Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2024-11-21 14:00 |
Kanagawa |
MUZA Kawasaki Symphony Hall (Kanagawa) |
How to Utilize The LLVM Compiler Infrastructure for Self Destructive Tamper Resistant Software Kazuomi Oishi (SIST) ICSS2024-66 |
Self destructive tamper resistant software can protect program from analysis and attacks. After the concept was proposed... [more] |
ICSS2024-66 pp.1-7 |
ICSS |
2023-11-16 14:55 |
Ishikawa |
IT Business Plaza Musashi and Online (Ishikawa, Online) (Primary: On-site, Secondary: Online) |
A Study on Self Destructive Tamper Resistant Software utilizing Return-Oriented Programming (Part 3) Kazuomi Oishi (SIST) ICSS2023-55 |
Self destructive tamper resistant software (SDTRS) is a tamper resistance technology that can protect a program by itsel... [more] |
ICSS2023-55 pp.30-34 |
ICSS, IPSJ-SPT |
2022-03-08 10:40 |
Online |
Online (Online) |
A Study on Self Destructive Tamper Resistant Software utilizing Return-Oriented Programming (Part 2) Kazuomi Oishi (SIST) ICSS2021-69 |
Taking into account CPU-level ROP (Return-Oriented Programming) defenses such as Intel CET, we study implementation feas... [more] |
ICSS2021-69 pp.61-65 |
ICSS |
2021-11-29 13:25 |
Kochi |
KOCHIJYO HALL (Kochi, Online) (Primary: On-site, Secondary: Online) |
A Study on Tamper Resistance of Trusted Execution Environment Kazuomi Oishi (SIST) ICSS2021-47 |
A Trusted Execution Environment (TEE) provides isolated execution inside a TEE from the outside. The outside environment... [more] |
ICSS2021-47 pp.7-12 |
ICSS |
2020-11-26 16:25 |
Online |
Online (Online) |
A Study on Anonymous Identifiers and its Applications Kazuomi Oishi (SIST) ICSS2020-25 |
As computer network spreads, identifiers with anonymity is required for privacy protection. IPv6 temporary addresses are... [more] |
ICSS2020-25 pp.32-37 |
ICSS, IPSJ-SPT |
2020-03-03 16:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Okinawa) (Cancelled but technical report was issued) |
Study on Implementation of Anonymous Public-Key Certificates based on Elliptic Curve Kazuomi Oishi (SIST) ICSS2019-107 |
[more] |
ICSS2019-107 pp.341-344 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 14:10 |
Kochi |
Kochi University of Technology (Kochi) |
Anonymous Public-Key Certificates based on Elliptic Curve Kazuomi Oishi (SIST) ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56 |
Anonymous public-key certificates can guarantee anonymity of the certificate users and are useful for applications in wh... [more] |
ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56 pp.347-352 |
ISEC, COMP |
2017-12-21 16:40 |
Kochi |
Eikokuji Campus, Kochi University of Technology (Kochi) |
Implementation Difficulty of Dynamic Self-Modifying Based Self Destructive Tamper Response Kazuomi Oishi (SIST) ISEC2017-82 COMP2017-36 |
Tamper resistant software, which has sufficient resistance against analysis and attack, is a necessary and important tec... [more] |
ISEC2017-82 COMP2017-36 pp.67-74 |
ICSS |
2016-11-25 15:45 |
Kanagawa |
Institute of Information Security (Kanagawa) |
Report on WhibOx 2016 White-Box Cryptography and Obfuscation Kazuomi Oishi (SIST) ICSS2016-43 |
A report on WhibOx 2016 is presented. WhibOx 2016 is a one-time workshop on white-box cryptogra-phy and obfuscation. It ... [more] |
ICSS2016-43 pp.27-29 |
ISEC |
2016-09-02 14:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Tokyo) |
Tamper Resistant Software utilizing Data Memory Kazuomi Oishi (SIST) ISEC2016-45 |
We study a class of tamper resistant software that can work on a computer on which self-modifying code might not necessa... [more] |
ISEC2016-45 pp.43-48 |
IA, ICSS |
2015-06-11 16:25 |
Fukuoka |
Kyushu Institute of Technology Univ. (Fukuoka) |
Report on the 23rd USENIX Security Symposium Shinichi Matsumoto (ISIT), Kazuomi Oishi (SIST), Kuniyasu Suzaki (AIST) IA2015-8 ICSS2015-8 |
[more] |
IA2015-8 ICSS2015-8 pp.39-44 |
ICSS |
2015-03-04 15:55 |
Okinawa |
Meio Univiersity (Okinawa) |
An Experimental Implementation of Self Destructive Tamper Resistant Software and Its Evaluation Kazuomi Oishi (SIST), Naoki Yoshida, Naoki Watanabe, Jun'ichi Sakamoto, Tsutomu Matsumoto (YNU) ICSS2014-99 |
Self destructive tamper resistant software (SDTRS) has strong resistance
against attacker's analysis or modification
... [more] |
ICSS2014-99 pp.217-222 |