µðÁöÅПÀÓ½º

 


¼º½Å¿©´ë ´ëÇпø¡¤Çкבּ¸»ýÆÀ, MobiSec 2024 ÃÖ¿ì¼ö³í¹®»ó, ÃÖ¿ì¼öÆ÷½ºÅÍ»ó 6°Ç ¼ö»ó

ÇÁ¸°Æ® ÆäÀ̽ººÏ Æ®À§ÅÍ Ä«Ä«¿À½ºÅ丮
¼º½Å¿©´ë ´ëÇпø¡¤Çкבּ¸»ýÆÀ, MobiSec 2024 ÃÖ¿ì¼ö³í¹®»ó, ÃÖ¿ì¼öÆ÷½ºÅÍ»ó 6°Ç ¼ö»ó
MobiSec'24¿¡ Âü¿©ÇØ ´Üü ±â³ä»çÁøÀ» ÃÔ¿µÇÏ´Â ¼º½Å¿©´ë À¶ÇÕº¸¾È°øÇаú, ¹Ì·¡À¶ÇÕ±â¼ú°øÇаú ¿¬±¸ÆÀ.

¼º½Å¿©ÀÚ´ëÇб³ À¶ÇÕº¸¾È°øÇаú¿Í ¹Ì·¡À¶ÇÕ±â¼ú°øÇаú ¿¬±¸ÆÀÀÌ Áö³­ 12¿ù 17ÀϺÎÅÍ 19ÀϱîÁö ÀϺ» »ñÆ÷·Î¿¡¼­ ¿­¸° 'Á¦8ȸ ¸ð¹ÙÀÏÀÎÅͳݺ¸¾È ±¹Á¦Çмú´ëȸ(The 8th International Conference on Mobile Internet Security, ÀÌÇÏ MobiSec 2024)'¿¡¼­ ÃÖ¿ì¼ö³í¹®»ó, ÃÖ¿ì¼ö Æ÷½ºÅÍ»ó µî ÃÑ 6°³ÀÇ »óÀ» ¼ö»óÇß´Ù.

MobiSecÀº Çѱ¹Á¤º¸º¸È£ÇÐȸ¿¡¼­ ÁÖÃÖÇÏ´Â ±¹Á¦Çмú´ëȸ·Î, ¿ÃÇØ´Â 18°³±¹ 378¸íÀÌ Âü¿©ÇØ 93ÆíÀÇ ³í¹®°ú 77ÆíÀÇ Æ÷½ºÅ͸¦ ¹ßÇ¥Çß´Ù. ¼º½Å¿©´ë´Â 12ÆíÀÇ ³í¹®, 25ÆíÀÇ Æ÷½ºÅ͸¦ ¹ßÇ¥ÇßÀ¸¸ç, ÀÌ Áß ¼º½Å¿©´ë ¿¬±¸ÆÀÀÌ ¹ßÇ¥ÇÑ ³í¹® 4Æí°ú Æ÷½ºÅÍ 2Æí ÃÑ 6ÆíÀÌ ¼ö»óÇÏ´Â ¼º°ú¸¦ °Åµ×´Ù.

¸ÕÀú, ±¹°¡º¸¾È±â¼ú¿¬±¸¼Ò(NSR) ÃÖ¿ì¼ö³í¹®»óÀº ¹Ì·¡À¶ÇÕ±â¼ú°øÇаú ¹Ú»ç°úÁ¤¿¡ ÀçÇÐ ÁßÀÎ ±è¼Ò¿¬, ¹Ú³ªÀº, ÀüÀ¯¶õ(Áöµµ±³¼ö ÀÌÀϱ¸) ¿¬±¸ÆÀÀÌ 'DFL: Differential Federated Learning for Enhancing Privacy and Efficiency of Multilink-Operation Wireless Communication Networks'¸¦ ÁÖÁ¦·Î ¼ö»óÇß´Ù. À̾î Çѱ¹°úÇбâ¼úÁ¤º¸¿¬±¸¿ø ÃÖ¿ì¼ö³í¹®»ó(KISTI Best Paper Award)Àº 'Analysis and investigation of remote call service artifacts used in voice phishing: Focusing on voice phishing using CMC'¸¦ ¹ßÇ¥ÇÑ À¶ÇÕº¸¾È°øÇаú À¯¹ÎÁ¤, ¹Ú½ÂÇö Çкλý(Áöµµ±³¼ö: ±è¼º¹Î)ÀÌ ¼ö»óÇßÀ¸¸ç, Çѱ¹ÀÎÅͳÝÁøÈï¿ø ÃÖ¿ì¼ö³í¹®»ó(KISA Best Paper Award)Àº À¶ÇÕº¸¾È°øÇаú ¼®»ç°úÁ¤ÀÎ ³ëÇö¾Æ ¿¬±¸¿ø°ú À¶ÇÕº¸¾È°øÇаú ÀÌÀº¹Î Çкλý(Áöµµ±³¼ö: ÀÌÁÖÈñ)¿¡°Ô µ¹¾Æ°¬´Ù. ¸¶Áö¸·À¸·Î Mobisec ¿öÅ©¼ó ÃÖ¿ì¼ö³í¹®»ó(MobiSec Workshop Best Paper Award)Àº 'Robust Watermark Against Model Extraction Attack'À» ¹ßÇ¥ÇÑ À¶ÇÕº¸¾È°øÇаú ¹Ú»ç°úÁ¤»ý ÀÌ¿¬Áö ¿¬±¸¿ø°ú ¹Ì·¡À¶ÇÕ±â¼ú°øÇаú ¼®»ç°úÁ¤»ýÀÎ ±è¼­ÀÌ ¿¬±¸¿øÀÌ ¼ö»óÇß´Ù.

Æ÷½ºÅÍ ¹ßÇ¥¿¡¼­µµ ¼º½Å¿©´ë ¿¬±¸ÆÀÀÇ ¿ì¼öÇÑ ¼º°ú´Â À̾îÁ³´Ù. Çлý ºÎ¹® ÃÖ¿ì¼ö Æ÷½ºÅÍ»ó(Best Student Poster Award)¿¡´Â 'A Detection Framework for Inadible Attack on Mobile AI Assistants'À» ¿¬±¸ÇÑ À¶ÇÕº¸¾È°øÇаú ½Å¹ÌÁø, ¾ö¼³ÀÎ Çкλý(Áöµµ±³¼ö: ±è¼º¹Î)°ú 'Feasibility Evaluation and Analysis of Information Leakage Attacks Using Wi-Fi Beacons in the Air Gaped Network'À» ¹ßÇ¥ÇÑ À¶ÇÕº¸¾È°øÇаú Á¤¿¹¸² Çкλý, ¹Ì·¡À¶ÇÕ±â¼ú°øÇаú ±è¼Ò¿¬ ¹Ú»ç°úÁ¤ ¿¬±¸¿ø(Áöµµ±³¼ö ÀÌÀϱ¸)ÀÌ ¼ö»óÀ» ±â·ÏÇß´Ù.

¹Ú¿ë¼º±âÀÚ dragon@dt.co.kr

[ÀúÀÛ±ÇÀÚ ¨ÏµðÁöÅПÀÓ½º ¹«´Ü ÀüÀç-Àç¹èÆ÷ ±ÝÁö]







[ ÀúÀÛ±ÇÀÚ ¨ÏµðÁöÅПÀÓ½º, ¹«´Ü ÀüÀç ¹× Àç¹èÆ÷ ±ÝÁö ]