Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 13:35 |
Kochi |
Kochi University of Technology |
Proposal of Spam Filter by Applying Neural Network for Mitigating Catastrophic Forgetting Shuiti Kawahara, Lu Chen, Hiroyuki Inaba (KIT) ISEC2019-32 SITE2019-26 BioX2019-24 HWS2019-27 ICSS2019-30 EMM2019-35 |
The trend of spam mails is changing. Since, in recent years, spam mails sent from overseas mail serversare increasing, s... [more] |
ISEC2019-32 SITE2019-26 BioX2019-24 HWS2019-27 ICSS2019-30 EMM2019-35 pp.171-178 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 14:00 |
Kochi |
Kochi University of Technology |
Video Watermarking Using Difference of Persistent Homology in Consecutive Frames Takaya Kimura, Hiroyuki Inaba (KIT) ISEC2019-33 SITE2019-27 BioX2019-25 HWS2019-28 ICSS2019-31 EMM2019-36 |
Copyright infringement such as illegal copying and uploading video contents frequently happen in many
video distributio... [more] |
ISEC2019-33 SITE2019-27 BioX2019-25 HWS2019-28 ICSS2019-31 EMM2019-36 pp.179-186 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 14:25 |
Kochi |
Kochi University of Technology |
A simulation of a 3-D visual cryptography using holography Takumi Takazawa, Kazuhiro Suzuki, Naoki Takada (Kochi Univ.) ISEC2019-34 SITE2019-28 BioX2019-26 HWS2019-29 ICSS2019-32 EMM2019-37 |
With the development of technologies for acquiring and recording data of 3-D objects, their security and privacy protect... [more] |
ISEC2019-34 SITE2019-28 BioX2019-26 HWS2019-29 ICSS2019-32 EMM2019-37 pp.187-192 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 09:30 |
Kochi |
Kochi University of Technology |
SecureHID: Securing the USB Interface Jan Goette (Waseda Univ.), Naoto Yanai (Osaka Univ.), Tatsuya Mori (Waseda Univ.) ISEC2019-35 SITE2019-29 BioX2019-27 HWS2019-30 ICSS2019-33 EMM2019-38 |
[more] |
ISEC2019-35 SITE2019-29 BioX2019-27 HWS2019-30 ICSS2019-33 EMM2019-38 pp.199-206 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 09:55 |
Kochi |
Kochi University of Technology |
A Performance Analysis of Supersingular Isogeny Diffie-Hellman with Several Classes of the Quadratic Extension Fields Yuki Nanjo (Okayama Univ.), Masaaki Shirase (Future Univ. Hakodate), Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) ISEC2019-36 SITE2019-30 BioX2019-28 HWS2019-31 ICSS2019-34 EMM2019-39 |
It is well-known that the class of binomial extension field (BEF) is widely used to construct a quadratic extension fiel... [more] |
ISEC2019-36 SITE2019-30 BioX2019-28 HWS2019-31 ICSS2019-34 EMM2019-39 pp.207-214 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 10:20 |
Kochi |
Kochi University of Technology |
Privacy for Documents and Prototype of Risk Evaluation Tool Tomoaki Mimoto, Shinsaku Kiyomoto (KDDI Research), Koji Kitamura (AIST), Atsuko Miyaji (Osaka Univ.) ISEC2019-23 SITE2019-17 BioX2019-15 HWS2019-18 ICSS2019-21 EMM2019-26 |
[more] |
ISEC2019-23 SITE2019-17 BioX2019-15 HWS2019-18 ICSS2019-21 EMM2019-26 pp.113-118 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 09:05 |
Kochi |
Kochi University of Technology |
Instruction Replacement Fault Attack for TVC using Double Laser Station Tomoro Suzuki, Junichi Sakamoto, Tsutomu Matsumoto (YNU) ISEC2019-38 SITE2019-32 BioX2019-30 HWS2019-33 ICSS2019-36 EMM2019-41 |
A powerful attack method called instruction replacement attack has been reported. The method manipulates any 1bit of a m... [more] |
ISEC2019-38 SITE2019-32 BioX2019-30 HWS2019-33 ICSS2019-36 EMM2019-41 pp.221-225 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 09:30 |
Kochi |
Kochi University of Technology |
Electromagnetic Analysis Attacks on an ASIC Implementation of a Ring-Oscillator PUF Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ.) ISEC2019-39 SITE2019-33 BioX2019-31 HWS2019-34 ICSS2019-37 EMM2019-42 |
Physically unclonable functions (PUFs) are assumed to provide high tamper resistance against counterfeits and hardware a... [more] |
ISEC2019-39 SITE2019-33 BioX2019-31 HWS2019-34 ICSS2019-37 EMM2019-42 pp.227-234 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 09:55 |
Kochi |
Kochi University of Technology |
Fundamental Study on an Estimation Method of Irradiate Frequencies to Forcibly Cause Electromagnetic Information Leakage Shugo Kaji (NAIST), Masahiro Kinugawa (NIT), Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) ISEC2019-40 SITE2019-34 BioX2019-32 HWS2019-35 ICSS2019-38 EMM2019-43 |
The threats of electromagnetic (EM) information leakage from the input/output (I/O) signal of an IC mounted on a de-vice... [more] |
ISEC2019-40 SITE2019-34 BioX2019-32 HWS2019-35 ICSS2019-38 EMM2019-43 pp.235-238 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 10:20 |
Kochi |
Kochi University of Technology |
Instrumentation Security of Ranging Pulse LIDARs Using Multiple Photodetectors Tatsuya Suehiro, Ryuya Ichinose, Satoru Sakurazawa, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2019-41 SITE2019-35 BioX2019-33 HWS2019-36 ICSS2019-39 EMM2019-44 |
Instrumentation security, that is the security at the sensing or instrumentation stage, is recognized as a major issue i... [more] |
ISEC2019-41 SITE2019-35 BioX2019-33 HWS2019-36 ICSS2019-39 EMM2019-44 pp.239-242 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 09:30 |
Kochi |
Kochi University of Technology |
Generation of Family Resemblance Inference Rules by Boid Annotation and Labeled-LDA
-- A Machine Learning Approach to Integrate Inference Attack Analysis and Covert Channel Attack Analysis -- Kosuke Kurebayashi, Tetsuya Morizumi, Hirotsugu Kinoshita (KU) ISEC2019-42 SITE2019-36 BioX2019-34 HWS2019-37 ICSS2019-40 EMM2019-45 |
In this paper we propose a method for machine learning similar chains of words (word chains) similar to "rules for infer... [more] |
ISEC2019-42 SITE2019-36 BioX2019-34 HWS2019-37 ICSS2019-40 EMM2019-45 pp.243-249 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 09:55 |
Kochi |
Kochi University of Technology |
Implicit Guidance & Control at OODA Loop using as Countermeasures
-- against SMS phishing -- Yuidhi Takigawa (N.D.A.), Takeo Tatsumi (O.U.J/) ISEC2019-43 SITE2019-37 BioX2019-35 HWS2019-38 ICSS2019-41 EMM2019-46 |
This document describes the benefit of “‘Implicit Guidance & Control” in the OODA loop as a countermeasure against phish... [more] |
ISEC2019-43 SITE2019-37 BioX2019-35 HWS2019-38 ICSS2019-41 EMM2019-46 pp.251-258 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 10:20 |
Kochi |
Kochi University of Technology |
Server Configuration Training Including Vulnerability Assessment and Remediation process Daisuke Suzuki (Hokuriku Univ.) ISEC2019-44 SITE2019-38 BioX2019-36 HWS2019-39 ICSS2019-42 EMM2019-47 |
Penetration testing exercise as a part of the information security education for undergraduate students is effective on ... [more] |
ISEC2019-44 SITE2019-38 BioX2019-36 HWS2019-39 ICSS2019-42 EMM2019-47 pp.259-263 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 10:55 |
Kochi |
Kochi University of Technology |
Investigation on Blockchain-based Malware Information Sharing Method in Malware Detection System Ryusei Fuji, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama (Univ. of Miyazaki), Mirang Park (Kanagawa Inst. of Tech.), Norio Shiratori (Chuo Univ.), Naonobu Okazaki (Univ. of Miyazaki) ISEC2019-45 SITE2019-39 BioX2019-37 HWS2019-40 ICSS2019-43 EMM2019-48 |
