IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev IPSJ-SPT Conf / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 

===============================================
Special Interest Group on Security Psychology and Trust (IPSJ-SPT)


===============================================
Technical Committee on Information Security (ISEC)
Chair: Junji Shikata (Yokohama National Univ.)
Vice Chair: Katsuyuki Takashima (Waseda Univ.), Shinsaku Kiyomoto (KDDI Research)
Secretary: Hiroki Okada (KDDI Research), Yoshikazu Hanatani (Toshiba)
Assistant: Atsushi Takayasu (Univ. of Tokyo)

===============================================
Technical Committee on Social Implications of Technology and Information Ethics (SITE)
Chair: Takeo Tatsumi (Open Univ. of Japan)
Vice Chair: Soichiro Morishita (Cyber Agent), Yuko Murakami (Rikkyo Univ.)
Secretary: Yusuke Kaneko (Japan Research Institute), Yusuke Tachibana (Fukuoka Inst. of Tech.)
Assistant: Kaito Hosono (Kanagawa Univ.), Rodriguez Samudio Ruben Enrique (Waseda Univ.)

===============================================
Technical Committee on Biometrics (BioX)
Chair: hironobu Takano (Toyama Prefectural Univ.) Vice Chair: Akihiro Hayasaka (NEC), Emiko Sano (Kubota)
Secretary: Shinichi Shirakawa (Yokohama National Univ.), Hiroyuki Suzuki (Gunma Univ)
Assistant: Tomokazu Kawahara (Toshiba), Kazuya Nakano (Seikei Univ.)

===============================================
Technical Committee on Hardware Security (HWS)
Chair: Yuichi Hayashi (NAIST) Vice Chair: Toru Akishita (Sony Semiconductor Solutions)
Secretary: Toshihiro Sato (hd Lab,), Junichi Sakamoto (AIST)

===============================================
Technical Committee on Information and Communication System Security (ICSS)
Chair: Daisuke Inoue (NICT)
Vice Chair: Keisuke Kito (Mitsubishi Electric), Toshihiro Yamauchi (Okayama Univ.)
Secretary: Yo Kanemoto (NTT), Masaya Sato (Okayama Prefectural Univ.)
Assistant: Ryoichi Izawa (NICT), Rui Tanabe (Juntendo Univ.)

===============================================
Technical Committee on Enriched MultiMedia (EMM)
Chair: Michiharu Niimi (Kyushu Inst. of Tech.) Vice Chair: Harumi Murata (Chukyo Univ.), Hyunho Kang (NIT, Tokyo)
Secretary: Naofumi Aoki (Hokkaido Univ.), Kazuaki Nakamura (Tokyo Univ. of Science)
Assistant: Marie Katsurai (Doshisha Univ.), Shunsuke Kidani (JAIST)

===============================================
Special Interest Group on Computer Security (IPSJ-CSEC)


DATE:
Mon, Jul 22, 2024 13:00 - 18:20
Tue, Jul 23, 2024 09:15 - 16:30

PLACE:
Sapporo Convention Center(1-1-1 Higashi-Sapporo 6-jo, Shiroishi-ku, Sapporo, 003-0006, Japan. 8 minutes walk from Higashi-Sapporo station.https://www.sora-scc.jp/eng/access.html)

TOPICS:


----------------------------------------
Mon, Jul 22 PM (13:00 - 14:15)
----------------------------------------

(1) 13:00 - 13:25


(2) 13:25 - 13:50


(3) 13:50 - 14:15


----- Break ( 35 min. ) -----

----------------------------------------
Mon, Jul 22 PM (13:00 - 14:40)
----------------------------------------

(4)/ISEC 13:00 - 13:25
Shor algorithm experiments with decision diagram-based quantum simulator
Yusuke Kimura (Fujitsu), Li Shaowen (U-Tokyo), Hiromitsu Soneda, Junpei Koyama (Fujitsu), Hiroyuki Sato, Masahiro Fujita (U-Tokyo)

(5)/ISEC 13:25 - 13:50
CSI-FiSh Variant with Quadratic Twists on Edwards Curves
Yuki Iwata (Toyohashi University of Technology), Hiroki Minamide (National Institute of Technology, Tokyo College), Takeshi Nakai, Koutarou Suzuki (Toyohashi University of Technology)

(6)/ISEC 13:50 - 14:15
A generalization of quantum ISD algorithm for Syndrome Decoding Problem
Asuka Wakasugi (EAGLYS), Mitsuru Tada (Chiba Univ.)

