Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 14:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Non-profiled Side-Channel Attacks by using Clustering Scores in Deep Learning model (2)
-- Attacks by using Models to Predict Ciphertext against Hardware-implemented AES with Countermeasures -- Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) ISEC2023-15 SITE2023-9 BioX2023-18 HWS2023-15 ICSS2023-12 EMM2023-15 |
[more] |
ISEC2023-15 SITE2023-9 BioX2023-18 HWS2023-15 ICSS2023-12 EMM2023-15 pp.7-12 |
HWS |
2023-04-14 15:35 |
Oita |
(Primary: On-site, Secondary: Online) |
Object Generation - Backdoor Attack against Object-Detection DNN Triggered by Fault Injection into MIPI Takumi Takubo, Tatsuya Oyama, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ.) HWS2023-6 |
Backdoor attacks that induce misclassification by poisoning training data and adding specific patterns (trigger marks) t... [more] |
HWS2023-6 pp.20-25 |
HWS, VLD |
2023-03-03 15:45 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Study of Intrinsic ID extracted from RG-DTM Arbiter PUF implemented on FPGA Mika Sakai, Tatsuya Oyama, Kota Yoshida (Ritsumeikan Univ.), Yohei Hori, Toshihiro Katashita (AIST), Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) VLD2022-111 HWS2022-82 |
We studied the implementation method of PUF for generating a unique ID on FPGA. We adopted a method of controlling the p... [more] |
VLD2022-111 HWS2022-82 pp.209-214 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2022-11-30 16:40 |
Kumamoto |
(Primary: On-site, Secondary: Online) |
Evaluation of Model Quantization Method on Vitis-AI for Mitigating Adversarial Examples Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) VLD2022-51 ICD2022-68 DC2022-67 RECONF2022-74 |
Adversarial examples (AEs) are security threats in deep neural networks (DNNs). One of the countermeasures is adversaria... [more] |
VLD2022-51 ICD2022-68 DC2022-67 RECONF2022-74 pp.182-187 |
HWS, ICD |
2022-10-25 13:50 |
Shiga |
(Primary: On-site, Secondary: Online) |
Fundamental Study of Adversarial Examples Created by Fault Injection Attack on Image Sensor Interface Tatsuya Oyama, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ.) HWS2022-36 ICD2022-28 |
Adversarial examples (AEs), which cause misclassification by adding subtle perturbations to input images, have been prop... [more] |
HWS2022-36 ICD2022-28 pp.35-40 |
HWS, ICD |
2022-10-25 16:40 |
Shiga |
(Primary: On-site, Secondary: Online) |
A Study on Small Area HMAC-SHA256 Circuit suitable for CMOS Image Sensor Yu Sekioka, Tatsuya Oyama, Hayato Tatsuno, Kota Yoshida, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ) HWS2022-42 ICD2022-34 |
In order to realize data integrity and authentication for the edge imaging devices and to prevent the image information ... [more] |
HWS2022-42 ICD2022-34 pp.70-75 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 15:15 |
Online |
Online |
Revealing PUF Responses by Differential Power Analysis against Reed-Muller-Code-based Fuzzy Extractor Soma Watanabe, Yuta Fukuda, Tatsuya Oyama, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ) ISEC2022-12 SITE2022-16 BioX2022-37 HWS2022-12 ICSS2022-20 EMM2022-20 |
IoT devices that use the Physically Unclonable Function (PUF) response to generate a secret key has been proposed. Since... [more] |
ISEC2022-12 SITE2022-16 BioX2022-37 HWS2022-12 ICSS2022-20 EMM2022-20 pp.29-34 |
HWS |
2022-04-26 10:55 |
Tokyo |
AIST Tokyo Waterfront (Annex) (Primary: On-site, Secondary: Online) |
Deep Learning Side-Channel Attacks against Hardware-Implemented Lightweight Cipher Midori64 Madoka Sako, Kunihiro Kuroda, Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) HWS2022-2 |
Midori is a lightweight cipher and it is developed to achieve superior circuit size, low latency, and low power consumpt... [more] |
HWS2022-2 pp.7-12 |
HWS |
2022-04-26 11:20 |
Tokyo |
AIST Tokyo Waterfront (Annex) (Primary: On-site, Secondary: Online) |
Deep Learning-based Side-Channel Attacks against Software-Implemented RSA using Binary Exponentiation with Dummy Multiplication Seiya Shimada, Kunihiro Kuroda, Yuta Fukuda, Kouta Yoshida, Takeshi Fujino (Ritsumeikan Univ.) HWS2022-3 |
Recently, deep learning-based side-channel attacks (DL-SCA) against symmetric key cryptography such as AES have been rep... [more] |
HWS2022-3 pp.13-18 |
VLD, HWS [detail] |
2022-03-08 13:25 |
Online |
Online |
A Study on Small Area Circuits for CMOS Image Sensors with Message Authentication Codes (1)
-- Drive Circuit and Pixel Array Configuration -- Yoshihiro Akamatsu, Hiroaki Ogawa, Tatsuya Oyama, Hayato Tatsuno, Yu Sekioka, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ) VLD2021-97 HWS2021-74 |
In edge AI, the information acquired by sensors is classified or recognized at the edge, and therefore, guaranteeing the... [more] |
VLD2021-97 HWS2021-74 pp.117-122 |
VLD, HWS [detail] |
2022-03-08 13:50 |
Online |
Online |
A Study on Small Area Circuits for CMOS Image Sensor with Message Authentication codes (2)
-- Code generation circuit -- Yu Sekioka, Hiroaki Ogawa, Hayato Tatsuno, Tatsuya Oyama, Yoshihiro Akamatsu, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ) VLD2021-98 HWS2021-75 |
In edge AI (Artificial Intelligence) computing, information acquired by sensors is processed with distributed IoT device... [more] |
VLD2021-98 HWS2021-75 pp.123-128 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 14:50 |
Online |
Online |
Deep Learning Side-Channel Attacks against Unprotected AES and RSM-AES Implemented in ASIC Yuta Fukuda, Kota Yoshida, Hisashi Hashimoto, Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29 |
The cryptographic key can be revealed by exploiting side-channel information such as power traces under operation.
