IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev ISEC Conf / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Information Security (ISEC) [schedule] [select]
Chair Junji Shikata (Yokohama National Univ.)
Vice Chair Katsuyuki Takashima (Waseda Univ.), Shinsaku Kiyomoto (KDDI Research)
Secretary Hiroki Okada (KDDI Research), Yoshikazu Hanatani (Toshiba)
Assistant Atsushi Takayasu (Univ. of Tokyo)

Technical Committee on Social Implications of Technology and Information Ethics (SITE) [schedule] [select]
Chair Takeo Tatsumi (Open Univ. of Japan)
Vice Chair Soichiro Morishita (Cyber Agent), Yuko Murakami (Rikkyo Univ.)
Secretary Yusuke Kaneko (Japan Research Institute), Yusuke Tachibana (Fukuoka Inst. of Tech.)
Assistant Kaito Hosono (Kanagawa Univ.), Rodriguez Samudio Ruben Enrique (Waseda Univ.)

Technical Committee on Biometrics (BioX) [schedule] [select]
Chair hironobu Takano (Toyama Prefectural Univ.)
Vice Chair Akihiro Hayasaka (NEC), Emiko Sano (Kubota)
Secretary Shinichi Shirakawa (Yokohama National Univ.), Hiroyuki Suzuki (Gunma Univ)
Assistant Tomokazu Kawahara (Toshiba), Kazuya Nakano (Seikei Univ.)

Technical Committee on Hardware Security (HWS) [schedule] [select]
Chair Yuichi Hayashi (NAIST)
Vice Chair Toru Akishita (Sony Semiconductor Solutions)
Secretary Toshihiro Sato (hd Lab,), Junichi Sakamoto (AIST)

Technical Committee on Information and Communication System Security (ICSS) [schedule] [select]
Chair Daisuke Inoue (NICT)
Vice Chair Keisuke Kito (Mitsubishi Electric), Toshihiro Yamauchi (Okayama Univ.)
Secretary Yo Kanemoto (NTT), Masaya Sato (Okayama Prefectural Univ.)
Assistant Ryoichi Izawa (NICT), Rui Tanabe (Juntendo Univ.)

Technical Committee on Enriched MultiMedia (EMM) [schedule] [select]
Chair Michiharu Niimi (Kyushu Inst. of Tech.)
Vice Chair Harumi Murata (Chukyo Univ.), Hyunho Kang (NIT, Tokyo)
Secretary Naofumi Aoki (Hokkaido Univ.), Kazuaki Nakamura (Tokyo Univ. of Science)
Assistant Marie Katsurai (Doshisha Univ.), Shunsuke Kidani (JAIST)

Special Interest Group on Computer Security (IPSJ-CSEC) [schedule] [select]

Special Interest Group on Security Psychology and Trust (IPSJ-SPT) [schedule] [select]

Conference Date Mon, Jul 22, 2024 13:00 - 18:20
Tue, Jul 23, 2024 09:15 - 16:30
Topics  
Conference Place Sapporo Convention Center 
Address 1-1-1 Higashi-Sapporo 6-jo, Shiroishi-ku, Sapporo, 003-0006, Japan
Transportation Guide 8 minutes walk from Higashi-Sapporo station.
https://www.sora-scc.jp/eng/access.html
Registration Fee This workshop will be held as the IEICE workshop in fully electronic publishing. Registration fee will be necessary except the speakers and participants other than the participants to workshop(s) in non-electronic publishing. See the registration fee page. We request the registration fee or presentation fee to participants who will attend the workshop(s) on EMM, BioX, ISEC, SITE, ICSS, HWS.

Mon, Jul 22 PM 
13:00 - 14:15 [updated]
(1)
[updated]
13:00-13:25
[updated]
 
(2)
[updated]
13:25-13:50
[updated]
 
(3)
[updated]
13:50-14:15
[updated]
 
  14:15-14:50
[updated]
Break ( 35 min. )
[updated]
Mon, Jul 22 PM 
13:00 - 14:40
(4)
ISEC
[updated]
13:00-13:25 Shor algorithm experiments with decision diagram-based quantum simulator Yusuke Kimura (Fujitsu), Li Shaowen (U-Tokyo), Hiromitsu Soneda, Junpei Koyama (Fujitsu), Hiroyuki Sato, Masahiro Fujita (U-Tokyo)
(5)
ISEC
[updated]
13:25-13:50 CSI-FiSh Variant with Quadratic Twists on Edwards Curves Yuki Iwata (Toyohashi University of Technology), Hiroki Minamide (National Institute of Technology, Tokyo College), Takeshi Nakai, Koutarou Suzuki (Toyohashi University of Technology)
(6)
ISEC
[updated]
13:50-14:15 A generalization of quantum ISD algorithm for Syndrome Decoding Problem Asuka Wakasugi (EAGLYS), Mitsuru Tada (Chiba Univ.)
(7)
ISEC
[updated]
14:15-14:40 Improving Ryan and Heninger's Attack on MEGA
[updated]
Naoki Shimoe, Noboru Kunihiro (Univ. of Tsukuba)
  14:40-14:50 Break ( 10 min. )
Mon, Jul 22 PM 
13:00 - 14:40
(8)
BioX
[updated]
13:00-13:25 [Invited Talk]
Cybernetic Avata Service Use Cases and Security
-- Backcasting from Year 2050 --
Masakatsu Nishigaki (Shizuoka Univ.), Yin Chen (Reitaku Univ.), Tetsushi Ohki (Shizuoka Univ.), Rie Shigetomi Yamaguchi (Univ. Tokyo), Yasushi Yagi (Osaka Univ.)
[updated]
(9)
BioX
[updated]
13:25-13:50 The OU-ISIR multimodal biometric database and its performance evaluation
[updated]
Chi Xu, Xiang Li, Allam Shehata, Yasushi Yagi (Osaka Univ.)
[updated]
(10)
BioX
[updated]
13:50-14:15 The OU-ISIR continuous authentication database comprising face and speech biometrics Xiang Li, Chi Xu, Yasushi Yagi (Osaka Univ.)
[updated]
(11)
BioX
[updated]
14:15-14:40 A Study of Multibiometrics Using a Single Face Image Koichi Ito, Taito Tonosaki, Takafumi Aoki (Tohoku Univ.), Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.)
  14:40-14:50 Break ( 10 min. )
Mon, Jul 22 PM 
13:00 - 14:15 [updated]
(12)
ICSS
[updated]
13:00-13:25 Honeypot for Long-term Observation of Cyber Attacks Exploiting Insecure Routers Masataka Mizokuchi, Takayuki Sasaki, Katsunari Yoshioka (Yokohama National Univ.)
(13)
ICSS
[updated]
13:25-13:50 Survey of OSS vulnerabilities in router firmware using an SCA tool Momoka Kihara, Sasaki Takayuki, Katsunari Yoshioka (Yokohama National Univ.)
(14)
ICSS
[updated]
13:50-14:15
[updated]
Proposing Slow-Scan Detection Methods in Closed Networks Without Time Windows Shunya Tanaka (OKI)
  14:15-14:50
[updated]
Break ( 35 min. )
[updated]
Mon, Jul 22 PM 
13:00 - 14:40
(15)
[updated]
13:00-13:25  
(16)
[updated]
13:25-13:50  
(17)
[updated]
13:50-14:15  
(18)
[updated]
14:15-14:40  
  14:40-14:50 Break ( 10 min. )
Mon, Jul 22 PM 
14:50 - 16:30
(19)
[updated]
14:50-15:15  
(20)
[updated]
15:15-15:40  
(21)
[updated]
15:40-16:05  
(22)
[updated]
16:05-16:30  
  16:30-16:40 Break ( 10 min. )
Mon, Jul 22 PM 
14:50 - 16:30
(23)
ISEC
[updated]
14:50-15:15 Collision Attack on DM-AES Kodai Taiyama (UOH), Kosei Sakamoto (ME), Ryoma Ito (NICT), Kazuma Taka, Takanori Isobe (UOH)
(24)
ISEC
[updated]
15:15-15:40 Differential attack using multipath against block cipher DoT
[updated]
Haruka Sugai, Yasutaka Igarashi (TUS)
(25)
ISEC
[updated]
15:40-16:05 On Integral Properties Efficiently Reducible to the Data Complexity of the Attack
[updated]
Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science)
(26)
ISEC
[updated]
16:05-16:30 Design of Low-Latency Block Ciphers with Multiple Linear Layers Kazuma Nakata, Tatsuya Ishikawa (Hyogo Uiv.), Kosei Sakamoto (Mitsubishi Electric), Kazuhiko Minematsu (NEC), Takanori Isobe (Hyogo Uiv.)
[updated]
  16:30-16:40 Break ( 10 min. )
Mon, Jul 22 PM 
14:50 - 16:05 [updated]
(27)
ICSS
[updated]
14:50-15:15 Building a Dataset for Accelerating Researches against Fraudulent DeFi Tokens
[updated]
Iori Suzuki, Yin Minn Pa Pa, Katsunari Yoshioka (YNU)
(28)
ICSS
[updated]
15:15-15:40 Detection of Web3 Phishing Sites Focused on Permission Requests After Wallet Connection Riku Aoto, Yin Minn Pa Pa, Katsunari Yoshioka (YNU)
(29)
ICSS
[updated]
15:40-16:05 An analysis of relationship between Black-Hat SEO malwares using information from redirected scam sites
[updated]
Makoto Shimamura (Trend Micro Inc.), Kousuke Takeshige (Chiba Prefectural Police), Shingo Matsugaya (Trend Micro Inc./JC3), Keisuke Sakai (Kanagawa Prefectural Police), Masaki Hashimoto (Kagawa Univ.)
  16:05-16:40
[updated]
Break ( 35 min. )
[updated]
Mon, Jul 22 PM 
14:50 - 16:30
(30)
HWS
[updated]
14:50-15:15 Performance Evaluation of Improved SuperSonic Glitch PUF Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.)
(31)
HWS
[updated]
15:15-15:40
(32)
HWS
[updated]
15:40-16:05
(33)
HWS
[updated]
16:05-16:30 Spoofing Attack for Payment Systems based on Barcode Wristbands and its Coutermeasure Yoshiteru Hibino, Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.)
  16:30-16:40 Break ( 10 min. )
Mon, Jul 22 PM 
14:50 - 16:30
(34)
[updated]
14:50-15:15  
(35)
[updated]
15:15-15:40  
(36)
[updated]
15:40-16:05  
(37)
[updated]
16:05-16:30  
  16:30-16:40 Break ( 10 min. )
Mon, Jul 22 PM 
16:40 - 18:20
(38)
[updated]
16:40-17:05  
(39)
[updated]
17:05-17:30  
(40)
[updated]
17:30-17:55  
(41)
[updated]
17:55-18:20  
Mon, Jul 22 PM 
16:40 - 18:20
(42)
ISEC
[updated]
16:40-17:05 Implementation and Evaluation of an Application System combining a Lightweight Block Cipher and a Lightweight MAC using MPC Kandai Nakagawa (Tokai Univ.), Kazuto Ogawa (NICT), Takeki Kitayama, Hayato Watanabe (Tokai Univ.), Toshihiro Ohigashi (Tokai Univ./NICT)
(43)
ISEC
[updated]
17:05-17:30 Frame fraud in secret sharing and its countermeasures
-- Current status and challenging issues --
Kouichi Sakurai (Kyushu Univ.)
(44)
EMM
[updated]
17:30-17:55 Estimation of rotation angle and anisotropic magnification rate using pilot signal Rinka Kawano, Masaki Kawamura (Yamaguchi Univ.)
(45)
EMM
[updated]
17:55-18:20 Study on Potential of Speech-pathological Features for Deepfake Speech Detection Anuwat Chaiwongyen (JAIST), Suradej Duangpummet, Jessada Karnjana (NSTDA), Waree Kongprawechnon (SIIT), Masashi Unoki (JAIST)
Mon, Jul 22 PM 
16:40 - 18:20
(46)
BioX
[updated]
16:40-17:05 Illegal login detection using eye movements when entering authentication codes Sachi Fujimoto, Chisa Takano, Masaki Inamura (HCU)
(47)
BioX
[updated]
17:05-17:30 Flick input PIN code authentication combined blink and gaze manipulation Moritomo Nara, Bo Wu, Kiminori Sato (TUT)
(48)
BioX
[updated]
17:30-17:55 Security Analysis of a Contactless Dial Lock Authentication System Kaiya Yokokura, Bo Wu, Kiminori Sato (TUT)
(49)
BioX
[updated]
17:55-18:20 A Machine Learning-Based Clone Detection Approach in Nano-Artifact Metrics Naoki Yoshida, Iwaki Miyamoto, Katsunari Yoshioka (YNU), Tsutomu Matsumoto (AIST)
Mon, Jul 22 PM 
16:40 - 18:20
(50)
HWS
[updated]
16:40-17:05 Defending against adversarial example attacks by a denoising autoencoder and physical random noise Yuki Rogi, Kota Yoshida, Tatsuya Oyama, Takeshi Fujino, Shunsuke Okura (Ritsumeikan Univ.)
(51)
HWS
[updated]
17:05-17:30 Power-analysis side channel attack with auto encoder Haruto Ishii, Takuya Kojima, Hideki Takase, Hiroshi Nakamura (UTokyo)
(52)
ICSS
[updated]
17:30-17:55 DoS Attack Evaluation Experiment Using De-authentication Frames Against WPA2/WPA3-Enterprise Authentication Procedures Daisei Tsuchiyama, Hiroyuki Okazaki (Shinshu Univ.), Hikofumi Suzuki (NII)
(53)
ICSS
[updated]
17:55-18:20 Investigation of the success rate of Evil Twin attacks due to differences in radio wave strength
-- Variation of success rate with load status and connection request flood --
Masataka Yasuda, Chisa Takano, Masaki Inamura (HCU)
Mon, Jul 22 PM 
Chair: Soichiro Morishita (Cyber Agent)
16:40 - 18:20
(54)
SITE
[updated]
16:40-17:05 Report on Survey of Professionalism and Ethics Among Japanese IT Professionals Hiroaki Kanematsu (Nagoya Univ.)
(55)
SITE
[updated]
17:05-17:30 What is brought about by the "Uncanny Circle" that connects LLM and humans? Tsukasa Shirai, Hirotsugu Ohba, Yuko Murakami (Rikkyo Univ.)
(56)
SITE
[updated]
17:30-17:55 Proposal of a Method for Evaluating the Authenticity of Seals Based on Judgment Criteria of Human Yuuki Kimura, Soma Sugahara, Atsumu Kida, Taisei Nakamura, Ayato Ishikawa, Tetsutaro Uehara (Ritsumeikan Univ.)
(57)
SITE
[updated]
17:55-18:20 A Study of the Japanese Version of the Security Clearance System, or Suitability Assessment System
-- From a Supply Chain Security Perspective --
Yusuke Tachibana (FIT)
Tue, Jul 23 AM 
09:15 - 10:05 [updated]
(58)
[updated]
09:15-09:40  
(59)
[updated]
09:40-10:05
[updated]
 
