¼º½Å¿©´ë ´ëÇпø¡¤Çкבּ¸»ýÆÀ, MobiSec 2024 ÃÖ¿ì¼ö³í¹®»ó, ÃÖ¿ì¼öÆ÷½ºÅÍ»ó 6°Ç ¼ö»ó
ÀÔ·Â: 2024-12-26 19:44
¹Ú¿ë¼º ±âÀÚ
MobiSecÀº Çѱ¹Á¤º¸º¸È£ÇÐȸ¿¡¼ ÁÖÃÖÇÏ´Â ±¹Á¦Çмú´ëȸ·Î, ¿ÃÇØ´Â 18°³±¹ 378¸íÀÌ Âü¿©ÇØ 93ÆíÀÇ ³í¹®°ú 77ÆíÀÇ Æ÷½ºÅ͸¦ ¹ßÇ¥Çß´Ù. ¼º½Å¿©´ë´Â 12ÆíÀÇ ³í¹®, 25ÆíÀÇ Æ÷½ºÅ͸¦ ¹ßÇ¥ÇßÀ¸¸ç, ÀÌ Áß ¼º½Å¿©´ë ¿¬±¸ÆÀÀÌ ¹ßÇ¥ÇÑ ³í¹® 4Æí°ú Æ÷½ºÅÍ 2Æí ÃÑ 6ÆíÀÌ ¼ö»óÇÏ´Â ¼º°ú¸¦ °Åµ×´Ù.
¸ÕÀú, ±¹°¡º¸¾È±â¼ú¿¬±¸¼Ò(NSR) ÃÖ¿ì¼ö³í¹®»óÀº ¹Ì·¡À¶ÇÕ±â¼ú°øÇаú ¹Ú»ç°úÁ¤¿¡ ÀçÇÐ ÁßÀÎ ±è¼Ò¿¬, ¹Ú³ªÀº, ÀüÀ¯¶õ(Áöµµ±³¼ö ÀÌÀϱ¸) ¿¬±¸ÆÀÀÌ 'DFL: Differential Federated Learning for Enhancing Privacy and Efficiency of Multilink-Operation Wireless Communication Networks'¸¦ ÁÖÁ¦·Î ¼ö»óÇß´Ù. À̾î Çѱ¹°úÇбâ¼úÁ¤º¸¿¬±¸¿ø ÃÖ¿ì¼ö³í¹®»ó(KISTI Best Paper Award)Àº 'Analysis and investigation of remote call service artifacts used in voice phishing: Focusing on voice phishing using CMC'¸¦ ¹ßÇ¥ÇÑ À¶ÇÕº¸¾È°øÇаú À¯¹ÎÁ¤, ¹Ú½ÂÇö Çкλý(Áöµµ±³¼ö: ±è¼º¹Î)ÀÌ ¼ö»óÇßÀ¸¸ç, Çѱ¹ÀÎÅͳÝÁøÈï¿ø ÃÖ¿ì¼ö³í¹®»ó(KISA Best Paper Award)Àº À¶ÇÕº¸¾È°øÇаú ¼®»ç°úÁ¤ÀÎ ³ëÇö¾Æ ¿¬±¸¿ø°ú À¶ÇÕº¸¾È°øÇаú ÀÌÀº¹Î Çкλý(Áöµµ±³¼ö: ÀÌÁÖÈñ)¿¡°Ô µ¹¾Æ°¬´Ù. ¸¶Áö¸·À¸·Î Mobisec ¿öÅ©¼ó ÃÖ¿ì¼ö³í¹®»ó(MobiSec Workshop Best Paper Award)Àº 'Robust Watermark Against Model Extraction Attack'À» ¹ßÇ¥ÇÑ À¶ÇÕº¸¾È°øÇаú ¹Ú»ç°úÁ¤»ý ÀÌ¿¬Áö ¿¬±¸¿ø°ú ¹Ì·¡À¶ÇÕ±â¼ú°øÇаú ¼®»ç°úÁ¤»ýÀÎ ±è¼ÀÌ ¿¬±¸¿øÀÌ ¼ö»óÇß´Ù.
Æ÷½ºÅÍ ¹ßÇ¥¿¡¼µµ ¼º½Å¿©´ë ¿¬±¸ÆÀÀÇ ¿ì¼öÇÑ ¼º°ú´Â À̾îÁ³´Ù. Çлý ºÎ¹® ÃÖ¿ì¼ö Æ÷½ºÅÍ»ó(Best Student Poster Award)¿¡´Â 'A Detection Framework for Inadible Attack on Mobile AI Assistants'À» ¿¬±¸ÇÑ À¶ÇÕº¸¾È°øÇаú ½Å¹ÌÁø, ¾ö¼³ÀÎ Çкλý(Áöµµ±³¼ö: ±è¼º¹Î)°ú 'Feasibility Evaluation and Analysis of Information Leakage Attacks Using Wi-Fi Beacons in the Air Gaped Network'À» ¹ßÇ¥ÇÑ À¶ÇÕº¸¾È°øÇаú Á¤¿¹¸² Çкλý, ¹Ì·¡À¶ÇÕ±â¼ú°øÇаú ±è¼Ò¿¬ ¹Ú»ç°úÁ¤ ¿¬±¸¿ø(Áöµµ±³¼ö ÀÌÀϱ¸)ÀÌ ¼ö»óÀ» ±â·ÏÇß´Ù.
¹Ú¿ë¼º±âÀÚ dragon@dt.co.kr
[ÀúÀÛ±ÇÀÚ ¨ÏµðÁöÅПÀÓ½º ¹«´Ü ÀüÀç-Àç¹èÆ÷ ±ÝÁö]
[ ÀúÀÛ±ÇÀÚ ¨ÏµðÁöÅПÀÓ½º, ¹«´Ü ÀüÀç ¹× Àç¹èÆ÷ ±ÝÁö ]