Rec... [more] |
ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29 pp.86-91 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 15:30 |
Online |
Online |
Implimentation of RISC-V TEE using PUF as Root of Trust Kota Yoshida (Ritsumeikan Univ.), Kuniyasu Suzaki (AIST), Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-25 SITE2021-19 BioX2021-26 HWS2021-25 ICSS2021-30 EMM2021-30 |
In society 5.0, acquiring trustworthy data from a huge amount of IoT devices in physical spaces, it is important to veri... [more] |
ISEC2021-25 SITE2021-19 BioX2021-26 HWS2021-25 ICSS2021-30 EMM2021-30 pp.92-97 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 15:55 |
Online |
Online |
Evaluation of TRNG Using CMOS Image Sensor Hayato Tatsuno, Tatsuya Oyama, Masayoshi Shirahata, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-26 SITE2021-20 BioX2021-27 HWS2021-26 ICSS2021-31 EMM2021-31 |
Recently, the number of IoT devices has been increasing rapidly, and cryptographic functions such as authentication, key... [more] |
ISEC2021-26 SITE2021-20 BioX2021-27 HWS2021-26 ICSS2021-31 EMM2021-31 pp.98-103 |
HWS, VLD [detail] |
2021-03-04 13:00 |
Online |
Online |
Design of Area-Efficient Response Generator for CMOS Image Sensor PUF Masanori Aoki, Shunsuke Okura, Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) VLD2020-82 HWS2020-57 |
(To be available after the conference date) [more] |
VLD2020-82 HWS2020-57 pp.79-84 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-21 10:50 |
Online |
Online |
Adversarial scan attack against ICP algorithm for pose estimation on LiDAR-based SLAM Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) ISEC2020-26 SITE2020-23 BioX2020-29 HWS2020-19 ICSS2020-13 EMM2020-23 |
An autonomous robot is controlled on physical information acquired by various sensors. Some physical attacks are propose... [more] |
ISEC2020-26 SITE2020-23 BioX2020-29 HWS2020-19 ICSS2020-13 EMM2020-23 pp.81-86 |
HWS, VLD [detail] |
2020-03-07 10:30 |
Okinawa |
Okinawa Ken Seinen Kaikan (Cancelled but technical report was issued) |
Causes of Entropy Loss on Non-IID PUFs and their Entropy Estimations (1) Mitsuru Shiozaki (Ritsumeikan Univ.), Yohei Hori (AIST), Shunsuke Okura, Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) VLD2019-138 HWS2019-111 |
Recently, evaluation items and evaluation schemes of Physically Unclonable Functions (PUFs) are discussed in internation... [more] |
VLD2019-138 HWS2019-111 pp.257-262 |
HWS, VLD [detail] |
2020-03-07 10:55 |
Okinawa |
Okinawa Ken Seinen Kaikan (Cancelled but technical report was issued) |
Causes of Entropy Loss on Non-IID PUFs and their Entropy Estimations (2) Mitsuru Shiozaki (Ritsumeikan Univ.), Yohei Hori (AIST), Shunsuke Okura, Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) VLD2019-139 HWS2019-112 |
Recently, evaluation items and evaluation schemes of Physically Unclonable Functions (PUFs) are discussed in internation... [more] |
VLD2019-139 HWS2019-112 pp.263-268 |
HWS (2nd) |
2019-12-06 16:00 |
Tokyo |
Asakusabashi Hulic Conference |
[Poster Presentation]
Model Reverse-Engineering Attack using Correlation Power Analysis against Systolic Array Based Neural Network Accelerator Kota Yoshida, Shunsuke Okura, Mitsuru Shiozaki, Takaya Kubota, Takeshi Fujino (Ritsumeikan Univ.) |
[more] |
|
VLD, DC, CPSY, RECONF, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC (Joint) [detail] |
2019-11-15 09:15 |
Ehime |
Ehime Prefecture Gender Equality Center |
A Study on Dependence between Performance Metrics of PUFs and the Number of Response Bits using PUF Numerical Model Tatsuya Oyama, Masayoshi Shirahata, Mitsuru Shiozaki, Shunsuke Okura (Ritsumeikan Univ.), Yohei Hori (AIST), Takeshi Fujino (Ritsumeikan Univ.) ICD2019-33 IE2019-39 |
Recently, performance metrics of Physically Unclonable Function (PUF) are discussed toward international standardization... [more] |
ICD2019-33 IE2019-39 pp.25-30 |