Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SeMI |
2025-01-23 15:30 |
Kanagawa |
(Kanagawa) |
IoT Security System Using Network Virtualization Technology with Manufacturer Communication Policy Takuma Sakamoto, Kenya Sato (Doshisha Univ.) |
(To be available after the conference date) [more] |
|
ICM, LOIS |
2025-01-17 14:15 |
Kumamoto |
Kumamoto City International Center (Kumamoto, Online) (Primary: On-site, Secondary: Online) |
Automating the Deployment of Access Control and WAF System in Cloud Environment Shota Fujii (Kobe Univ.), Shohei Kakei (Nagoya Inst. of Tech.), Makoto Takita (Kobe Univ.), Masami Mohri (Kindai Univ.), Hiroki Kuzuno, Yoshiaki Shiraishi (Kobe Univ.) ICM2024-36 LOIS2024-69 |
(To be available after the conference date) [more] |
ICM2024-36 LOIS2024-69 pp.100-105 |
NS, RCS (Joint) |
2024-12-19 19:05 |
Hokkaido |
Hakodate Arena + Online (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
A case study of a rule-based security method for distributed data stores for edge computing assuming mobile clients Koki Fujii, Tomio Kamada (Konan Univ.) NS2024-159 |
Edge computing is expected to be applied to traffic information and other fields that require low-latency data access.
... [more] |
NS2024-159 pp.92-97 |
WBS, ITS, RCC |
2024-12-04 12:40 |
Kagoshima |
Kagoshima Prefectural Culture Center (Kagoshima, Online) (Primary: On-site, Secondary: Online) |
[Invited Lecture]
Challenges and prospects of communication technology supporting electric power infrastructure Daiji Kawashima, Rinzou Yamaoka, Hiroaki Yamaguchi, Yuta Hiramatsu (Kyushu Electric Power Transmission and Distribution) WBS2024-37 ITS2024-18 RCC2024-42 |
The transmission and distribution companies build, maintain, and operate their own communication networks for power cont... [more] |
WBS2024-37 ITS2024-18 RCC2024-42 p.38 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-23 09:40 |
Hokkaido |
Sapporo Convention Center (Hokkaido) |
A Study on Detection Method of Aged Microcontrollers Using Side-Channel Information Yuki Kaneko (Tohoku Univ.), Yuichi Hayashi (NAIST), Naofumi Homma (Tohoku Univ.) ISEC2024-50 SITE2024-47 BioX2024-60 HWS2024-50 ICSS2024-54 EMM2024-56 |
This paper describes a basic study on detection method of aged microcontrollers using side-channel information. [more] |
ISEC2024-50 SITE2024-47 BioX2024-60 HWS2024-50 ICSS2024-54 EMM2024-56 pp.272-277 |
VLD, CAS, SIP, MSS |
2024-07-18 14:00 |
Aomori |
(Aomori, Online) (Primary: On-site, Secondary: Online) |
Measurement of Leakage based Strong PUF Operating at Ultra Low Voltage Using a Leakage Control Approach Shunkichi Hata, Kimiyoshi Usami (SIT) CAS2024-8 VLD2024-8 SIP2024-25 MSS2024-8 |
Low voltage operation becomes issues to be addressed when PUF (Physically Unclonable Function) is mounted on devices tha... [more] |
CAS2024-8 VLD2024-8 SIP2024-25 MSS2024-8 pp.41-46 |
RCC, RCS, SeMI, NS, SR, RISING (Joint) |
2024-07-18 14:05 |
Hokkaido |
Hokkaido Citizens Activities Promotion Center (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
[Invited Talk]
Hardware security for robust and transparent network systems Yuichi Hayashi (NAIST) |
Transparent communication, achieved through the integration of sensing, computation, and devices, allows for information... [more] |
|
ICM |
2024-03-22 09:10 |
Okinawa |
Okinawa Prefectural Museum and Art Museum (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Proposal of an implication relationship estimation method for information security related regulatory documents Kouki Nakanishi, Tkakani ikuko, Sakamoto Masanobu, Ohishi Haruo (NTT) ICM2023-51 |
In recent years, internal controls regarding information security have become increasingly important from the perspectiv... [more] |
ICM2023-51 pp.35-40 |
IA, SITE, IPSJ-IOT [detail] |
2024-03-12 13:45 |
Okinawa |
Miyakojima City Future Creation Center (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Dynamic control of redundancy factor k in the byzantine-resilient structured overlay network ByzSkip Toyokazu Akiyama (Kyoto Sangyo Univ.), Yuuichi Teranishi (NICT), Kota Abe (Osaka Metropolitan Univ.) SITE2023-74 IA2023-80 |
While key-order preserving structured overlay networks (KOPSONs) with Byzantine Fault Tolerance (BFT) are expected to ha... [more] |
SITE2023-74 IA2023-80 pp.36-42 |
VLD, HWS, ICD |
2024-03-02 09:45 |
Okinawa |
(Okinawa, Online) (Primary: On-site, Secondary: Online) |
Demonstrating a Real Car Covered with Infra-red-cut Films to Hide itself from LiDAR Yuki Fukatsu, Akira Iwahashi, Naoki Yoshida, Tsutomu Matsumoto (YNU) VLD2023-135 HWS2023-95 ICD2023-124 |
In recent years, various technologies have been developed toward the practical application of fully automated driving. A... [more] |
VLD2023-135 HWS2023-95 ICD2023-124 pp.190-195 |
ICM, NS, CQ, NV (Joint) |
2023-11-22 09:50 |
Ehime |
Ehime Prefecture Gender Equality Center (Ehime, Online) (Primary: On-site, Secondary: Online) |
