Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2023-11-16 13:25 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Real time detection for replay-attack communication in control system Koushi Nishi, Yuichi Futa (TUT), Hiroyuki Okazaki (Shinshu University) ICSS2023-52 |
Attacks on control system in factory and power plant are increasing every year. Therefore, System that monitor communica... [more] |
ICSS2023-52 pp.7-14 |
ICSS |
2023-11-16 13:50 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Device identification and attribute values consideration with browser fingerprint Takashi Tsukazaki, Yuichi Futa (TUT), Hiroyuki Okazaki (Shinshu Univ.), Hikofumi Suzuki (NII) ICSS2023-53 |
Browser fingerprinting is to identify website users by collecting information about device. Browser fingerprinting is us... [more] |
ICSS2023-53 pp.15-21 |
ICSS |
2023-11-16 15:20 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Attack Verification and Evaluation of Incremental Fault Analysis against AES Encryption Processing Device Miran Tamagawa, Yuichi Futa (TUT), Takehiko Mieno (AVASYS), Hiroyuki Okazaki (Shinshu University) ICSS2023-56 |
In recent years,there has been a growing concern about the impact of fault analysis attack,which use hardware failures a... [more] |
ICSS2023-56 pp.35-41 |
ICSS |
2023-11-17 13:55 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Analysis of the influence of DDoS attacks on Snort and legitimate users Yuki Kano, Yuichi Futa (TUT), Hikofumi Suzuki (NII), Hiroyuki Okazaki (Shinshu University) ICSS2023-65 |
(To be available after the conference date) [more] |
ICSS2023-65 pp.101-107 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 16:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Analysis of effective attribute values on risk-based authentication with browser fingerprint Takashi Tsukazaki, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) ISEC2023-19 SITE2023-13 BioX2023-22 HWS2023-19 ICSS2023-16 EMM2023-19 |
Browser fingerprinting is to identify website users by collecting information about device. Browser fingerprint is used ... [more] |
ISEC2023-19 SITE2023-13 BioX2023-22 HWS2023-19 ICSS2023-16 EMM2023-19 pp.30-36 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 18:05 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Proposal of Kaminsky Attack Detection Method Using Blockchain Technology Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (SU) NS2022-116 |
The Kaminsky attack is known as an efficient and successful method for DNS cache poisoning attacks. Takahashi et al. pro... [more] |
NS2022-116 pp.91-96 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 16:15 |
Online |
Online |
Identification and tracking of website users in consideration of privacy in browser fingerprinting Takashi Tsukazaki, Yuichi Futa (TUT), Tomomichi Suzuki (PitApp), Hiroyuki Okazaki (Shinshu Univ.) ISEC2022-28 SITE2022-32 BioX2022-53 HWS2022-28 ICSS2022-36 EMM2022-36 |
Browser fingerprinting is to identify website users by collecting information about device. In our previous research, we... [more] |
ISEC2022-28 SITE2022-32 BioX2022-53 HWS2022-28 ICSS2022-36 EMM2022-36 pp.124-130 |
NS |
2022-05-13 10:15 |
Kyoto |
Rakuyu Kaikan, Kyoto Univ. + Online (Primary: On-site, Secondary: Online) |
Construction of attack implementation environment using VirtualBox and Proposal of a new method against CDN Fumiya Anzai, Hiroyuki Okazaki, Hikohumi Suzuki (Shinshu Univ) NS2022-16 |
In recent years, the number of cases which attackers launch DoS attacks against web servers has been increasing. Moreove... [more] |
NS2022-16 pp.40-46 |
ICSS, IPSJ-SPT |
2022-03-07 15:20 |
Online |
Online |
Evaluation of Detection System of DNS Cache Poisoning Using Blockchain Technology Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) ICSS2021-65 |
DNS cache poisoning is an attack on DNS essential to use of Internet communications. Takahashi et al. proposed a detecti... [more] |
ICSS2021-65 pp.38-43 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 11:20 |
Online |
Online |
Fake Command Attack Detection of industrial Control System with SVM Yuki Harada, Yuichi Futa (TUT), Hiroyuki Okazaki (Shinshu Univ.) ISEC2021-15 SITE2021-9 BioX2021-16 HWS2021-15 ICSS2021-20 EMM2021-20 |
Recently, industrial control systems (ICS) are introduced TCP/IP protocol and connect internet via office network. Secur... [more] |
ISEC2021-15 SITE2021-9 BioX2021-16 HWS2021-15 ICSS2021-20 EMM2021-20 pp.35-40 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 11:20 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Experiment of DDoS Attack Detection with UTM Log Analysis Using Decision Tree Aoshi Fujioka, Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) NS2019-123 |
In recent years, AI technology such as machine learning has been developed and the number of application examples are in... [more] |
NS2019-123 pp.19-25 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 11:45 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Analysis of UTM traffic log using LLL algorithm Takuya Morita, Hikofumi Suzuki, Hiroyuki Okazaki (Shinshu Univ.) NS2019-124 |
In recent years, with the spread of information communication equipment and the development of the Internet, various ser... [more] |
NS2019-124 pp.27-30 |
ISEC, SITE, LOIS |
2019-11-02 10:50 |
Osaka |
Osaka Univ. |
Detection System of DNS Cache Poisoning Using Blockchain Technology Tomohiro Takahashi, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (SU) ISEC2019-78 SITE2019-72 LOIS2019-37 |
Recently we enjoy the benefits of the Internet.
