Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICD, HWS |
2023-10-31 14:20 |
Mie |
(Primary: On-site, Secondary: Online) |
Evaluation of Time-to-Digital-Converter in Laser Fault Injection Detection on FPGA Shungo Hayashi, Junichi Sakamoto (YNU/AIST), Masaki Chikano, Tsutomu Matsumoto (YNU) |
[more] |
|
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Secure Cryptographic Unit with built-in Signature Generation Hardware for Aggregate Signature Schemes and its FPGA Implementation Toshihiro Sato, Shohei Kawasaki (SCU), Kaoru Masada (Tokyo Univ.), Riku Anzai, Junichi Sakamoto, Naoki Yoshida (YNU), Yasuyoshi Uemura (SCU), Makoto Ikeda (Tokyo Univ.), Tsutomu Matsumoto (YNU) ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42 |
Secure Cryptographic Unit (SCU) consists of a hardware cryptographic engine and an access control mechanism for the engi... [more] |
ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42 pp.182-187 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Clone Resistance of Artifact Metrics: Spatial Frequency Filtering Akira Iwahashi, Iwaki Miyamoto, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2023-43 SITE2023-37 BioX2023-46 HWS2023-43 ICSS2023-40 EMM2023-43 |
Artifact metrics is a technology that uses features unique to an artifact to authenticate the artifact in question. Unli... [more] |
ISEC2023-43 SITE2023-37 BioX2023-46 HWS2023-43 ICSS2023-40 EMM2023-43 pp.188-193 |
HWS |
2023-04-15 10:05 |
Oita |
(Primary: On-site, Secondary: Online) |
Clone Resistance of Artifact Metric Systems Based on White Light Interferometry and Correlation coefficient Akira Iwahashi, Naoki Yoshida, Tsutomu Matsumoto (YNU) HWS2023-11 |
Artifact metrics are a technology that authenticates artifacts using features unique to each artifact. Unlike convention... [more] |
HWS2023-11 pp.43-48 |
ICSS, IPSJ-SPT |
2023-03-13 17:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
URL Warning List Creation and Manage Methods using VirusTotal and Web Access Log Kyohei Takao, Chika Hiraishi (YNU), Kazuki Takada (SecureBrain), Akira Fujita, Daisuke Inoue (NICT), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-66 |
Security services such as URL blocklists are widely used to prevent users from accessing malicious websites.
However, ... [more] |
ICSS2022-66 pp.109-114 |
ICSS, IPSJ-SPT |
2023-03-14 13:10 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Towards observation of online fraud exploiting multiple SNS Yamato Kawaguchi (Yokohama National Univ.), Kazuki Takada (SecureBrain), Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2022-77 |
SNS (Social Networking Service) fraud has been reported in accordance with the increase in SNS users. In this study, we ... [more] |
ICSS2022-77 pp.175-180 |
ICSS, IPSJ-SPT |
2023-03-14 13:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Assessment Method for Persistent Malware Infection on IoT Devices Shunki Soeda, Takahiro Inoue, Rui Tanabe, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-78 |
Malware targeting IoT devices has become a growing threat in recent years. Some of them continue to infect devices perma... [more] |
ICSS2022-78 pp.181-186 |
HWS, VLD |
2023-03-04 10:00 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Importance of Inverters Placement in Ring-Oscilator for Laser Irradiation Detection Shungo Hayashi (YNU), Junichi Sakamoto (AIST/YNU), Masaki Chikano, Tsutomu Matsumoto (YNU) VLD2022-115 HWS2022-86 |
Laser fault injection is known as the most efficient fault injection technique due to its high spatial controllability a... [more] |
VLD2022-115 HWS2022-86 pp.233-238 |
HWS, VLD |
2023-03-04 11:05 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Clone Resistance of Artifact Metrics: Scanning Probe Lithography Based Clones Naoki Yoshida, Akira Iwahashi (YNU), Hoga Morihisa, Junko Ohta, Kaoru Sumiya (AIST), Tsutomu Matsumoto (YNU) VLD2022-117 HWS2022-88 |
The nano-artifact metrics bases its security on the fact that nanometer-order three-dimensional structures (nanopatterns... [more] |
VLD2022-117 HWS2022-88 pp.245-250 |
HWS, VLD |
2023-03-04 11:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Clone Resistance of Artifact Metrics Systems Based on White Light Interferometry and Phase Only Correlation Akira Iwahashi, Naoki Yoshida, Tsutomu Matsumoto (YNU) VLD2022-118 HWS2022-89 |
Artifact Metrics is a technique for authenticating artifacts using characteristics unique to each artifact. Unlike conve... [more] |
VLD2022-118 HWS2022-89 pp.251-256 |
HWS, VLD |
