Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2023-11-16 14:55 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
A Study on Self Destructive Tamper Resistant Software utilizing Return-Oriented Programming (Part 3) Kazuomi Oishi (SIST) ICSS2023-55 |
Self destructive tamper resistant software (SDTRS) is a tamper resistance technology that can protect a program by itsel... [more] |
ICSS2023-55 pp.30-34 |
ICSS, IPSJ-SPT |
2022-03-08 10:40 |
Online |
Online |
A Study on Self Destructive Tamper Resistant Software utilizing Return-Oriented Programming (Part 2) Kazuomi Oishi (SIST) ICSS2021-69 |
Taking into account CPU-level ROP (Return-Oriented Programming) defenses such as Intel CET, we study implementation feas... [more] |
ICSS2021-69 pp.61-65 |
ICSS |
2021-11-29 13:25 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
A Study on Tamper Resistance of Trusted Execution Environment Kazuomi Oishi (SIST) ICSS2021-47 |
A Trusted Execution Environment (TEE) provides isolated execution inside a TEE from the outside. The outside environment... [more] |
ICSS2021-47 pp.7-12 |
ICSS |
2020-11-26 16:25 |
Online |
Online |
A Study on Anonymous Identifiers and its Applications Kazuomi Oishi (SIST) ICSS2020-25 |
As computer network spreads, identifiers with anonymity is required for privacy protection. IPv6 temporary addresses are... [more] |
ICSS2020-25 pp.32-37 |
ICSS, IPSJ-SPT |
2020-03-03 16:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Study on Implementation of Anonymous Public-Key Certificates based on Elliptic Curve Kazuomi Oishi (SIST) ICSS2019-107 |
[more] |
ICSS2019-107 pp.341-344 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 14:10 |
Kochi |
Kochi University of Technology |
Anonymous Public-Key Certificates based on Elliptic Curve Kazuomi Oishi (SIST) ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56 |
Anonymous public-key certificates can guarantee anonymity of the certificate users and are useful for applications in wh... [more] |
ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56 pp.347-352 |
ISEC, COMP |
2017-12-21 16:40 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
Implementation Difficulty of Dynamic Self-Modifying Based Self Destructive Tamper Response Kazuomi Oishi (SIST) ISEC2017-82 COMP2017-36 |
Tamper resistant software, which has sufficient resistance against analysis and attack, is a necessary and important tec... [more] |
ISEC2017-82 COMP2017-36 pp.67-74 |
ICSS |
2016-11-25 15:45 |
Kanagawa |
Institute of Information Security |
Report on WhibOx 2016 White-Box Cryptography and Obfuscation Kazuomi Oishi (SIST) ICSS2016-43 |
A report on WhibOx 2016 is presented. WhibOx 2016 is a one-time workshop on white-box cryptogra-phy and obfuscation. It ... [more] |
ICSS2016-43 pp.27-29 |
ISEC |
2016-09-02 14:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Tamper Resistant Software utilizing Data Memory Kazuomi Oishi (SIST) ISEC2016-45 |
We study a class of tamper resistant software that can work on a computer on which self-modifying code might not necessa... [more] |
ISEC2016-45 pp.43-48 |
IA, ICSS |
2015-06-11 16:25 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Report on the 23rd USENIX Security Symposium Shinichi Matsumoto (ISIT), Kazuomi Oishi (SIST), Kuniyasu Suzaki (AIST) IA2015-8 ICSS2015-8 |
[more] |
IA2015-8 ICSS2015-8 pp.39-44 |
ICSS |
2015-03-04 15:55 |
Okinawa |
Meio Univiersity |
An Experimental Implementation of Self Destructive Tamper Resistant Software and Its Evaluation Kazuomi Oishi (SIST), Naoki Yoshida, Naoki Watanabe, Jun'ichi Sakamoto, Tsutomu Matsumoto (YNU) ICSS2014-99 |
Self destructive tamper resistant software (SDTRS) has strong resistance
against attacker's analysis or modification
... [more] |
ICSS2014-99 pp.217-222 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 11:30 |
Hokkaido |
San-Refure Hakodate |
Experimental Platform for CAN Kazuomi Oishi (Shizuoka Inst. of Science and Tech.) ISEC2014-17 SITE2014-12 ICSS2014-21 EMM2014-17 |
Embedded systems are used for various purposes and are widely prevalent.
It turned out that embedded systems for which ... [more] |
ISEC2014-17 SITE2014-12 ICSS2014-21 EMM2014-17 pp.81-87 |
ISEC |
2013-12-11 16:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Storage Encryption Scheme: Unconditionally Secure Encryption of Unlimited Number of Keys using A Fixed Secret (Part 2) Kazuomi Oishi (Shizuoka Inst. of Science and Tech.) ISEC2013-80 |
A storage encryption scheme is studied. In a storage encryption scheme, data encryption and key encryption are executed.... [more] |
ISEC2013-80 pp.47-51 |
ISEC |
2013-12-11 16:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study on An Analysis Prevention Scheme for Embedded System Firmware Kazuomi Oishi (Shizuoka Inst. of Science and Tech.) ISEC2013-81 |
There are increasing attacks against embedded system software as well as PC software. Software of embedded system is cal... [more] |
ISEC2013-81 pp.53-57 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 16:35 |
Akita |
Akita University |
A Tamper Resistant Software Construction Method Based on Self Integrity Verification and Self-Modifying Kazuomi Oishi, Tsutomu Matsumoto (Yokohama National Univ.) ISEC2009-39 SITE2009-31 ICSS2009-53 |
A method of constructing tamper resistant software resistant to
malicious modification is proposed.
It uses a primit... [more] |
ISEC2009-39 SITE2009-31 ICSS2009-53 pp.221-228 |