Table of Contents

Overview

Participants

# Name Dept Advisor Mobile Phone Email Address
1 Eunseong Kim CE Minkyoung Cho
2 Jimin Son CE Minho Shin
3 Somon CE Sangwon Hyun
4 Suwon Park CE Minho Shin
5 Hoguk Lee CE Minho Shin
6 Soyoung Ji CE Minho Shin

Agenda

Date Name Topic Slides Minutes
9/14 Minho Ice-breaking
9/21 Sam debreach_mitigating_compression_side_channels_via.pdf debreach.pptx
Eun ai_스피커의_보안성_평가_및_대응방안_연구.pdf
slide
ai_스피커의_보안성_평가_및_대응방안_연구.pptx
9/28 No Class
10/5 No Class
10/12 Jimin 블록체인_기반의_scada.pdf 블록체인_기반의_scada_시스템_보안.pptx
Suwon arp_공격_시그니처_정보에_기반한_스푸핑_공격_탐지_및_차단_모델.pdf spoofing_attack_detection_and_blocking_model.pptx
10/17 3pm Soyoung 웹_기밀성_및_무결성의_보안성_검증_방법.pdf 1.웹기밀성및무결성의보안성검증방법.pptx
Hoguk securing_medical_records_of_covid-19_patients_using_elliptic_curve_digital_-_signature_algorithm_ecdsa_in_blockchain.pdf securing_medical_records.pptx
10/19 Sam htb_a_very_effective_method_to_protect_web_servers.pdf heal_the_breach_abdusamatov_somon_.pptx
Eun ai_사이버보안_체계를_위한_블록체인_기반의.pdf ai_사이버보안_체계를_위한_블록체인_기반의_data-preserviing.pptx
10/26 Jimin 클라이언트_환경에서_보안_소켓_레이어의_트래픽_복호화.pdf 클라이언트_환경에서_보안_소켓_레이어의_트래픽_복호화.pptx
Suwon applsci-12-07655-v2.pdf sgxdump.pptx
10/31 3pm Soyoung 웹모니터링기반암호화웹트래픽공격탐지시스템.pdf 2.웹모니터링기반암호화웹트래픽공격탐지시스템.pptx
Hoguk on_the_security_of_networked_control_systems_in.pdf on_the_security_of_networked_control_systems-in_smart_vehicle_and_its_adaptive_cruise_control.pptx
11/2 Sam privacy-preserving_computing_in_the_blockchain_era.pdf privacy-preserving_in_the_blockchain_era_abdusamatov_somon_.pptx
Eun 자율_운항_선박의_인공지능_잠재적_사이버_위협과_보안.pdf 자율_운항_선박의_인공지능.pptx
11/9 Jimin 자율_주행_자동차_보안_위협_및_기술_동향.pdf 자율_주행_자동차_보안_위협_및_기술_동향.pptx
Suwon 1-s2.0-s0167404821004053-main.pdf automated-analysis-of-malicious-microsoft-office-documents.pptx
11/16 No Class
11/21 3pm Soyoung 수정_가능한_블록체인_기반_권한_변경.pdf 3.수정가능한블록체인기반권한변경및접근제어시스템.pptx
Hoguk detection-of-cybersecurity-spoofing-attacks-in-vehicular-networks-with-recurrence-quantification-analysis.pdf detection-of-cybersecurity-spoofing-attacks-in-vehicular-networks-with-recurrence-quantification-analysis.pptx
11/23 Sam targeted-deanonymization-via-the-cache-side-channel-attacks-and-defenses.pdf targeted_deanonymization_via_the_cache_side_channel_abdusamatov_somon_.pptx
Eun 인공지능기술의_iot_통합보안관제를_위한_데이터모델링.pdf 인공지능기술의_iot_통합보안관제를_위한_데이터모델링.pptx
11/30 Jimin sdn에서의_보안_시스템_부하_감소_기법.pdf sdn에서의_보안_시스템_부하_감소_기법.pptx
Suwon 1-s2.0-s0167404822001407-main.pdf wasmati.pptx
12/7 Soyoung 4.보안_메시징_프로토콜_mls에서_관리자에_메시지_노출에_관한_연구.pdf
Hoguk cyberphysical-security-of-powertrain-systems-in-modern-electric-vehicles-vulnerabilities-challenges-and-future-visions.pdf cyberphysical_security_of_powertrain_systems_80221115_이호국.pptx
9/21 Zhong Perfectly Privacy-Preserving AI,
A Survey on Collaborative Deep Learning
and Privacy-Preserving
Privacy-Preserving AI

Class Information

Reading List on Privacy

List: privacy-preserving_ai-2020.4.1.pdf

SAMPLE:

Privacy-preserving for AI applications:

Privacy-preserving approach using machine learning:

Others:

Reading List Security

Reading List on Blockchain

General

Survey

Blockchain Technology

Blockchain Security & Privacy

Hyperledger (Permissioned Blockchain)

Applications: Security & Privacy

Applications: Medical

Applications: IoT

Applications: Business

Applications: Government

Blockchain Technology and Decentralized Governance: Is the State Still Necessary?

Applications: Smart City

Applications: Energy

Applications: Others