Tue, Jul 23 AM A-1:ISEC(1):101 09:55 - 12:00 |
(1) ISEC |
09:55-10:20 |
Implementation of gathering system configuration and design vulnerability assessment for zero-day attack countermeasure using vulnerability information ISEC2019-12 SITE2019-6 BioX2019-4 HWS2019-7 ICSS2019-10 EMM2019-15 |
Motoki Kusume, Koji Kida, Keizo Saisho (Kagawa Univ.) |
(2) ISEC |
10:20-10:45 |
An Approach to Attack Scenario Generation for Simulation of Targeted Attacks ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16 |
Yusuke Takahashi, Shigeyoshi Shima, Atsunori Naito (NEC), Rui Tanabe, Katsunari Yoshioka (YNU) |
(3) ISEC |
10:45-11:10 |
Profiling of malicious users towards honeypot installation in the blockchain network ISEC2019-14 SITE2019-8 BioX2019-6 HWS2019-9 ICSS2019-12 EMM2019-17 |
Kazuki Hara, Teppei Sato, Mitsuyoshi Imamura (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT) |
(4) ISEC |
11:10-11:35 |
Risk analysis of zero downtime mechanism by dispersibility in blockchain technology ISEC2019-15 SITE2019-9 BioX2019-7 HWS2019-10 ICSS2019-13 EMM2019-18 |
Wataru Taguchi, Mitsuyoshi Imamura (Tsukuba Univ.), Kazumasa Omote (uba Univ./NICT) |
(5) ISEC |
11:35-12:00 |
A method of giving trust to users in Bitcoin ISEC2019-16 SITE2019-10 BioX2019-8 HWS2019-11 ICSS2019-14 EMM2019-19 |
Asuka Suzuki, Teppei Sato (Tsukuba Univ.), Omote Kazumasa (Tsukuba Univ./NICT) |
Tue, Jul 23 AM B-1:CSEC(1):213 09:55 - 12:00 |
(6) |
09:55-10:20 |
金融サービスにおける機械学習システムの適切な活用について:セキュリティと品質に焦点を当てて
○清藤 武暢・宇根 正志(日本銀行) |
(7) |
10:20-10:45 |
対象者の人数と人間関係に制約のない移動履歴とSNSアカウントの照合
○大岡 拓斗・松本 瞬・市野 将嗣・吉浦 裕(電通大) |
(8) |
10:45-11:10 |
マルウェア対策のための研究用データセット~MWS Datasets 2019~
荒木 粧子(ソリトンシステムズ)・○笠間 貴弘(NICT)・押場 博光(FFRI)千葉 大紀(NTTセキュアプラットフォーム研究所)・畑田 充弘(NTT)・寺田 真敏(電機大学) |
(9) |
11:10-11:35 |
擬似C&Cサーバを用いたIoTマルウェア駆除手法の検討
○三須 剛史・高田 一樹(セキュアブレイン) |
(10) |
11:35-12:00 |
観測ロケットMOMO3号機によるセキュア通信方式の基礎実験
○吉田 真紀(NICT)・森岡 澄夫(インターステラテクノロジズ)・尾花 賢(法政大学) |
Tue, Jul 23 AM D-1:BioX:328 09:55 - 11:35 |
(11) BioX |
09:55-10:20 |
Evaluation of Similarity Calculation Methods for Image Clustering based on PRNU Noise ISEC2019-17 SITE2019-11 BioX2019-9 HWS2019-12 ICSS2019-15 EMM2019-20 |
Mai Uchida, Yoichi Tomioka (UoA) |
(12) BioX |
10:20-10:45 |
Development of 2,400ppi fingerprint sensor for capturing neonate fingerprint within 24 hours after Birth ISEC2019-18 SITE2019-12 BioX2019-10 HWS2019-13 ICSS2019-16 EMM2019-21 |
Yoshinori Koda, Ai Takahashi, Koichi Ito, Takafumi Aoki (Tohoku Univ.) |
(13) BioX |
10:45-11:10 |
Introduction of Second-order Differential Phase Spectrum into Person Authentication using Intra-Palm Propagation Signal ISEC2019-19 SITE2019-13 BioX2019-11 HWS2019-14 ICSS2019-17 EMM2019-22 |
Kohei Fujita, Yuya Isimoto, Isao Nakanishi (Tottori Univ) |
(14) BioX |
11:10-11:35 |
Empirical Evaluation on Face-Detection Prevention Technologies ISEC2019-20 SITE2019-14 BioX2019-12 HWS2019-15 ICSS2019-18 EMM2019-23 |
Kazuki Eto, Kazushi Waki, Takafumi Mori, Hiroaki Kikuchi (Meiji Univ.) |
Tue, Jul 23 PM A-2:ISEC(2):104 13:10 - 15:15 |
