Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2025-03-06 14:05 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
A Comprehensive Survey on Secure Practices for GitHub Actions Yusuke Kubo (NTT Communications), Takuro Wakai (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT/RIKEN) |
(To be available after the conference date) [more] |
|
ICSS, IPSJ-SPT |
2025-03-07 11:45 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
A Security Evaluation Framework for V2X Communication in Autonomous Driving System Kodai Hirai, Yuna Tanaka (Waseda Univ.), Kazuki Nomoto (Waseda Univ./DTCY), Ryunosuke Kobayashi, Go Tsuruoka (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT/RIKEN) |
(To be available after the conference date) [more] |
|
ICSS, IPSJ-SPT |
2025-03-07 13:35 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
Evaluation and Defense of Malicious SIM Applet Memory Exhaustion Attack Rei Sakomoto, Ryusei Watanabe, Takahiro Matsuki (NFLabs.) |
(To be available after the conference date) [more] |
|
ICSS, IPSJ-SPT |
2025-03-07 14:50 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
Evaluation of Deployment Strategies for Active Directory Deception Techniques Using CyberBattleSim Akihiko Nakajima, Takao Okubo (IISEC) |
(To be available after the conference date) [more] |
|
ICSS, IPSJ-SPT |
2025-03-07 16:25 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
Collecting Infrequently Accessed but Trustworthy Domain Names Daiki Chiba, Hiroki Nakano, Takashi Koide (NTT Security Holdings/NTT) |
(To be available after the conference date) [more] |
|
HWS, ICD, VLD |
2025-03-06 14:25 |
Okinawa |
(Okinawa, Online) (Primary: On-site, Secondary: Online) |
Implementation Method and Circuit Fabrication for Photonic Circuits of Symmetric Key Cryptography Junko Takahashi, Shota Kita, Akihiko Shinya (NTT), Kazumaro Aoki (Bunkyo Univ), Koji Chida (Gunma Univ), Fumitaka Hoshino (Univ. of Nagasaki) |
(To be available after the conference date) [more] |
|
HWS, ICD, VLD |
2025-03-07 11:15 |
Okinawa |
(Okinawa, Online) (Primary: On-site, Secondary: Online) |
MTJ-PUF with Response Reuse and Evaluation of Machine Learning Attack Resistance Taiki Tsukada, Kimiyoshi Usami (SIT) |
(To be available after the conference date) [more] |
|
HWS, ICD, VLD |
2025-03-07 11:40 |
Okinawa |
(Okinawa, Online) (Primary: On-site, Secondary: Online) |
Cost reduction of fine-grained power domain partitioning circuits enabling hardware trojan detection Takahiro Ishikawa, Yoshihiro Midoh, Noriyuki Miura (Osaka Univ.), Michihiro Shintani (Kyoto Inst. of Tech.), Jun Shiomi (Osaka Univ.) |
(To be available after the conference date) [more] |
|
HWS, ICD, VLD |
2025-03-07 12:05 |
Okinawa |
(Okinawa, Online) (Primary: On-site, Secondary: Online) |
Development of Hardware Trojans using Transistor Characteristics in Low Temperature Environments Ayano Takaya, Ryuichi Nakajima (Kyoto Inst. of Tech.), Jun Shiomi (Osaka Univ.), Michihiro Shintani (Kyoto Inst. of Tech.) |
(To be available after the conference date) [more] |
|
WBS, ISEC, IT, RCC |
2025-03-05 12:40 |
Osaka |
Nakanoshima Center, Osaka University (Osaka) |
Survey of security measures targeting SMEs Yoshinaga Tatsuya, Minami Yoda, Yuichiro Gomi, Yutaka Matsuno (Nihon Univ.) |
(To be available after the conference date) [more] |
|
WBS, ISEC, IT, RCC |
2025-03-06 08:50 |
Osaka |
Nakanoshima Center, Osaka University (Osaka) |
Security notions of key combiner against adaptive chosen ciphertext attacks Ann Kasakawa, Toki Sasaki, Astushi Fujioka (Kanagawa Univ.), Akira Nagai, Kan Yasuda (NTT) |
(To be available after the conference date) [more] |
|
IA, SITE, IPSJ-IOT [detail] |
2025-03-03 10:35 |
Kagoshima |
Ama-Home Plaza (Kagoshima, Online) (Primary: On-site, Secondary: Online) |
A hybrid deception mechanism taking into consideration the sensitivity of information assets Kazuma Kasahara (Keio Univ.), Takao Kondo (Hokkaido Univ.), Satoshi Kai, Satoru Tezuka (Keio Univ.) |
(To be available after the conference date) [more] |
|
ET |
2025-03-01 09:55 |
Nagano |
Shinshu University Faculty of Education (Nagano) |
Development of Educational Materials for Supporting Security Learning on Wireless LAN Communication Targeting Secondary Education Kazuaki Yoshihara (Kindai Univ.) |
(To be available after the conference date) [more] |
|
ITS, IE, ITE-MMS, ITE-ME, ITE-AIT, ITE-SIP [detail] |
2025-02-19 10:55 |
Hokkaido |
(Hokkaido) |
On the Effectiveness of Information Screens Applied Nudegs for Decreasing Passage Time of Airport Security Checkpoint Taisei Ichimura (Saitama Univ.), Yuichiro Ishikawa, Naoya Kawase, Hisakazu Mizuno, Yuichiro Hirata (CJIAC), Hideo Ideguchi, Hiroyuki Uchiyama (AGP), Tetsuya Manabe (Saitama Univ.) |
(To be available after the conference date) [more] |
|
IA |
2025-01-23 13:30 |
Tokyo |
NICT Innovation Center (Tokyo, Online) (Primary: On-site, Secondary: Online) |
[Invited Lecture]
SecHack365: NICT's Initiatives for Fostering Cybersecurity Innovators Teruaki Yokoyama, Tomohiro Hanada, Michio Sonoda (NICT) IA2024-61 |
The National Institute of Information and Communications Technology (NICT) conducts the SecHack365 program, a year-long ... [more] |
IA2024-61 p.2 |
ICTSSL, CAS |
2025-01-23 11:00 |
Tokyo |
(Tokyo, Online) (Primary: On-site, Secondary: Online) |
A Study on Enhancing Cyber Physical Security Measures Using Generative AI Keizo Sugiyama, Masataka Nakahara, Ayumu Kubota (KDDI Research) CAS2024-80 ICTSSL2024-38 |
With the advancement of the integration between cyber and physical spaces, security measures are becoming increasingly s... [more] |
CAS2024-80 ICTSSL2024-38 pp.18-21 |
SeMI |
2025-01-23 15:30 |
Kanagawa |
(Kanagawa) |
IoT Security System Using Network Virtualization Technology with Manufacturer Communication Policy Takuma Sakamoto, Kenya Sato (Doshisha Univ.) SeMI2024-67 |
The recent development of the Internet of Things (IoT) has connected everything to the Internet, increasing convenience ... [more] |
SeMI2024-67 pp.29-34 |
ICM, LOIS |
2025-01-17 14:15 |
Kumamoto |
Kumamoto City International Center (Kumamoto, Online) (Primary: On-site, Secondary: Online) |
Automating the Deployment of Access Control and WAF System in Cloud Environment Shota Fujii (Kobe Univ.), Shohei Kakei (Nagoya Inst. of Tech.), Makoto Takita (Kobe Univ.), Masami Mohri (Kindai Univ.), Hiroki Kuzuno, Yoshiaki Shiraishi (Kobe Univ.) ICM2024-36 LOIS2024-69 |
Cyber-attacks exploiting vulnerabilities, such as SQL injection and cross-site scripting, threaten businesses, causing d... [more] |
ICM2024-36 LOIS2024-69 pp.100-105 |
MSS, SS |
2025-01-12 10:25 |
Kagoshima |
(Kagoshima) |
Proposal for Security Protocol Verification using Graph Database Hisashi Mori, Kazuki Yonemochi, Manabu Misawa (Mitsubishi Electric) MSS2024-43 SS2024-22 |
A model checking method using graph database software is investigated. A technique to ensure functional safety and secur... [more] |
MSS2024-43 SS2024-22 pp.7-12 |
NS, RCS (Joint) |
2024-12-19 19:05 |
Hokkaido |
Hakodate Arena + Online (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
A case study of a rule-based security method for distributed data stores for edge computing assuming mobile clients Koki Fujii, Tomio Kamada (Konan Univ.) NS2024-159 |
Edge computing is expected to be applied to traffic information and other fields that require low-latency data access.
... [more] |
NS2024-159 pp.92-97 |