  10:05-10:40
[updated]
Break ( 35 min. )
[updated]
Tue, Jul 23 AM 
09:15 - 10:30
(60)
ISEC
[updated]
09:15-09:40 Evaluation of Accuracy and Security on Deep Learning Model by Utilizing K-Anonymization With Attribute Selection for Reducing Computational Cost
[updated]
Rei Ueda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ)
(61)
ISEC
[updated]
09:40-10:05 Security Analysis on the Authentication Process Using Bluetooth Shogo Shiraki, Takanori Isobe (Univ.Hyogo)
(62)
ISEC
[updated]
10:05-10:30 Intrinsic Cause of Adversarial Examples by Parameter Analysis of Deep Learning Viewed from Data Manifold Hajime Tasaki, Jinhui Chao (Chuo Univ.)
  10:30-10:40 Break ( 10 min. )
Tue, Jul 23 AM 
09:15 - 10:30
(63)
HWS
[updated]
09:15-09:40
(64)
HWS
[updated]
09:40-10:05 A Study on Detection Method of Aged Microcontrollers Using Side-Channel Information
[updated]
Yuki Kaneko (Tohoku Univ.), Yuichi Hayashi (NAIST), Naofumi Homma (Tohoku Univ.)
(65)
HWS
[updated]
10:05-10:30 Study on Stochastic Encrypted Data Processing Method based on Fully Homomorphic Encryption Soh Sato, Naofumi Homma (Tohoku Univ.)
  10:30-10:40 Break ( 10 min. )
Tue, Jul 23 AM 
09:15 - 10:30
(66)
ICSS
[updated]
09:15-09:40 UEBA Model Poisoning Attack: Challenges in Insider Threat Defense by UEBA and Proposal of Detection Methods Yusuke Isaka, Keisuke Kito, Takumi Yamamoto, Kiyoto Kawauchi (MELCO)
[updated]
(67)
ICSS
[updated]
09:40-10:05
[updated]

