‚ฌ์ „๋“ฑ๋ก ๋งํฌ์ž…๋‹ˆ๋‹ค. KAIST ๋‚ด๋ถ€์ธ์€ ๋ˆ„๊ตฌ๋‚˜ ๋ฌด๋ฃŒ ์ฐธ์—ฌ ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค.
์žฅ์†Œ ๋ฐ ์‹œ๊ฐ„
๊น€๋ณ‘ํ˜ธใ†๊น€์‚ผ์—ด IT์œตํ•ฉ ๋นŒ๋”ฉ (N1) 1์ธต
2025๋…„ 8์›” 25์ผ (์›”) 13:00~18:00
* ์ผ์ •์€ ์ถ”ํ›„ ๋ณ€๊ฒฝ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
์ƒ์„ธ ํ”„๋กœ๊ทธ๋žจ ์•ˆ๋‚ด
์‹œ๊ฐ„ N1, 101ํ˜ธ
๊ธฐ์ˆ ์„ธ๋ฏธ๋‚˜ ํŠธ๋ž™A
N1, 114ํ˜ธ
๊ธฐ์ˆ ์„ธ๋ฏธ๋‚˜ ํŠธ๋ž™B
N1, 117ํ˜ธ
๋ฐ๋ชจ ๋ฐ ํ™๋ณด ๋ถ€์Šค
13:00 - 13:30 ํ‚ค๋…ธํŠธ ์—ฐ์„ค
์ฐจ์ƒ๊ธธ ๊ต์ˆ˜
- (์ƒ์‹œ์ „์‹œ) ๋ฐ๋ชจ ๋ฐ ํ™๋ณด ๋ถ€์Šค ์ „์‹œ & ์—ฐ๊ตฌํฌ์Šคํ„ฐ ์ „์‹œ ๋ฐ ๊ด€๋žŒ (์Šคํ‹ฐ์ปค๋ถ€์ฐฉ17์‹œ๊นŒ์ง€)
13:30 - 14:20 ํŒจ๋„ํ† ์˜
๊ฐ•๋ฏผ์„ ๊ต์ˆ˜
-
14:20 - 14:30 ํœด์‹์‹œ๊ฐ„
14:30 - 14:55 ์„ธ์…˜1
์ขŒ์žฅ : ๊น€์šฉ๋Œ€ ๊ต์ˆ˜
๋Œ€ํ˜•์–ธ์–ด๋ชจ๋ธ์˜ ์•ˆ์ „์„ฑ๊ณผ ํ”„๋ผ์ด๋ฒ„์‹œ๋ฅผ ์ ๊ฒ€ํ•˜๋Š” ์ƒˆ๋กœ์šด Red-teaming ๋ฐฉ๋ฒ•๋ก 
(์†์ˆ˜์—˜ ๊ต์ˆ˜)
์„ธ์…˜2
์ขŒ์žฅ : ํ—ˆ๊ธฐํ™ ๊ต์ˆ˜
Making Password Checkups Work: Designing for Action, Not Apathy
(Ian Oakley ๊ต์ˆ˜)
14:55 - 15:20 ์…€๋ฃฐ๋Ÿฌ ์ด์ค‘์šฉ๋„ ๊ธฐ์ˆ : ๊ฐ์‹œ์™€ ๋ฐฉ์–ด ์‚ฌ์ด์˜ ๊ตฌ์กฐ์  ๋”œ๋ ˆ๋งˆ
(๊น€์šฉ๋Œ€ ๊ต์ˆ˜)
๋ชฉํ‘œ ์ง‘์ค‘ํ˜• ํ”„๋กœ๊ทธ๋žจ ๋ถ„์„
(ํ—ˆ๊ธฐํ™ ๊ต์ˆ˜)
15:20 - 16:20 ํœด์‹์‹œ๊ฐ„
16:20 - 16:33 ์„ธ์…˜3
(์•”ํ˜ธ/๋ธ”๋ก์ฒด์ธ๋ณด์•ˆ)
์ขŒ์žฅ : ์ •๋™์žฌ(CSRC)
Polocolo: A ZK-Friendly Hash Function Based on S-boxes Using Power Residues
(์†๋ฏผ์ฒ , ์ด์ฃผ์˜ ๊ต์ˆ˜๋‹˜ ์—ฐ๊ตฌ์‹ค)
์„ธ์…˜4
(๋ชจ๋ฐ”์ผ/๋„คํŠธ์›Œํฌ๋ณด์•ˆ)
์ขŒ์žฅ : ์ตœ๊ทœํ˜„(CSRC)
Tor ์ต๋ช…์„ฑ ๋„คํŠธ์›Œํฌ์˜ ๊ฐ€์šฉ์„ฑ, ์ต๋ช…์„ฑ ์นจํ•ด ๊ณต๊ฒฉ ์—ฐ๊ตฌ
(์ด์ง„์„œ, ๊ฐ•๋ฏผ์„ ๊ต์ˆ˜๋‹˜ ์—ฐ๊ตฌ์‹ค)
16:33 - 16:46 Ambush: A Frontrunning Attack in Batch-Order Fair Systems for Blockchains
(๋ฐ•์€์ฐฌ, ๊ฐ•๋ฏผ์„ ๊ต์ˆ˜๋‹˜ ์—ฐ๊ตฌ์‹ค)
Systematic Testing of Context Integrity Violations in Cellular Core Networks
(์†๋ฏผ์ฒ , ๊น€์šฉ๋Œ€ ๊ต์ˆ˜๋‹˜ ์—ฐ๊ตฌ์‹ค)
16:46 - 16:59 Forky: Fork State-Aware Differential Fuzzing for Blockchain Consensus Implementations
(๋‚จํ˜ธ์ฒ , ๊ฐ•๋ฏผ์„ ๊ต์ˆ˜๋‹˜ ์—ฐ๊ตฌ์‹ค)
PowDew: Detecting Counterfeit Powdered Food Products using a Commodity Smartphone
(์œค์ข…ํ˜, ํ•œ์ค€ ๊ต์ˆ˜๋‹˜ ์—ฐ๊ตฌ์‹ค)
17:00 - 17:10 ํœด์‹์‹œ๊ฐ„
17:10 - 17:23 ์„ธ์…˜5
(์†Œํ”„ํŠธ์›จ์–ด๋ณด์•ˆ)
์ขŒ์žฅ : ๊น€์ˆ˜๋ฏผ(CSRC)
์ปดํŒŒ์ผ๋Ÿฌ ์ตœ์ ํ™” ๋ฒ„๊ทธ, ๋ฒˆ์—ญ ๊ฒ€์‚ฐ๊ณผ ์ง€ํ–ฅ์„ฑ ํผ์ง•์œผ๋กœ ๋ฐ”๋กœ ์žก์•„๋‚ด๊ธฐ
(์žฅ๋ด‰์ค€, ํ—ˆ๊ธฐํ™ ๊ต์ˆ˜๋‹˜ ์—ฐ๊ตฌ์‹ค)
์„ธ์…˜6
(AI/์‹œ์Šคํ…œ๋ณด์•ˆ)
์ขŒ์žฅ : ๊ณ ๊ธฐํ˜(CSRC)
From Harmful Domain Detection to Criminal Organization Mapping: A Research for Evidence-Based Threat Attribution and Network Analysis
(์ตœ๊ทœํ˜„, ์‚ฌ์ด๋ฒ„๋ณด์•ˆ์—ฐ๊ตฌ์„ผํ„ฐ)
-
17:23 - 17:36 Automatic Attack Synthesis for Constant Product Market Makers (ISSTA '25 paper)
(ํ•œ์ˆ˜์ง„, ์œค์ธ์ˆ˜ ๊ต์ˆ˜๋‹˜ ์—ฐ๊ตฌ์‹ค)
CROSS-X: Generalised and Stable Cross-Cache Attack on the Linux Kernel
(์†ก์ฃผํ˜„, ์œค์ธ์ˆ˜ ๊ต์ˆ˜๋‹˜ ์—ฐ๊ตฌ์‹ค)
-
17:36 - 17:48 TrustyMon: Practical Detection of DOM-based Cross-Site Scripting Attacks Using Trusted Types
(๋ฐ•์„ ๋…€, ์†์ˆ˜์—˜ ๊ต์ˆ˜๋‹˜ ์—ฐ๊ตฌ์‹ค)
Interstellar: ํ•˜๋“œ์›จ์–ด ๊ธฐ๋ฐ˜ instruction ๋ชจ๋‹ˆํ„ฐ๋ง์„ ํ†ตํ•œ ๋Ÿฐํƒ€์ž„ ๋ณด์•ˆ ์œ„ํ˜‘ ํƒ์ง€ ๋ฐ ์‚ฌ์ „ ์ฐจ๋‹จ
(์†ก์šฉํ˜ธ, ๊ฐ•๋ณ‘ํ›ˆ ๊ต์ˆ˜๋‹˜ ์—ฐ๊ตฌ์‹ค)
-
17:48 - 18:00 Towards Sound Reassembly of Modern x86-64 Binaries
(๊น€์ˆ˜๋ฏผ, ์‚ฌ์ด๋ฒ„๋ณด์•ˆ์—ฐ๊ตฌ์„ผํ„ฐ)
XAI ๊ธฐ๋ฐ˜ LLM ์ƒ์„ฑ ๊ฐ€์งœ๋Œ“๊ธ€์˜ ์–ธ์–ดํŒจํ„ด ๋ถ„์„ ๋ฐ ํƒ์ง€(XDAC)
(๊ณ ์šฐ์˜, ๊น€์šฉ๋Œ€ ๊ต์ˆ˜๋‹˜ ์—ฐ๊ตฌ์‹ค)
-
๋ฌธ์˜ ๋ฐ ๊ณต์‹ ์ฑ„๋„
์ง€๋‚œ ํ–‰์‚ฌ

2024๋…„ Security@KAIST Fair์˜ ์ƒ์ƒํ•œ ํ˜„์žฅ์„ ํ™•์ธํ•ด๋ณด์„ธ์š”!

2024๋…„ ํ–‰์‚ฌ ๊ฒฐ๊ณผ ๋ณด๊ธฐ