IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: Recent 10 Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 12 of 12  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2024-11-21
14:00
Kanagawa MUZA Kawasaki Symphony Hall (Kanagawa) How to Utilize The LLVM Compiler Infrastructure for Self Destructive Tamper Resistant Software
Kazuomi Oishi (SIST) ICSS2024-66
Self destructive tamper resistant software can protect program from analysis and attacks. After the concept was proposed... [more] ICSS2024-66
pp.1-7
ICSS 2023-11-16
14:55
Ishikawa IT Business Plaza Musashi and Online (Ishikawa, Online)
(Primary: On-site, Secondary: Online)
A Study on Self Destructive Tamper Resistant Software utilizing Return-Oriented Programming (Part 3)
Kazuomi Oishi (SIST) ICSS2023-55
Self destructive tamper resistant software (SDTRS) is a tamper resistance technology that can protect a program by itsel... [more] ICSS2023-55
pp.30-34
ICSS, IPSJ-SPT 2022-03-08
10:40
Online Online (Online) A Study on Self Destructive Tamper Resistant Software utilizing Return-Oriented Programming (Part 2)
Kazuomi Oishi (SIST) ICSS2021-69
Taking into account CPU-level ROP (Return-Oriented Programming) defenses such as Intel CET, we study implementation feas... [more] ICSS2021-69
pp.61-65
ICSS 2021-11-29
13:25
Kochi KOCHIJYO HALL (Kochi, Online)
(Primary: On-site, Secondary: Online)
A Study on Tamper Resistance of Trusted Execution Environment
Kazuomi Oishi (SIST) ICSS2021-47
A Trusted Execution Environment (TEE) provides isolated execution inside a TEE from the outside. The outside environment... [more] ICSS2021-47
pp.7-12
ICSS 2020-11-26
16:25
Online Online (Online) A Study on Anonymous Identifiers and its Applications
Kazuomi Oishi (SIST) ICSS2020-25
As computer network spreads, identifiers with anonymity is required for privacy protection. IPv6 temporary addresses are... [more] ICSS2020-25
pp.32-37
ICSS, IPSJ-SPT 2020-03-03
16:20
Okinawa Okinawa-Ken-Seinen-Kaikan (Okinawa)
(Cancelled but technical report was issued)
Study on Implementation of Anonymous Public-Key Certificates based on Elliptic Curve
Kazuomi Oishi (SIST) ICSS2019-107
 [more] ICSS2019-107
pp.341-344
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
14:10
Kochi Kochi University of Technology (Kochi) Anonymous Public-Key Certificates based on Elliptic Curve
Kazuomi Oishi (SIST) ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56
Anonymous public-key certificates can guarantee anonymity of the certificate users and are useful for applications in wh... [more] ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56
pp.347-352
ISEC, COMP 2017-12-21
16:40
Kochi Eikokuji Campus, Kochi University of Technology (Kochi) Implementation Difficulty of Dynamic Self-Modifying Based Self Destructive Tamper Response
Kazuomi Oishi (SIST) ISEC2017-82 COMP2017-36
Tamper resistant software, which has sufficient resistance against analysis and attack, is a necessary and important tec... [more] ISEC2017-82 COMP2017-36
pp.67-74
ICSS 2016-11-25
15:45
Kanagawa Institute of Information Security (Kanagawa) Report on WhibOx 2016 White-Box Cryptography and Obfuscation
Kazuomi Oishi (SIST) ICSS2016-43
A report on WhibOx 2016 is presented. WhibOx 2016 is a one-time workshop on white-box cryptogra-phy and obfuscation. It ... [more] ICSS2016-43
pp.27-29
ISEC 2016-09-02
14:25
Tokyo Kikai-Shinko-Kaikan Bldg. (Tokyo) Tamper Resistant Software utilizing Data Memory
Kazuomi Oishi (SIST) ISEC2016-45
We study a class of tamper resistant software that can work on a computer on which self-modifying code might not necessa... [more] ISEC2016-45
pp.43-48
IA, ICSS 2015-06-11
16:25
Fukuoka Kyushu Institute of Technology Univ. (Fukuoka) Report on the 23rd USENIX Security Symposium
Shinichi Matsumoto (ISIT), Kazuomi Oishi (SIST), Kuniyasu Suzaki (AIST) IA2015-8 ICSS2015-8
 [more] IA2015-8 ICSS2015-8
pp.39-44
ICSS 2015-03-04
15:55
Okinawa Meio Univiersity (Okinawa) An Experimental Implementation of Self Destructive Tamper Resistant Software and Its Evaluation
Kazuomi Oishi (SIST), Naoki Yoshida, Naoki Watanabe, Jun'ichi Sakamoto, Tsutomu Matsumoto (YNU) ICSS2014-99
Self destructive tamper resistant software (SDTRS) has strong resistance
against attacker's analysis or modification
... [more]
ICSS2014-99
pp.217-222
 Results 1 - 12 of 12  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan