Tue, Jul 23 AM A-1:ISEC(1):101 09:55 - 12:00 |
(1) ISEC |
09:55-10:20 |
Implementation of gathering system configuration and design vulnerability assessment for zero-day attack countermeasure using vulnerability information |
Motoki Kusume, Koji Kida, Keizo Saisho (Kagawa Univ.) |
(2) ISEC |
10:20-10:45 |
An Approach to Attack Scenario Generation for Simulation of Targeted Attacks |
Yusuke Takahashi, Shigeyoshi Shima, Atsunori Naito (NEC), Rui Tanabe, Katsunari Yoshioka (YNU) |
(3) ISEC |
10:45-11:10 |
Profiling of malicious users towards honeypot installation in the blockchain network |
Kazuki Hara, Teppei Sato, Mitsuyoshi Imamura (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT) |
(4) ISEC |
11:10-11:35 |
Risk analysis of zero downtime mechanism by dispersibility in blockchain technology |
Wataru Taguchi, Mitsuyoshi Imamura (Tsukuba Univ.), Kazumasa Omote (uba Univ./NICT) |
(5) ISEC |
11:35-12:00 |
A method of giving trust to users in Bitcoin |
Asuka Suzuki, Teppei Sato (Tsukuba Univ.), Omote Kazumasa (Tsukuba Univ./NICT) |
Tue, Jul 23 AM B-1:CSEC(1):213 09:55 - 12:00 |
(6) |
09:55-10:20 |
金融サービスにおける機械学習システムの適切な活用について:セキュリティと品質に焦点を当てて
○清藤 武暢・宇根 正志(日本銀行) |
(7) |
10:20-10:45 |
対象者の人数と人間関係に制約のない移動履歴とSNSアカウントの照合
○大岡 拓斗・松本 瞬・市野 将嗣・吉浦 裕(電通大) |
(8) |
10:45-11:10 |
マルウェア対策のための研究用データセット~MWS Datasets 2019~
荒木 粧子(ソリトンシステムズ)・○笠間 貴弘(NICT)・押場 博光(FFRI)千葉 大紀(NTTセキュアプラットフォーム研究所)・畑田 充弘(NTT)・寺田 真敏(電機大学) |
(9) |
11:10-11:35 |
擬似C&Cサーバを用いたIoTマルウェア駆除手法の検討
○三須 剛史・高田 一樹(セキュアブレイン) |
(10) |
11:35-12:00 |
観測ロケットMOMO3号機によるセキュア通信方式の基礎実験
○吉田 真紀(NICT)・森岡 澄夫(インターステラテクノロジズ)・尾花 賢(法政大学) |
Tue, Jul 23 AM D-1:BioX:328 09:55 - 11:35 |
(11) BioX |
09:55-10:20 |
Evaluation of Similarity Calculation Methods for Image Clustering based on PRNU Noise |
Mai Uchida, Yoichi Tomioka (UoA) |
(12) BioX |
10:20-10:45 |
Development of 2,400ppi fingerprint sensor for capturing neonate fingerprint within 24 hours after Birth |
Yoshinori Koda, Ai Takahashi, Koichi Ito, Takafumi Aoki (Tohoku Univ.) |
(13) BioX |
10:45-11:10 |
Introduction of Second-order Differential Phase Spectrum into Person Authentication using Intra-Palm Propagation Signal |
Kohei Fujita, Yuya Isimoto, Isao Nakanishi (Tottori Univ) |
(14) BioX |
11:10-11:35 |
Empirical Evaluation on Face-Detection Prevention Technologies |
Kazuki Eto, Kazushi Waki, Takafumi Mori, Hiroaki Kikuchi (Meiji Univ.) |
Tue, Jul 23 PM A-2:ISEC(2):104 13:10 - 15:15 |
(15) ISEC |
13:10-13:35 |
Constructing More Efficient Lattice-based Revocable IBE with Adaptive Security |
Atsushi Takayasu (Univ. Tokyo) |
(16) ISEC |
13:35-14:00 |
A Revocable Group Signature Scheme with Strong Anonymity for Crowdsensing |
Yuto Nakazawa, Toru Nakanishi (Hiroshima Univ.) |
(17) ISEC |
14:00-14:25 |
Generic Even-Mansour Construction Based on Group Actions |
Hector Hougaard, Chen-Mou Cheng, Miyaji Atsuko (Graduate School of Engineering, Osaka Univ.) |
(18) ISEC |
14:25-14:50 |
New Quantum Algorithms for Modular Inverse and Their Application on the Elliptic Curve Discrete Logarithm Problem |
Ryo Kurama (Univ. of Tokyo), Noboru Kunihiro (Tsukuba Univ.) |
(19) ISEC |
14:50-15:15 |
Attribute-Based Group Signatures for Revocable Members |
Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama (ATR) |
Tue, Jul 23 PM B-2:HWS(1):213 13:10 - 15:15 |
(20) HWS |
13:10-13:35 |
A Formal Approach to Verifying Trojan-freeness of Cryptographic Circuits Based on Galois-Field Arithmetic |
Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) |
(21) HWS |
13:35-14:00 |
Side-channel leakage evaluation of cryptographic module by IC chip level consumption simulation |
Kazuki Yasuda, Kazuki Monta, Akihiro Tsukioka, Noriyuki Miura, Makoto Nagata (Kobe Univ.) |
(22) HWS |
14:00-14:25 |
A Countermeasure against Side-Channel Analysis using Dynamic Power Control |
Tomoaki Ukezono (Fukuoka Univ.) |
(23) HWS |
14:25-14:50 |
Side Channel Security of an FPGA Pairing Implementation with Pipelined Modular Multiplier |
Mitsufumi Yamazaki, Junichi Sakamoto, Yuta Okuaki, Tsutomu Matsumoto (YNU) |
(24) HWS |
14:50-15:15 |
An FPGA Implementation of Aggregate Signature Schemes with Pipelined Modular Multiplier |
Yota Okuaki, Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) |
Tue, Jul 23 PM D-2:SITE(1):328 13:10 - 14:50 |
(25) SITE |
13:10-13:35 |
Proposal and Implementation of Password Reminder System for Partial Forgetting |
Ryota Hosoda, Hiroyuki Inaba (KIT) |
(26) SITE |
13:35-14:00 |
Proposal of Spam Filter by Applying Neural Network for Mitigating Catastrophic Forgetting |
Shuiti Kawahara, Lu Chen, Hiroyuki Inaba (KIT) |
(27) SITE |
14:00-14:25 |
Video Watermarking Using Difference of Persistent Homology in Consecutive Frames |
Takaya Kimura, Hiroyuki Inaba (KIT) |
(28) SITE |
14:25-14:50 |
A simulation of a 3-D visual cryptography using holography |
Takumi Takazawa, Kazuhiro Suzuki, Naoki Takada (Kochi Univ.) |
Tue, Jul 23 PM 15:30 - 16:30 |
(29) |
15:30-16:30 |
|
Tue, Jul 23 PM 16:30 - 17:30 |
(30) |
16:30-17:30 |
|
Tue, Jul 23 PM 17:30 - 18:00 |
(31) |
17:30-18:00 |
|
Wed, Jul 24 AM A-3:ISEC(3):104 09:30 - 10:45 |
(32) ISEC |
09:30-09:55 |
SecureHID: Securing the USB Interface |
Jan Goette (Waseda Univ.), Naoto Yanai (Osaka Univ.), Tatsuya Mori (Waseda Univ.) |
(33) ISEC |
09:55-10:20 |
A Performance Analysis of Supersingular Isogeny Diffie-Hellman with Several Classes of the Quadratic Extension Fields |
Yuki Nanjo (Okayama Univ.), Masaaki Shirase (Future Univ. Hakodate), Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) |
(34) ISEC |
10:20-10:45 |
Privacy for Documents and Prototype of Risk Evaluation Tool |
Tomoaki Mimoto, Shinsaku Kiyomoto (KDDI Research), Koji Kitamura (AIST), Atsuko Miyaji (Osaka Univ.) |
Wed, Jul 24 AM B-3:HWS(2):213 09:05 - 10:45 |
(35) HWS |
09:05-09:30 |
Instruction Replacement Fault Attack for TVC using Double Laser Station |
Tomoro Suzuki, Junichi Sakamoto, Tsutomu Matsumoto (YNU) |
(36) HWS |
09:30-09:55 |
Electromagnetic Analysis Attacks on an ASIC Implementation of a Ring-Oscillator PUF |
Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ.) |
(37) HWS |
09:55-10:20 |
Fundamental Study on an Estimation Method of Irradiate Frequencies to Forcibly Cause Electromagnetic Information Leakage |
Shugo Kaji (NAIST), Masahiro Kinugawa (NIT), Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) |
(38) HWS |
10:20-10:45 |
Instrumentation Security of Ranging Pulse LIDARs Using Multiple Photodetectors |
Tatsuya Suehiro, Ryuya Ichinose, Satoru Sakurazawa, Naoki Yoshida, Tsutomu Matsumoto (YNU) |
Wed, Jul 24 AM C-3:SITE(2):210 09:30 - 10:45 |
(39) SITE |
09:30-09:55 |
Generation of Family Resemblance Inference Rules by Boid Annotation and Labeled-LDA
-- A Machine Learning Approach to Integrate Inference Attack Analysis and Covert Channel Attack Analysis -- |
Kosuke Kurebayashi, Tetsuya Morizumi, Hirotsugu Kinoshita (KU) |
(40) SITE |
09:55-10:20 |
Implicit Guidance & Control at OODA Loop using as Countermeasures
-- against SMS phishing -- |
Yuidhi Takigawa (N.D.A.), Takeo Tatsumi (O.U.J/) |
(41) SITE |
10:20-10:45 |
Server Configuration Training Including Vulnerability Assessment and Remediation process |
Daisuke Suzuki (Hokuriku Univ.) |
Wed, Jul 24 AM A-4:CSEC(2):104 10:55 - 12:35 |
(42) |
10:55-11:20 |
n<2k-1において計算結果の正当性を検証可能な秘密分散を用いた秘匿計算
○落合 将吾・岩村 惠市(理科大) |
(43) |
11:20-11:45 |
ブロックチェーンを用いたIoTシステム向け証明サービス基盤の提案
○大久保 隆夫(情報セキュリティ大学院大学)・田嶋 健・上原 敏幸(アイビーシー) |
(44) |
11:45-12:10 |
ブロックチェーンを用いた公正なオンラインゲームの確立手法
○佐古 健太郎(早稲田大学)・森 達哉(早稲田大学)・松尾 真一郎(ジョージタウン大学) |
(45) |
12:10-12:35 |
Ethereumブロックチェーンで綿菓子を巻く方法
○須賀 祐治(IIJ) |
Wed, Jul 24 AM B-4:EMM/ICSS:213 10:55 - 12:35 |
(46) ICSS |
10:55-11:20 |
Investigation on Blockchain-based Malware Information Sharing Method in Malware Detection System |
Ryusei Fuji, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama (Univ. of Miyazaki), Mirang Park (Kanagawa Inst. of Tech.), Norio Shiratori (Chuo Univ.), Naonobu Okazaki (Univ. of Miyazaki) |
(47) ICSS |
11:20-11:45 |
Automatic Node Manipulation System for Active Monitoring Environment |
Shingo Yasuda, Nobuyuki Kanaya, Yu Tsuda, Satoshi Ohta, Ryosuke Miura, Daisuke Inoue (NICT) |
(48) EMM |
11:45-12:10 |
A Study on Suppression of Inappropriate Use of Illegal Contents Based on Conformity Caused by Normative Influence |
Hiroki Yamaguchi, Kazuhiro Kono (Kansai Univ.) |
(49) EMM |
12:10-12:35 |
Recording device identification based on audio distortion depending on system-on-chip |
Akira Nishimura (Tokyo Univ. Info. Sci.) |
Wed, Jul 24 AM C-4:SITE(3):210 10:55 - 12:10 |
(50) SITE |
10:55-11:20 |
Stochastic Existence Connecting Logos that are not necessarily completely divided and Language Games
-- Limitations of Security Models and the Possibility of Artificial Intelligence -- |
Tetsuya Morizumi (KU) |