A survey on suitable hook points for outbound packet monitoring using eBPF Masaya Okabe, Hiroshi Tsunoda (Tohtech) ICM2023-27 |
The use of VPNs and similar technologies has made it difficult to define network boundaries, and traditional boundary se... [more] |
ICM2023-27 pp.26-31 |
ICSS |
2023-11-16 13:25 |
Ishikawa |
IT Business Plaza Musashi and Online (Ishikawa, Online) (Primary: On-site, Secondary: Online) |
Real time detection for replay-attack communication in control system Koushi Nishi, Yuichi Futa (TUT), Hiroyuki Okazaki (Shinshu University) ICSS2023-52 |
Attacks on control system in factory and power plant are increasing every year. Therefore, System that monitor communica... [more] |
ICSS2023-52 pp.7-14 |
LOIS, SITE, ISEC |
2023-11-10 10:45 |
Hiroshima |
Satellite Campus Hiroshima (Hiroshima, Online) (Primary: On-site, Secondary: Online) |
NTP Tunneling Threat Model Verification and Countermeasure Shinjisangeru Sugasawa, Hisayoshi Kunimune, Shigeaki Tanimoto (CIT) ISEC2023-64 SITE2023-58 LOIS2023-22 |
Fraudulent covert communication methods are techniques used by attackers to avoid detection of malicious communication b... [more] |
ISEC2023-64 SITE2023-58 LOIS2023-22 pp.66-71 |
CPSY, DC, IPSJ-ARC [detail] |
2023-08-04 13:40 |
Hokkaido |
Hakodate Arena (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
A Classification of Security Threats and Countermeasure Directions for Cloud-based Railway Signalling Systems Using COTS Components Takashi Toyama, Akihiro Gion (RTRI) |
Research and development of cloud-based railway signaling systems, which remotely control signalling devices or trains f... [more] |
|
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 10:00 |
Hokkaido |
Hokkaido Jichiro Kaikan (Hokkaido) |
An Implementation and Evaluation of Communication Schemes Using Authenticated Cryptography for MAVLink Communication Ryuto Kuwada, Nobuya Ishihara, Yuta Kodera, Yasuyuki Nogami (Okayama Univ.) ISEC2023-39 SITE2023-33 BioX2023-42 HWS2023-39 ICSS2023-36 EMM2023-39 |
MAVLink is a lightweight communication protocol used between drones and ground stations to transmit drone status and con... [more] |
ISEC2023-39 SITE2023-33 BioX2023-42 HWS2023-39 ICSS2023-36 EMM2023-39 pp.165-170 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:20 |
Hokkaido |
Hokkaido Jichiro Kaikan (Hokkaido) |
Secure Cryptographic Unit with built-in Signature Generation Hardware for Aggregate Signature Schemes and its FPGA Implementation Toshihiro Sato, Shohei Kawasaki (SCU), Kaoru Masada (Tokyo Univ.), Riku Anzai, Junichi Sakamoto, Naoki Yoshida (YNU), Yasuyoshi Uemura (SCU), Makoto Ikeda (Tokyo Univ.), Tsutomu Matsumoto (YNU) ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42 |
Secure Cryptographic Unit (SCU) consists of a hardware cryptographic engine and an access control mechanism for the engi... [more] |
ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42 pp.182-187 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 14:50 |
Hokkaido |
Hokkaido Jichiro Kaikan (Hokkaido) |
Anomaly detection with dataset including replay-attack communication Koushi Nishi, Futa Yuichi (TUT), Okazaki Hiroyuki (Shinshu University) ISEC2023-52 SITE2023-46 BioX2023-55 HWS2023-52 ICSS2023-49 EMM2023-52 |
General-purpose devices and communications are increasingly introduced to control systems in factories and power plants ... [more] |
ISEC2023-52 SITE2023-46 BioX2023-55 HWS2023-52 ICSS2023-49 EMM2023-52 pp.247-254 |
SWIM, KBSE |
2023-05-19 15:10 |
Shizuoka |
(Shizuoka, Online) (Primary: On-site, Secondary: Online) |
DARPA-Like Organization and Role of Univeristy
-- A Global Perspective Regarding AI R&D -- Haruki Ueno (NII) KBSE2023-3 SWIM2023-3 |
Dual-use technology (DUT) refers to technology that can be used for both peaceful and military purposes, and has its roo... [more] |
KBSE2023-3 SWIM2023-3 pp.13-20 |
ICSS, IPSJ-SPT |
2023-03-13 16:10 |
Okinawa |
Okinawaken Seinenkaikan (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Implementation and Evaluation for Remote-Control Security System of IoT Devices Masaru Takeuchi (JDC), Yohei Watanabe (UEC/JDC), Naoto Yanai (OU/JDC), Akira Takeuchi (JDC), Tatsuya Takehisa (Nisshin), Yukitoshi Sanada (KU/JDC), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2022-67 |
We have proposed the Remote-Control System for securing IoT devices from malwares. It consists of a control algorithm ba... [more] |
ICSS2022-67 pp.115-120 |
NS, NWS (Joint) |
2023-01-26 13:00 |
Yamaguchi |
Hybrid Meeting (Yamaguchi Prefecture) (Yamaguchi, Online) (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
A User Authenticity Verification Method Using Behavioral and Cognitive Biometrics for Zero Trust Access Control Mechanisms Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-153 |
In recent years, remote access to confidential data necessary for work has been rapidly increasing due to the spread of ... [more] |
NS2022-153 pp.19-24 |