Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SAT, SANE (Joint) |
2024-02-09 13:20 |
Kagoshima |
AmaHome PLAZA (Amami City Shimin Koryu Center) (Primary: On-site, Secondary: Online) |
Secure Firmware Updates for Nano-Satellites: Design Considerations and PoC Implementation Yuta Nakagawa, Keika Mori, Ryoya Furukawa, Hiroshi Kumagai, Masaki Kamizono (DTCY) SANE2023-111 |
With the increase in the number of satellite launches in recent years, cyber attacks on satellites have become a serious... [more] |
SANE2023-111 pp.43-48 |
ISEC, SITE, LOIS |
2022-11-18 09:25 |
Online |
Online |
Analysis of EU Cyber Resilience Act
-- from a Perspective of Cyber Supply Chain Security -- Yusuke Tachibana (FIT) ISEC2022-32 SITE2022-36 LOIS2022-16 |
This past September, the European Commission published the Cyber Resilience Act. It will establish security requirements... [more] |
ISEC2022-32 SITE2022-36 LOIS2022-16 pp.16-19 |
KBSE |
2019-03-02 09:00 |
Kyoto |
Doshisha University Kambaikan |
Development of Knowledge Presentation Method in Security Requirement Analysis and Design Using a Software Security Knowledge Base and Evaluation by a Case Study Yuki Yamada, Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII) KBSE2018-62 |
In recent years, the threat of cyber attacks such as information disclosure due to unauthorized access has become seriou... [more] |
KBSE2018-62 pp.51-56 |
ISEC |
2018-09-07 09:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Development of Portable Automotive Security Testbed with Adaptability: PASTA Tsuyoshi Toyama, Hisashi Oguma (TOYOTA-ITC), Tsutomu Matsumoto (YNU) ISEC2018-51 |
For accelerating the development of sophisticated driving-assist technologies such as automated driving, securing vehicl... [more] |
ISEC2018-51 pp.7-14 |
QIT (2nd) |
2018-06-04 13:20 |
Hiroshima |
ICCH Ran |
[Poster Presentation]
Certifying Quantum Randomness by Probability Estimation Yanbao Zhang (NTT-BRL), Emanuel Knill, Peter Bierhorst (NIST) |
We introduce probability estimation, a broadly applicable framework to certify
randomness in a finite sequence of mea... [more] |
|
KBSE |
2018-03-01 15:50 |
Okinawa |
|
Development of a System Supporting Security Design from Security Requirements Analysis using a Software Security Knowledge Base Hikaru Miyahara, Atsuo Hazeyama (Tokyo Gakugei Univ.), Takafumi Tanaka (TUAT), Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC), Nobukazu Yoshioka (NII) KBSE2017-50 |
The importance of software security is recognized because the Internet is permeating into our society. In particular, di... [more] |
KBSE2017-50 pp.67-72 |
IA |
2017-10-13 16:30 |
Tokyo |
Fukutake Hall, The University of Tokyo |
Testbed for Security Analysis of the DNS64 IPv6 Transition Technology in Virtual Environment Gabor Lencse, Youki Kadobayashi (NAIST) IA2017-22 |
In this paper, we demonstrate the feasibility of building a virtual network with several virtual Linux hosts for testing... [more] |
IA2017-22 pp.19-24 |
ICSS, IPSJ-SPT |
2016-03-03 16:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Issue analysis toward forensics gathering infrastructure that supports the more efficient incident handling Daichi Hasumi, Shigeyoshi Shima, Takahiro Kakumaru (NEC) ICSS2015-53 |
Organization introducing ICT systems needs to properly respond to the information security incidents. In contrast, recen... [more] |
ICSS2015-53 pp.35-40 |
KBSE |
2015-01-26 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Investigation of a Reverse Engineering Method for Verifying Source Code with a Use Case Model
-- A Case of an ASP.NET Application -- Shinpei Ogata (Shinshu Univ.), Yoshitaka Aoki (SIT), Satoshi Yazawa (VR), Saeko Matsuura (SIT) KBSE2014-42 |
Traceability between a requirements specification and source code should be kept but it’s difficult. Verifying that the ... [more] |
KBSE2014-42 pp.19-24 |
ICSS, IPSJ-SPT |
2014-03-28 14:45 |
Okinawa |
Meio Univiersity |
System Security Analysis using Dependency Relationship on Cloud Yoshiro Wataguchi, Nobuyuki Kanaya (FUJITSU labs), Takao Okubo (IISEC) ICSS2013-93 |
Recently, many systems are developed using the cloud computing environment. In those systems, an operator of a SaaS uses... [more] |
ICSS2013-93 pp.231-236 |
KBSE |
2014-01-28 15:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
An Evaluation on the Modifiability of Model Driven Security Requirements Analysis Method based on Common Criteria Atsushi Noro, Saeko Matsuura (Shibaura Inst. of Tech.) KBSE2013-78 |
Requirements analysis is complicated because in requirements analysis of the system is a security request as well as a f... [more] |
KBSE2013-78 pp.77-82 |
KBSE |
2013-09-13 15:00 |
Tokyo |
The University of Electro-Communications |
A classification method in identifying security patterns for a dependable Security Case
-- From Security Patterns to D-Case -- Vaise Patu, Nada Olayan, Shuichiro Yamamoto (Nagoya Univ.) KBSE2013-52 |
Today's software systems are facing new and complicated challenges in confronting with security issues. There are lots o... [more] |
KBSE2013-52 pp.91-96 |
KBSE, SS |
2012-07-27 13:30 |
Hokkaido |
Future University Hakodate |
Integration Method of UML Requirement Analytical Model and Security Requirement Analysis based on Common Criteria Atsushi Noro (Shibaura Inst. of Tech.), Shinpei Ogata (Shinshu Univ.), Saeko Matsuura (Shibaura Inst. of Tech.) SS2012-13 KBSE2012-15 |
Analyzing security requirements for a system at an early stage of development is effective in developing a system with l... [more] |
SS2012-13 KBSE2012-15 pp.19-24 |
KBSE |
2012-01-23 15:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Cause-Oriented Vulnerability Analysis of Security Requirements for Web Applications Hironori Nishino, Junya Sakai, Haruhiko Kaiya, Kenji Kaijiri (SU) KBSE2011-58 |
Use case models are frequently used to specify requirements for an information system, but such models do not permit us ... [more] |
KBSE2011-58 pp.31-36 |
KBSE |
2010-03-05 10:30 |
Fukuoka |
Kyushu Institute of Technology (kyutech plaza) |
Goal-Oriented Security Requirements Analysis Using Common Criteria as Domain Ontology Motoshi Saeki, Shinpei Hayashi (Tokyo Inst. of Tech.), Haruhiko Kaiya (Shinshu Univ.) KBSE2009-65 |
This paper proposes the usage of security targets, which are documents compliant to Common Criteria (ISO/IEC 15408), as ... [more] |
KBSE2009-65 pp.37-42 |
IA, ICSS |
2009-06-18 16:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
[Invited Talk]
* Youki Kadobayashi (Nara Inst. of Sci and Tech.) IA2009-10 ICSS2009-18 |
Network security technologies today are facing broad range of requirements, including network situational awareness, roo... [more] |
IA2009-10 ICSS2009-18 p.55 |
ISEC |
2008-09-12 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Estimating RSA Private-Keys Generated in Security Chips Tsutomu Matsumoto, Yoshio Takahashi (YNU) ISEC2008-71 |
For a particular instance of TPM - Trusted Platform Module, we have shown that the RSA private keys generated inside the... [more] |
ISEC2008-71 pp.55-62 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 11:35 |
Okayama |
Okayama Univ. |
Visualization Technologies of nicter Incident Analysis System Koji Nakao, Fumiko Matsumoto, Daisuke Inoue (NICT), Shunsuke Baba, Kazuya Suzuki (YOKOGAWA), Masashi Eto, Katsunari Yoshioka, Kenji Rikitake (NICT), Yoshiaki Hori (ISEE) |
The authors have been working on the R&D activities of nicter, an Internet security incident analysis center investigati... [more] |
ISEC2006-51 pp.83-89 |
SS |
2005-12-20 14:30 |
Kochi |
Kochi Women's University |
Supporting Method for Insertion of Behaviors based on Security Requirements to Scenarios Hiroya Itoga, Atsushi Ohnishi (Ritsumeikan Univ.) |
Security requirements which requested from some audit standards are difficult to understand and to check for stakeholder... [more] |
SS2005-71 pp.49-54 |