Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 13:00 |
Online |
Online |
Side-Channel Attacks on Post-Quantum KEMs Using Multi-class Classification Neural Network Yutaro Tanaka, Rei Ueno (Tohoku Univ.), Keita Xagawa, Akitra Ito, Junko Takahashi (NTT), Naofumi Homma (Tohoku Univ.) ISEC2022-7 SITE2022-11 BioX2022-32 HWS2022-7 ICSS2022-15 EMM2022-15 |
(To be available after the conference date) [more] |
ISEC2022-7 SITE2022-11 BioX2022-32 HWS2022-7 ICSS2022-15 EMM2022-15 pp.1-6 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 13:25 |
Online |
Online |
Revisit of Non Profiled Side Channel Analysis via Deep Learning Kentaro Imafuku, Shinichi Kawamura, Hanae Nozaki, Junichi Sakamoto, Saki Osuka (AIST) ISEC2022-8 SITE2022-12 BioX2022-33 HWS2022-8 ICSS2022-16 EMM2022-16 |
After a brief review of non-profile side channel analysis using deep learning, we propose some improved versions of the ... [more] |
ISEC2022-8 SITE2022-12 BioX2022-33 HWS2022-8 ICSS2022-16 EMM2022-16 pp.7-12 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 13:50 |
Online |
Online |
Randomness evaluation of TERO-based TRNG with a side-channel attack countermeasure Saki Osuka (AIST), Daisuke Fujimoto, Yuichi Hayashi (NAIST), Shinichi Kawamura (AIST) ISEC2022-9 SITE2022-13 BioX2022-34 HWS2022-9 ICSS2022-17 EMM2022-17 |
True random number generators (TRNGs) based on ring oscillators (ROs) are employed in many devices because they can be c... [more] |
ISEC2022-9 SITE2022-13 BioX2022-34 HWS2022-9 ICSS2022-17 EMM2022-17 pp.13-17 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 14:15 |
Online |
Online |
A Study for Predicting Correlation Power Analysis Results by Using High-SNR Plaintexts Selected Based on Linear Leakage Model Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) ISEC2022-10 SITE2022-14 BioX2022-35 HWS2022-10 ICSS2022-18 EMM2022-18 |
To reduce the number of traces for evaluating side-channel attack (SCA) resistance, some methods for performing correlat... [more] |
ISEC2022-10 SITE2022-14 BioX2022-35 HWS2022-10 ICSS2022-18 EMM2022-18 pp.18-22 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 14:50 |
Online |
Online |
Issues and Considerations for Improvement of Verification in ECDSA Attestation of Intel SGX Yagawa Takashi (Tsukuba Univ.), Suzaki Kuniyasu, Teruya Tadanori, Ohara Kazuma (AIST), Abe Hirotake (Tsukuba Univ.) ISEC2022-11 SITE2022-15 BioX2022-36 HWS2022-11 ICSS2022-19 EMM2022-19 |
Intel SGX is a kind of TEE (Trusted Execution Environment) and can protect the confidentiality and integrity of programs... [more] |
ISEC2022-11 SITE2022-15 BioX2022-36 HWS2022-11 ICSS2022-19 EMM2022-19 pp.23-28 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 15:15 |
Online |
Online |
Revealing PUF Responses by Differential Power Analysis against Reed-Muller-Code-based Fuzzy Extractor Soma Watanabe, Yuta Fukuda, Tatsuya Oyama, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ) ISEC2022-12 SITE2022-16 BioX2022-37 HWS2022-12 ICSS2022-20 EMM2022-20 |
IoT devices that use the Physically Unclonable Function (PUF) response to generate a secret key has been proposed. Since... [more] |
ISEC2022-12 SITE2022-16 BioX2022-37 HWS2022-12 ICSS2022-20 EMM2022-20 pp.29-34 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 15:40 |
Online |
Online |
Security of Systems that Automatically Authenticate a User's Credentials and Location using Wireless Technology Kazuki Tachibana, Junichi Sakamoto, Tsutomu Matsumoto (YNU) ISEC2022-13 SITE2022-17 BioX2022-38 HWS2022-13 ICSS2022-21 EMM2022-21 |
To enhance user convenience, there is a movement to automate certain processes in systems by performing authentication v... [more] |
ISEC2022-13 SITE2022-17 BioX2022-38 HWS2022-13 ICSS2022-21 EMM2022-21 pp.35-39 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 16:15 |
Online |
Online |
Security Assessment and Countermeasures for Magnetic Malfunction of Electromagnetic Relays Takumi Owada, Kazuki Tachibana, Tsutomu Matsumoto (YNU) ISEC2022-14 SITE2022-18 BioX2022-39 HWS2022-14 ICSS2022-22 EMM2022-22 |
Relays are used in many electrical and electronic devices, including switches and sensors. Some relays are electromagnet... [more] |
ISEC2022-14 SITE2022-18 BioX2022-39 HWS2022-14 ICSS2022-22 EMM2022-22 pp.40-45 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 16:40 |
Online |
Online |
Distance Spoofing Detection by LiDAR and Stereo Camera Ataru Kubo, Yuki Fukatsu, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2022-15 SITE2022-19 BioX2022-40 HWS2022-15 ICSS2022-23 EMM2022-23 |
Automatic driving vehicles use information obtained from onboard ranging sensors to recognize objects such as surroundin... [more] |
ISEC2022-15 SITE2022-19 BioX2022-40 HWS2022-15 ICSS2022-23 EMM2022-23 pp.46-51 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 17:05 |
Online |
Online |
Security Evaluation of Cryptographic Circuits with Laser Sensors by Double-Spot Laser Irradiation Masaki Chikano, Naoki Yoshida, Junichi Sakamoto, Syungo Hayashi, Tsutomu Matsumoto (YNU) ISEC2022-16 SITE2022-20 BioX2022-41 HWS2022-16 ICSS2022-24 EMM2022-24 |
A fault injection attack is an attack method that intentionally injects faults into a device to cause it to malfunction,... [more] |
ISEC2022-16 SITE2022-20 BioX2022-41 HWS2022-16 ICSS2022-24 EMM2022-24 pp.52-57 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 09:00 |
Online |
Online |
[Invited Talk]
Audio forensics and recording property estimation Akira Nishimura (TUIS) ISEC2022-17 SITE2022-21 BioX2022-42 HWS2022-17 ICSS2022-25 EMM2022-25 |
Audio forensics is a research field of media forensics for criminal
investigations and courts by utilizing acoustical... [more] |
ISEC2022-17 SITE2022-21 BioX2022-42 HWS2022-17 ICSS2022-25 EMM2022-25 p.58 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 10:15 |
Online |
Online |
Person Verification Using Evoked EEG by Ultrasound
-- Examination of Correlation in Fusing Features -- Yuta Ishikawa, Kotaro Mukai, Isao Nakanishi (Tottori Univ.) ISEC2022-18 SITE2022-22 BioX2022-43 HWS2022-18 ICSS2022-26 EMM2022-26 |
Person verification using evoked EEG by ultrasound has been studied.
