IEICE Technical Report

Online edition: ISSN 2432-6380

Volume 124, Number 121

Social Implications of Technology and Information Ethics

Workshop Date : 2024-07-22 - 2024-07-23 / Issue Date : 2024-07-15

[PREV] [NEXT]

[TOP] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [2024] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

SITE2024-5
Shor algorithm experiments with multi-node decision diagram-based quantum simulator
Yusuke Kimura (Fujitsu), Li Shaowen (U-Tokyo), Hiromitsu Soneda, Junpei Koyama (Fujitsu), Hiroyuki Sato, Masahiro Fujita (U-Tokyo)
pp. 1 - 7

SITE2024-6
CSI-FiSh Variant with Quadratic Twists on Edwards Curves
Yuki Iwata (Toyohashi University of Technology), Hiroki Minamide (National Institute of Technology, Tokyo College), Takeshi Nakai, Koutarou Suzuki (Toyohashi University of Technology)
pp. 8 - 15

SITE2024-7
A generalization of quantum ISD algorithm for Syndrome Decoding Problem
Asuka Wakasugi (EAGLYS), Mitsuru Tada (Chiba Univ.)
pp. 16 - 22

SITE2024-8
Improving Ryan and Heninger's Attack on MEGA
Naoki Shimoe, Noboru Kunihiro (Univ. of Tsukuba)
pp. 23 - 30

SITE2024-9
[Invited Talk] Cybernetic Avata Service Use Cases and Security -- Backcasting from Year 2050 --
Masakatsu Nishigaki (Shizuoka Univ.), Yin Chen (Reitaku Univ.), Tetsushi Ohki (Shizuoka Univ.), Rie Shigetomi Yamaguchi (Univ. Tokyo), Yasushi Yagi (Osaka Univ.)
p. 31

SITE2024-10
The OU-ISIR multimodal biometric database and its performance evaluation
Chi Xu, Xiang Li, Allam Shehata, Yasushi Yagi (Osaka Univ.)
pp. 32 - 37

SITE2024-11
The OU-ISIR continuous authentication database comprising face and speech biometrics
Xiang Li, Chi Xu, Yasushi Yagi (Osaka Univ.)
pp. 38 - 43

SITE2024-12
A Study of Multibiometrics Using a Single Face Image
Koichi Ito, Taito Tonosaki, Takafumi Aoki (Tohoku Univ.), Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.)
pp. 44 - 49

SITE2024-13
Honeypot for Long-term Observation of Cyber Attacks Exploiting Insecure Routers
Masataka Mizokuchi, Takayuki Sasaki, Katsunari Yoshioka (Yokohama National Univ.)
pp. 50 - 57

SITE2024-14
Survey of OSS vulnerabilities in router firmware using an SCA tool
Momoka Kihara, Sasaki Takayuki, Katsunari Yoshioka (Yokohama National Univ.)
pp. 58 - 65

SITE2024-15
Proposing Slow-Scan Detection Methods in Closed Networks Without Time Windows
Shunya Tanaka (OKI)
pp. 66 - 72

SITE2024-16
Collision Attack on DM-AES
Kodai Taiyama (UOH), Kosei Sakamoto (ME), Ryoma Ito (NICT), Kazuma Taka, Takanori Isobe (UOH)
pp. 73 - 80

SITE2024-17
Differential attack using multipath against block cipher DoT
Haruka Sugai, Yasutaka Igarashi (TUS)
pp. 81 - 89

SITE2024-18
On Integral Properties Efficiently Reducible to the Data Complexity of the Attack
Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science)
pp. 90 - 95

SITE2024-19
Design of Low-Latency Block Ciphers with Multiple Linear Layers
Kazuma Nakata, Tatsuya Ishikawa (Hyogo Uiv.), Kosei Sakamoto (Mitsubishi Electric), Kazuhiko Minematsu (NEC), Takanori Isobe (Hyogo Uiv.)
pp. 96 - 103

SITE2024-20
Building a Dataset for Accelerating Researches against Fraudulent DeFi Tokens
Iori Suzuki, Yin Minn Pa Pa, Katsunari Yoshioka (YNU)
pp. 104 - 111

SITE2024-21
Detection of Web3 Phishing Sites Focused on Permission Requests After Wallet Connection
Riku Aoto, Yin Minn Pa Pa, Katsunari Yoshioka (YNU)
pp. 112 - 119

SITE2024-22
An analysis of relationship between Black-Hat SEO malwares using information from redirected scam sites
Makoto Shimamura (Trend Micro Inc.), Kousuke Takeshige (Chiba Prefectural Police), Shingo Matsugaya (Trend Micro Inc./JC3), Keisuke Sakai (Kanagawa Prefectural Police), Masaki Hashimoto (Kagawa Univ.)
pp. 120 - 127

SITE2024-23
Performance Evaluation of Improved SuperSonic Glitch PUF
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.)
pp. 128 - 132

SITE2024-24
(See Japanese page.)
pp. 133 - 137

SITE2024-25
(See Japanese page.)
pp. 138 - 142

SITE2024-26
Spoofing Attack for Payment Systems based on Barcode Wristbands and its Coutermeasure
Yoshiteru Hibino, Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.)
pp. 143 - 146

SITE2024-27
Implementation and Evaluation of an Application System combining a Lightweight Block Cipher and a Lightweight MAC using MPC
Kandai Nakagawa (Tokai Univ.), Kazuto Ogawa (NICT), Takeki Kitayama, Hayato Watanabe (Tokai Univ.), Toshihiro Ohigashi (Tokai Univ./NICT)
pp. 147 - 154

SITE2024-28
Framing Fraud in Secret Sharing Scheme and its Countermeasure -- Current status and challenging issues --
Kouichi Sakurai (Kyushu Univ.)
pp. 155 - 157

SITE2024-29
Estimation of rotation angle and anisotropic magnification rate using pilot signal
Rinka Kawano, Masaki Kawamura (Yamaguchi Univ.)
pp. 158 - 163

SITE2024-30
Study on Potential of Speech-pathological Features for Deepfake Speech Detection
Anuwat Chaiwongyen (JAIST), Suradej Duangpummet, Jessada Karnjana (NSTDA), Waree Kongprawechnon (SIIT), Masashi Unoki (JAIST)
pp. 164 - 169

SITE2024-31
Illegal login detection using eye movements when entering authentication codes
Sachi Fujimoto, Chisa Takano, Masaki Inamura (HCU)
pp. 170 - 175

SITE2024-32
Flick input PIN code authentication combined blink and gaze manipulation
Moritomo Nara, Bo Wu, Kiminori Sato (TUT)
pp. 176 - 181

SITE2024-33
Security Analysis of a Contactless Dial Lock Authentication System
Kaiya Yokokura, Bo Wu, Kiminori Sato (TUT)
pp. 182 - 187

SITE2024-34
A Machine Learning-Based Clone Detection Approach in Nano-Artifact Metrics
Naoki Yoshida, Iwaki Miyamoto, Katsunari Yoshioka (YNU), Tsutomu Matsumoto (AIST)
pp. 188 - 193

SITE2024-35
Defending against adversarial example attacks by a denoising autoencoder and physical random noise
Yuki Rogi, Kota Yoshida, Tatsuya Oyama, Takeshi Fujino, Shunsuke Okura (Ritsumeikan Univ.)
pp. 194 - 199

SITE2024-36
Power-analysis side channel attack with auto encoder
Haruto Ishii, Takuya Kojima, Hideki Takase, Hiroshi Nakamura (UTokyo)
pp. 200 - 205

SITE2024-37
DoS Attack Evaluation Experiment Using De-authentication Frames Against WPA2/WPA3-Enterprise Authentication Procedures
Daisei Tsuchiyama, Hiroyuki Okazaki (Shinshu Univ.), Hikofumi Suzuki (NII)
pp. 206 - 213

SITE2024-38
Investigation of the success rate of Evil Twin attacks due to differences in radio wave strength -- Variation of success rate with load status and connection request flood --
Masataka Yasuda, Chisa Takano, Masaki Inamura (HCU)
pp. 214 - 221

SITE2024-39
Report on Survey of Professionalism and Ethics Among Japanese IT Professionals
Hiroaki Kanematsu (Nagoya Univ.)
pp. 222 - 229

SITE2024-40
What is brought about by the "Uncanny Circle" that connects LLM and humans?
Tsukasa Shirai, Hirotsugu Ohba, Yuko Murakami (Rikkyo Univ.)
pp. 230 - 235