(7)/ISEC 14:15 - 14:40
Improving Ryan and Heninger's Attack on MEGA
Naoki Shimoe, Noboru Kunihiro (Univ. of Tsukuba)

----- Break ( 10 min. ) -----

----------------------------------------
Mon, Jul 22 PM (13:00 - 14:40)
----------------------------------------

(8)/BioX 13:00 - 13:25
[Invited Talk]
Cybernetic Avata Service Use Cases and Security
-- Backcasting from Year 2050 --
Masakatsu Nishigaki (Shizuoka Univ.), Yin Chen (Reitaku Univ.), Tetsushi Ohki (Shizuoka Univ.), Rie Shigetomi Yamaguchi (Univ. Tokyo), Yasushi Yagi (Osaka Univ.)

(9)/BioX 13:25 - 13:50
The OU-ISIR multimodal biometric database and its performance evaluation
Chi Xu, Xiang Li, Allam Shehata, Yasushi Yagi (Osaka Univ.)

(10)/BioX 13:50 - 14:15
The OU-ISIR continuous authentication database comprising face and speech biometrics
Xiang Li, Chi Xu, Yasushi Yagi (Osaka Univ.)

(11)/BioX 14:15 - 14:40
A Study of Multibiometrics Using a Single Face Image
Koichi Ito, Taito Tonosaki, Takafumi Aoki (Tohoku Univ.), Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Mon, Jul 22 PM (13:00 - 14:15)
----------------------------------------

(12)/ICSS 13:00 - 13:25
Honeypot for Long-term Observation of Cyber Attacks Exploiting Insecure Routers
Masataka Mizokuchi, Takayuki Sasaki, Katsunari Yoshioka (Yokohama National Univ.)

(13)/ICSS 13:25 - 13:50
Survey of OSS vulnerabilities in router firmware using an SCA tool
Momoka Kihara, Sasaki Takayuki, Katsunari Yoshioka (Yokohama National Univ.)

(14)/ICSS 13:50 - 14:15
Proposing Slow-Scan Detection Methods in Closed Networks Without Time Windows
Shunya Tanaka (OKI)

----- Break ( 35 min. ) -----

----------------------------------------
Mon, Jul 22 PM (13:00 - 14:40)
----------------------------------------

(15) 13:00 - 13:25


(16) 13:25 - 13:50


(17) 13:50 - 14:15


(18) 14:15 - 14:40


----- Break ( 10 min. ) -----

----------------------------------------
Mon, Jul 22 PM (14:50 - 16:30)
----------------------------------------

(19) 14:50 - 15:15


(20) 15:15 - 15:40


(21) 15:40 - 16:05


(22) 16:05 - 16:30


----- Break ( 10 min. ) -----

----------------------------------------
Mon, Jul 22 PM (14:50 - 16:30)
----------------------------------------

(23)/ISEC 14:50 - 15:15
Collision Attack on DM-AES
Kodai Taiyama (UOH), Kosei Sakamoto (ME), Ryoma Ito (NICT), Kazuma Taka, Takanori Isobe (UOH)

(24)/ISEC 15:15 - 15:40
Differential attack using multipath against block cipher DoT
Haruka Sugai, Yasutaka Igarashi (TUS)

(25)/ISEC 15:40 - 16:05
On Integral Properties Efficiently Reducible to the Data Complexity of the Attack
Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science)

(26)/ISEC 16:05 - 16:30
Design of Low-Latency Block Ciphers with Multiple Linear Layers
Kazuma Nakata, Tatsuya Ishikawa (Hyogo Uiv.), Kosei Sakamoto (Mitsubishi Electric), Kazuhiko Minematsu (NEC), Takanori Isobe (Hyogo Uiv.)

----- Break ( 10 min. ) -----

----------------------------------------
Mon, Jul 22 PM (14:50 - 16:05)
----------------------------------------

(27)/ICSS 14:50 - 15:15
Building a Dataset for Accelerating Researches against Fraudulent DeFi Tokens
Iori Suzuki, Yin Minn Pa Pa, Katsunari Yoshioka (YNU)

(28)/ICSS 15:15 - 15:40
Detection of Web3 Phishing Sites Focused on Permission Requests After Wallet Connection
Riku Aoto, Yin Minn Pa Pa, Katsunari Yoshioka (YNU)

(29)/ICSS 15:40 - 16:05
An analysis of relationship between Black-Hat SEO malwares using information from redirected scam sites
Makoto Shimamura (Trend Micro Inc.), Kousuke Takeshige (Chiba Prefectural Police), Shingo Matsugaya (Trend Micro Inc./JC3), Keisuke Sakai (Kanagawa Prefectural Police), Masaki Hashimoto (Kagawa Univ.)

