IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 15 of 15  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2023-11-16
14:55
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
A Study on Self Destructive Tamper Resistant Software utilizing Return-Oriented Programming (Part 3)
Kazuomi Oishi (SIST) ICSS2023-55
Self destructive tamper resistant software (SDTRS) is a tamper resistance technology that can protect a program by itsel... [more] ICSS2023-55
pp.30-34
ICSS, IPSJ-SPT 2022-03-08
10:40
Online Online A Study on Self Destructive Tamper Resistant Software utilizing Return-Oriented Programming (Part 2)
Kazuomi Oishi (SIST) ICSS2021-69
Taking into account CPU-level ROP (Return-Oriented Programming) defenses such as Intel CET, we study implementation feas... [more] ICSS2021-69
pp.61-65
ICSS 2021-11-29
13:25
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
A Study on Tamper Resistance of Trusted Execution Environment
Kazuomi Oishi (SIST) ICSS2021-47
A Trusted Execution Environment (TEE) provides isolated execution inside a TEE from the outside. The outside environment... [more] ICSS2021-47
pp.7-12
ICSS 2020-11-26
16:25
Online Online A Study on Anonymous Identifiers and its Applications
Kazuomi Oishi (SIST) ICSS2020-25
As computer network spreads, identifiers with anonymity is required for privacy protection. IPv6 temporary addresses are... [more] ICSS2020-25
pp.32-37
ICSS, IPSJ-SPT 2020-03-03
16:20
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Study on Implementation of Anonymous Public-Key Certificates based on Elliptic Curve
Kazuomi Oishi (SIST) ICSS2019-107
 [more] ICSS2019-107
pp.341-344
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
14:10
Kochi Kochi University of Technology Anonymous Public-Key Certificates based on Elliptic Curve
Kazuomi Oishi (SIST) ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56
Anonymous public-key certificates can guarantee anonymity of the certificate users and are useful for applications in wh... [more] ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56
pp.347-352
ISEC, COMP 2017-12-21
16:40
Kochi Eikokuji Campus, Kochi University of Technology Implementation Difficulty of Dynamic Self-Modifying Based Self Destructive Tamper Response
Kazuomi Oishi (SIST) ISEC2017-82 COMP2017-36
Tamper resistant software, which has sufficient resistance against analysis and attack, is a necessary and important tec... [more] ISEC2017-82 COMP2017-36
pp.67-74
ICSS 2016-11-25
15:45
Kanagawa Institute of Information Security Report on WhibOx 2016 White-Box Cryptography and Obfuscation
Kazuomi Oishi (SIST) ICSS2016-43
A report on WhibOx 2016 is presented. WhibOx 2016 is a one-time workshop on white-box cryptogra-phy and obfuscation. It ... [more] ICSS2016-43
pp.27-29
ISEC 2016-09-02
14:25
Tokyo Kikai-Shinko-Kaikan Bldg. Tamper Resistant Software utilizing Data Memory
Kazuomi Oishi (SIST) ISEC2016-45
We study a class of tamper resistant software that can work on a computer on which self-modifying code might not necessa... [more] ISEC2016-45
pp.43-48
IA, ICSS 2015-06-11
16:25
Fukuoka Kyushu Institute of Technology Univ. Report on the 23rd USENIX Security Symposium
Shinichi Matsumoto (ISIT), Kazuomi Oishi (SIST), Kuniyasu Suzaki (AIST) IA2015-8 ICSS2015-8
 [more] IA2015-8 ICSS2015-8
pp.39-44
ICSS 2015-03-04
15:55
Okinawa Meio Univiersity An Experimental Implementation of Self Destructive Tamper Resistant Software and Its Evaluation
Kazuomi Oishi (SIST), Naoki Yoshida, Naoki Watanabe, Jun'ichi Sakamoto, Tsutomu Matsumoto (YNU) ICSS2014-99
Self destructive tamper resistant software (SDTRS) has strong resistance
against attacker's analysis or modification
... [more]
ICSS2014-99
pp.217-222
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
11:30
Hokkaido San-Refure Hakodate Experimental Platform for CAN
Kazuomi Oishi (Shizuoka Inst. of Science and Tech.) ISEC2014-17 SITE2014-12 ICSS2014-21 EMM2014-17
Embedded systems are used for various purposes and are widely prevalent.
It turned out that embedded systems for which ... [more]
ISEC2014-17 SITE2014-12 ICSS2014-21 EMM2014-17
pp.81-87
ISEC 2013-12-11
16:25
Tokyo Kikai-Shinko-Kaikan Bldg. A Storage Encryption Scheme: Unconditionally Secure Encryption of Unlimited Number of Keys using A Fixed Secret (Part 2)
Kazuomi Oishi (Shizuoka Inst. of Science and Tech.) ISEC2013-80
A storage encryption scheme is studied. In a storage encryption scheme, data encryption and key encryption are executed.... [more] ISEC2013-80
pp.47-51
ISEC 2013-12-11
16:50
Tokyo Kikai-Shinko-Kaikan Bldg. A Study on An Analysis Prevention Scheme for Embedded System Firmware
Kazuomi Oishi (Shizuoka Inst. of Science and Tech.) ISEC2013-81
There are increasing attacks against embedded system software as well as PC software. Software of embedded system is cal... [more] ISEC2013-81
pp.53-57
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
16:35
Akita Akita University A Tamper Resistant Software Construction Method Based on Self Integrity Verification and Self-Modifying
Kazuomi Oishi, Tsutomu Matsumoto (Yokohama National Univ.) ISEC2009-39 SITE2009-31 ICSS2009-53
A method of constructing tamper resistant software resistant to
malicious modification is proposed.
It uses a primit... [more]
ISEC2009-39 SITE2009-31 ICSS2009-53
pp.221-228
 Results 1 - 15 of 15  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan