Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT |
2024-08-07 10:30 |
Okayama |
Okayama University, Tsushima campus (Primary: On-site, Secondary: Online) |
Revisiting the Lossy Signature Scheme Based on DSDL Problem Tihang Wijaya, Bagus Santoso (UEC) |
[more] |
|
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 14:50 |
Hokkaido |
Sapporo Convention Center |
Performance Evaluation of Improved SuperSonic Glitch PUF Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ISEC2024-26 SITE2024-23 BioX2024-36 HWS2024-26 ICSS2024-30 EMM2024-32 |
In accordance with the basic plan for science and technology in Japan, The fundamental technologies of digital social in... [more] |
ISEC2024-26 SITE2024-23 BioX2024-36 HWS2024-26 ICSS2024-30 EMM2024-32 pp.128-132 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 17:30 |
Hokkaido |
Sapporo Convention Center |
Security Analysis of a Contactless Dial Lock Authentication System Kaiya Yokokura, Bo Wu, Kiminori Sato (TUT) ISEC2024-36 SITE2024-33 BioX2024-46 HWS2024-36 ICSS2024-40 EMM2024-42 |
Currently, knowledge-based authentication methods such as PIN codes, passwords, and patterns are widely used in many asp... [more] |
ISEC2024-36 SITE2024-33 BioX2024-46 HWS2024-36 ICSS2024-40 EMM2024-42 pp.182-187 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 16:40 |
Hokkaido |
Sapporo Convention Center |
Defending against adversarial example attacks by a denoising autoencoder and physical random noise Yuki Rogi, Kota Yoshida, Tatsuya Oyama, Takeshi Fujino, Shunsuke Okura (Ritsumeikan Univ.) ISEC2024-38 SITE2024-35 BioX2024-48 HWS2024-38 ICSS2024-42 EMM2024-44 |
With the development of IoT technology, edge AI has attracted widespread attention. However, edge AI shows vulnerability... [more] |
ISEC2024-38 SITE2024-35 BioX2024-48 HWS2024-38 ICSS2024-42 EMM2024-44 pp.194-199 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-23 09:40 |
Hokkaido |
Sapporo Convention Center |
A Study on Detection Method of Aged Microcontrollers Using Side-Channel Information Yuki Kaneko (Tohoku Univ.), Yuichi Hayashi (NAIST), Naofumi Homma (Tohoku Univ.) ISEC2024-50 SITE2024-47 BioX2024-60 HWS2024-50 ICSS2024-54 EMM2024-56 |
This paper describes a basic study on detection method of aged microcontrollers using side-channel information. [more] |
ISEC2024-50 SITE2024-47 BioX2024-60 HWS2024-50 ICSS2024-54 EMM2024-56 pp.272-277 |
VLD, CAS, SIP, MSS |
2024-07-18 14:00 |
Aomori |
(Primary: On-site, Secondary: Online) |
Measurement of Leakage based Strong PUF Operating at Ultra Low Voltage Using a Leakage Control Approach Shunkichi Hata, Kimiyoshi Usami (SIT) CAS2024-8 VLD2024-8 SIP2024-25 MSS2024-8 |
Low voltage operation becomes issues to be addressed when PUF (Physically Unclonable Function) is mounted on devices tha... [more] |
CAS2024-8 VLD2024-8 SIP2024-25 MSS2024-8 pp.41-46 |
RCC, RCS, SeMI, NS, SR, RISING (Joint) |
2024-07-18 09:00 |
Hokkaido |
Hokkaido Citizens Activities Promotion Center (Primary: On-site, Secondary: Online) |
Analysis of Hybrid Cyber Attacks in State Estimation of Power Networks Yuta Kajinishi, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) RCC2024-24 |
In this paper, we discuss hybrid cyber attacks in state estimation of power networks from the viewpoint of security indi... [more] |
RCC2024-24 pp.35-38 |
RCC, RCS, SeMI, NS, SR, RISING (Joint) |
2024-07-18 16:20 |
Hokkaido |
Hokkaido Citizens Activities Promotion Center (Primary: On-site, Secondary: Online) |
Physical Layer Security Based on Dynamic Frozen Bit Design for Polar-Coded OFDM Systems Yuto Hama (Yokohama Nat. Univ.) RCS2024-104 |
In general, physical layer security in wiretap channels requires that the channel of the eavesdropper is degraded relati... [more] |
RCS2024-104 pp.101-106 |
EMCJ, IEE-EMC, IEE-SPC |
2024-06-28 16:20 |
Hokkaido |
Hotel Suncity |
Calculation of Target Attenuation of Transfer Function to Suppress Side-Channel Information Leakage from Cryptographic IC
-- Study Based on Simulated Switching Current Source -- Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) EMCJ2024-19 |
Side-channel attacks (SCAs) recover the secret key for cryptography by analyzing the switching noises generated by crypt... [more] |
EMCJ2024-19 pp.65-70 |
RCS |
2024-06-20 14:15 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Study on Physical-Layer Encrypted Relay Transmission Method Using Group Key for Distributed Terminal Cooperative Communication Keita Ito, Eiji Okamoto (NITech) RCS2024-62 |