----- Break ( 35 min. ) -----

----------------------------------------
Mon, Jul 22 PM (14:50 - 16:30)
----------------------------------------

(30)/HWS 14:50 - 15:15
Performance Evaluation of Improved SuperSonic Glitch PUF
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.)

(31)/HWS 15:15 - 15:40
(See Japanese page.)

(32)/HWS 15:40 - 16:05
(See Japanese page.)

(33)/HWS 16:05 - 16:30
Spoofing Attack for Payment Systems based on Barcode Wristbands and its Coutermeasure
Yoshiteru Hibino, Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Mon, Jul 22 PM (14:50 - 16:30)
----------------------------------------

(34) 14:50 - 15:15


(35) 15:15 - 15:40


(36) 15:40 - 16:05


(37) 16:05 - 16:30


----- Break ( 10 min. ) -----

----------------------------------------
Mon, Jul 22 PM (16:40 - 18:20)
----------------------------------------

(38) 16:40 - 17:05


(39) 17:05 - 17:30


(40) 17:30 - 17:55


(41) 17:55 - 18:20


----------------------------------------
Mon, Jul 22 PM (16:40 - 18:20)
----------------------------------------

(42)/ISEC 16:40 - 17:05
Implementation and Evaluation of an Application System combining a Lightweight Block Cipher and a Lightweight MAC using MPC
Kandai Nakagawa (Tokai Univ.), Kazuto Ogawa (NICT), Takeki Kitayama, Hayato Watanabe (Tokai Univ.), Toshihiro Ohigashi (Tokai Univ./NICT)

(43)/ISEC 17:05 - 17:30
Frame fraud in secret sharing and its countermeasures
-- Current status and challenging issues --
Kouichi Sakurai (Kyushu Univ.)

(44)/EMM 17:30 - 17:55
Estimation of rotation angle and anisotropic magnification rate using pilot signal
Rinka Kawano, Masaki Kawamura (Yamaguchi Univ.)

(45)/EMM 17:55 - 18:20
Study on Potential of Speech-pathological Features for Deepfake Speech Detection
Anuwat Chaiwongyen (JAIST), Suradej Duangpummet, Jessada Karnjana (NSTDA), Waree Kongprawechnon (SIIT), Masashi Unoki (JAIST)

----------------------------------------
Mon, Jul 22 PM (16:40 - 18:20)
----------------------------------------

(46)/BioX 16:40 - 17:05
Illegal login detection using eye movements when entering authentication codes
Sachi Fujimoto, Chisa Takano, Masaki Inamura (HCU)

(47)/BioX 17:05 - 17:30
Flick input PIN code authentication combined blink and gaze manipulation
Moritomo Nara, Bo Wu, Kiminori Sato (TUT)

(48)/BioX 17:30 - 17:55
Security Analysis of a Contactless Dial Lock Authentication System
Kaiya Yokokura, Bo Wu, Kiminori Sato (TUT)

(49)/BioX 17:55 - 18:20
A Machine Learning-Based Clone Detection Approach in Nano-Artifact Metrics
Naoki Yoshida, Iwaki Miyamoto, Katsunari Yoshioka (YNU), Tsutomu Matsumoto (AIST)

----------------------------------------
Mon, Jul 22 PM (16:40 - 18:20)
----------------------------------------

(50)/HWS 16:40 - 17:05
Defending against adversarial example attacks by a denoising autoencoder and physical random noise
Yuki Rogi, Kota Yoshida, Tatsuya Oyama, Takeshi Fujino, Shunsuke Okura (Ritsumeikan Univ.)

(51)/HWS 17:05 - 17:30
Power-analysis side channel attack with auto encoder
Haruto Ishii, Takuya Kojima, Hideki Takase, Hiroshi Nakamura (UTokyo)

(52)/ICSS 17:30 - 17:55
DoS Attack Evaluation Experiment Using De-authentication Frames Against WPA2/WPA3-Enterprise Authentication Procedures
Daisei Tsuchiyama, Hiroyuki Okazaki (Shinshu Univ.), Hikofumi Suzuki (NII)

(53)/ICSS 17:55 - 18:20
Investigation of the success rate of Evil Twin attacks due to differences in radio wave strength
-- Variation of success rate with load status and connection request flood --
Masataka Yasuda, Chisa Takano, Masaki Inamura (HCU)

----------------------------------------
Mon, Jul 22 PM (16:40 - 18:20)
Chair: Soichiro Morishita (Cyber Agent)
----------------------------------------

(54)/SITE 16:40 - 17:05
Report on Survey of Professionalism and Ethics Among Japanese IT Professionals
Hiroaki Kanematsu (Nagoya Univ.)