2023-03-04 11:55 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Cloud Based Evaluation of Communication Bandwidth and Tracking Time of Traceable Aggregate Signature Protocols Koudai Aoyama, Riku Anzai, Junichi Sakamoto, Naoki Yoshida, Tsutomu Matsumoto (Yokohama National Univ.) VLD2022-119 HWS2022-90 |
Traceable Aggregate Signature is a scheme that has the ability to identify the source of an illegal signature if it is i... [more] |
VLD2022-119 HWS2022-90 pp.257-260 |
ICSS |
2022-11-07 15:00 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Observation of Attack Infrastructures by Scripts that Mimic C&C Communications of IoT Bots Kaichi Sameshima, Yuki Endo, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2022-44 |
(To be available after the conference date) [more] |
ICSS2022-44 pp.37-42 |
ICSS |
2022-11-07 15:25 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Analysis of Environmental Sensitivity of Persistent IoT Malware using Sandboxes with File Systems from Various IoT Devices Takahiro Inoue (YNU), Eizo Okada, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2022-45 |
(To be available after the conference date) [more] |
ICSS2022-45 pp.43-48 |
HWS, ICD |
2022-10-25 15:15 |
Shiga |
(Primary: On-site, Secondary: Online) |
A Memory-Saving Software Implementation of Pairing Computation on the GMT8-544 Curve Hiroto Miyata, Junichi Sakamoto, Naoki Yoshida, Riku Anzai, Tsutomu Matsumoto (YNU) HWS2022-39 ICD2022-31 |
There has been a lot of research on increasing the security of IoT, and encryption is one of the methods. Pairing crypto... [more] |
HWS2022-39 ICD2022-31 pp.52-57 |
HWS, ICD |
2022-10-25 17:05 |
Shiga |
(Primary: On-site, Secondary: Online) |
How to Identify the Physical Direction of CAN Message Transmission Yosuke Maekawa, Camille Gay (TOYOTA/YNU), Tsutomu Matsumoto (YNU) HWS2022-43 ICD2022-35 |
The impact of cyber-attacks on automobiles is becoming more serious as vehicles become more connected and multi-function... [more] |
HWS2022-43 ICD2022-35 pp.76-81 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 15:40 |
Online |
Online |
Security of Systems that Automatically Authenticate a User's Credentials and Location using Wireless Technology Kazuki Tachibana, Junichi Sakamoto, Tsutomu Matsumoto (YNU) ISEC2022-13 SITE2022-17 BioX2022-38 HWS2022-13 ICSS2022-21 EMM2022-21 |
To enhance user convenience, there is a movement to automate certain processes in systems by performing authentication v... [more] |
ISEC2022-13 SITE2022-17 BioX2022-38 HWS2022-13 ICSS2022-21 EMM2022-21 pp.35-39 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 16:15 |
Online |
Online |
Security Assessment and Countermeasures for Magnetic Malfunction of Electromagnetic Relays Takumi Owada, Kazuki Tachibana, Tsutomu Matsumoto (YNU) ISEC2022-14 SITE2022-18 BioX2022-39 HWS2022-14 ICSS2022-22 EMM2022-22 |
Relays are used in many electrical and electronic devices, including switches and sensors. Some relays are electromagnet... [more] |
ISEC2022-14 SITE2022-18 BioX2022-39 HWS2022-14 ICSS2022-22 EMM2022-22 pp.40-45 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 16:40 |
Online |
Online |
Distance Spoofing Detection by LiDAR and Stereo Camera Ataru Kubo, Yuki Fukatsu, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2022-15 SITE2022-19 BioX2022-40 HWS2022-15 ICSS2022-23 EMM2022-23 |
Automatic driving vehicles use information obtained from onboard ranging sensors to recognize objects such as surroundin... [more] |
ISEC2022-15 SITE2022-19 BioX2022-40 HWS2022-15 ICSS2022-23 EMM2022-23 pp.46-51 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 17:05 |
Online |
Online |
Security Evaluation of Cryptographic Circuits with Laser Sensors by Double-Spot Laser Irradiation Masaki Chikano, Naoki Yoshida, Junichi Sakamoto, Syungo Hayashi, Tsutomu Matsumoto (YNU) ISEC2022-16 SITE2022-20 BioX2022-41 HWS2022-16 ICSS2022-24 EMM2022-24 |
A fault injection attack is an attack method that intentionally injects faults into a device to cause it to malfunction,... [more] |
ISEC2022-16 SITE2022-20 BioX2022-41 HWS2022-16 ICSS2022-24 EMM2022-24 pp.52-57 |
ICSS, IPSJ-SPT |
2022-03-07 12:50 |
Online |
Online |
am I infected? A New Web Service to Inspect End Users' IoT Devices for Malware Infection and Vulnerabilities Songwei He, Takaya Noma, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2021-58 |
IoT devices have become prevalent in recent years, but unfortunately, many devices are infected by malware due to their ... [more] |
ICSS2021-58 pp.1-6 |