Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SAT, MICT, WBS, RCC (Joint) [detail] |
2024-05-16 17:20 |
Miyazaki |
KITEN Convention hall (Miyazaki) (Primary: On-site, Secondary: Online) |
Event-Triggered Control of Distributed Network Systems under DoS Attacks Masaki Yanai, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) WBS2024-7 RCC2024-7 |
(To be available after the conference date) [more] |
WBS2024-7 RCC2024-7 pp.32-35 |
IN, IA (Joint) |
2022-12-13 16:15 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Investigation of a drop request protocol for defense against DRDoS attacks Koji Sugiyama, Ken-ichi Baba (Kogakuin Univ.) IN2022-51 |
In recent years, the number of DDoS attacks have increased. One way of them is the DRDoS attack which uses non-malicious... [more] |
IN2022-51 pp.40-45 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 14:15 |
Online |
Online |
A Study for Predicting Correlation Power Analysis Results by Using High-SNR Plaintexts Selected Based on Linear Leakage Model Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) ISEC2022-10 SITE2022-14 BioX2022-35 HWS2022-10 ICSS2022-18 EMM2022-18 |
To reduce the number of traces for evaluating side-channel attack (SCA) resistance, some methods for performing correlat... [more] |
ISEC2022-10 SITE2022-14 BioX2022-35 HWS2022-10 ICSS2022-18 EMM2022-18 pp.18-22 |
CCS, NLP |
2022-06-09 13:00 |
Osaka |
(Primary: On-site, Secondary: Online) |
Conditional entropy based DDoS Attack detection in Software Defined Network Tian QiWen, miyata sumiko (SIT) NLP2022-1 CCS2022-1 |
In order to detect each network attack in an SDN environment, an attack detection method has been proposed based on the ... [more] |
NLP2022-1 CCS2022-1 pp.1-6 |
VLD, HWS [detail] |
2022-03-08 17:15 |
Online |
Online |
Development of a Test Environment for Attack-Resistance Evaluation of Matrix Direct ToF Lidar Masato Suzuki, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2021-105 HWS2021-82 |
Matrix-type Direct Time of flight (dToF) Lidar, which enables high-resolution and high-speed acquisition of distance inf... [more] |
VLD2021-105 HWS2021-82 pp.164-169 |
HWS, ICD [detail] |
2021-10-19 10:50 |
Online |
Online |
Study on Fault Injection into Cryptographic Modules Using Continuous Sinusoidal Waves with Controlled Frequency, Amplitude and Phase Hikaru Nishiyama, Daisuke Fujimoto, Youngwoo Kim, Yuichi Hayashi (NAIST) HWS2021-43 ICD2021-17 |
A fault injection attack based on an intentional electromagnetic interference (IEMI) using a continuous sinusoidal wave ... [more] |
HWS2021-43 ICD2021-17 pp.13-18 |
IA, ICSS |
2021-06-21 13:30 |
Online |
Online |
secure isogeny-based cryptosystem CSIDH for side-channel attacks Hayato Arai, Atusko Miyaji (Osaka Univ.) IA2021-2 ICSS2021-2 |
CSIDH (Commutative Supersingular Isogeny Diffie Hellman) is a kind of post-quantum cryptography that uses isogenies to e... [more] |
IA2021-2 ICSS2021-2 pp.8-13 |
EMCJ |
2021-04-16 15:00 |
Online |
Online |
Time-Frequency Domain Correlation Power Analysis for Side-Channel Attack Resistance Evaluation of Practical Modules Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) EMCJ2021-5 |
When evaluating the Side-Channel Attack resistance of a practical module, the correlation coefficient, a measure of side... [more] |
EMCJ2021-5 pp.21-26 |
WBS, IT, ISEC |
2021-03-04 11:20 |
Online |
Online |
An Attack on Search Ring-LWE Problem for Even Relative Degree Yasuhisa Okumura, Shinya Okumura, Atsuko Miyaji (Osaka Univ) IT2020-122 ISEC2020-52 WBS2020-41 |
The Ring-LWE problem is used to construct homomorphic encryption and has attracted much attention because of its quantum... [more] |
IT2020-122 ISEC2020-52 WBS2020-41 pp.66-72 |
WBS, IT, ISEC |
2021-03-04 11:45 |
Online |
Online |
Security analysis for the isogeny-based cryptography CSIDH Hayato Arai, Atsuko Miyaji, Kenta Kodera (Osaka Univ.) IT2020-123 ISEC2020-53 WBS2020-42 |
CSIDH (Commutative Supersingular Isogeny Diffie Hellman) is a kind of post-quantum cryptography that uses isogenies to e... [more] |
IT2020-123 ISEC2020-53 WBS2020-42 pp.73-80 |
IN, NS (Joint) |
2021-03-05 09:30 |
Online |
Online |
A Study on Privacy Protection Leveraging Name Encryption with Multiple Encryption Keys Toru Hasegawa, Shota Yamada, Yuki Koizumi (Osaka Univ.) IN2020-75 |
Information Centric Networking (ICN) is a promising Internet architecture wherein destinations are specified by data nam... [more] |
IN2020-75 pp.126-131 |
CQ, CBE (Joint) |
2021-01-22 10:10 |
Online |
Online |
Improvement Using White List and QoS Control for SYN Cookie Method Riku Iwasaki, Shigetomo Kimura (Univ. of Tsukuba) CQ2020-93 |
In the SYN cookie method, when a system receives a TCP SYN packet, to protect against TCP SYN flood attacks in a statele... [more] |
CQ2020-93 pp.116-121 |
ICD, HWS [detail] |
2020-10-26 11:20 |
Online |
Online |
Feasibility of lattice attacks on ECDSA Kotaro Abe, Makoto Ikeda (Tokyo Univ.) HWS2020-30 ICD2020-19 |
ECDSA secret key is recovered via lattice attacks when only a few bits of nonce$(k)$ are leaked. In this paper, we evalu... [more] |
HWS2020-30 ICD2020-19 pp.30-35 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-21 16:35 |
Online |
Online |
Secure and Compact Elliptic Curve LR Scalar Multiplication Yaoan Jin, Atsuko Miyaji (Osaka Univ) ISEC2020-31 SITE2020-28 BioX2020-34 HWS2020-24 ICSS2020-18 EMM2020-28 |
Elliptic curve cryptography (ECC) can ensure an equivalent security with much smaller key sizes. Elliptic curve scalar m... [more] |
ISEC2020-31 SITE2020-28 BioX2020-34 HWS2020-24 ICSS2020-18 EMM2020-28 pp.111-118 |
HWS, VLD |
2019-03-02 14:20 |
Okinawa |
Okinawa Ken Seinen Kaikan |
Conditions for Successful Attacks on Ultrasonic Range Finder to Output Incorrect Values Yuya Inoue, Hiroki Nohira, Naoki Yoshida, Daisuke Fujimoto, Tsutomu Matumoto (YNU) VLD2018-143 HWS2018-106 |
Discussion is made on the condition that an attacking device installed at a place not detected from the target ultrasoni... [more] |
VLD2018-143 HWS2018-106 pp.295-299 |
ITS, IE, ITE-MMS, ITE-HI, ITE-ME, ITE-AIT [detail] |
2019-02-20 16:00 |
Hokkaido |
Hokkaido Univ. |
[Invited Talk]
Anomaly Detection for Smart Home Based on User Behavior
-- ICCE2019 Report -- Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.), Kensuke Ueda, Yoshiaki Kato (Mitsubishi Electric) |
The operations of home IoT devices by attackers can cause serious problems.
However, such attacks are difficult to dete... [more] |
|
SS, DC |
2017-10-20 10:30 |
Kochi |
Kochi City Culture-plaza CUL-PORT |
Wormhole Attacks on Duty-Cycling Wireless Sensor Networks and Their Countermeasures Wang Wen Yang, Takashi Minohara (Takushoku Univ.) SS2017-32 DC2017-31 |
Wireless sensor networks(WSN) which employ a large number of wireless
sensor nodes to monitor physical or environmenta... [more] |
SS2017-32 DC2017-31 pp.67-72 |
IE, CS, IPSJ-AVM, ITE-BCT [detail] |
2016-12-09 15:15 |
Ishikawa |
|
Extension of Jigsaw Puzzle Solvers and Its Attack on Permutation-Based Image Encryption Schemes Tatsuya Chuman, Kenta Kurihara, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro. Univ.) CS2016-63 IE2016-99 |
Block-based scrambled image encryption schemes have superior features that are compressible and against noises to number... [more] |
CS2016-63 IE2016-99 pp.115-120 |
CPSY, DC, IPSJ-ARC (Joint) [detail] |
2016-08-09 12:15 |
Nagano |
Kissei-Bunka-Hall (Matsumoto) |
Formulating Attack Condition on Received Signal Strength Indicator based Device Authentication Tatsuya Fujii, Takatsugu Ono, Haruichi Kanaya, Koji Inoue (Kyushu Univ.) CPSY2016-22 DC2016-19 |
Spoofing attack in wireless communications is a critical issue, in which a malicious transmitter attempts to pretend to ... [more] |
CPSY2016-22 DC2016-19 pp.139-146(CPSY), pp.15-22(DC) |
ICSS, IPSJ-SPT |
2016-03-04 11:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A Suspicious Processes Detection Scheme using Process Frequency and Network State Junji Nakazato, Yu Tsuda, Eto Masashi, Daisuke Inoue, Koji Nakao (NICT) ICSS2015-60 |
Many serious security incidents caused by the targeted attacks have been occurred. The targeted attacks can not be preve... [more] |
ICSS2015-60 pp.77-82 |