(55)/SITE 17:05 - 17:30
What is brought about by the "Uncanny Circle" that connects LLM and humans?
Tsukasa Shirai, Hirotsugu Ohba, Yuko Murakami (Rikkyo Univ.)

(56)/SITE 17:30 - 17:55
Proposal of a Method for Evaluating the Authenticity of Seals Based on Judgment Criteria of Human
Yuuki Kimura, Soma Sugahara, Atsumu Kida, Taisei Nakamura, Ayato Ishikawa, Tetsutaro Uehara (Ritsumeikan Univ.)

(57)/SITE 17:55 - 18:20
A Study of the Japanese Version of the Security Clearance System, or Suitability Assessment System
-- From a Supply Chain Security Perspective --
Yusuke Tachibana (FIT)

----------------------------------------
Tue, Jul 23 AM (09:15 - 10:05)
----------------------------------------

(58) 09:15 - 09:40


(59) 09:40 - 10:05


----- Break ( 35 min. ) -----

----------------------------------------
Tue, Jul 23 AM (09:15 - 10:30)
----------------------------------------

(60)/ISEC 09:15 - 09:40
Evaluation of Accuracy and Security on Deep Learning Model by Utilizing K-Anonymization With Attribute Selection for Reducing Computational Cost
Rei Ueda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ)

(61)/ISEC 09:40 - 10:05
Security Analysis on the Authentication Process Using Bluetooth
Shogo Shiraki, Takanori Isobe (Univ.Hyogo)

(62)/ISEC 10:05 - 10:30
Intrinsic Cause of Adversarial Examples by Parameter Analysis of Deep Learning Viewed from Data Manifold
Hajime Tasaki, Jinhui Chao (Chuo Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Tue, Jul 23 AM (09:15 - 10:30)
----------------------------------------

(63)/HWS 09:15 - 09:40
(See Japanese page.)

(64)/HWS 09:40 - 10:05
A Study on Detection Method of Aged Microcontrollers Using Side-Channel Information
Yuki Kaneko (Tohoku Univ.), Yuichi Hayashi (NAIST), Naofumi Homma (Tohoku Univ.)

(65)/HWS 10:05 - 10:30
Study on Stochastic Encrypted Data Processing Method based on Fully Homomorphic Encryption
Soh Sato, Naofumi Homma (Tohoku Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Tue, Jul 23 AM (09:15 - 10:30)
----------------------------------------

(66)/ICSS 09:15 - 09:40
UEBA Model Poisoning Attack: Challenges in Insider Threat Defense by UEBA and Proposal of Detection Methods
Yusuke Isaka, Keisuke Kito, Takumi Yamamoto, Kiyoto Kawauchi (MELCO)

(67)/ICSS 09:40 - 10:05
(See Japanese page.)

(68)/ICSS 10:05 - 10:30
Toward semantic identification method for patch modification using LLM
Reika Arakawa, Yo Kanemoto, Mitsuaki Akiyama (NTT)

----- Break ( 10 min. ) -----

----------------------------------------
Tue, Jul 23 AM (10:40 - 11:55)
----------------------------------------

(69) 10:40 - 11:55


----- Lunch Break ( 90 min. ) -----

----------------------------------------
Tue, Jul 23 PM (13:25 - 14:40)
----------------------------------------

(70) 13:25 - 14:40


----- Break ( 10 min. ) -----

----------------------------------------
Tue, Jul 23 PM (14:50 - 16:30)
----------------------------------------

(71) 14:50 - 15:15


(72) 15:15 - 15:40


(73) 15:40 - 16:05


(74) 16:05 - 16:30


----------------------------------------
Tue, Jul 23 PM (14:50 - 16:30)
----------------------------------------

(75)/ISEC 14:50 - 15:15
Lossy Signature Scheme Based on Decisional Exact LPN Problem with Concrete Hash Encodings
Arga Dhahana Pramudianto, Bagus Santoso (UEC)

(76)/ISEC 15:15 - 15:40
On Mulit-Key FuncCPA Secure Public Key Encryption Schemes
Eri Nakajima (Osaka Univ.), Keisuke Hara (AIST), Kyosuke Yamashita (Osaka Univ.)

