The First Workshop on New EXperiments on network security Technologies (WoNEXT)
The First Workshop on New EXperiments on network security Technologies (WoNEXT)
Seoul, Korea
October 17th, 2022
13:30 ~ 13:40 Welcome Address
Junbeom Hur, Korea University
13:40 ~ 14:40 Keynote: Next-generation security technologies against next-generation adversaries?
Adrian Perrig, ETH Zurich
14:40 ~ 15:10 Coffee Break
15:10 ~ 16:30 Technical Session
Jeonggyu Song (Korea University), Jonghoon Kwon (ETH Zürich), Junbeom Hur (Korea University), Analysis of Multiple Monitoring Stations based NTP Pool Monitoring System
Donghyun Kim (Korea Military Academy), Youn Kyu Lee (Hongik University), JongWook Jeong (Hongik University), NULL Byte Injection: Anti-Forensic Technique for Data Hiding in FAT32 File System
Cuong Manh Ho (Chung-Ang University), Anh Tien Tran (Chung-Ang University), Chunghyun Lee (Chung-Ang University), Duc Thien Hua (Chung-Ang University), Sungrae Cho (Chung-Ang University), Handover in Mobility-Aware Caching Strategy for LEO Satellite-based Overlay System with Content Delivery Network
Anh Tien Tran (ChungAng University), Nam-Phuong Tran (ChungAng University), Demeke Shumeye Lakew (ChungAng University), Nhu-Ngoc Dao (ChungAng University), Sungrae Cho (ChungAng University), Delay-Constrained Quality Maximization in RSMA-Based Video Streaming Networks
The current network systems and protocols are becoming more complex by integrating many system and network-controlling technologies for achieving higher efficiency and security. As a result, their vulnerabilities and attack surfaces are also increasing in practice. One impediment to the development of the appropriate defenses results from the fact that many of the current networking system architectures and their implementations are still behind the veil, and some pragmatically important security requirements have never been widely explored. This workshop aims to explore the following questions: “What important networking system mechanisms are still behind the veil, and what are their security implications?”, “What pragmatically important security requirements should be considered, but have never (or little) been handled in the state-of-the-art offense or defense?”, “What should we do to make the next generation networking systems more secure and sustainable in the presence of large-scale and multi-attack vector adversaries?”.
WoNEXT provides a high-quality work forum for discussing such questions and techniques for computer network attacks and defenses. Submissions should reflect the state-of-the-art in the computer network security technology, exposing poorly understood mechanisms, presenting novel security problems and solutions. The goal for these submissions is to produce pioneering works that will guide future work in the field. The workshop topics include, but are not limited to:
l Inter-domain network and cloud virtualization security
l Quantum-secure network system
l Side-channel attack and defense
l Hardware-assisted network security (including RDMA)
l Attack-resilient and green routing
l Exploitation of hardware/software vulnerability
l AI-based real-time network attack detection
l Internet and web security
l Distributed systems attack and defense (including Blockchain)
Papers being submitted to WoNEXT 2022 should be in ACM conference format (double column) and should be less than 6 pages in length. Accepted abstracts will appear in the ACM Digital Library.
Important dates
Paper submission: August 06, 2022
Acceptance notification: August 20, 2022
Camera ready submission: August 27, 2022
Workshop event: October 17, 2022
Paper submission
Organizing & Program chair
Junbeom Hur (Department of Computer Science and Engineering, Korea University)
Program Committee
Changhee Hahn (Seoul University of Science and Technology)
Dongyoung Koo (Hansung University)
Hyunsoo Kwon (Samsung Electronics)
Jonghoon Kwon (ETH Zurich)
Youngjoo Shin (Korea University)