Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
OCS, OFT, LSJ (Joint) [detail] |
2022-08-25 15:35 |
Online |
Online |
Standardization Activities for Optical Fiber Sensors Shoji Adachi (PhoSC) |
(Advance abstract in Japanese is available) [more] |
|
SITE, IPSJ-EIP |
2022-06-10 13:15 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Trends regarding access to vehicle data in European Union Hideyuki Fujii (NRI Secure) SITE2022-9 |
As the distribution of connected cars expands, discussions on the handling of vehicle data are becoming more active. In ... [more] |
SITE2022-9 pp.52-58 |
ICSS, IPSJ-SPT |
2022-03-07 13:10 |
Online |
Online |
A Method for Identifying IoT Devices Using Features from WebUI Contents and Images Kosuke Murakami (NICT/KDDI), Takahiro Kasama, Akira Fujita (NICT), Jumpei Urakawa (KDS), Daisuke Inoue (NICT) ICSS2021-59 |
Cyber attacks on IoT devices have caused damage such as information theft and malware infection.
In order to identify I... [more] |
ICSS2021-59 pp.7-12 |
ICSS, IPSJ-SPT |
2022-03-08 10:00 |
Online |
Online |
Input predictive attack by keyboard acoustic emanations using BERT and its countermeasures Masahiro Iida (Teikyo Univ.), Mitsuaki Akiyama (NTT), Masaki Kamizono (DTCY), Takahiro Kasama (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Kyoto Sangyo Univ.), Atsuo Inomata (Osaka Univ.) ICSS2021-67 |
The Keyboard Acoustic Emanations has been proposed to estimate the input key from keystroke sounds as a kind of side-cha... [more] |
ICSS2021-67 pp.49-54 |
AP |
2022-02-17 10:50 |
Online |
Online |
[Invited Lecture]
Radio Wave Propagation Characteristics of Millimeter-wave in Railway Environment Kazuki Nakamura, Nagateru Iwasawa, Koki Iwamoto, Yusuke Kawamura, Daisuke Yamaguchi, Takayasu Kitano, Kunihiro Kawasaki (RTRI), Shotaro Yoshida (JRSEC), Masaharu Takahashi (Chiba Univ.) AP2021-161 |
In railways, wireless communication systems are used to communicate between running trains and the ground. Therefore, it... [more] |
AP2021-161 pp.16-19 |
SITE, ISEC, LOIS |
2021-11-12 13:50 |
Online |
Online |
Security notions of decryption-controllable identity-based encryption Hidekazu Miyanaga, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Yuki Okano (NTT), Koutarou Suzuki (Toyohashi Univ. of Tech.), Kazuki Yoneyama (Ibaraki Univ.) ISEC2021-43 SITE2021-37 LOIS2021-26 |
In recent years, there have been increasing opportunities for a single user to have multiple devices. A similar situati... [more] |
ISEC2021-43 SITE2021-37 LOIS2021-26 pp.13-17 |
OFT, OCS, LSJ (Joint) [detail] |
2021-08-26 14:45 |
Online |
Online |
A method for continuously measuring backscattered light at an arbitrary point on an optical fiber Shiro Ryu (Meiji Univ.), Takafumi Tsuboya (SECOM) OFT2021-14 |
We have proposed a continuous measurement method for Rayleigh backscattered light in the time domain at any point on the... [more] |
OFT2021-14 pp.13-18 |
QIT (2nd) |
2021-05-24 09:00 |
Online |
Online |
[Invited Talk]
Classical Verification of Quantum Computations with Efficient Verifier Takashi Yamakawa (NTT) |
[more] |
|
WBS, IT, ISEC |
2021-03-05 13:30 |
Online |
Online |
Information retrieval for security reports using behavior of cyber attacker Yuki Kawaguchi, Mayo Yamasaki (NTT) IT2020-154 ISEC2020-84 WBS2020-73 |
Cyber security incident responders require related information about related incidents for the quick and comprehensive
... [more] |
IT2020-154 ISEC2020-84 WBS2020-73 pp.257-264 |
HWS, VLD [detail] |
2021-03-04 14:15 |
Online |
Online |
Experiments of Data Authenticity Verification in Multi-Node IoT Systems Using Elliptic Curve Digital Signature Chips Yuya Takahashi, Takuya Matsumaru, Kazuki Monta (Kobe Univ.), Toshihiro Sato, Takaaki Okidono (ECSEC Lab), Takuji Miki, Noriyuki Miura, Makoto Nagata (Kobe Univ.) VLD2020-85 HWS2020-60 |