(77)/ISEC 15:40 - 16:05
On Key Substitution Attack against BGLS Signature Scheme
Yusuke (AIST), Yuuki, Kyosuke (Osaka Univ.), Goichiro (AIST)

(78)/ISEC 16:05 - 16:30
On Key Substitution Attack against Ordered Multi-Signature Schemes
Yuuki Fujita, Kyosuke Yamashita (Osaka Univ.), Yusuke Sakai, Goichiro Hanaoka (AIST)

----------------------------------------
Tue, Jul 23 PM (14:50 - 16:05)
----------------------------------------

(79)/BioX 14:50 - 15:15
Innovations in Security Mechanisms through Decomposition and Reuse of Body Functions: A Preliminary Study on Password Authentication(part 2)
Takumi Takaiwa, Seiya Kajihara, Tsubasa Shibata, Soichi Takigawa, Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.)

(80)/BioX 15:15 - 15:40
An Experimental Study on Radio Frequency Fingerprinting-based Authentication in IEEE 802.11g
Zhen Jia, Zewei Guo (FUN), Wenhao Huang (Keio Univ.), Yin Chen (Reitaku Univ.), Jinxiao Zhu (TDU), Xiaohong Jiang (FUN)

(81)/BioX 15:40 - 16:05
CAPT-AI: Study on AI Model identification using differences in ability (part 2)
Seiya Kajihara, Takumi Takaiwa, Tsubasa Shibata (Shizuoka Univ.), Nami Ashizawa (NTT/Shizuoka Univ.), Naoto Kiribuchi, Toshiki Shibahara (NTT), Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.)

----------------------------------------
Tue, Jul 23 PM (14:50 - 16:30)
----------------------------------------

(82) 14:50 - 15:15


(83) 15:15 - 15:40


(84) 15:40 - 16:05


(85) 16:05 - 16:30


----------------------------------------
Tue, Jul 23 PM (14:50 - 16:30)
----------------------------------------

(86) 14:50 - 15:15


(87) 15:15 - 15:40


(88) 15:40 - 16:05


(89) 16:05 - 16:30


# Information for speakers
General Talk will have 20 minutes for presentation and 5 minutes for discussion.


=== Special Interest Group on Security Psychology and Trust (IPSJ-SPT) ===

=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:

Mon, Sep 2, 2024: Online , Topics: Workshop on Cryptography and Information Security 2024 (WCIS 2024)

# SECRETARY:
Atsushi Takayasu (Univ. Tokyo)
E-mail: ic-c (to ISEC secretaries)

=== Technical Committee on Social Implications of Technology and Information Ethics (SITE) ===

# SECRETARY:
E-mail: site-contact[at]mail.ieice.org

=== Technical Committee on Biometrics (BioX) ===
# FUTURE SCHEDULE:

Thu, Oct 31, 2024 - Fri, Nov 1, 2024: Miraisozo Center (Miyako) [Thu, Aug 15]

=== Technical Committee on Hardware Security (HWS) ===

# SECRETARY:
Junichi Sakamoto (AIST), Hirotake Yamamoto (SSS)
E-mail:hws-c

=== Technical Committee on Information and Communication System Security (ICSS) ===

# SECRETARY:
ICSS Technical Committee
E-mail: is-adm-q

# ANNOUNCEMENT:
# Latest information will be presented on ICSS webpage:
https://icss.ieice.org/

=== Technical Committee on Enriched MultiMedia (EMM) ===
# FUTURE SCHEDULE:

Wed, Sep 4, 2024 - Thu, Sep 5, 2024: Hiroshima Institute of Technology [Thu, Jul 11]

# SECRETARY:
Enriched MultiMedia (EMM) Secretaries
E-mail: emm-adn

=== Special Interest Group on Computer Security (IPSJ-CSEC) ===


Last modified: 2024-07-12 15:51:50


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /   [Return to SITE Schedule Page]   /   [Return to BioX Schedule Page]   /   [Return to HWS Schedule Page]   /   [Return to ICSS Schedule Page]   /   [Return to EMM Schedule Page]   /   [Return to IPSJ-CSEC Schedule Page]   /   [Return to IPSJ-SPT Schedule Page]   /  
 
 Go Top  Go Back   Prev IPSJ-SPT Conf / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan