Mon, Jul 22 PM 13:00 - 14:15 |
(1) |
13:00-13:25 |
|
(2) |
13:25-13:50 |
|
(3) |
13:50-14:15 |
|
|
14:15-14:50 |
Break ( 35 min. ) |
Mon, Jul 22 PM 13:00 - 14:40 |
(4) ISEC |
13:00-13:25 |
Shor algorithm experiments with multi-node decision diagram-based quantum simulator |
Yusuke Kimura (Fujitsu), Li Shaowen (U-Tokyo), Hiromitsu Soneda, Junpei Koyama (Fujitsu), Hiroyuki Sato, Masahiro Fujita (U-Tokyo) |
(5) ISEC |
13:25-13:50 |
CSI-FiSh Variant with Quadratic Twists on Edwards Curves |
Yuki Iwata (Toyohashi University of Technology), Hiroki Minamide (National Institute of Technology, Tokyo College), Takeshi Nakai, Koutarou Suzuki (Toyohashi University of Technology) |
(6) ISEC |
13:50-14:15 |
A generalization of quantum ISD algorithm for Syndrome Decoding Problem |
Asuka Wakasugi (EAGLYS), Mitsuru Tada (Chiba Univ.) |
(7) ISEC |
14:15-14:40 |
Improving Ryan and Heninger's Attack on MEGA |
Naoki Shimoe, Noboru Kunihiro (Univ. of Tsukuba) |
|
14:40-14:50 |
Break ( 10 min. ) |
Mon, Jul 22 PM 13:00 - 14:40 |
(8) BioX |
13:00-13:25 |
[Invited Talk]
Cybernetic Avata Service Use Cases and Security
-- Backcasting from Year 2050 -- |
Masakatsu Nishigaki (Shizuoka Univ.), Yin Chen (Reitaku Univ.), Tetsushi Ohki (Shizuoka Univ.), Rie Shigetomi Yamaguchi (Univ. Tokyo), Yasushi Yagi (Osaka Univ.) |
(9) BioX |
13:25-13:50 |
The OU-ISIR multimodal biometric database and its performance evaluation |
Chi Xu, Xiang Li, Allam Shehata, Yasushi Yagi (Osaka Univ.) |
(10) BioX |
13:50-14:15 |
The OU-ISIR continuous authentication database comprising face and speech biometrics |
Xiang Li, Chi Xu, Yasushi Yagi (Osaka Univ.) |
(11) BioX |
14:15-14:40 |
A Study of Multibiometrics Using a Single Face Image |
Koichi Ito, Taito Tonosaki, Takafumi Aoki (Tohoku Univ.), Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.) |
|
14:40-14:50 |
Break ( 10 min. ) |
Mon, Jul 22 PM 13:00 - 14:15 |
(12) ICSS |
13:00-13:25 |
Honeypot for Long-term Observation of Cyber Attacks Exploiting Insecure Routers |
Masataka Mizokuchi, Takayuki Sasaki, Katsunari Yoshioka (Yokohama National Univ.) |
(13) ICSS |
13:25-13:50 |
Survey of OSS vulnerabilities in router firmware using an SCA tool |
Momoka Kihara, Sasaki Takayuki, Katsunari Yoshioka (Yokohama National Univ.) |
(14) ICSS |
13:50-14:15 |
Proposing Slow-Scan Detection Methods in Closed Networks Without Time Windows |
Shunya Tanaka (OKI) |
|
14:15-14:50 |
Break ( 35 min. ) |
Mon, Jul 22 PM 13:00 - 14:40 |
(15) |
13:00-13:25 |
|
(16) |
13:25-13:50 |
|
(17) |
13:50-14:15 |
|
(18) |
14:15-14:40 |
|
|
14:40-14:50 |
Break ( 10 min. ) |
Mon, Jul 22 PM 14:50 - 16:30 |
(19) |
14:50-15:15 |
|
(20) |
15:15-15:40 |
|
(21) |
15:40-16:05 |
|
(22) |
16:05-16:30 |
|
|
16:30-16:40 |
Break ( 10 min. ) |
Mon, Jul 22 PM 14:50 - 16:30 |
(23) ISEC |
14:50-15:15 |
Collision Attack on DM-AES |
Kodai Taiyama (UOH), Kosei Sakamoto (ME), Ryoma Ito (NICT), Kazuma Taka, Takanori Isobe (UOH) |
(24) ISEC |
15:15-15:40 |
Differential attack using multipath against block cipher DoT |
Haruka Sugai, Yasutaka Igarashi (TUS) |
(25) ISEC |
15:40-16:05 |
On Integral Properties Efficiently Reducible to the Data Complexity of the Attack |
Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science) |
(26) ISEC |
16:05-16:30 |
Design of Low-Latency Block Ciphers with Multiple Linear Layers |
Kazuma Nakata, Tatsuya Ishikawa (Hyogo Uiv.), Kosei Sakamoto (Mitsubishi Electric), Kazuhiko Minematsu (NEC), Takanori Isobe (Hyogo Uiv.) |
|
16:30-16:40 |
Break ( 10 min. ) |
Mon, Jul 22 PM 14:50 - 16:05 |
(27) ICSS |
14:50-15:15 |
Building a Dataset for Accelerating Researches against Fraudulent DeFi Tokens |
Iori Suzuki, Yin Minn Pa Pa, Katsunari Yoshioka (YNU) |
(28) ICSS |
15:15-15:40 |
Detection of Web3 Phishing Sites Focused on Permission Requests After Wallet Connection |
Riku Aoto, Yin Minn Pa Pa, Katsunari Yoshioka (YNU) |
(29) ICSS |
15:40-16:05 |
An analysis of relationship between Black-Hat SEO malwares using information from redirected scam sites |
Makoto Shimamura (Trend Micro Inc.), Kousuke Takeshige (Chiba Prefectural Police), Shingo Matsugaya (Trend Micro Inc./JC3), Keisuke Sakai (Kanagawa Prefectural Police), Masaki Hashimoto (Kagawa Univ.) |
|
16:05-16:40 |
Break ( 35 min. ) |
Mon, Jul 22 PM 14:50 - 16:30 |
(30) HWS |
14:50-15:15 |
Performance Evaluation of Improved SuperSonic Glitch PUF |
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) |
(31) HWS |
15:15-15:40 |
|
|
(32) HWS |
15:40-16:05 |
|
|
(33) HWS |
16:05-16:30 |
Spoofing Attack for Payment Systems based on Barcode Wristbands and its Coutermeasure |
Yoshiteru Hibino, Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) |
|
16:30-16:40 |
Break ( 10 min. ) |
Mon, Jul 22 PM 14:50 - 16:30 |
(34) |
14:50-15:15 |
|
(35) |
15:15-15:40 |
|
(36) |
15:40-16:05 |
|
(37) |
16:05-16:30 |
|
|
16:30-16:40 |
Break ( 10 min. ) |
Mon, Jul 22 PM 16:40 - 18:20 |
(38) |
16:40-17:05 |
|
(39) |
17:05-17:30 |
|
(40) |
17:30-17:55 |
|
(41) |
17:55-18:20 |
|
Mon, Jul 22 PM 16:40 - 18:20 |
(42) ISEC |
16:40-17:05 |
Implementation and Evaluation of an Application System combining a Lightweight Block Cipher and a Lightweight MAC using MPC |
Kandai Nakagawa (Tokai Univ.), Kazuto Ogawa (NICT), Takeki Kitayama, Hayato Watanabe (Tokai Univ.), Toshihiro Ohigashi (Tokai Univ./NICT) |
(43) ISEC |
17:05-17:30 |
Framing Fraud in Secret Sharing Scheme and its Countermeasure
-- Current status and challenging issues -- |
Kouichi Sakurai (Kyushu Univ.) |
(44) EMM |
17:30-17:55 |
Estimation of rotation angle and anisotropic magnification rate using pilot signal |
Rinka Kawano, Masaki Kawamura (Yamaguchi Univ.) |
(45) EMM |
17:55-18:20 |
Study on Potential of Speech-pathological Features for Deepfake Speech Detection |
Anuwat Chaiwongyen (JAIST), Suradej Duangpummet, Jessada Karnjana (NSTDA), Waree Kongprawechnon (SIIT), Masashi Unoki (JAIST) |
Mon, Jul 22 PM 16:40 - 18:20 |
(46) BioX |
16:40-17:05 |
Illegal login detection using eye movements when entering authentication codes |
