Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SAT, SANE (Joint) |
2024-02-09 13:45 |
Kagoshima |
AmaHome PLAZA (Amami City Shimin Koryu Center) (Primary: On-site, Secondary: Online) |
Cyber Threat Analysis for Nano-Satellites Keika Mori, Ryoya Furukawa, Yuta Nakagawa, Kotaro Saito, Yusuke Yamamoto, FajardoTapia Isai, Shogo Suzuki, Hiroshi Kumagai, Masaki Kamizono (DTCY) SANE2023-112 |
The number of launches of nano-satellites is increasing due to more frequent launch opportunities and lower development ... [more] |
SANE2023-112 pp.49-54 |
IA |
2024-01-25 16:10 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Router Security Assessment Using CAPEC Vulnerability Assessment Criteria Yu-Chaing Wang, Tai-Ying Chiu, Bor-Yao Tseng, Bagus Tri Atmaja, Jiann-Liang Chen, Shih-Ping Chiu (NTUST), Jian-Chang Hsu (ITRI) IA2023-62 |
Our research addresses the nexus of router performance and security in contemporary cyberinfrastructure. Routers, pivota... [more] |
IA2023-62 pp.30-36 |
IA |
2024-01-25 16:10 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Analyzing Cybersecurity Datasets
-- Enhancing Security throughout the Data Life Cycle -- Chidchanok Choksuchat, Sorawit Khamnaewnak, Siwakorn Kasikam, Chanin Maiprom, Suwimon Bureekarn (PSU) IA2023-63 |
Our study identifies and prevents threats in real-time, particularly focusing on the publishing stage of the data lifecy... [more] |
IA2023-63 pp.37-39 |
IA |
2024-01-25 16:40 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Strengthening Cybersecurity with Data Analytics
-- A Web Tool for Secure Exploration of CVE Data -- Chidchanok Choksuchat, Sorawit Khamnaewnak, Chanin Maiprom, Suwimon Bureekarn, Touchai Angchuan, Sinchai Kamonphiwong, Thossaporn Kamolphiwong (PSU) IA2023-68 |
In the realm of Higher Education, the sophistication of cyberattacks necessitates a departure from traditional security ... [more] |
IA2023-68 pp.48-51 |
SIP, IT, RCS |
2024-01-18 17:35 |
Miyagi |
(Primary: On-site, Secondary: Online) |
A Study on Decoding Performance Improvement by Using Non-binary LDPC Codes in Outer Channel Coding-Concatenated Chaos Coded Modulation Ryo Tozawa, Seiya Yamashita, Eiji Okamoto (NITech), Horiike Naoto, Tetsuya Yamamoto (Panasonic) IT2023-55 SIP2023-88 RCS2023-230 |
With the rapid expansion of the Internet of Things (IoT) in recent years, the need to improve the confidentiality of wir... [more] |
IT2023-55 SIP2023-88 RCS2023-230 pp.133-138 |
ED, MWPTHz |
2023-12-21 16:45 |
Miyagi |
RIEC, Tohoku Univ. (Primary: On-site, Secondary: Online) |
Demonstration of a secure wireless communication system based on XOR operation between two data in terahertz waves Takuya Yano, Ming Che, Hanwei Chen, Naoya Seiki, Takashi Shiramizu, Yuya Mikami (Kyushu Univ.), Yuta Ueda (NTT), Kazutoshi Kato (Kyushu Univ.) ED2023-56 MWPTHz2023-66 |
Future wireless communications will require high security as well as high capacity. We have proposed a wireless communic... [more] |
ED2023-56 MWPTHz2023-66 pp.16-19 |
ICM, NS, CQ, NV (Joint) |
2023-11-21 13:15 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
Security Evaluation of Low-latency Cipher based on Improved Simon against Deep Learning Analysis using Profiled Power Consumption Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2023-114 |
Society 5.0 aims to solve problems in social systems through the intercommunication of small devices. On the other hand,... [more] |
NS2023-114 pp.20-25 |
ICM, NS, CQ, NV (Joint) |
2023-11-22 12:30 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
[Invited Talk]
Secure Middlebox Communication over TLS against Middlebox Compromise Toru Hasegawa, Kentaro Kita, Junji Takemasa, Yuki Koizumi (Osaka Univ.) CQ2023-46 |
A large portion of Internet traffic passes through middleboxes that read or modify messages. However, such middleboxes a... [more] |
CQ2023-46 pp.50-53 |
ICM, NS, CQ, NV (Joint) |
2023-11-22 09:50 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
A survey on suitable hook points for outbound packet monitoring using eBPF Masaya Okabe, Hiroshi Tsunoda (Tohtech) ICM2023-27 |
The use of VPNs and similar technologies has made it difficult to define network boundaries, and traditional boundary se... [more] |
ICM2023-27 pp.26-31 |
ICSS |
2023-11-16 13:00 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Implementation of Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities, and A Study on Its Large-scale Demonstration Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2023-51 |
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] |
ICSS2023-51 pp.1-6 |
ICSS |
2023-11-16 13:25 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Real time detection for replay-attack communication in control system Koushi Nishi, Yuichi Futa (TUT), Hiroyuki Okazaki (Shinshu University) ICSS2023-52 |
Attacks on control system in factory and power plant are increasing every year. Therefore, System that monitor communica... [more] |
ICSS2023-52 pp.7-14 |
MSS, CAS, IPSJ-AL [detail] |
2023-11-17 14:45 |
Okinawa |
|
Construction of criminal models using kernel density estimation Kenta Sakakura, Eiji Konaka (Meijo Univ.) CAS2023-80 MSS2023-50 |
Since the 2000s, security systems using autonomous mobile vehicles have begun to be put into practical use, and automati... [more] |
CAS2023-80 MSS2023-50 pp.107-112 |
ICSS |
2023-11-16 15:20 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Attack Verification and Evaluation of Incremental Fault Analysis against AES Encryption Processing Device Miran Tamagawa, Yuichi Futa (TUT), Takehiko Mieno (AVASYS), Hiroyuki Okazaki (Shinshu University) ICSS2023-56 |
In recent years,there has been a growing concern about the impact of fault analysis attack,which use hardware failures a... [more] |
ICSS2023-56 pp.35-41 |
ICSS |
2023-11-17 10:25 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Chameleon Hash Function with Forward-Security Pengxuan Wei, Atsuko Miyaji (Osaka Univ.), Yangguang Tian (University Of Surrey) ICSS2023-61 |
Chameleon Hash Function (CH) is a hash function with a public and secret key pair. CH is collision-resistant for users w... [more] |
ICSS2023-61 pp.70-76 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-16 09:55 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Primary: On-site, Secondary: Online) |
MTJ-PUF with Input Decoder and Evaluation of Machine Learning Resistance Takumi Kikuchi, Kimiyoshi Usami (SIT) VLD2023-44 ICD2023-52 DC2023-51 RECONF2023-47 |
Physically Unclonable Function (PUF), one of the LSI individual authentication techniques, is vulnerable to machine lear... [more] |
VLD2023-44 ICD2023-52 DC2023-51 RECONF2023-47 pp.82-87 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-16 13:20 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Primary: On-site, Secondary: Online) |
Tamper Resistance Evaluation on FPGA for Low-Latency Cipher Sonic Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52 |
Industry 5.0 promotes smart factories for system optimization by utilizing IoT and AI in the industrial field. The smart... [more] |
VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52 pp.101-105 |
LOIS, SITE, ISEC |
2023-11-09 10:50 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
[Invited Talk]
Security Technologies to Improve Content-Distribution and Broadcasting Services Kazuto Ogawa (NICT) ISEC2023-54 SITE2023-48 LOIS2023-12 |
Nowadays, technologies for information security have become essential in the world cyber-space.
PC users know their val... [more] |
ISEC2023-54 SITE2023-48 LOIS2023-12 p.1 |
LOIS, SITE, ISEC |
2023-11-09 13:30 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Optimum Median-Sum Fingerprinting for Winternitz One-Time Signature Motonari Honda, Yuichi Kaji (NU) ISEC2023-57 SITE2023-51 LOIS2023-15 |
Winternitz one-time signature (OTS) plays a core role in practical quantum-secure hash-based digital signature schemes. ... [more] |
ISEC2023-57 SITE2023-51 LOIS2023-15 pp.18-25 |
LOIS, SITE, ISEC |
2023-11-10 10:45 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
NTP Tunneling Threat Model Verification and Countermeasure Shinjisangeru Sugasawa, Hisayoshi Kunimune, Shigeaki Tanimoto (CIT) ISEC2023-64 SITE2023-58 LOIS2023-22 |
Fraudulent covert communication methods are techniques used by attackers to avoid detection of malicious communication b... [more] |
ISEC2023-64 SITE2023-58 LOIS2023-22 pp.66-71 |
SR |
2023-11-10 11:10 |
Miyagi |
(Primary: On-site, Secondary: Online) |
[Short Paper]
Model Sharing and Learning for Visually Secure Deep Joint Source Channel Coding Yuyang Fu, Katsuya Suto (UEC) SR2023-59 |
Research and development of Deep Joint Source Channel Coding (DeepJSCC) technology, which is a data-driven design of inf... [more] |
SR2023-59 pp.64-66 |