[updated]
(68)
ICSS
[updated]
10:05-10:30 Toward semantic identification method for patch modification using LLM
[updated]
Reika Arakawa, Yo Kanemoto, Mitsuaki Akiyama (NTT)
  10:30-10:40 Break ( 10 min. )
Tue, Jul 23 AM 
10:40 - 11:55
(69)
[updated]
10:40-11:55  
  11:55-13:25 Lunch Break ( 90 min. )
Tue, Jul 23 PM 
13:25 - 14:40
(70)
[updated]
13:25-14:40  
  14:40-14:50 Break ( 10 min. )
Tue, Jul 23 PM 
14:50 - 16:30
(71)
[updated]
14:50-15:15  
(72)
[updated]
15:15-15:40  
(73)
[updated]
15:40-16:05  
(74)
[updated]
16:05-16:30  
Tue, Jul 23 PM 
14:50 - 16:30
(75)
ISEC
[updated]
14:50-15:15 Lossy Signature Scheme Based on Decisional Exact LPN Problem with Concrete Hash Encodings Arga Dhahana Pramudianto, Bagus Santoso (UEC)
(76)
ISEC
[updated]
15:15-15:40 On Mulit-Key FuncCPA Secure Public Key Encryption Schemes Eri Nakajima (Osaka Univ.), Keisuke Hara (AIST), Kyosuke Yamashita (Osaka Univ.)
(77)
ISEC
[updated]
15:40-16:05 On Key Substitution Attack against BGLS Signature Scheme Yusuke (AIST), Yuuki, Kyosuke (Osaka Univ.), Goichiro (AIST)
(78)
ISEC
[updated]
16:05-16:30 On Key Substitution Attack against Ordered Multi-Signature Schemes Yuuki Fujita, Kyosuke Yamashita (Osaka Univ.), Yusuke Sakai, Goichiro Hanaoka (AIST)
Tue, Jul 23 PM 
14:50 - 16:05 [updated]
(79)
BioX
[updated]
14:50-15:15 Innovations in Security Mechanisms through Decomposition and Reuse of Body Functions: A Preliminary Study on Password Authentication(part 2) Takumi Takaiwa, Seiya Kajihara, Tsubasa Shibata, Soichi Takigawa, Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.)
(80)
BioX
[updated]
15:15-15:40 An Experimental Study on Radio Frequency Fingerprinting-based Authentication in IEEE 802.11g
[updated]
Zhen Jia, Zewei Guo (FUN), Wenhao Huang (Keio Univ.), Yin Chen (Reitaku Univ.), Jinxiao Zhu (TDU), Xiaohong Jiang (FUN)
(81)
BioX
[updated]
15:40-16:05
[updated]
CAPT-AI: Study on AI Model identification using differences in ability (part 2)
[updated]
Seiya Kajihara, Takumi Takaiwa, Tsubasa Shibata (Shizuoka Univ.), Nami Ashizawa (NTT/Shizuoka Univ.), Naoto Kiribuchi, Toshiki Shibahara (NTT), Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.)
Tue, Jul 23 PM 
14:50 - 16:30
(82)
[updated]
14:50-15:15  
(83)
[updated]
15:15-15:40  
(84)
[updated]
15:40-16:05  
(85)
[updated]
16:05-16:30  
Tue, Jul 23 PM 
14:50 - 16:30
(86)
[updated]
14:50-15:15  
(87)
[updated]
15:15-15:40  
(88)
[updated]
15:40-16:05  
(89)
[updated]
16:05-16:30  

Announcement for Speakers
General TalkEach speech will have 20 minutes for presentation and 5 minutes for discussion.

Contact Address and Latest Schedule Information
ISEC Technical Committee on Information Security (ISEC)   [Latest Schedule]
Contact Address Atsushi Takayasu (Univ. Tokyo)
E--mail: ic-c (to ISEC secretaries) 
SITE Technical Committee on Social Implications of Technology and Information Ethics (SITE)   [Latest Schedule]
Contact Address E--mail: site-contact[at]mail.ieice.org 
BioX Technical Committee on Biometrics (BioX)   [Latest Schedule]
Contact Address  
HWS Technical Committee on Hardware Security (HWS)   [Latest Schedule]
Contact Address Junichi Sakamoto (AIST), Hirotake Yamamoto (SSS)
E--mail:hws-c 
ICSS Technical Committee on Information and Communication System Security (ICSS)   [Latest Schedule]
Contact Address ICSS Technical Committee
E--mail: is-adm-q 
Announcement Latest information will be presented on ICSS webpage:
https://icss.ieice.org/
EMM Technical Committee on Enriched MultiMedia (EMM)   [Latest Schedule]
Contact Address Enriched MultiMedia (EMM) Secretaries
E--mail: emm-adn 
IPSJ-CSEC Special Interest Group on Computer Security (IPSJ-CSEC)   [Latest Schedule]
Contact Address  
IPSJ-SPT Special Interest Group on Security Psychology and Trust (IPSJ-SPT)   [Latest Schedule]
Contact Address  


Last modified: 2024-06-20 18:20:36


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /   [Return to SITE Schedule Page]   /   [Return to BioX Schedule Page]   /   [Return to HWS Schedule Page]   /   [Return to ICSS Schedule Page]   /   [Return to EMM Schedule Page]   /   [Return to IPSJ-CSEC Schedule Page]   /   [Return to IPSJ-SPT Schedule Page]   /  
 
 Go Top  Go Back   Prev ISEC Conf / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan