Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-14 15:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Secrity Oriented Design of Polar-Coded OFDM on Selective Fading Channels Yuki Kuraya, Hideki Ochiai (YNU) IT2023-124 ISEC2023-123 WBS2023-112 RCC2023-106 |
We introduce a physical layer security scheme based on a polar-coded OFDM system in wireless communication. Our approach... [more] |
IT2023-124 ISEC2023-123 WBS2023-112 RCC2023-106 pp.306-311 |
SAT, SANE (Joint) |
2024-02-09 13:20 |
Kagoshima |
AmaHome PLAZA (Amami City Shimin Koryu Center) (Primary: On-site, Secondary: Online) |
Secure Firmware Updates for Nano-Satellites: Design Considerations and PoC Implementation Yuta Nakagawa, Keika Mori, Ryoya Furukawa, Hiroshi Kumagai, Masaki Kamizono (DTCY) SANE2023-111 |
With the increase in the number of satellite launches in recent years, cyber attacks on satellites have become a serious... [more] |
SANE2023-111 pp.43-48 |
ICSS |
2023-11-16 13:00 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Implementation of Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities, and A Study on Its Large-scale Demonstration Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2023-51 |
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] |
ICSS2023-51 pp.1-6 |
SR |
2023-11-10 11:10 |
Miyagi |
(Primary: On-site, Secondary: Online) |
[Short Paper]
Model Sharing and Learning for Visually Secure Deep Joint Source Channel Coding Yuyang Fu, Katsuya Suto (UEC) SR2023-59 |
Research and development of Deep Joint Source Channel Coding (DeepJSCC) technology, which is a data-driven design of inf... [more] |
SR2023-59 pp.64-66 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
A Study on the Application of Nudge to Improve Cybersecurity Hideyuki Fujii (NRI Secure) ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50 |
One possible measure to improve cybersecurity is the use of "Nudge". Nudge is designed (choice architectures) that chang... [more] |
ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50 pp.232-238 |
RCC, ISEC, IT, WBS |
2023-03-14 09:25 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
A Study on Secure Coded Communications Using Discrete Fourier Transform over Finite Fields Shoichiro Yamasaki (Hiroshima City Univ), Tomoko K. Matsushima (Yokohama College of Commerce), Hirokazu Tanaka (Hiroshima City Univ) IT2022-79 ISEC2022-58 WBS2022-76 RCC2022-76 |
The authors have proposed a security enhancement scheme using a shortened non-systematic
Reed-Solomon codes construc... [more] |
IT2022-79 ISEC2022-58 WBS2022-76 RCC2022-76 pp.74-79 |
RCC, ISEC, IT, WBS |
2023-03-14 15:45 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Enhancing physical-layer security by 4PPM space division multiplexing for smartphone screen to camera uplink communication Alisa Kawade, Wataru Chujo, Kentaro Kobayashi (Meijo Univ.) IT2022-86 ISEC2022-65 WBS2022-83 RCC2022-83 |
In indoor 3.5-m uplink screen camera communication using a smartphone screen and a video camera, it has been shown that ... [more] |
IT2022-86 ISEC2022-65 WBS2022-83 RCC2022-83 pp.114-119 |
HWS, VLD |
2023-03-01 13:50 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Circuit Optimization and Simulation Evaluation for Ultra-Low Voltage of LRPUF Using Manufacturing Variability of Leakage Current Shunkichi Hata, Kimiyoshi Usami (SIT) VLD2022-77 HWS2022-48 |
Low power consumption and low-voltage operation become critical issues to be addressed when PUF (Physically Unclonable F... [more] |
VLD2022-77 HWS2022-48 pp.25-30 |
HWS, VLD |
2023-03-02 15:20 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Secure Cache System against On-Chip Threats Keisuke Kamahori, Shinya Takamaeda (UTokyo) VLD2022-95 HWS2022-66 |
In this paper, we propose a new threat model for secure processor design that considers on-chip threats.
Also, we desi... [more] |
VLD2022-95 HWS2022-66 pp.113-118 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 11:35 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Design and Trial of Cyber Security Exercise for Basic CISO Skillset Tatsumi Seko, Touri Nakagawa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-104 |
Conventional security officers lack the authority and responsibility to make decisions related to management and are not... [more] |
NS2022-104 pp.23-28 |
ITE-BCT, OCS, IEE-CMN, OFT |
2022-11-10 14:00 |
Miyagi |
Forest-Sendai (Primary: On-site, Secondary: Online) |
Y-00 Quantum Noise Stream Cipher with Quantum Deliberate Signal Randomization and Its Application to Optical Fiber Transmission System Fumio Futami, Ken Tanizawa, Kentaro Kato (Tamagawa Univ.) OCS2022-41 |
Deliberate signal randomization (DSR) driven by quantum random numbers is proposed for enhancing security. PSK Y-00 ciph... [more] |
OCS2022-41 pp.7-12 |
ICTSSL, IN, NWS, IEE-SMF |
2022-10-27 14:55 |
Nagano |
Shinshu University (Primary: On-site, Secondary: Online) |
Data Security Verification in Supply Chain Keizo Sugiyama, Yuto Nakano, Yasuaki Kobayashi, Toru Nakamura, Haruki Ota, Takao Kojima, Yutaka Miyake, Shinsaku Kiyomoto (KDDI Research) ICTSSL2022-19 |
Highly sensitive data such as inspection data, design data, program module are often handled in a supply chain. As speci... [more] |
ICTSSL2022-19 pp.12-17 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 13:50 |
Online |
Online |
An overview of the secrecy of patent applications in the Japanese Law Makoto Koike (MK Microwave) ISEC2022-23 SITE2022-27 BioX2022-48 HWS2022-23 ICSS2022-31 EMM2022-31 |
Economic security promotion law enacted on May 11, 2022 includes the provisions to keep patent application secret in Jap... [more] |
ISEC2022-23 SITE2022-27 BioX2022-48 HWS2022-23 ICSS2022-31 EMM2022-31 pp.88-97 |
ICM |
2022-07-07 14:50 |
Hokkaido |
Tokachi Plaza (Primary: On-site, Secondary: Online) |
[Invited Talk]
Zero Trust Architecture and Risk Management Yuki Unno (Fujitsu Research) ICM2022-14 |
This paper describes what zero-trust architecture is, what are the threats to zero-trust architecture, and the risk mana... [more] |
ICM2022-14 pp.21-23 |
ICSS, IPSJ-SPT |
2022-03-07 13:30 |
Online |
Online |
Time Efficient Risk Assessment Tool for IoT Systems Rajulapati Shourya, Takashi Kawauchi (Hitachi) ICSS2021-60 |
We have developed an integrated security design platform that provides security analysis independent of the consultant's... [more] |
ICSS2021-60 p.13 |
RECONF, VLD, CPSY, IPSJ-ARC, IPSJ-SLDM [detail] |
2022-01-25 10:20 |
Online |
Online |
FPGA Implementation of Radar Imaging for Walk-Through Security Screening System Tatsuya Sumiya, Yuki Kobayashi, Masayuki Ariyoshi (NEC) VLD2021-64 CPSY2021-33 RECONF2021-72 |
To enhance security at facilities such as railway stations and commercial buildings where many people come and go withou... [more] |
VLD2021-64 CPSY2021-33 RECONF2021-72 pp.84-89 |
DC |
2021-12-10 14:00 |
Kagawa |
(Primary: On-site, Secondary: Online) |
A SAT and FALL Attacks Resistant Logic Locking Method at Register Transfer Level Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.), Masayoshi Yoshimura (Kyoto Sangyo Univ.) DC2021-57 |
In recent years, to meet strict time-to-market constraints, it has become difficult for only one semiconductor design co... [more] |
DC2021-57 pp.13-18 |
ICSS |
2021-11-29 13:50 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Automation of Security Vulnerability Analysis by Auto-generated DFD Shun Miyazaki, Junpei Kamimura (NEC) ICSS2021-48 |
System vulnerabilities can be caused by bugs such as buffer overflow, misconfigurations such as improper permission cont... [more] |
ICSS2021-48 pp.13-18 |
RISING (3rd) |
2021-11-16 09:30 |
Tokyo |
(Primary: On-site, Secondary: Online) |
On Attack Pattern Classification in IoT Networks for Network Intrusion Detection Systems Jesse Atuhurra, Takanori Hara (NAIST), Yuanyu Zhang (Xidian Univ.), Shoji Kasahara (NAIST) |
With the proliferation of IoT devices, IoT security problems arise. To protect heterogeneous connected devices in IoT ne... [more] |
|
RCS |
2021-10-21 10:50 |
Online |
Online |
Beamforming Design and Secrecy capacity analysis for Cell-Free massive MIMO Kengo Ando (UEC), Hiroki Iimori, Giuseppe Abreu (JUB), Koji Ishibashi (UEC) RCS2021-120 |
In this paper, we investigate a secure beamforming (BF) design for cell-free massive multiple input mul tiple output (CF... [more] |
RCS2021-120 pp.13-18 |