(51) SITE |
11:20-11:45 |
International regulatory trend survey report on AI
-- Focusing on the OECD Principles on AI -- |
Naonori Kato (KDDI Research), Masatomo Suzuki (Niigata Univ./RIKEN), Yoichiro Itakura (Hikari Sogoh Law Offices/RIKEN), Yosuke Murakami (KDDI Research) |
(52) SITE |
11:45-12:10 |
Development of the Ethics Assessment for Research & Innovation Guidelines under the SATORI project in Europe (1)
-- Background and Outline -- |
Takushi Otani (Kibi International Univ.), Hirotaka Osawa (Tsukuba Univ.), Minao Kukita (Nagoya Univ.), Reina Saijo (Kyoto Univ.) |
Wed, Jul 24 PM A-5:ISEC(4):104 13:45 - 15:50 |
(53) ISEC |
13:45-14:10 |
3 Layers Public Key Cryptosystem with a Short Tandem Repeat DNA for Ultimate Personal Identification
-- Introduction of Short Tandem Repeat Coupled with Mai Nanbaa and its Application -- |
Shigeo Tsujii, Toshiaki Saisho, Masao Yamasawa, Ko Shikata (Chuo Univ.), Koji Sasaki, Nobuharu Suzuki (Ad.) |
(54) ISEC |
14:10-14:35 |
Anonymous Public-Key Certificates based on Elliptic Curve |
Kazuomi Oishi (SIST) |
(55) ISEC |
14:35-15:00 |
A Method for Key-Updatable Symmetric Searchable Encryption |
Natsume Matsuzaki, Hiroaki Anada (Univ. of Nagasaki) |
(56) ISEC |
15:00-15:25 |
Participation Report of the 9th BIU Winter School on Cryptography |
Hiroaki Anada (Univ. Nagasaki) |
(57) ISEC |
15:25-15:50 |
Garbled Circuit by three valued logics by Bochvar |
Shunsuke Hayashi, Taroh Sasaki, Athushi Fujioka (Kanagawa Univ.) |
Wed, Jul 24 PM B-5:HWS(3):213 13:45 - 15:50 |
(58) HWS |
13:45-14:10 |
Design Space Search Applying Bayesian Optimization to High-level Design Flow |
Ryohei Nakayama (UTokyo), Hiromitsu Awano (Osaka Univ.), Makoto Ikeda (UTokyo) |
(59) HWS |
14:10-14:35 |
Design of Highly Efficient AES Hardware Architectures Based on Multiplicative-Offset |
Rei Ueno (Tohoku Univ.), Sumio Morioka (IST), Noriyuki Miura, Kohei Matsuda, Makoto Nagata (Kobe Univ.), Shivam Bhasin (NTU), Yves Mathieu, Tarik Graba, Jean-Luc Danger (TPT), Naofumi Homma (Tohoku Univ.) |
(60) HWS |
14:35-15:00 |
Design of High Performance Processor for Paillier Algorithm With Homomorphism |
Chun Cai, Hiromitsu Awano, Makoto Ikeda (Tokyo Univ.) |
(61) HWS |
15:00-15:25 |
Potential Method to Extract Uniqueness from Non-Ideality of Sensor Device |
Thibaut Constant, Makoto Nagata, Noriyuki Miura (Kobe Univ.) |
(62) HWS |
15:25-15:50 |
Possibility of Identifying USB Device by Voltage Changing |
Taku Toyama, Junichi Sakamoto, Naoki Yoshida, Tsutomu Matsumoto (YNU) |
Wed, Jul 24 PM C-5:SPT:210 13:45 - 15:25 |
(63) |
13:45-14:10 |
メールにおける誘導手口の推定手法に関する検討
○山本匠・西川弘毅・岩崎亜衣子(三菱電機)・上原 航汰(静岡大学)・Harsham Bret・WangYe・HoriChiori・河内清人(三菱電機)・西垣正勝(静岡大学) |
(64) |
14:10-14:35 |
新聞で報道される情報漏えい事故の属性分析
○新原功一・菊池浩明(明治大学) |
(65) |
14:35-15:00 |
セキュリティやプライバシーに関するSoK論文やサーベイ論文をSoKする
○金岡晃(東邦大学) |
(66) |
15:00-15:25 |
情報セキュリティに関連するガイドラインのDoc2Vecを用いた文書内容の可視化手法の提案とその評価
○尾崎敏司(筑波大学/トレンドマイクロ) |