(15) ISEC |
13:10-13:35 |
Constructing More Efficient Lattice-based Revocable IBE with Adaptive Security ISEC2019-21 SITE2019-15 BioX2019-13 HWS2019-16 ICSS2019-19 EMM2019-24 |
Atsushi Takayasu (Univ. Tokyo) |
(16) ISEC |
13:35-14:00 |
A Revocable Group Signature Scheme with Strong Anonymity for Crowdsensing ISEC2019-22 SITE2019-16 BioX2019-14 HWS2019-17 ICSS2019-20 EMM2019-25 |
Yuto Nakazawa, Toru Nakanishi (Hiroshima Univ.) |
(17) ISEC |
14:00-14:25 |
Generic Even-Mansour Construction Based on Group Actions ISEC2019-37 SITE2019-31 BioX2019-29 HWS2019-32 ICSS2019-35 EMM2019-40 |
Hector Hougaard, Chen-Mou Cheng, Miyaji Atsuko (Graduate School of Engineering, Osaka Univ.) |
(18) ISEC |
14:25-14:50 |
New Quantum Algorithms for Modular Inverse and Their Application on the Elliptic Curve Discrete Logarithm Problem ISEC2019-24 SITE2019-18 BioX2019-16 HWS2019-19 ICSS2019-22 EMM2019-27 |
Ryo Kurama (Univ. of Tokyo), Noboru Kunihiro (Tsukuba Univ.) |
(19) ISEC |
14:50-15:15 |
Attribute-Based Group Signatures for Revocable Members ISEC2019-25 SITE2019-19 BioX2019-17 HWS2019-20 ICSS2019-23 EMM2019-28 |
Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama (ATR) |
Tue, Jul 23 PM B-2:HWS(1):213 13:10 - 15:15 |
(20) HWS |
13:10-13:35 |
A Formal Approach to Verifying Trojan-freeness of Cryptographic Circuits Based on Galois-Field Arithmetic ISEC2019-26 SITE2019-20 BioX2019-18 HWS2019-21 ICSS2019-24 EMM2019-29 |
Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) |
(21) HWS |
13:35-14:00 |
Side-channel leakage evaluation of cryptographic module by IC chip level consumption simulation ISEC2019-27 SITE2019-21 BioX2019-19 HWS2019-22 ICSS2019-25 EMM2019-30 |
Kazuki Yasuda, Kazuki Monta, Akihiro Tsukioka, Noriyuki Miura, Makoto Nagata (Kobe Univ.) |
(22) HWS |
14:00-14:25 |
A Countermeasure against Side-Channel Analysis using Dynamic Power Control ISEC2019-28 SITE2019-22 BioX2019-20 HWS2019-23 ICSS2019-26 EMM2019-31 |
Tomoaki Ukezono (Fukuoka Univ.) |
(23) HWS |
14:25-14:50 |
Side Channel Security of an FPGA Pairing Implementation with Pipelined Modular Multiplier ISEC2019-29 SITE2019-23 BioX2019-21 HWS2019-24 ICSS2019-27 EMM2019-32 |
Mitsufumi Yamazaki, Junichi Sakamoto, Yuta Okuaki, Tsutomu Matsumoto (YNU) |
(24) HWS |
14:50-15:15 |
An FPGA Implementation of Aggregate Signature Schemes with Pipelined Modular Multiplier ISEC2019-30 SITE2019-24 BioX2019-22 HWS2019-25 ICSS2019-28 EMM2019-33 |
Yota Okuaki, Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) |
Tue, Jul 23 PM D-2:SITE(1):328 13:10 - 14:50 |
(25) SITE |
13:10-13:35 |
Proposal and Implementation of Password Reminder System for Partial Forgetting ISEC2019-31 SITE2019-25 BioX2019-23 HWS2019-26 ICSS2019-29 EMM2019-34 |
Ryota Hosoda, Hiroyuki Inaba (KIT) |
(26) SITE |
13:35-14:00 |
Proposal of Spam Filter by Applying Neural Network for Mitigating Catastrophic Forgetting ISEC2019-32 SITE2019-26 BioX2019-24 HWS2019-27 ICSS2019-30 EMM2019-35 |
Shuiti Kawahara, Lu Chen, Hiroyuki Inaba (KIT) |
(27) SITE |
14:00-14:25 |