From brain waves simultaneously measured at many e... [more] |
ISEC2022-18 SITE2022-22 BioX2022-43 HWS2022-18 ICSS2022-26 EMM2022-26 pp.59-63 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 10:40 |
Online |
Online |
Person Verification Using EEG Evoked by Ultrasound
-- Introduction of mutual features between electrodes -- Kotaro Mukai, Isao Nakanishi (Tottori Univ.) ISEC2022-19 SITE2022-23 BioX2022-44 HWS2022-19 ICSS2022-27 EMM2022-27 |
In user management, to realize continuous authentication of users, we have studied to use an electroencephalogram (EEG) ... [more] |
ISEC2022-19 SITE2022-23 BioX2022-44 HWS2022-19 ICSS2022-27 EMM2022-27 pp.64-69 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 11:05 |
Online |
Online |
A Study on Biometric Modality for Continuous Authentication of Smart Devices Yuka Watanabe, Yasushi Yamazaki (Kitakyushu Univ.) ISEC2022-20 SITE2022-24 BioX2022-45 HWS2022-20 ICSS2022-28 EMM2022-28 |
In recent years, with the rapid spread of smart devices, biometric authentication technology has been widely used as a u... [more] |
ISEC2022-20 SITE2022-24 BioX2022-45 HWS2022-20 ICSS2022-28 EMM2022-28 pp.70-75 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 11:30 |
Online |
Online |
Person verification using evoked EEG from imperceptible vibratory stimulation
-- Introduction of normalization into EEG spectral content ratio -- Hiroki Kobayashi, Hirotomo Nakashima, Isao Nakanishi (Tottori Univ.) ISEC2022-21 SITE2022-25 BioX2022-46 HWS2022-21 ICSS2022-29 EMM2022-29 |
In this study, we focus on the EEG as a biometrics that can be detected continuously with high confidentiality, and aim ... [more] |
ISEC2022-21 SITE2022-25 BioX2022-46 HWS2022-21 ICSS2022-29 EMM2022-29 pp.76-80 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 13:00 |
Online |
Online |
Investigation of credit card fraud model and deterrence method on SNS Zhixian Zhao, Shigeyuki Osada (JRI) ISEC2022-22 SITE2022-26 BioX2022-47 HWS2022-22 ICSS2022-30 EMM2022-30 |
In recent years, the number theft of credit card information has become a growing problem in Japan. Some of the credit c... [more] |
ISEC2022-22 SITE2022-26 BioX2022-47 HWS2022-22 ICSS2022-30 EMM2022-30 pp.81-87 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 13:25 |
Online |
Online |
What type of document is CWA (CEN Workshop Agreement) in European Committee for Standardization Takushi Otani (Kibi International Univ.) |
[more] |
|
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 13:50 |
Online |
Online |
An overview of the secrecy of patent applications in the Japanese Law Makoto Koike (MK Microwave) ISEC2022-23 SITE2022-27 BioX2022-48 HWS2022-23 ICSS2022-31 EMM2022-31 |
Economic security promotion law enacted on May 11, 2022 includes the provisions to keep patent application secret in Jap... [more] |
ISEC2022-23 SITE2022-27 BioX2022-48 HWS2022-23 ICSS2022-31 EMM2022-31 pp.88-97 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 14:25 |
Online |
Online |
Cryptocurrency Analysis System for Investigating Cyber Crime Economy Hiroshi Mori, Hiroshi Kumagai, Yin Minn Pa Pa, Yuta Takata, Ryoya Furukawa, Yuji Sakurai, Masaki Kamizono (DTCY) ISEC2022-24 SITE2022-28 BioX2022-49 HWS2022-24 ICSS2022-32 EMM2022-32 |
[more] |
ISEC2022-24 SITE2022-28 BioX2022-49 HWS2022-24 ICSS2022-32 EMM2022-32 pp.98-103 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 14:50 |
Online |
Online |
Distributed Random Number Generation Method on Smart Contracts Kentaro Sako (Waseda Univ), Shin'ichiro Matsuo (Georgetown Univ), Tatsuya Mori (Waseda Univ) ISEC2022-25 SITE2022-29 BioX2022-50 HWS2022-25 ICSS2022-33 EMM2022-33 |
We propose N-choice game (NCG), a decentralized pseudo-random number generation method that can be executed on smart con... [more] |
ISEC2022-25 SITE2022-29 BioX2022-50 HWS2022-25 ICSS2022-33 EMM2022-33 pp.104-109 |