Mon, Jul 22 PM 13:00 - 14:15 |
(1) |
13:00-13:25 |
|
(2) |
13:25-13:50 |
|
(3) |
13:50-14:15 |
|
|
14:15-14:50 |
Break ( 35 min. ) |
Mon, Jul 22 PM 13:00 - 14:40 |
(4) ISEC |
13:00-13:25 |
Shor algorithm experiments with multi-node decision diagram-based quantum simulator ISEC2024-8 SITE2024-5 BioX2024-18 HWS2024-8 ICSS2024-12 EMM2024-14 |
Yusuke Kimura (Fujitsu), Li Shaowen (U-Tokyo), Hiromitsu Soneda, Junpei Koyama (Fujitsu), Hiroyuki Sato, Masahiro Fujita (U-Tokyo) |
(5) ISEC |
13:25-13:50 |
CSI-FiSh Variant with Quadratic Twists on Edwards Curves ISEC2024-9 SITE2024-6 BioX2024-19 HWS2024-9 ICSS2024-13 EMM2024-15 |
Yuki Iwata (Toyohashi University of Technology), Hiroki Minamide (National Institute of Technology, Tokyo College), Takeshi Nakai, Koutarou Suzuki (Toyohashi University of Technology) |
(6) ISEC |
13:50-14:15 |
A generalization of quantum ISD algorithm for Syndrome Decoding Problem ISEC2024-10 SITE2024-7 BioX2024-20 HWS2024-10 ICSS2024-14 EMM2024-16 |
Asuka Wakasugi (EAGLYS), Mitsuru Tada (Chiba Univ.) |
(7) ISEC |
14:15-14:40 |
Improving Ryan and Heninger's Attack on MEGA ISEC2024-11 SITE2024-8 BioX2024-21 HWS2024-11 ICSS2024-15 EMM2024-17 |
Naoki Shimoe, Noboru Kunihiro (Univ. of Tsukuba) |
|
14:40-14:50 |
Break ( 10 min. ) |
Mon, Jul 22 PM 13:00 - 14:40 |
(8) BioX |
13:00-13:25 |
[Invited Talk]
Cybernetic Avata Service Use Cases and Security
-- Backcasting from Year 2050 -- ISEC2024-12 SITE2024-9 BioX2024-22 HWS2024-12 ICSS2024-16 EMM2024-18 |
Masakatsu Nishigaki (Shizuoka Univ.), Yin Chen (Reitaku Univ.), Tetsushi Ohki (Shizuoka Univ.), Rie Shigetomi Yamaguchi (Univ. Tokyo), Yasushi Yagi (Osaka Univ.) |
(9) BioX |
13:25-13:50 |
The OU-ISIR multimodal biometric database and its performance evaluation ISEC2024-13 SITE2024-10 BioX2024-23 HWS2024-13 ICSS2024-17 EMM2024-19 |
Chi Xu, Xiang Li, Allam Shehata, Yasushi Yagi (Osaka Univ.) |
(10) BioX |
13:50-14:15 |
The OU-ISIR continuous authentication database comprising face and speech biometrics ISEC2024-14 SITE2024-11 BioX2024-24 HWS2024-14 ICSS2024-18 EMM2024-20 |
Xiang Li, Chi Xu, Yasushi Yagi (Osaka Univ.) |
(11) BioX |
14:15-14:40 |
A Study of Multibiometrics Using a Single Face Image ISEC2024-15 SITE2024-12 BioX2024-25 HWS2024-15 ICSS2024-19 EMM2024-21 |
Koichi Ito, Taito Tonosaki, Takafumi Aoki (Tohoku Univ.), Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.) |
|
14:40-14:50 |
Break ( 10 min. ) |
Mon, Jul 22 PM 13:00 - 14:15 |
(12) ICSS |
13:00-13:25 |
Honeypot for Long-term Observation of Cyber Attacks Exploiting Insecure Routers ISEC2024-16 SITE2024-13 BioX2024-26 HWS2024-16 ICSS2024-20 EMM2024-22 |
Masataka Mizokuchi, Takayuki Sasaki, Katsunari Yoshioka (Yokohama National Univ.) |
(13) ICSS |
13:25-13:50 |
Survey of OSS vulnerabilities in router firmware using an SCA tool ISEC2024-17 SITE2024-14 BioX2024-27 HWS2024-17 ICSS2024-21 EMM2024-23 |
Momoka Kihara, Sasaki Takayuki, Katsunari Yoshioka (Yokohama National Univ.) |
(14) ICSS |
13:50-14:15 |
Proposing Slow-Scan Detection Methods in Closed Networks Without Time Windows ISEC2024-18 SITE2024-15 BioX2024-28 HWS2024-18 ICSS2024-22 EMM2024-24 |
Shunya Tanaka (OKI) |
|
14:15-14:50 |
Break ( 35 min. ) |
Mon, Jul 22 PM 13:00 - 14:40 |
(15) |
13:00-13:25 |
|
(16) |
13:25-13:50 |
|
(17) |
13:50-14:15 |
|
(18) |
14:15-14:40 |
|
|
14:40-14:50 |
Break ( 10 min. ) |
Mon, Jul 22 PM 14:50 - 16:30 |
(19) |
14:50-15:15 |
|
(20) |
15:15-15:40 |
|
(21) |
15:40-16:05 |
|
(22) |
16:05-16:30 |
|
|
16:30-16:40 |
Break ( 10 min. ) |
Mon, Jul 22 PM 14:50 - 16:30 |
(23) ISEC |
14:50-15:15 |
Collision Attack on DM-AES ISEC2024-19 SITE2024-16 BioX2024-29 HWS2024-19 ICSS2024-23 EMM2024-25 |
Kodai Taiyama (UOH), Kosei Sakamoto (ME), Ryoma Ito (NICT), Kazuma Taka, Takanori Isobe (UOH) |
(24) ISEC |
15:15-15:40 |
Differential attack using multipath against block cipher DoT ISEC2024-20 SITE2024-17 BioX2024-30 HWS2024-20 ICSS2024-24 EMM2024-26 |
Haruka Sugai, Yasutaka Igarashi (TUS) |
(25) ISEC |
15:40-16:05 |
On Integral Properties Efficiently Reducible to the Data Complexity of the Attack ISEC2024-21 SITE2024-18 BioX2024-31 HWS2024-21 ICSS2024-25 EMM2024-27 |
Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science) |
(26) ISEC |
16:05-16:30 |
Design of Low-Latency Block Ciphers with Multiple Linear Layers ISEC2024-22 SITE2024-19 BioX2024-32 HWS2024-22 ICSS2024-26 EMM2024-28 |
Kazuma Nakata, Tatsuya Ishikawa (Hyogo Uiv.), Kosei Sakamoto (Mitsubishi Electric), Kazuhiko Minematsu (NEC), Takanori Isobe (Hyogo Uiv.) |
|
16:30-16:40 |
Break ( 10 min. ) |
Mon, Jul 22 PM 14:50 - 16:05 |
(27) ICSS |
14:50-15:15 |
Building a Dataset for Accelerating Researches against Fraudulent DeFi Tokens ISEC2024-23 SITE2024-20 BioX2024-33 HWS2024-23 ICSS2024-27 EMM2024-29 |
Iori Suzuki, Yin Minn Pa Pa, Katsunari Yoshioka (YNU) |
(28) ICSS |
15:15-15:40 |
Detection of Web3 Phishing Sites Focused on Permission Requests After Wallet Connection ISEC2024-24 SITE2024-21 BioX2024-34 HWS2024-24 ICSS2024-28 EMM2024-30 |
Riku Aoto, Yin Minn Pa Pa, Katsunari Yoshioka (YNU) |
(29) ICSS |
15:40-16:05 |
An analysis of relationship between Black-Hat SEO malwares using information from redirected scam sites ISEC2024-25 SITE2024-22 BioX2024-35 HWS2024-25 ICSS2024-29 EMM2024-31 |
Makoto Shimamura (Trend Micro Inc.), Kousuke Takeshige (Chiba Prefectural Police), Shingo Matsugaya (Trend Micro Inc./JC3), Keisuke Sakai (Kanagawa Prefectural Police), Masaki Hashimoto (Kagawa Univ.) |
|
16:05-16:40 |
Break ( 35 min. ) |
Mon, Jul 22 PM 14:50 - 16:30 |
(30) HWS |
14:50-15:15 |
Performance Evaluation of Improved SuperSonic Glitch PUF ISEC2024-26 SITE2024-23 BioX2024-36 HWS2024-26 ICSS2024-30 EMM2024-32 |
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) |
(31) HWS |
15:15-15:40 |
ISEC2024-27 SITE2024-24 BioX2024-37 HWS2024-27 ICSS2024-31 EMM2024-33 |
|
(32) HWS |
15:40-16:05 |
ISEC2024-28 SITE2024-25 BioX2024-38 HWS2024-28 ICSS2024-32 EMM2024-34 |
|
(33) HWS |
16:05-16:30 |
Spoofing Attack for Payment Systems based on Barcode Wristbands and its Coutermeasure ISEC2024-29 SITE2024-26 BioX2024-39 HWS2024-29 ICSS2024-33 EMM2024-35 |
Yoshiteru Hibino, Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) |
|
16:30-16:40 |
Break ( 10 min. ) |
Mon, Jul 22 PM 14:50 - 16:30 |
(34) |
14:50-15:15 |
|
(35) |
15:15-15:40 |
|
(36) |
15:40-16:05 |
|
(37) |
16:05-16:30 |
|
|
16:30-16:40 |
Break ( 10 min. ) |
Mon, Jul 22 PM 16:40 - 18:20 |
(38) |
16:40-17:05 |
|
(39) |
17:05-17:30 |
|
(40) |
17:30-17:55 |
|
(41) |
17:55-18:20 |
|
Mon, Jul 22 PM 16:40 - 18:20 |
(42) ISEC |
16:40-17:05 |
Implementation and Evaluation of an Application System combining a Lightweight Block Cipher and a Lightweight MAC using MPC ISEC2024-30 SITE2024-27 BioX2024-40 HWS2024-30 ICSS2024-34 EMM2024-36 |
Kandai Nakagawa (Tokai Univ.), Kazuto Ogawa (NICT), Takeki Kitayama, Hayato Watanabe (Tokai Univ.), Toshihiro Ohigashi (Tokai Univ./NICT) |
(43) ISEC |
17:05-17:30 |
Framing Fraud in Secret Sharing Scheme and its Countermeasure
-- Current status and challenging issues -- ISEC2024-31 SITE2024-28 BioX2024-41 HWS2024-31 ICSS2024-35 EMM2024-37 |
Kouichi Sakurai (Kyushu Univ.) |
(44) EMM |
17:30-17:55 |
Estimation of rotation angle and anisotropic magnification rate using pilot signal ISEC2024-32 SITE2024-29 BioX2024-42 HWS2024-32 ICSS2024-36 EMM2024-38 |
Rinka Kawano, Masaki Kawamura (Yamaguchi Univ.) |
(45) EMM |
17:55-18:20 |
Study on Potential of Speech-pathological Features for Deepfake Speech Detection ISEC2024-33 SITE2024-30 BioX2024-43 HWS2024-33 ICSS2024-37 EMM2024-39 |
Anuwat Chaiwongyen (JAIST), Suradej Duangpummet, Jessada Karnjana (NSTDA), Waree Kongprawechnon (SIIT), Masashi Unoki (JAIST) |
Mon, Jul 22 PM 16:40 - 18:20 |
(46) BioX |
16:40-17:05 |
Illegal login detection using eye movements when entering authentication codes ISEC2024-34 SITE2024-31 BioX2024-44 HWS2024-34 ICSS2024-38 EMM2024-40 |