Video Watermarking Using Difference of Persistent Homology in Consecutive Frames ISEC2019-33 SITE2019-27 BioX2019-25 HWS2019-28 ICSS2019-31 EMM2019-36 |
Takaya Kimura, Hiroyuki Inaba (KIT) |
(28) SITE |
14:25-14:50 |
A simulation of a 3-D visual cryptography using holography ISEC2019-34 SITE2019-28 BioX2019-26 HWS2019-29 ICSS2019-32 EMM2019-37 |
Takumi Takazawa, Kazuhiro Suzuki, Naoki Takada (Kochi Univ.) |
Tue, Jul 23 PM 15:30 - 16:30 |
(29) |
15:30-16:30 |
|
Tue, Jul 23 PM 16:30 - 17:30 |
(30) |
16:30-17:30 |
|
Tue, Jul 23 PM 17:30 - 18:00 |
(31) |
17:30-18:00 |
|
Wed, Jul 24 AM A-3:ISEC(3):104 09:30 - 10:45 |
(32) ISEC |
09:30-09:55 |
SecureHID: Securing the USB Interface ISEC2019-35 SITE2019-29 BioX2019-27 HWS2019-30 ICSS2019-33 EMM2019-38 |
Jan Goette (Waseda Univ.), Naoto Yanai (Osaka Univ.), Tatsuya Mori (Waseda Univ.) |
(33) ISEC |
09:55-10:20 |
A Performance Analysis of Supersingular Isogeny Diffie-Hellman with Several Classes of the Quadratic Extension Fields ISEC2019-36 SITE2019-30 BioX2019-28 HWS2019-31 ICSS2019-34 EMM2019-39 |
Yuki Nanjo (Okayama Univ.), Masaaki Shirase (Future Univ. Hakodate), Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) |
(34) ISEC |
10:20-10:45 |
Privacy for Documents and Prototype of Risk Evaluation Tool ISEC2019-23 SITE2019-17 BioX2019-15 HWS2019-18 ICSS2019-21 EMM2019-26 |
Tomoaki Mimoto, Shinsaku Kiyomoto (KDDI Research), Koji Kitamura (AIST), Atsuko Miyaji (Osaka Univ.) |
Wed, Jul 24 AM B-3:HWS(2):213 09:05 - 10:45 |
(35) HWS |
09:05-09:30 |
Instruction Replacement Fault Attack for TVC using Double Laser Station ISEC2019-38 SITE2019-32 BioX2019-30 HWS2019-33 ICSS2019-36 EMM2019-41 |
Tomoro Suzuki, Junichi Sakamoto, Tsutomu Matsumoto (YNU) |
(36) HWS |
09:30-09:55 |
Electromagnetic Analysis Attacks on an ASIC Implementation of a Ring-Oscillator PUF ISEC2019-39 SITE2019-33 BioX2019-31 HWS2019-34 ICSS2019-37 EMM2019-42 |
Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ.) |
(37) HWS |
09:55-10:20 |
Fundamental Study on an Estimation Method of Irradiate Frequencies to Forcibly Cause Electromagnetic Information Leakage ISEC2019-40 SITE2019-34 BioX2019-32 HWS2019-35 ICSS2019-38 EMM2019-43 |
Shugo Kaji (NAIST), Masahiro Kinugawa (NIT), Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) |
(38) HWS |
10:20-10:45 |
Instrumentation Security of Ranging Pulse LIDARs Using Multiple Photodetectors ISEC2019-41 SITE2019-35 BioX2019-33 HWS2019-36 ICSS2019-39 EMM2019-44 |
Tatsuya Suehiro, Ryuya Ichinose, Satoru Sakurazawa, Naoki Yoshida, Tsutomu Matsumoto (YNU) |
Wed, Jul 24 AM C-3:SITE(2):210 09:30 - 10:45 |
(39) SITE |
09:30-09:55 |
Generation of Family Resemblance Inference Rules by Boid Annotation and Labeled-LDA
-- A Machine Learning Approach to Integrate Inference Attack Analysis and Covert Channel Attack Analysis -- ISEC2019-42 SITE2019-36 BioX2019-34 HWS2019-37 ICSS2019-40 EMM2019-45 |
Kosuke Kurebayashi, Tetsuya Morizumi, Hirotsugu Kinoshita (KU) |
(40) SITE |
09:55-10:20 |
Implicit Guidance & Control at OODA Loop using as Countermeasures