SITE2024-41
Proposal of a Method for Evaluating the Authenticity of Seals Based on Judgment Criteria of Human
Yuuki Kimura, Soma Sugahara, Atsumu Kida, Taisei Nakamura, Ayato Ishikawa, Tetsutaro Uehara (Ritsumeikan Univ.)
pp. 236 - 242

SITE2024-42
A Study of the Japanese Version of the Security Clearance System, or Suitability Assessment System -- From a Supply Chain Security Perspective --
Yusuke Tachibana (FIT)
pp. 243 - 246

SITE2024-43
Evaluation of Accuracy and Security on Deep Learning Model by Utilizing K-Anonymization With Attribute Selection for Reducing Computational Cost
Rei Ueda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ)
pp. 247 - 254

SITE2024-44
Security Analysis on the Authentication Process Using Bluetooth
Shogo Shiraki, Takanori Isobe (Univ.Hyogo)
pp. 255 - 260

SITE2024-45
Intrinsic Cause of Adversarial Examples by Geometric Analysis of Deep Learning Viewed from Data Manifold
Hajime Tasaki, Jinhui Chao (Chuo Univ.)
pp. 261 - 266

SITE2024-46
(See Japanese page.)
pp. 267 - 271

SITE2024-47
A Study on Detection Method of Aged Microcontrollers Using Side-Channel Information
Yuki Kaneko (Tohoku Univ.), Yuichi Hayashi (NAIST), Naofumi Homma (Tohoku Univ.)
pp. 272 - 277

SITE2024-48
Study on Stochastic Encrypted Data Processing Method based on Fully Homomorphic Encryption
Soh Sato, Naofumi Homma (Tohoku Univ.)
pp. 278 - 283

SITE2024-49
UEBA Model Poisoning Attack: Challenges in Insider Threat Defense by UEBA and Proposal of Detection Methods
Yusuke Isaka, Keisuke Kito, Takumi Yamamoto, Kiyoto Kawauchi (MELCO)
pp. 284 - 290

SITE2024-50
(See Japanese page.)
pp. 291 - 298

SITE2024-51
Toward semantic identification method for patch modification using LLM
Reika Arakawa, Yo Kanemoto, Mitsuaki Akiyama (NTT)
pp. 299 - 306

SITE2024-52
Lossy Signature Scheme Based on Decisional Exact LPN Problem with Concrete Hash Encodings
Arga Dhahana Pramudianto, Bagus Santoso (UEC)
pp. 307 - 314

SITE2024-53
On Mulit-Key FuncCPA Secure Public Key Encryption Schemes
Eri Nakajima (Osaka Univ.), Keisuke Hara (AIST), Kyosuke Yamashita (Osaka Univ.)
pp. 315 - 319

SITE2024-54
Key Substitution Attack against Ordered Multisignature
Yusuke (AIST), Yuuki, Kyosuke (Osaka Univ.), Goichiro (AIST)
pp. 320 - 327

SITE2024-55
Key Substitution Attack against Ordered Multisignature
Yuuki Fujita (Osaka Univ.), Yusuke Sakai (AIST), Kyosuke Yamashita (Osaka Univ.), Goichiro Hanaoka (AIST)
pp. 328 - 335

SITE2024-56
Innovations in Security Mechanisms through Decomposition and Reuse of Body Functions: A Preliminary Study on Password Authentication(part 2)
Takumi Takaiwa, Seiya Kajihara, Tsubasa Shibata, Soichi Takigawa, Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.)
pp. 336 - 343

SITE2024-57
An Experimental Study on Radio Frequency Fingerprinting-based Authentication in IEEE 802.11g
Zhen Jia, Zewei Guo (FUN), Wenhao Huang (Keio Univ.), Yin Chen (Reitaku Univ.), Jinxiao Zhu (TDU), Xiaohong Jiang (FUN)
pp. 344 - 349

SITE2024-58
CAPT-AI: Study on AI Model identification using differences in ability (part 2)
Seiya Kajihara, Takumi Takaiwa, Tsubasa Shibata (Shizuoka Univ.), Nami Ashizawa (NTT/Shizuoka Univ.), Naoto Kiribuchi, Toshiki Shibahara (NTT), Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.)
pp. 350 - 357

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan