Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SAT, MICT, WBS, RCC (Joint) [detail] |
2024-05-16 17:20 |
Miyazaki |
KITEN Convention hall (Miyazaki) (Primary: On-site, Secondary: Online) |
Event-Triggered Control of Distributed Network Systems under DoS Attacks Masaki Yanai, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) |
(To be available after the conference date) [more] |
|
ICSS, IPSJ-SPT |
2024-03-21 16:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
One Million Routers Under Control: Vulnerabilities in DDNS of IoT Devices Kanta Okugawa (Ritsumei/NICT), Yoshiki Mori, Masaki Kubo, Takahiro Kasama (NICT), Koichi Mouri (Ritsumei), Daisuke Inoue (NICT) ICSS2023-78 |
IoT devices such as routers and webcams have dynamic DNS (DDNS) functions as one of the methods to remotely manage devic... [more] |
ICSS2023-78 pp.63-70 |
ICSS, IPSJ-SPT |
2024-03-22 10:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Improved signature-embedding techniques against backdoor attacks on DNN models Akira Fujimoto, Yuntao Wang, Atsuko Miyaji (OU) ICSS2023-87 |
In recent years, machine learning, particularly deep learning, has made remarkable strides, and has great impact on our ... [more] |
ICSS2023-87 pp.129-136 |
ICSS, IPSJ-SPT |
2024-03-22 12:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Study of the Label-Flipping Poisoning Attack on Machine-Learning Based Malicious URL Query Detection. Akira Matsunami (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-90 |
In recent years, there have been a large increase of cyber attacks with increasing use of web applications. A method to... [more] |
ICSS2023-90 pp.153-159 |
ICSS, IPSJ-SPT |
2024-03-22 11:20 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Development of an Outsourcing Password Evaluation System using Intel SGX Takeki Kitayama, Yuma Nishihira (Tokai Univ.), Akira Kanaoka (Toho Univ.), Yoshio Kakizaki, Toshihiro Ohigashi (Tokai Univ.) ICSS2023-93 |
Users are required to set passwords that are both complex and not included in leaked lists, with the recent increase in ... [more] |
ICSS2023-93 pp.174-179 |
ICSS, IPSJ-SPT |
2024-03-22 11:45 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Fast and Secure Scalar Multiplication for the GLS254 Binary Elliptic Curve Ryosuke Kido, Atsuko Miyaji (OU) ICSS2023-94 |
Elliptic curve cryptosystems (ECCs) are cryptographic schemes based on the discrete logarithm problem on an elliptic cur... [more] |
ICSS2023-94 pp.180-187 |
RCC, ISEC, IT, WBS |
2024-03-13 10:05 |
Osaka |
Osaka Univ. (Suita Campus) |
A Study of Feature Point Extraction Methods Suitable for Non-Referenced Local Watermarking in Still Images Kota Sasaki, Siyi Shang, Masazumi Kurihara, Kazuhiko Yamaguchi (UEC) IT2023-77 ISEC2023-76 WBS2023-65 RCC2023-59 |
The watermarking based on detection without original data is advantageous in practical use because it does not require a... [more] |
IT2023-77 ISEC2023-76 WBS2023-65 RCC2023-59 pp.12-19 |
RCC, ISEC, IT, WBS |
2024-03-13 11:10 |
Osaka |
Osaka Univ. (Suita Campus) |
Revisiting the Soundness of 5-Pass Identification Scheme Daigo Kuroki, Kaoru Takemure, Bagus Santoso (UEC) IT2023-82 ISEC2023-81 WBS2023-70 RCC2023-64 |
We observe that mostly, the security of 5-pass identification schemes
have only been analyzed in a emph{rough} way as f... [more] |
IT2023-82 ISEC2023-81 WBS2023-70 RCC2023-64 pp.44-51 |
LOIS |
2024-03-14 13:40 |
Okinawa |
Okinawa Pref Danjyo-Kyoudou-Sankaku Center (Primary: On-site, Secondary: Online) |
LOIS2023-64 |
Targeted attacks on specific organizations have become a significant issue due to their sophistication and the extensive... [more] |
LOIS2023-64 pp.96-101 |
RCC, ISEC, IT, WBS |
2024-03-14 09:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Partial Key Exposure Attacks on UOV-like Signatures Yuki Seto, Hiroki Furue, Atsushi Takayasu (UTokyo) IT2023-104 ISEC2023-103 WBS2023-92 RCC2023-86 |
NIST is currently working on the standardization of post-quantum cryptography (PQC). Forty signature schemes were submit... [more] |
IT2023-104 ISEC2023-103 WBS2023-92 RCC2023-86 pp.189-196 |
RCC, ISEC, IT, WBS |
2024-03-14 09:30 |
Osaka |
Osaka Univ. (Suita Campus) |
Security Analysis of Backdoored Classic McEliece in a Multi-User Setting Dai Miura, Hyungrok Jo, Shingo Sato, Junji Shikata (Yokohama National Univ.) IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87 |
Several attacks have been proposed for the Classic McEliece cryptosystem, which is one of the 4th round candidates of th... [more] |
IT2023-105 ISEC2023-104 WBS2023-93 RCC2023-87 pp.197-204 |
RCC, ISEC, IT, WBS |
2024-03-14 16:35 |
Osaka |
Osaka Univ. (Suita Campus) |
Integral Attack with Bit-Based Division Property on Block Cipher LBC Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science) IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113 |
LBC is a block cipher proposed by Kapalova et al. in 2023. The block size is 64-bit, the secret key size is 80-bit, and ... [more] |
IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113 pp.350-357 |
PRMU, IBISML, IPSJ-CVIM |
2024-03-04 10:40 |
Hiroshima |
Hiroshima Univ. Higashi-Hiroshima campus (Primary: On-site, Secondary: Online) |
Poisoning Attack on Fairness of Fair Classification Algorithm through Threshold Control Dai Shengtian, Akimoto Youhei (Univ. of Tsukuba/RIKEN), Jun Sakuma (Tokyo Tech./RIKEN), Fukuchi Kazuto (Univ. of Tsukuba/RIKEN) IBISML2023-47 |
The ethical issues of artificial intelligence have become more severe as machine learning is widely used in several fiel... [more] |
IBISML2023-47 pp.49-56 |
EMM |
2024-03-03 10:00 |
Overseas |
Day1:JEJU TECHNOPARK, Day2:JEJU Business Agency |
[Poster Presentation]
Estimation of scaling rate and rotation angle using pilot signal for image watermarking
-- Estimation using radon transform -- Rinka Kawano, Masaki Kawamura (Yamaguchi Univ.) EMM2023-94 |
To construct a robust watermarking method against geometric attacks, conventional methods extract watermarks and correct... [more] |
EMM2023-94 pp.28-33 |
SIP, SP, EA, IPSJ-SLP [detail] |
2024-02-29 15:10 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Byzantine attack detection via similarity of local updates in federated learning Kenta Ohno, Masao Yamagishi (Hosei Univ.) EA2023-86 SIP2023-133 SP2023-68 |
We propose a method to detect Byzantine attacks in federated learning, as well as a method for identifying clients repea... [more] |
EA2023-86 SIP2023-133 SP2023-68 pp.150-155 |
SIP, SP, EA, IPSJ-SLP [detail] |
2024-03-01 09:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Black-Box Adversarial Attack for Math Formula Recognition Model Haruto Namura, Masatomo Yoshida (Doshisha Univ.), Nicola Adami (UNIBS), Masahiro Okuda (Doshisha Univ.) EA2023-110 SIP2023-157 SP2023-92 |
Remarkable advances in deep learning have greatly improved the accuracy of image analysis. The progress of deep learning... [more] |
EA2023-110 SIP2023-157 SP2023-92 pp.289-293 |
NS, IN (Joint) |
2024-02-29 10:45 |
Okinawa |
Okinawa Convention Center |
Proposal of a Data Leakage Attack against a Vertical Federated Learning System based on Knowledge Distillation Takumi Suimon, Yuki Koizumi, Junji Takemasa, Toru Hasegawa (Osaka Univ.) NS2023-187 |
Vertical federated learning is a method for participants who have data with the same samples but different features to c... [more] |
NS2023-187 pp.90-95 |
NS, IN (Joint) |
2024-03-01 11:10 |
Okinawa |
Okinawa Convention Center |
Blockchain-based malicious node detection and defense method for potential-based routing Kanato Otsu (Osaka Univ.), Naomi Kuze (Wakayama Univ.) NS2023-200 |
In recent years, the scale and complexity in networks have grown such as the Internet of Things (IoT).
For controlling... [more] |
NS2023-200 pp.166-171 |
VLD, HWS, ICD |
2024-02-29 15:55 |
Okinawa |
(Primary: On-site, Secondary: Online) |
[Memorial Lecture]
Modeling of Tamper Resistance to Electromagnetic Side-channel Attacks on Voltage-scaled Circuits Kazuki Minamiguchi, Yoshihiro Midoh, Noriyuki Miura, Jun Shiomi (Osaka Univ.) VLD2023-117 HWS2023-77 ICD2023-106 |
The threat of information leakage by Side-Channel Attacks (SCAs) using ElectroMagnetic (EM) leakage is becoming more and... [more] |
VLD2023-117 HWS2023-77 ICD2023-106 p.99 |
VLD, HWS, ICD |
2024-03-01 10:50 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Pseudo-random Number Generator Design Robust against Fault Injection Attacks Sota Kado, Mingyu Yang, Yuko Hara (Tokyo Tech) VLD2023-123 HWS2023-83 ICD2023-112 |
Fault Injection Attacks (FIA) using physical methods are a significant threat for embedded devices to process various ap... [more] |
VLD2023-123 HWS2023-83 ICD2023-112 pp.125-130 |