Sachi Fujimoto, Chisa Takano, Masaki Inamura (HCU) |
(47) BioX |
17:05-17:30 |
Flick input PIN code authentication combined blink and gaze manipulation ISEC2024-35 SITE2024-32 BioX2024-45 HWS2024-35 ICSS2024-39 EMM2024-41 |
Moritomo Nara, Bo Wu, Kiminori Sato (TUT) |
(48) BioX |
17:30-17:55 |
Security Analysis of a Contactless Dial Lock Authentication System ISEC2024-36 SITE2024-33 BioX2024-46 HWS2024-36 ICSS2024-40 EMM2024-42 |
Kaiya Yokokura, Bo Wu, Kiminori Sato (TUT) |
(49) BioX |
17:55-18:20 |
A Machine Learning-Based Clone Detection Approach in Nano-Artifact Metrics ISEC2024-37 SITE2024-34 BioX2024-47 HWS2024-37 ICSS2024-41 EMM2024-43 |
Naoki Yoshida, Iwaki Miyamoto, Katsunari Yoshioka (YNU), Tsutomu Matsumoto (AIST) |
Mon, Jul 22 PM 16:40 - 18:20 |
(50) HWS |
16:40-17:05 |
Defending against adversarial example attacks by a denoising autoencoder and physical random noise ISEC2024-38 SITE2024-35 BioX2024-48 HWS2024-38 ICSS2024-42 EMM2024-44 |
Yuki Rogi, Kota Yoshida, Tatsuya Oyama, Takeshi Fujino, Shunsuke Okura (Ritsumeikan Univ.) |
(51) HWS |
17:05-17:30 |
Power-analysis side channel attack with auto encoder ISEC2024-39 SITE2024-36 BioX2024-49 HWS2024-39 ICSS2024-43 EMM2024-45 |
Haruto Ishii, Takuya Kojima, Hideki Takase, Hiroshi Nakamura (UTokyo) |
(52) ICSS |
17:30-17:55 |
DoS Attack Evaluation Experiment Using De-authentication Frames Against WPA2/WPA3-Enterprise Authentication Procedures ISEC2024-40 SITE2024-37 BioX2024-50 HWS2024-40 ICSS2024-44 EMM2024-46 |
Daisei Tsuchiyama, Hiroyuki Okazaki (Shinshu Univ.), Hikofumi Suzuki (NII) |
(53) ICSS |
17:55-18:20 |
Investigation of the success rate of Evil Twin attacks due to differences in radio wave strength
-- Variation of success rate with load status and connection request flood -- ISEC2024-41 SITE2024-38 BioX2024-51 HWS2024-41 ICSS2024-45 EMM2024-47 |
Masataka Yasuda, Chisa Takano, Masaki Inamura (HCU) |
Mon, Jul 22 PM Chair: Soichiro Morishita (Cyber Agent) 16:40 - 18:20 |
(54) SITE |
16:40-17:05 |
Report on Survey of Professionalism and Ethics Among Japanese IT Professionals ISEC2024-42 SITE2024-39 BioX2024-52 HWS2024-42 ICSS2024-46 EMM2024-48 |
Hiroaki Kanematsu (Nagoya Univ.) |
(55) SITE |
17:05-17:30 |
What is brought about by the "Uncanny Circle" that connects LLM and humans? ISEC2024-43 SITE2024-40 BioX2024-53 HWS2024-43 ICSS2024-47 EMM2024-49 |
Tsukasa Shirai, Hirotsugu Ohba, Yuko Murakami (Rikkyo Univ.) |
(56) SITE |
17:30-17:55 |
Proposal of a Method for Evaluating the Authenticity of Seals Based on Judgment Criteria of Human ISEC2024-44 SITE2024-41 BioX2024-54 HWS2024-44 ICSS2024-48 EMM2024-50 |
Yuuki Kimura, Soma Sugahara, Atsumu Kida, Taisei Nakamura, Ayato Ishikawa, Tetsutaro Uehara (Ritsumeikan Univ.) |
(57) SITE |
17:55-18:20 |
A Study of the Japanese Version of the Security Clearance System, or Suitability Assessment System
-- From a Supply Chain Security Perspective -- ISEC2024-45 SITE2024-42 BioX2024-55 HWS2024-45 ICSS2024-49 EMM2024-51 |
Yusuke Tachibana (FIT) |
Tue, Jul 23 AM 09:15 - 10:05 |
(58) |
09:15-09:40 |
|
(59) |
09:40-10:05 |
|
|
10:05-10:40 |
Break ( 35 min. ) |
Tue, Jul 23 AM 09:15 - 10:30 |
(60) ISEC |
09:15-09:40 |
Evaluation of Accuracy and Security on Deep Learning Model by Utilizing K-Anonymization With Attribute Selection for Reducing Computational Cost ISEC2024-46 SITE2024-43 BioX2024-56 HWS2024-46 ICSS2024-50 EMM2024-52 |
Rei Ueda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ) |
(61) ISEC |
09:40-10:05 |
Security Analysis on the Authentication Process Using Bluetooth ISEC2024-47 SITE2024-44 BioX2024-57 HWS2024-47 ICSS2024-51 EMM2024-53 |
Shogo Shiraki, Takanori Isobe (Univ.Hyogo) |
(62) ISEC |
10:05-10:30 |
Intrinsic Cause of Adversarial Examples by Geometric Analysis of Deep Learning Viewed from Data Manifold ISEC2024-48 SITE2024-45 BioX2024-58 HWS2024-48 ICSS2024-52 EMM2024-54 |
Hajime Tasaki, Jinhui Chao (Chuo Univ.) |
|
10:30-10:40 |
Break ( 10 min. ) |
Tue, Jul 23 AM 09:15 - 10:30 |
(63) HWS |
09:15-09:40 |
ISEC2024-49 SITE2024-46 BioX2024-59 HWS2024-49 ICSS2024-53 EMM2024-55 |
|
(64) HWS |
09:40-10:05 |
A Study on Detection Method of Aged Microcontrollers Using Side-Channel Information ISEC2024-50 SITE2024-47 BioX2024-60 HWS2024-50 ICSS2024-54 EMM2024-56 |
Yuki Kaneko (Tohoku Univ.), Yuichi Hayashi (NAIST), Naofumi Homma (Tohoku Univ.) |
(65) HWS |
10:05-10:30 |
Study on Stochastic Encrypted Data Processing Method based on Fully Homomorphic Encryption ISEC2024-51 SITE2024-48 BioX2024-61 HWS2024-51 ICSS2024-55 EMM2024-57 |
Soh Sato, Naofumi Homma (Tohoku Univ.) |
|
10:30-10:40 |
Break ( 10 min. ) |
Tue, Jul 23 AM 09:15 - 10:30 |
(66) ICSS |
09:15-09:40 |
UEBA Model Poisoning Attack: Challenges in Insider Threat Defense by UEBA and Proposal of Detection Methods ISEC2024-52 SITE2024-49 BioX2024-62 HWS2024-52 ICSS2024-56 EMM2024-58 |
Yusuke Isaka, Keisuke Kito, Takumi Yamamoto, Kiyoto Kawauchi (MELCO) |
(67) ICSS |
09:40-10:05 |
ISEC2024-53 SITE2024-50 BioX2024-63 HWS2024-53 ICSS2024-57 EMM2024-59 |
|
(68) ICSS |
10:05-10:30 |
Toward semantic identification method for patch modification using LLM ISEC2024-54 SITE2024-51 BioX2024-64 HWS2024-54 ICSS2024-58 EMM2024-60 |
Reika Arakawa, Yo Kanemoto, Mitsuaki Akiyama (NTT) |
|
10:30-10:40 |
Break ( 10 min. ) |