Practicality of IoT systems requires the efficiency and speed of crypto processing in edge nodes and remote servers. So ... [more] |
VLD2020-85 HWS2020-60 pp.97-101 |
HWS, VLD [detail] |
2021-03-04 16:00 |
Online |
Online |
Survey on intrusion detection system for Vehicle Security Techniques Ayaka Matsushita, Takao Okubo (IISEC) VLD2020-88 HWS2020-63 |
The purpose of this paper is to identify the factors that cause the characteristics of voltage waveforms of ECUs in auto... [more] |
VLD2020-88 HWS2020-63 pp.114-119 |
ICSS, IPSJ-SPT |
2021-03-01 09:10 |
Online |
Online |
Developing and Characterizing a New Approach to Extracting Communication Sessions Associated with NIDS Alerts Ryosuke Ishibashi, Hiroki Goto (Kyushu Univ.), Chansu Han, Tao Ban, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.) ICSS2020-26 |
(To be available after the conference date) [more] |
ICSS2020-26 pp.1-6 |
ICSS, IPSJ-SPT |
2021-03-01 10:25 |
Online |
Online |
Construction of Vulnerability Evaluation System with Machine Learning Methods Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota (KDDIR), Junpei Urakawa (KDS/KDDIR) ICSS2020-29 |
Recently, the cyberattacks aimed at software vulnerabilities are more popular and powerful. Therefore, various incidents... [more] |
ICSS2020-29 pp.19-24 |
ICSS, IPSJ-SPT |
2021-03-01 09:10 |
Online |
Online |
On the Privacy Risk of Exposure Notification Framework: Assessment and Countermeasures Kazuki Nomoto (Waseda Univ.), Mitsuaki Akiyama (NTT), Masashi Eto (NICT), Atsuo Inomata (Osaka Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-34 |
The Exposure Notification Framework uses the Bluetooth Low Energy (BLE) signal generated by a smartphone to determine cl... [more] |
ICSS2020-34 pp.49-54 |
ICSS, IPSJ-SPT |
2021-03-01 09:35 |
Online |
Online |
A Method for Reconstructing Hidden Background Image in Tele-conference with Virtual Background Satoki Tsuji, Ryusei Ishikawa (Ritsumeikan Univ.), Masashi Eto (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Hiroshima City Univ.) ICSS2020-35 |
Interpersonal communications through video chat software has become essential since a remote work is now encouraged. Whe... [more] |
ICSS2020-35 pp.55-60 |
ICSS, IPSJ-SPT |
2021-03-01 10:00 |
Online |
Online |
Implementation and Evaluation of a Plagiarism Detection Method for Source Code on Programming Contest Ryusei Ishikawa (Ritsumeikan Univ.), Yuichi Hattori (Secure Cycle), Hiroyuki Inoue (Hiroshima City Univ.), Atsuo Inomata (Osaka Univ.) ICSS2020-36 |
Programming competitions are held all over the world to write programs accurately in a short time. However, because many... [more] |
ICSS2020-36 pp.61-65 |
ICSS, IPSJ-SPT |
2021-03-01 14:55 |
Online |
Online |
Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41 |
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] |
ICSS2020-41 pp.90-95 |
ICSS, IPSJ-SPT |
2021-03-02 14:05 |
Online |
Online |
Developing an Interactive Analysis System for Voice Assistant Apps Atsuko Natatsuka (Waseda Univ.), Ryo Iijima (Waseda Univ./NICT), Takuya Watanabe, Mitsuaki Akiyama (NTT), Tetsuya Sakai (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-48 |
In Voice Assistant Services, official or third-party Voice Assistant Apps (VA apps) are provided. Since a VA app works a... [more] |
ICSS2020-48 pp.132-137 |
ICSS, IPSJ-SPT |
2021-03-02 14:30 |
Online |
Online |
ICSS2020-49 |
[more] |
ICSS2020-49 pp.138-143 |
ICSS, IPSJ-SPT |
2021-03-02 09:10 |
Online |
Online |
A Study on the Adoption of Link Preview by the Phishing Sites Norihito Omori (Waseda Univ.), Satoshi Furutani, Takuya Watanabe, Toshiki Shibahara, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.) ICSS2020-54 |
Search engines are not the only means of accessing online content. The distribution of malicious content has become mor... [more] |
ICSS2020-54 pp.166-171 |