Multiple-input multiple-output (MIMO) techniques are commonly used to improve frequency efficiency and channel capacity.... [more] |
RCS2024-62 pp.203-208 |
IA, ICSS |
2024-06-17 16:00 |
Okayama |
Okayama University (Primary: On-site, Secondary: Online) |
[Invited Talk]
Basic SecCap: Practical Security Education Based on Inter-University Collaboration Tokumi Yokohira (Okayama Univ.), Hideaki Sone (Tohoku Univ.), Hideki Sunahara (Keio Univ.), Satoru Izumi (Tohoku Unvi./NIT, Sendai College), Miyuki Hirose (Kyutech/TDU), Daiya Kato (Keio Univ.) IA2024-6 ICSS2024-6 |
In order to provide practical education on IT technologies, the Ministry of Education, Culture, Sports, Science and Tech... [more] |
IA2024-6 ICSS2024-6 p.35 |
SAT, MICT, WBS, RCC (Joint) [detail] |
2024-05-17 11:15 |
Miyazaki |
KITEN Convention hall (Miyazaki) (Primary: On-site, Secondary: Online) |
[Invited Lecture]
The Overview of SparkLink Technology and its Enabled Vision of Smart City Wang Junyi, Yang Weijia, Ken Kamiryu, Yasuhiro Kondo (AZAPA) WBS2024-12 RCC2024-12 |
Bluetooth and Wi-Fi are the Near Field Communication technologies most commonly used by consumers today. However, there ... [more] |
WBS2024-12 RCC2024-12 pp.56-59 |
ISEC |
2024-05-15 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Detection of Adversarial Example Attacks in Deep Learning Focusing on Data Manifolds and Inner Product Signs in Classifiers Hiroki Hisashige, Hajime Tasaki, Mao Fujita, Jinhui Chao (Chuo Univ.) ISEC2024-2 |
Adversarial example attacks against Deep Learning are known to lead misclassification by adding invisible perturbations ... [more] |
ISEC2024-2 pp.7-12 |
HWS |
2024-04-19 14:10 |
Tokyo |
(Primary: On-site, Secondary: Online) |
[Memorial Lecture]
Hardware security and trust
-- The nice relationship between digital trust and hardware security -- Yasushi Matsumoto (JNSA) HWS2024-1 |
Describes digital trusts, a system that plays an important role in trust formation in the digital society [more] |
HWS2024-1 pp.1-2 |
ICD |
2024-04-11 10:45 |
Kanagawa |
(Primary: On-site, Secondary: Online) |
[Invited Lecture]
An SPN Strong PUF with SRAM-based Entropy Source Featuring Both 100-Bit Output Space and Modeling Attack Resilience Kunyang Liu (Kyoto Univ.), Yichen Tang (Lenovo), Shufan Xu, Kiichi Niitsu (Kyoto Univ.), Hirofumi Shinohara (Waseda Univ.) ICD2024-2 |
Strong physically unclonable function (Strong PUF) is a hardware-security circuit that generates response outputs corres... [more] |
ICD2024-2 p.7 |
CCS |
2024-03-27 16:50 |
Hokkaido |
RUSUTSU RESORT |
JPEG Compression Quality Setting Considering Image Quality and Information Loss for Correlated Steganography Mariiko Aikawa, Sumiko Miyata (SIT), Kaito Hosono, Hirotsugu Kinoshita (KU) CCS2023-50 |
As more and more confidential information, including personal information, is transmitted and received over the Internet... [more] |
CCS2023-50 pp.64-69 |
ICM |
2024-03-22 09:10 |
Okinawa |
Okinawa Prefectural Museum and Art Museum (Primary: On-site, Secondary: Online) |
Proposal of an implication relationship estimation method for information security related regulatory documents Kouki Nakanishi, Tkakani ikuko, Sakamoto Masanobu, Ohishi Haruo (NTT) ICM2023-51 |
In recent years, internal controls regarding information security have become increasingly important from the perspectiv... [more] |
ICM2023-51 pp.35-40 |
ICSS, IPSJ-SPT |
2024-03-21 14:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
ICSS2023-75 |
With the proliferation of IoT devices, there has been an increase in security incidents targeting IoT devices. To active... [more] |
ICSS2023-75 pp.43-50 |
ICSS, IPSJ-SPT |
2024-03-22 08:30 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Proposal of Moving Target Defense Approach on Reliability in Web Services Mamoru Saita (Keio Univ.), Shunsuke Hashimoto (Univ. of Hyogo), Atsuo Inomata (Osaka Univ.), Hiroyuki Inoue (Kyoto Sangyo Univ.) ICSS2023-82 |
Although modern Web services are built on a high level of security and reliability, the static properties of networks re... [more] |
ICSS2023-82 pp.93-99 |
ICSS, IPSJ-SPT |
2024-03-22 12:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Study of the Label-Flipping Poisoning Attack on Machine-Learning Based Malicious URL Query Detection. Akira Matsunami (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-90 |
In recent years, there have been a large increase of cyber attacks with increasing use of web applications. A method to... [more] |
ICSS2023-90 pp.153-159 |