-- against SMS phishing -- ISEC2019-43 SITE2019-37 BioX2019-35 HWS2019-38 ICSS2019-41 EMM2019-46 |
Yuidhi Takigawa (N.D.A.), Takeo Tatsumi (O.U.J/) |
(41) SITE |
10:20-10:45 |
Server Configuration Training Including Vulnerability Assessment and Remediation process ISEC2019-44 SITE2019-38 BioX2019-36 HWS2019-39 ICSS2019-42 EMM2019-47 |
Daisuke Suzuki (Hokuriku Univ.) |
Wed, Jul 24 AM A-4:CSEC(2):104 10:55 - 12:35 |
(42) |
10:55-11:20 |
n<2k-1において計算結果の正当性を検証可能な秘密分散を用いた秘匿計算
○落合 将吾・岩村 惠市(理科大) |
(43) |
11:20-11:45 |
ブロックチェーンを用いたIoTシステム向け証明サービス基盤の提案
○大久保 隆夫(情報セキュリティ大学院大学)・田嶋 健・上原 敏幸(アイビーシー) |
(44) |
11:45-12:10 |
ブロックチェーンを用いた公正なオンラインゲームの確立手法
○佐古 健太郎(早稲田大学)・森 達哉(早稲田大学)・松尾 真一郎(ジョージタウン大学) |
(45) |
12:10-12:35 |
Ethereumブロックチェーンで綿菓子を巻く方法
○須賀 祐治(IIJ) |
Wed, Jul 24 AM B-4:EMM/ICSS:213 10:55 - 12:35 |
(46) ICSS |
10:55-11:20 |
Investigation on Blockchain-based Malware Information Sharing Method in Malware Detection System ISEC2019-45 SITE2019-39 BioX2019-37 HWS2019-40 ICSS2019-43 EMM2019-48 |
Ryusei Fuji, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama (Univ. of Miyazaki), Mirang Park (Kanagawa Inst. of Tech.), Norio Shiratori (Chuo Univ.), Naonobu Okazaki (Univ. of Miyazaki) |
(47) ICSS |
11:20-11:45 |
Automatic Node Manipulation System for Active Monitoring Environment ISEC2019-46 SITE2019-40 BioX2019-38 HWS2019-41 ICSS2019-44 EMM2019-49 |
Shingo Yasuda, Nobuyuki Kanaya, Yu Tsuda, Satoshi Ohta, Ryosuke Miura, Daisuke Inoue (NICT) |
(48) EMM |
11:45-12:10 |
A Study on Suppression of Inappropriate Use of Illegal Contents Based on Conformity Caused by Normative Influence ISEC2019-47 SITE2019-41 BioX2019-39 HWS2019-42 ICSS2019-45 EMM2019-50 |
Hiroki Yamaguchi, Kazuhiro Kono (Kansai Univ.) |
(49) EMM |
12:10-12:35 |
Recording device identification based on audio distortion depending on system-on-chip ISEC2019-48 SITE2019-42 BioX2019-40 HWS2019-43 ICSS2019-46 EMM2019-51 |
Akira Nishimura (Tokyo Univ. Info. Sci.) |
Wed, Jul 24 AM C-4:SITE(3):210 10:55 - 12:10 |
(50) SITE |
10:55-11:20 |
Stochastic Existence Connecting Logos that are not necessarily completely divided and Language Games
-- Limitations of Security Models and the Possibility of Artificial Intelligence -- ISEC2019-49 SITE2019-43 BioX2019-41 HWS2019-44 ICSS2019-47 EMM2019-52 |
Tetsuya Morizumi (KU) |
(51) SITE |
11:20-11:45 |
International regulatory trend survey report on AI
-- Focusing on the OECD Principles on AI -- ISEC2019-50 SITE2019-44 BioX2019-42 HWS2019-45 ICSS2019-48 EMM2019-53 |
Naonori Kato (KDDI Research), Masatomo Suzuki (Niigata Univ./RIKEN), Yoichiro Itakura (Hikari Sogoh Law Offices/RIKEN), Yosuke Murakami (KDDI Research) |
(52) SITE |
11:45-12:10 |
Development of the Ethics Assessment for Research & Innovation Guidelines under the SATORI project in Europe (1)
-- Background and Outline -- ISEC2019-51 SITE2019-45 BioX2019-43 HWS2019-46 ICSS2019-49 EMM2019-54 |
Takushi Otani (Kibi International Univ.), Hirotaka Osawa (Tsukuba Univ.), Minao Kukita (Nagoya Univ.), Reina Saijo (Kyoto Univ.) |
