Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2023-11-22 16:00 |
Aomori |
Aomori Prefecture Tourist Center ASPM (Aomori) (Aomori, Online) (Primary: On-site, Secondary: Online) |
A Study on BGP Routing Operations in the Deployment of ASPA as Path Validation Yusho Yamaguchi (Osaka Univ.), Taiji Kimura (JPNIC), Naoto Yanai, Atsuo Inomata (Osaka Univ.) IA2023-40 |
Autonomous Systems Path Authorization (ASPA) is a technology for verifying routing information advertised in Border Gate... [more] |
IA2023-40 pp.25-32 |
ISEC |
2023-05-17 15:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Tokyo) |
[Invited Talk]
An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities (from BRAIN 2023) Chihiro Kado, Naoto Yanai, Jason Paul Cruz (Osaka Univ.), Shingo Okamura (NIT, Nara College) ISEC2023-11 |
Vulnerabilities are an important issue in Ethereum smart contracts. Although various vulnerability analysis tools have b... [more] |
ISEC2023-11 pp.62-64 |
RCC, ISEC, IT, WBS |
2023-03-14 15:45 |
Yamaguchi |
(Yamaguchi, Online) (Primary: On-site, Secondary: Online) |
Claimable Designated Verifier Signature Kyosuke Yamashita (Osaka Univ.), Keisuke Hara (AIST/YNU), Yohei Watanabe (UEC/JDC), Naoto Yanai (Osaka Univ./JDC), Junji Shikata (YNU) IT2022-95 ISEC2022-74 WBS2022-92 RCC2022-92 |
This paper considers the problem of balancing anonymity and traceablity in group-oriented signature schemes. That is, we... [more] |
IT2022-95 ISEC2022-74 WBS2022-92 RCC2022-92 pp.171-178 |
ICSS, IPSJ-SPT |
2023-03-13 16:10 |
Okinawa |
Okinawaken Seinenkaikan (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Implementation and Evaluation for Remote-Control Security System of IoT Devices Masaru Takeuchi (JDC), Yohei Watanabe (UEC/JDC), Naoto Yanai (OU/JDC), Akira Takeuchi (JDC), Tatsuya Takehisa (Nisshin), Yukitoshi Sanada (KU/JDC), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2022-67 |
We have proposed the Remote-Control System for securing IoT devices from malwares. It consists of a control algorithm ba... [more] |
ICSS2022-67 pp.115-120 |
ICSS, IPSJ-SPT |
2022-03-08 13:00 |
Online |
Online (Online) |
Remote-Control System for Securing IoT Devices Masaru Takeuchi (JDC), Yohei Watanabe (UEC/ジャパンデータコム), Naoto Yanai (OU/ジャパンデータコム), Tatsuya Takehisa (Nisshin), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2021-73 |
The number of malwares targeting IoT devices increases, and security issues in many systems such as critical infrastruct... [more] |
ICSS2021-73 pp.87-92 |
NS, NWS (Joint) |
2022-01-28 13:30 |
Online |
Online (Online) |
Implementation and Evaluation for A Self-Stabilizing Leader Election Algorithm on the Population Protocol Model Keitaro Watanabe, Hideharu Kojima (Osaka Univ.), Yuichi Sudo (Hosei Univ.), Naoto Yanai, Tatsuhiro Tsuchiya (Osaka Univ.) NS2021-120 |
[more] |
NS2021-120 pp.56-61 |
NS |
2021-10-06 15:45 |
Online |
Online (Online) |
Implementation of smart contracts with an access control by attribute based encryption Takumi Okano, Hideharu Kojima, Naoto Yanai, Tatsuhiro Tsuchiya (Osaka Univ.) |
[more] |
|
WBS, IT, ISEC |
2021-03-05 14:20 |
Online |
Online (Online) |
Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts Nami Ashizawa, Naoto Yanai, Jason Paul Cruz (Osaka Univ.), Singo Okamura (NITNC) IT2020-156 ISEC2020-86 WBS2020-75 |
Ethereum smart contracts are programs that run on the Ethereum blockchain, and many smart contract vulnerabilities have ... [more] |
IT2020-156 ISEC2020-86 WBS2020-75 pp.273-280 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 09:30 |
Kochi |
Kochi University of Technology (Kochi) |
SecureHID: Securing the USB Interface Jan Goette (Waseda Univ.), Naoto Yanai (Osaka Univ.), Tatsuya Mori (Waseda Univ.) ISEC2019-35 SITE2019-29 BioX2019-27 HWS2019-30 ICSS2019-33 EMM2019-38 |
[more] |
ISEC2019-35 SITE2019-29 BioX2019-27 HWS2019-30 ICSS2019-33 EMM2019-38 pp.199-206 |
ICSS, IA |
2018-06-26 10:45 |
Ehime |
Ehime University (Ehime) |
[Invited Talk]
Security Analysis with Formal Methods Naoto Yanai (Osaka Univ.) IA2018-12 ICSS2018-12 |
For security analysis of information security researches, a method with a formal proof has attracted attention in recent... [more] |
IA2018-12 ICSS2018-12 pp.73-75 |
ICSS, IPSJ-SPT |
2016-03-03 16:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University (Kyoto) |
Privacy-preserving Log Analysis with Deterministic Encryption Yuji Furuta, Naoto Yanai (Osaka Univ.), Masashi Karasaki (NTT-neomeit), Katsuhiko Eguchi (NTT Neomeit), Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) ICSS2015-54 |
Recently, an increase of attacks via a network is remarkable, and the observation and the analysis of log information is... [more] |
ICSS2015-54 pp.41-46 |
ICSS |
2015-03-04 09:50 |
Okinawa |
Meio Univiersity (Okinawa) |
An Estimation of Signature Schemes for Multiple Signers Kenta Muranaka, Naoto Yanai (Osaka Univ.), Shingo Okamura (NITNC), Toru Fujiwara (Osaka Univ.) ICSS2014-78 |
A signature scheme for multiple signers is a cryptographic primitive where each signer generates an individual signature... [more] |
ICSS2014-78 pp.91-96 |