IWSEC 2020

September 2 (Wed) - 4 (Fri), 2020


How to join Poster Session

  • This year IWSEC poster session will be held online due to COVID-19.
    For the questions and answers, Slack will be used. The link for accessing the Slack channels will be sent by e-mail.
    Please feel free to discuss with the presenters on the channels.

IWSEC2020 List of Posters

  1. Exploiting low-powerful IoT devices to perpetrate network attacks
    Ivan Vaccari, Maurizio Aiello, Enrico Cambiaso (CNR, IEIIT institute)
  1. Vulnerability in the Food Supply Chain - Approaches and Results from the NutriSafe Project
    Manfred Hofmeier, Ulrike Lechner (Universitat der Bundeswehr Munchen)
  1. Study on Handover Security Protocol for 5G Wireless Backhaul Environment
    Jiyoon Kim (Soonchunhyang University), Philip Virgil Astillo (Soonchunhyang University), Hoonyong Park (Soonchunhyang University), Vishal Sharma (Singapore University of Technology and Design), Ilsun You (Soonchunhyang University)
  1. Privacy in Analytics
    Kabiru Mohammed (De Montfort University), Aladdin Ayesh (De Montfort University), Eerke Boiten (De Montfort University)
  1. Can Data Obfuscation techniques be beneficial for preserving Data Utility unlike Differentially Private Algorithms
    Debolina Ghatak (Indian Institute of Technology Jammu) , Kouichi Sakurai (Kyushu University) , Bimal K Roy (Indian Statistical Institute Kolkata)
  1. An Efficient Authenticated Key Exchange from Random Self-Reducibility on CSIDH
    Tomoki Kawashima (University of Tokyo) Katsuyuki Takashima (Mitsubishi Electric Corporation) Yusuke Aikawa (Mitsubishi Electric Corporation) Tsuyoshi Takagi (University of Tokyo)
  1. Importance of Machine Learning in Adaptive Authentication
    Daiji Hara (Kyushu University), Koichi Sakurai (Kyushu University)
  1. Evaluation of an algebraic fault attack on the SHA-256 compression function
    Koji Hori (University of Fukui), Shoichi Hirose (University of Fukui)
  1. Research on attack cases via topic-model analysis and selection of vulnerability candidates from large-scale vulnerability database
    Hiroki Koyanagi (Shonan Institute of Technology),Yusuke Mishina (AIST),Kazuo Takaragi (AIST),Sven Wohlgemuth (Hitachi Ltd),Katsuyuki Umezawa (Shonan Institute of Technology, AIST)
  1. Secure Virtualization Technology in Android OS using HYP mode
    Jaehyeon Yoon (Soongsil University), Souhwan Jung (Soongsil University)
  1. Automated API Grouping as Dimensionality Reduction for Classification of Android Malware
    Hyunseok Shim (Soongsil University), Souhwan Jung (Soongsil University)
  1. A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV
    Hiroki Furue (The University of Tokyo), Yasuhiko Ikematsu (Kyushu University), Yutaro Kiyomura (NTT Secure Platform Laboratorie), Tsuyoshi Takagi (The University of Tokyo)
  1. An Initial Experimentation of SDN/OpenFlow Based Port Scan Detection Method
    Daichi Ono (Tohoku University), Satoru Izumi (National Institute of Technology, Sendai College), Toru Abe (Tohoku University), Takuo Suganuma (Tohoku University)
  1. A Smart Behavioral Threat Detection Scheme for Resource Constraint
    Gaurav Choudhary (Soonchunhyang University), Philip Virgil Astillo (Soonchunhyang University), Jiyoon Kim (Soonchunhyang University), Bonam Kim (Soonchunhyang University), Ilsun You (Soonchunhyang University)

* Underlined authors are presenters.

Some poster presenters published their poster document on their will at this page. The documents are only available one week after the workshop date.

Every uploaded document regarding the posters is POSTER AUTHORS RESPONSIBILITY. IWSEC2020 accept no responsibility and no liability for any loss resulting from the published documents. IWSEC2020 does not endorses documents that violates any law or infringes the rights.


Posters were not rigorously refereed, and no proceedings were published regarding the posters, and hence the copyrights of any content for the poster presentations are retained by the authors; there is no restriction for the authors of the posters to submit the contents to other journals/conferences in the future.