Wed, Jul 24 PM A-5:ISEC(4):104 13:45 - 15:50 |
(53) ISEC |
13:45-14:10 |
3 Layers Public Key Cryptosystem with a Short Tandem Repeat DNA for Ultimate Personal Identification
-- Introduction of Short Tandem Repeat Coupled with Mai Nanbaa and its Application -- ISEC2019-52 SITE2019-46 BioX2019-44 HWS2019-47 ICSS2019-50 EMM2019-55 |
Shigeo Tsujii, Toshiaki Saisho, Masao Yamasawa, Ko Shikata (Chuo Univ.), Koji Sasaki, Nobuharu Suzuki (Ad.) |
(54) ISEC |
14:10-14:35 |
Anonymous Public-Key Certificates based on Elliptic Curve ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56 |
Kazuomi Oishi (SIST) |
(55) ISEC |
14:35-15:00 |
A Method for Key-Updatable Symmetric Searchable Encryption ISEC2019-54 SITE2019-48 BioX2019-46 HWS2019-49 ICSS2019-52 EMM2019-57 |
Natsume Matsuzaki, Hiroaki Anada (Univ. of Nagasaki) |
(56) ISEC |
15:00-15:25 |
Participation Report of the 9th BIU Winter School on Cryptography ISEC2019-55 SITE2019-49 BioX2019-47 HWS2019-50 ICSS2019-53 EMM2019-58 |
Hiroaki Anada (Univ. Nagasaki) |
(57) ISEC |
15:25-15:50 |
Garbled Circuit by three valued logics by Bochvar ISEC2019-56 SITE2019-50 BioX2019-48 HWS2019-51 ICSS2019-54 EMM2019-59 |
Shunsuke Hayashi, Taroh Sasaki, Athushi Fujioka (Kanagawa Univ.) |
Wed, Jul 24 PM B-5:HWS(3):213 13:45 - 15:50 |
(58) HWS |
13:45-14:10 |
Design Space Search Applying Bayesian Optimization to High-level Design Flow ISEC2019-57 SITE2019-51 BioX2019-49 HWS2019-52 ICSS2019-55 EMM2019-60 |
Ryohei Nakayama (UTokyo), Hiromitsu Awano (Osaka Univ.), Makoto Ikeda (UTokyo) |
(59) HWS |
14:10-14:35 |
Design of Highly Efficient AES Hardware Architectures Based on Multiplicative-Offset ISEC2019-58 SITE2019-52 BioX2019-50 HWS2019-53 ICSS2019-56 EMM2019-61 |
Rei Ueno (Tohoku Univ.), Sumio Morioka (IST), Noriyuki Miura, Kohei Matsuda, Makoto Nagata (Kobe Univ.), Shivam Bhasin (NTU), Yves Mathieu, Tarik Graba, Jean-Luc Danger (TPT), Naofumi Homma (Tohoku Univ.) |
(60) HWS |
14:35-15:00 |
Design of High Performance Processor for Paillier Algorithm With Homomorphism ISEC2019-59 SITE2019-53 BioX2019-51 HWS2019-54 ICSS2019-57 EMM2019-62 |
Chun Cai, Hiromitsu Awano, Makoto Ikeda (Tokyo Univ.) |
(61) HWS |
15:00-15:25 |
Potential Method to Extract Uniqueness from Non-Ideality of Sensor Device ISEC2019-60 SITE2019-54 BioX2019-52 HWS2019-55 ICSS2019-58 EMM2019-63 |
Thibaut Constant, Makoto Nagata, Noriyuki Miura (Kobe Univ.) |
(62) HWS |
15:25-15:50 |
Possibility of Identifying USB Device by Voltage Changing ISEC2019-61 SITE2019-55 BioX2019-53 HWS2019-56 ICSS2019-59 EMM2019-64 |
Taku Toyama, Junichi Sakamoto, Naoki Yoshida, Tsutomu Matsumoto (YNU) |
Wed, Jul 24 PM C-5:SPT:210 13:45 - 15:25 |
(63) |
13:45-14:10 |
メールにおける誘導手口の推定手法に関する検討
○山本匠・西川弘毅・岩崎亜衣子(三菱電機)・上原 航汰(静岡大学)・Harsham Bret・WangYe・HoriChiori・河内清人(三菱電機)・西垣正勝(静岡大学) |
(64) |
14:10-14:35 |
新聞で報道される情報漏えい事故の属性分析
○新原功一・菊池浩明(明治大学) |
(65) |
14:35-15:00 |
セキュリティやプライバシーに関するSoK論文やサーベイ論文をSoKする
○金岡晃(東邦大学) |
(66) |
15:00-15:25 |
情報セキュリティに関連するガイドラインのDoc2Vecを用いた文書内容の可視化手法の提案とその評価
○尾崎敏司(筑波大学/トレンドマイクロ) |