Fri, Apr 14 PM 13:00 - 13:20 |
|
13:00-13:05 |
( 5 min. ) |
|
13:05-13:20 |
( 15 min. ) |
Fri, Apr 14 PM Side Channel 13:20 - 14:45 |
(1) |
13:20-13:45 |
Exploration of hardware Trojan detection through power supply current simulation |
Takafumi Oki, Kazuki Monta, Takuji Miki, Makoto Nagata (Kobe Univ.) |
(2) |
13:45-14:10 |
Fundamental Study on the effect of the Number of RNS Bases on the Side-channel Information Leakage from Modular Multiplier |
Daisuke Fujimoto, Rikuo Haga, Yuichi Hayashi (NAIST) |
(3) |
14:10-14:35 |
Modeling of Electromagnetic Leakage from Voltage-scaled Cryptographic Circuits |
Kazuki Minamiguchi, Yoshihiro Midoh, Noriyuki Miura, Jun Shiomi (Osaka Univ.) |
|
14:35-14:45 |
Break ( 10 min. ) |
Fri, Apr 14 PM Fault Injection 14:45 - 16:10 |
(4) |
14:45-15:10 |
Exploration of analysis methods of electromagnetic fault injection attacks on cryptographic IC chips |
Yusuke Hayashi, Rikuu Hasegawa, Takuya Wadatsumi, Kazuki Monta, Takuji Miki, Makoto Nagata (Kobe Univ.) |
(5) |
15:10-15:35 |
Electromagnetic fault injection attacks on cryptographic IC chips and analysis of internal voltage fluctuation |
Rikuu Hasegawa, Takuya Wadatsumi, Kazuki Monta, Takuji Miki, Makoto Nagata (Kobe Univ) |
(6) |
15:35-16:00 |
Object Generation - Backdoor Attack against Object-Detection DNN Triggered by Fault Injection into MIPI |
Takumi Takubo, Tatsuya Oyama, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ.) |
|
16:00-16:10 |
Break ( 10 min. ) |
Fri, Apr 14 PM Security Hardware(1) 16:10 - 17:00 |
(7) |
16:10-16:35 |
An Application of Information Flow Tracking to Support Detection of Hardware Trojans |
Ryoichi Isawa, Nobuyuki Kanaya, Daisuke Inoue (NICT) |
(8) |
16:35-17:00 |
Instrumentation Security of Infrastructure Monitoring Based on PRNU |
Kotaro Naruse, Hikari Sasaki, Kosuke Kawamura, Jun Shiomi, Yoshihiro Midoh, Noriyuki Miura (Osaka Univ.) |
Sat, Apr 15 AM Security Hardware(2) 09:15 - 10:45 |
(9) |
09:15-09:40 |
An AES Cryptographic Processor with Partial Re-Keying Scheme Utilizing Physical Attack Sensor |
Ryuki Ikemoto, Soichiro Fujii (Osaka Univ.), Yuki Yamashita, Makoto Nagata (Kobe Univ.), Jun Shiomi, Yoshihiro Midoh, Noriyuki Miura (Osaka Univ.) |
(10) |
09:40-10:05 |
Investigation of automated design technique of pairing engine |
Momoko Fukuda, Makoto Ikeda (UT) |
(11) |
10:05-10:30 |
Clone Resistance of Artifact Metric Systems Based on White Light Interferometry and Correlation coefficient |
Akira Iwahashi, Naoki Yoshida, Tsutomu Matsumoto (YNU) |
|
10:30-10:45 |
Break ( 15 min. ) |
Sat, Apr 15 AM PUF 10:45 - 11:35 |
(12) |
10:45-11:10 |
PUF Based on Fetal-Movement Circuit |
Kotaro Naruse, Takayuki Ueda, Jun Shiomi, Yoshihiro Midoh, Noriyuki Miura (Osaka Univ.) |
(13) |
11:10-11:35 |
Simultaneous Measured Data and Device Authentication Utilizing Unique Sensor PUF Characteristics |
Kosuke Kawamura (Osaka Univ.), Yasuhiro Kubota, Makoto Nagata (Kobe Univ.), Jun Shiomi, Yoshihiro Midoh, Noriyuki Miura (Osaka Univ.) |