π Security@KAIST Fair 2025 is coming soon!
νμ¬ ν¬μ€ν°

μ¬μ λ±λ‘
μ§κΈ λ°λ‘ μ¬μ λ±λ‘νμΈμ!
Security@KAIST Fair 2025μ μ°Έμ¬νμλ €λ©΄ μ¬μ λ±λ‘μ΄ νμν©λλ€.
μ¬μ λ±λ‘μ ν΅ν΄ λ λμ νμ¬ κ²½νμ μ 곡ν΄λ립λλ€.
μΈλΆμΈ (KAIST μΈλΆ) μ¬μ λ±λ‘ λ§ν¬μ
λλ€
μ₯μ λ° μκ°
κΉλ³νΈγκΉμΌμ΄ ITμ΅ν© λΉλ© (N1) 1μΈ΅
2025λ 8μ 25μΌ (μ) 13:00~18:00
* μΌμ μ μΆν λ³κ²½λ μ μμ΅λλ€.
2025λ 8μ 25μΌ (μ) 13:00~18:00
* μΌμ μ μΆν λ³κ²½λ μ μμ΅λλ€.
μμΈ νλ‘κ·Έλ¨ μλ΄
Keynote
λνλ―Όκ΅ λ³΄μ μ°κ΅¬μ νμ€ μ§λ¨κ³Ό λ―Έλ
ν¨λ ν μ
λνλ―Όκ΅ λ³΄μμ λ―Έλμ κ΄ν KAIST κ΅μλ€μ λλ΄
κΈ°μ μΈλ―Έλ (μ΄ 18νΈ)
- β’ λνμΈμ΄λͺ¨λΈμ μμ μ±κ³Ό νλΌμ΄λ²μλ₯Ό μ κ²νλ μλ‘μ΄ Red-teaming λ°©λ²λ‘
- β’ μ λ£°λ¬ μ΄μ€μ©λ κΈ°μ : κ°μμ λ°©μ΄ μ¬μ΄μ ꡬ쑰μ λλ λ§
- β’ λͺ©ν μ§μ€ν νλ‘κ·Έλ¨ λΆμ
- β’ Making Password Checkups Work: Designing for Action, Not Apathy
- β’ Tor μ΅λͺ μ± λ€νΈμν¬μ κ°μ©μ±, μ΅λͺ μ± μΉ¨ν΄ κ³΅κ²© μ°κ΅¬
- β’ μ»΄νμΌλ¬ μ΅μ ν λ²κ·Έ, λ²μ κ²μ°κ³Ό μ§ν₯μ± νΌμ§μΌλ‘ λ°λ‘ μ‘μλ΄κΈ°
- β’ Polocolo: A ZK-Friendly Hash Function Based on S-boxes Using Power Residues
- β’ Automatic Attack Synthesis for Constant Product Market Makers (ISSTA '25 paper)
- β’ From Harmful Domain Detection to Criminal Organization Mapping: A Research for Evidence-Based Threat Attribution and Network Analysis
- β’ CROSS-X: Generalised and Stable Cross-Cache Attack on the Linux Kernel
- β’ TrustyMon: Practical Detection of DOM-based Cross-Site Scripting Attacks Using Trusted Types
- β’ XAI κΈ°λ° LLM μμ± κ°μ§λκΈμ μΈμ΄ν¨ν΄ λΆμ λ° νμ§(XDAC)
- β’ Systematic Testing of Context Integrity Violations in Cellular Core Networks
- β’ PowDew: Detecting Counterfeit Powdered Food Products using a Commodity Smartphone
- β’ Ambush: A Frontrunning Attack in Batch-Order Fair Systems for Blockchains
- β’ Forky: Fork State-Aware Differential Fuzzing for Blockchain Consensus Implementations
- β’ Towards Sound Reassembly of Modern x86-64 Binaries
- β’ Interstellar: νλμ¨μ΄ κΈ°λ° instruction λͺ¨λν°λ§μ ν΅ν λ°νμ 보μ μν νμ§ λ° μ¬μ μ°¨λ¨
λ¬Έμ λ° κ³΅μ μ±λ
μ§λ νμ¬
2024λ Security@KAIST Fairμ μμν νμ₯μ νμΈν΄λ³΄μΈμ!
2024λ νμ¬ κ²°κ³Ό 보기