Tue, Jul 23 AM 10:40 - 11:55 |
(69) |
10:40-11:55 |
|
|
11:55-13:25 |
Lunch Break ( 90 min. ) |
Tue, Jul 23 PM 13:25 - 14:40 |
(70) |
13:25-14:40 |
|
|
14:40-14:50 |
Break ( 10 min. ) |
Tue, Jul 23 PM 14:50 - 16:30 |
(71) |
14:50-15:15 |
|
(72) |
15:15-15:40 |
|
(73) |
15:40-16:05 |
|
(74) |
16:05-16:30 |
|
Tue, Jul 23 PM 14:50 - 16:30 |
(75) ISEC |
14:50-15:15 |
Lossy Signature Scheme Based on Decisional Exact LPN Problem with Concrete Hash Encodings ISEC2024-55 SITE2024-52 BioX2024-65 HWS2024-55 ICSS2024-59 EMM2024-61 |
Arga Dhahana Pramudianto, Bagus Santoso (UEC) |
(76) ISEC |
15:15-15:40 |
On Mulit-Key FuncCPA Secure Public Key Encryption Schemes ISEC2024-56 SITE2024-53 BioX2024-66 HWS2024-56 ICSS2024-60 EMM2024-62 |
Eri Nakajima (Osaka Univ.), Keisuke Hara (AIST), Kyosuke Yamashita (Osaka Univ.) |
(77) ISEC |
15:40-16:05 |
Key Substitution Attack against Ordered Multisignature ISEC2024-57 SITE2024-54 BioX2024-67 HWS2024-57 ICSS2024-61 EMM2024-63 |
Yusuke (AIST), Yuuki, Kyosuke (Osaka Univ.), Goichiro (AIST) |
(78) ISEC |
16:05-16:30 |
Key Substitution Attack against Ordered Multisignature ISEC2024-58 SITE2024-55 BioX2024-68 HWS2024-58 ICSS2024-62 EMM2024-64 |
Yuuki Fujita (Osaka Univ.), Yusuke Sakai (AIST), Kyosuke Yamashita (Osaka Univ.), Goichiro Hanaoka (AIST) |
Tue, Jul 23 PM 14:50 - 16:05 |
(79) BioX |
14:50-15:15 |
Innovations in Security Mechanisms through Decomposition and Reuse of Body Functions: A Preliminary Study on Password Authentication(part 2) ISEC2024-59 SITE2024-56 BioX2024-69 HWS2024-59 ICSS2024-63 EMM2024-65 |
Takumi Takaiwa, Seiya Kajihara, Tsubasa Shibata, Soichi Takigawa, Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.) |
(80) BioX |
15:15-15:40 |
An Experimental Study on Radio Frequency Fingerprinting-based Authentication in IEEE 802.11g ISEC2024-60 SITE2024-57 BioX2024-70 HWS2024-60 ICSS2024-64 EMM2024-66 |
Zhen Jia, Zewei Guo (FUN), Wenhao Huang (Keio Univ.), Yin Chen (Reitaku Univ.), Jinxiao Zhu (TDU), Xiaohong Jiang (FUN) |
(81) BioX |
15:40-16:05 |
CAPT-AI: Study on AI Model identification using differences in ability (part 2) ISEC2024-61 SITE2024-58 BioX2024-71 HWS2024-61 ICSS2024-65 EMM2024-67 |
Seiya Kajihara, Takumi Takaiwa, Tsubasa Shibata (Shizuoka Univ.), Nami Ashizawa (NTT/Shizuoka Univ.), Naoto Kiribuchi, Toshiki Shibahara (NTT), Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.) |
Tue, Jul 23 PM 14:50 - 16:30 |
(82) |
14:50-15:15 |
|
(83) |
15:15-15:40 |
|
(84) |
15:40-16:05 |
|
(85) |
16:05-16:30 |
|
Tue, Jul 23 PM 14:50 - 16:30 |
(86) |
14:50-15:15 |
|
(87) |
15:15-15:40 |
|
(88) |
15:40-16:05 |
|
(89) |
16:05-16:30 |
|