|
10:00-10:05 |
Opening Address ( 5 min. ) |
Thu, Dec 13 AM 10:05 - 12:00 |
(1) |
10:05-10:20 |
Introduction of Cyber Physical Security Research Center |
Tsutomu Matsumoto (AIST) |
(2) |
10:20-10:45 |
Report on CHES 2018 |
Naofumi Homma (Tohoku Univ.) |
(3) |
10:45-11:10 |
Study of Secure Implementation of AI Hardware on IoT edge |
Takeshi Fujino, Kota Yoshida (Ritsumeikan Univ.) |
(4) |
11:10-11:35 |
Tamper-Evident Cryptographic Key Storage Based on Weak PUF |
Rei Ueno, Noafumi Homma (Tohoku Univ.) |
(5) |
11:35-12:00 |
|
|
|
12:00-13:30 |
Lunch Break ( 90 min. ) |
Thu, Dec 13 PM 13:30 - 16:10 |
(6) |
13:30-13:50 |
Awards ceremony |
(7) |
13:50-14:15 |
Research on security using trusted hardware |
Takayuki Sasaki (NEC) |
(8) |
14:15-14:40 |
Comparison of TEE implementations |
Kuniyasu Suzaki, Akira Tsukamoto (AIST) |
(9) |
14:40-15:05 |
RISCV-based Hardware Root-Of-Trust for Secure IoT Device Lifecycle Management |
Thomas Edison Yu (Rambus K.K.) |
(10) |
15:05-15:30 |
Issues in industrial equipment installed in the factory and Renesas' initiatives |
Tsukasa Yobo (Renesas Electronics) |
|
15:30-15:40 |
Break ( 10 min. ) |
(11) |
15:40-16:10 |
Lightning Talk for Poster Session |
Thu, Dec 13 PM 16:10 - 17:00 |
(12) |
16:10-17:00 |
[Poster Presentation]
Hardware Trojan Attack and Countermeasures in Bundle-Data Asynchronous Circuits |
Koutaro Inaba, Toshiki Kanamoto, Atsushi Kurokawa, Masashi Imai (Hirosaki Univ.) |
(13) |
16:10-17:00 |
[Poster Presentation]
Fundamental Study on Randomness Evaluation Method of True Random Number Generator Using Amplitude Probability Distribution |
Saki Osuka, Daisuke Fujimoto (NAIST), Naofumi Homma (Tohoku Univ.), Arthur Beckers, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede (KU Leuven), Yu-ichi Hayashi (NAIST) |
(14) |
16:10-17:00 |
[Poster Presentation]
Fundamental Study on Estimation of Sensing Timing Based on Observation of EM Radiation from Ultrasonic Range Finder |
Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) |
(15) |
16:10-17:00 |
[Poster Presentation]
A YNU-made Low-Cost Laser Apparatus Capable of High-Precision Fault Injection |
Junichi Sakamoto, Tsutomu Matsumoto (YNU) |
(16) |
16:10-17:00 |
[Poster Presentation]
Computer experiments for efficient sign detection in RNS |
Yuya Kakei (ECSEC), Shinichi Kawamura (ECSEC/Toshiba) |
(17) |
16:10-17:00 |
[Poster Presentation]
Modeling Attacks on Double-Arbiter PUF Using End-to-End Deep Neural Network |
Tomoki Iizuka, Hiromitsu Awano, Makoto Ikeda (UTokyo) |
(18) |
16:10-17:00 |
[Poster Presentation]
Base Sampler Design of Micciancio-Walter Algorithm on ASIC |
Keitaro Koga, Hiromitsu Awano, Makoto Ikeda (UTokyo) |
(19) |
16:10-17:00 |
[Poster Presentation]
Prototype Development of ITS Security Research Platform
-- Miniature vehicle with simulated V2X communication over ZigBee and multiple censors -- |
Tsuyoshi Toyama, Takuya Yoshida, Hisashi Oguma (Toyota-ITC), Tsutomu Matsumoto (YNU) |
(20) |
16:10-17:00 |
[Poster Presentation]
Side-channel Attack using Average Power Traces against Pairing Implementation with Random Masking Countermeasure |
Mitsufumi Yamazaki, Junichi Sakamoto, Tsutomu Matsumoto (YNU) |
(21) |
16:10-17:00 |
[Poster Presentation]
A Power Analysis for Software Implemented Ring-LWE Lattice Cryptography with Number Theoretic Transformation |
Ryo Miyachi, Junichi Sakamoto, Tsutomu Matsumoto (YNU) |
(22) |
16:10-17:00 |
[Poster Presentation]
Demonstration of Illusion Attack on Object Detection Algorithm of Stereo Vision Camera |
Hiroki Nohira, Yasushi Iwata, Naoki Yoshida, Tsutomu Matsumoto (YNU) |
(23) |
16:10-17:00 |
[Poster Presentation]
Laser-Irradiation-Based Instruction Replacement Can Break an Fault-Injection-Countermeasured AES Implemented in TVC |
Tomoro Suzuki, Junichi Sakamoto, Tsutomu Matsumoto (YNU) |
(24) |
16:10-17:00 |
[Poster Presentation]
A System of Evaluating Instrumentation Security Enhancement Techniques for Ranging Pulse LIDARs |
Tatsuya Suehiro, Satoru Sakurazawa, Naoki Yoshida, Tsutomu Matsumoto (YNU) |
(25) |
16:10-17:00 |
[Poster Presentation]
TEE Comparison on Hardware/Software |
Kuniyasu Suzaki, Akira Tsukamoto (AIST) |
(26) |
16:10-17:00 |
[Poster Presentation]
Wireless Devices Authentication using Physical Layer Authentication based on Machine Learning |
Yuichi Takita, Yohei Kaieda (SECOM) |