Rapid malware detection is very important because malware causes serious damage to the modern society based on the Inter... [more] |
ISEC2019-45 SITE2019-39 BioX2019-37 HWS2019-40 ICSS2019-43 EMM2019-48 pp.293-298 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 11:20 |
Kochi |
Kochi University of Technology |
Automatic Node Manipulation System for Active Monitoring Environment Shingo Yasuda, Nobuyuki Kanaya, Yu Tsuda, Satoshi Ohta, Ryosuke Miura, Daisuke Inoue (NICT) ISEC2019-46 SITE2019-40 BioX2019-38 HWS2019-41 ICSS2019-44 EMM2019-49 |
[more] |
ISEC2019-46 SITE2019-40 BioX2019-38 HWS2019-41 ICSS2019-44 EMM2019-49 pp.299-304 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 11:45 |
Kochi |
Kochi University of Technology |
A Study on Suppression of Inappropriate Use of Illegal Contents Based on Conformity Caused by Normative Influence Hiroki Yamaguchi, Kazuhiro Kono (Kansai Univ.) ISEC2019-47 SITE2019-41 BioX2019-39 HWS2019-42 ICSS2019-45 EMM2019-50 |
Copyright infringement by illegal contents uploaded on the Internet has become a social issue. However, it is hard to su... [more] |
ISEC2019-47 SITE2019-41 BioX2019-39 HWS2019-42 ICSS2019-45 EMM2019-50 pp.305-310 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 12:10 |
Kochi |
Kochi University of Technology |
Recording device identification based on audio distortion depending on system-on-chip Akira Nishimura (Tokyo Univ. Info. Sci.) ISEC2019-48 SITE2019-42 BioX2019-40 HWS2019-43 ICSS2019-46 EMM2019-51 |
This study addresses device-specific distortion observed in recorded
audio, to identify a built-in system-on-a-chip (... [more] |
ISEC2019-48 SITE2019-42 BioX2019-40 HWS2019-43 ICSS2019-46 EMM2019-51 pp.311-316 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 10:55 |
Kochi |
Kochi University of Technology |
Stochastic Existence Connecting Logos that are not necessarily completely divided and Language Games
-- Limitations of Security Models and the Possibility of Artificial Intelligence -- Tetsuya Morizumi (KU) ISEC2019-49 SITE2019-43 BioX2019-41 HWS2019-44 ICSS2019-47 EMM2019-52 |
In this paper we describe that AI architecture including input data in artificial intelligence system for Bayesian estim... [more] |
ISEC2019-49 SITE2019-43 BioX2019-41 HWS2019-44 ICSS2019-47 EMM2019-52 pp.317-324 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 11:20 |
Kochi |
Kochi University of Technology |
International regulatory trend survey report on AI
-- Focusing on the OECD Principles on AI -- Naonori Kato (KDDI Research), Masatomo Suzuki (Niigata Univ./RIKEN), Yoichiro Itakura (Hikari Sogoh Law Offices/RIKEN), Yosuke Murakami (KDDI Research) ISEC2019-50 SITE2019-44 BioX2019-42 HWS2019-45 ICSS2019-48 EMM2019-53 |
[more] |
ISEC2019-50 SITE2019-44 BioX2019-42 HWS2019-45 ICSS2019-48 EMM2019-53 pp.325-331 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 11:45 |
Kochi |
Kochi University of Technology |
Development of the Ethics Assessment for Research & Innovation Guidelines under the SATORI project in Europe (1)
-- Background and Outline -- Takushi Otani (Kibi International Univ.), Hirotaka Osawa (Tsukuba Univ.), Minao Kukita (Nagoya Univ.), Reina Saijo (Kyoto Univ.) ISEC2019-51 SITE2019-45 BioX2019-43 HWS2019-46 ICSS2019-49 EMM2019-54 |
This presentation summarizes the background and outline of the European Commission (EC)’s Stakeholders Acting Together O... [more] |
ISEC2019-51 SITE2019-45 BioX2019-43 HWS2019-46 ICSS2019-49 EMM2019-54 pp.333-340 |