Sachi Fujimoto, Chisa Takano, Masaki Inamura (HCU) |
(47) BioX |
17:05-17:30 |
Flick input PIN code authentication combined blink and gaze manipulation |
Moritomo Nara, Bo Wu, Kiminori Sato (TUT) |
(48) BioX |
17:30-17:55 |
Security Analysis of a Contactless Dial Lock Authentication System |
Kaiya Yokokura, Bo Wu, Kiminori Sato (TUT) |
(49) BioX |
17:55-18:20 |
A Machine Learning-Based Clone Detection Approach in Nano-Artifact Metrics |
Naoki Yoshida, Iwaki Miyamoto, Katsunari Yoshioka (YNU), Tsutomu Matsumoto (AIST) |
Mon, Jul 22 PM 16:40 - 18:20 |
(50) HWS |
16:40-17:05 |
Defending against adversarial example attacks by a denoising autoencoder and physical random noise |
Yuki Rogi, Kota Yoshida, Tatsuya Oyama, Takeshi Fujino, Shunsuke Okura (Ritsumeikan Univ.) |
(51) HWS |
17:05-17:30 |
Power-analysis side channel attack with auto encoder |
Haruto Ishii, Takuya Kojima, Hideki Takase, Hiroshi Nakamura (UTokyo) |
(52) ICSS |
17:30-17:55 |
DoS Attack Evaluation Experiment Using De-authentication Frames Against WPA2/WPA3-Enterprise Authentication Procedures |
Daisei Tsuchiyama, Hiroyuki Okazaki (Shinshu Univ.), Hikofumi Suzuki (NII) |
(53) ICSS |
17:55-18:20 |
Investigation of the success rate of Evil Twin attacks due to differences in radio wave strength
-- Variation of success rate with load status and connection request flood -- |
Masataka Yasuda, Chisa Takano, Masaki Inamura (HCU) |
Mon, Jul 22 PM Chair: Soichiro Morishita (Cyber Agent) 16:40 - 18:20 |
(54) SITE |
16:40-17:05 |
Report on Survey of Professionalism and Ethics Among Japanese IT Professionals |
Hiroaki Kanematsu (Nagoya Univ.) |
(55) SITE |
17:05-17:30 |
What is brought about by the "Uncanny Circle" that connects LLM and humans? |
Tsukasa Shirai, Hirotsugu Ohba, Yuko Murakami (Rikkyo Univ.) |
(56) SITE |
17:30-17:55 |
Proposal of a Method for Evaluating the Authenticity of Seals Based on Judgment Criteria of Human |
Yuuki Kimura, Soma Sugahara, Atsumu Kida, Taisei Nakamura, Ayato Ishikawa, Tetsutaro Uehara (Ritsumeikan Univ.) |
(57) SITE |
17:55-18:20 |
A Study of the Japanese Version of the Security Clearance System, or Suitability Assessment System
-- From a Supply Chain Security Perspective -- |
Yusuke Tachibana (FIT) |
Tue, Jul 23 AM 09:15 - 10:05 |
(58) |
09:15-09:40 |
|
(59) |
09:40-10:05 |
|
|
10:05-10:40 |
Break ( 35 min. ) |
Tue, Jul 23 AM 09:15 - 10:30 |
(60) ISEC |
09:15-09:40 |
Evaluation of Accuracy and Security on Deep Learning Model by Utilizing K-Anonymization With Attribute Selection for Reducing Computational Cost |
Rei Ueda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ) |
(61) ISEC |
09:40-10:05 |
Security Analysis on the Authentication Process Using Bluetooth |
Shogo Shiraki, Takanori Isobe (Univ.Hyogo) |
(62) ISEC |
10:05-10:30 |
Intrinsic Cause of Adversarial Examples by Geometric Analysis of Deep Learning Viewed from Data Manifold |
Hajime Tasaki, Jinhui Chao (Chuo Univ.) |
|
10:30-10:40 |
Break ( 10 min. ) |
Tue, Jul 23 AM 09:15 - 10:30 |
(63) HWS |
09:15-09:40 |
|
|
(64) HWS |
09:40-10:05 |
A Study on Detection Method of Aged Microcontrollers Using Side-Channel Information |
Yuki Kaneko (Tohoku Univ.), Yuichi Hayashi (NAIST), Naofumi Homma (Tohoku Univ.) |
(65) HWS |
10:05-10:30 |
Study on Stochastic Encrypted Data Processing Method based on Fully Homomorphic Encryption |
Soh Sato, Naofumi Homma (Tohoku Univ.) |
|
10:30-10:40 |
Break ( 10 min. ) |
Tue, Jul 23 AM 09:15 - 10:30 |
(66) ICSS |
09:15-09:40 |
UEBA Model Poisoning Attack: Challenges in Insider Threat Defense by UEBA and Proposal of Detection Methods |
Yusuke Isaka, Keisuke Kito, Takumi Yamamoto, Kiyoto Kawauchi (MELCO) |
(67) ICSS |
09:40-10:05 |
|
|
(68) ICSS |
10:05-10:30 |
Toward semantic identification method for patch modification using LLM |
Reika Arakawa, Yo Kanemoto, Mitsuaki Akiyama (NTT) |
|
10:30-10:40 |
Break ( 10 min. ) |
Tue, Jul 23 AM 10:40 - 11:55 |
(69) |
10:40-11:55 |
|
|
11:55-13:25 |
Lunch Break ( 90 min. ) |
Tue, Jul 23 PM 13:25 - 14:40 |
(70) |
13:25-14:40 |
|
|
14:40-14:50 |
Break ( 10 min. ) |
Tue, Jul 23 PM 14:50 - 16:30 |
(71) |
14:50-15:15 |
|
(72) |
15:15-15:40 |
|
(73) |
15:40-16:05 |
|
(74) |
16:05-16:30 |
|
Tue, Jul 23 PM 14:50 - 16:30 |
(75) ISEC |
14:50-15:15 |
Lossy Signature Scheme Based on Decisional Exact LPN Problem with Concrete Hash Encodings |
Arga Dhahana Pramudianto, Bagus Santoso (UEC) |
(76) ISEC |
15:15-15:40 |
On Mulit-Key FuncCPA Secure Public Key Encryption Schemes |
Eri Nakajima (Osaka Univ.), Keisuke Hara (AIST), Kyosuke Yamashita (Osaka Univ.) |
(77) ISEC |
15:40-16:05 |
Key Substitution Attack against Ordered Multisignature |
Yusuke (AIST), Yuuki, Kyosuke (Osaka Univ.), Goichiro (AIST) |
(78) ISEC |
16:05-16:30 |
Key Substitution Attack against Ordered Multisignature |
Yuuki Fujita (Osaka Univ.), Yusuke Sakai (AIST), Kyosuke Yamashita (Osaka Univ.), Goichiro Hanaoka (AIST) |
Tue, Jul 23 PM 14:50 - 16:05 |
(79) BioX |
14:50-15:15 |
Innovations in Security Mechanisms through Decomposition and Reuse of Body Functions: A Preliminary Study on Password Authentication(part 2) |
Takumi Takaiwa, Seiya Kajihara, Tsubasa Shibata, Soichi Takigawa, Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.) |
(80) BioX |
15:15-15:40 |
An Experimental Study on Radio Frequency Fingerprinting-based Authentication in IEEE 802.11g |
Zhen Jia, Zewei Guo (FUN), Wenhao Huang (Keio Univ.), Yin Chen (Reitaku Univ.), Jinxiao Zhu (TDU), Xiaohong Jiang (FUN) |
(81) BioX |
15:40-16:05 |
CAPT-AI: Study on AI Model identification using differences in ability (part 2) |
Seiya Kajihara, Takumi Takaiwa, Tsubasa Shibata (Shizuoka Univ.), Nami Ashizawa (NTT/Shizuoka Univ.), Naoto Kiribuchi, Toshiki Shibahara (NTT), Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.) |
Tue, Jul 23 PM 14:50 - 16:30 |
(82) |
14:50-15:15 |
|
(83) |
15:15-15:40 |
|
(84) |
15:40-16:05 |
|
(85) |
16:05-16:30 |
|
Tue, Jul 23 PM 14:50 - 16:30 |
(86) |
14:50-15:15 |
|
(87) |
15:15-15:40 |
|
(88) |
15:40-16:05 |
|
(89) |
16:05-16:30 |
|