Internet is working by various network services.
The Domain Name Syst... [more] |
ISEC2019-78 SITE2019-72 LOIS2019-37 pp.107-112 |
IA, ICSS |
2019-06-07 10:20 |
Miyagi |
Research Institute for Electrical Communication, Tohoku University |
Development of safety confirmation system with authentication log as life log Takuya Morita, David Asano, Hikohumi Suzuki, Hiroyuki Okazaki (Shinshu Univ.) IA2019-6 ICSS2019-6 |
In recent years, We can confirm the safety of someone at a certain moment, but it is hard to confirm the safety of peopl... [more] |
IA2019-6 ICSS2019-6 pp.27-30 |
MW |
2017-11-09 14:20 |
Okinawa |
Miyakojima Marin Terminal Bldg. |
A 30-W class X-band GaN-on-Si MMIC Power Amplifier with a GaAs MMIC Output Matching Circuit Jun Kamioka, Yoshifumi Kawamura, Kazuhiko Nakahara, Hiroyuki Okazaki, Masatake Hangai, Koji Yamanaka (Mitsubishi Electric Corporation) MW2017-122 |
[more] |
MW2017-122 pp.57-60 |
MW, ED |
2017-01-27 11:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An X-band Low Loss/High Power SPST Switch Using GaN on Si Ryota Komaru, Masatake Hangai, Kazuhiko Nakahara, Hiroyuki Okazaki, Koji Yamanaka (Mitsubishi Electric) ED2016-106 MW2016-182 |
An X-band low loss and high power switch using GaN on Si has been developed. The high power switch utilized asymmetric c... [more] |
ED2016-106 MW2016-182 pp.53-56 |
MW, ED |
2017-01-27 14:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A compact 8.5-10.5 GHz GaN-on-Si MMIC Amplifier for a low cost transmitter Jun Kamioka, Masatake Hangai, Kazuhiko Nakahara (Mitsubishi Electric Corp.), Hiroyuki Okazaki (Mitsubishi Electric Corporation), Koji Yamanaka (Mitsubishi Electric Corp.) ED2016-109 MW2016-185 |
[more] |
ED2016-109 MW2016-185 pp.69-73 |
ET |
2012-11-17 11:15 |
Saga |
|
Content development for distance education for advanced university mathematics by Mizar Takaya Ido, Hiroyuki Okazaki, Hiroshi Yamazaki, Yasunari Shidama (Shinshu Univ) ET2012-55 |
Mizar project describes the formalization and proof of the current theorem using mathematical for-
malization descripti... [more] |
ET2012-55 pp.13-17 |
ISEC, LOIS |
2011-11-14 15:35 |
Osaka |
Osaka Electro-Communication University |
Formalization and Verification of Arithmetic Algorithms by Mizar Yoshiki Aoki, Hiroyuki Okazaki, Yasunari Shidama (Shinshu Univ.) ISEC2011-44 LOIS2011-38 |
In this report, we formalize some number theoretical algorithms,
Euclidean Algorithm and Extended Euclidean Algorithm
... [more] |
ISEC2011-44 LOIS2011-38 pp.69-74 |
ED, SDM |
2010-06-30 16:00 |
Tokyo |
Tokyo Inst. of Tech. Ookayama Campus |
Electrochemical formation of InP porous structures for their application to photoelectric conversion devices Hiroyuki Okazaki, Taketomo Sato, Naoki Yoshizawa, Tamotsu Hashizume (Hokkaido Univ) ED2010-71 SDM2010-72 |
[more] |
ED2010-71 SDM2010-72 pp.85-89 |