IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: Recent 10 Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 24  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2024-11-21
14:00
Kanagawa MUZA Kawasaki Symphony Hall (Kanagawa) How to Utilize The LLVM Compiler Infrastructure for Self Destructive Tamper Resistant Software
Kazuomi Oishi (SIST) ICSS2024-66
Self destructive tamper resistant software can protect program from analysis and attacks. After the concept was proposed... [more] ICSS2024-66
pp.1-7
SC, KBSE 2024-11-09
09:00
Kochi Kochi-City Culture Plaza CUL-PORT (Kochi) Proposal for a Personal Information Retention System using the Tamper Resistance of SIM Cards in a Super-Emergency Situation
Kaito Watanabe (Tsukuba Univ), Rei Sakomoto, Takahiro Matsuki (NFLabs.), Naoto Hoshikawa (Tsukuba Univ) KBSE2024-31 SC2024-34
In catastrophic situations such as airplane crashes and tsunamis, the last message and personal information of terminal ... [more] KBSE2024-31 SC2024-34
pp.71-76
ICSS 2023-11-16
14:55
Ishikawa IT Business Plaza Musashi and Online (Ishikawa, Online)
(Primary: On-site, Secondary: Online)
A Study on Self Destructive Tamper Resistant Software utilizing Return-Oriented Programming (Part 3)
Kazuomi Oishi (SIST) ICSS2023-55
Self destructive tamper resistant software (SDTRS) is a tamper resistance technology that can protect a program by itsel... [more] ICSS2023-55
pp.30-34
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2023-11-16
14:10
Kumamoto Civic Auditorium Sears Home Yume Hall (Kumamoto, Online)
(Primary: On-site, Secondary: Online)
Hardware obfuscation method using Obfuscator-LLVM and Bambu
Mikiya Ogura, Shuichi Ichikawa (Toyohashi Univ. Tech.) VLD2023-54 ICD2023-62 DC2023-61 RECONF2023-57
Hardware obfuscation serves as a countermeasure against hardware reverse engineering. Yamada et al. employed the OLLVM s... [more] VLD2023-54 ICD2023-62 DC2023-61 RECONF2023-57
pp.125-130
ICD, SDM, ITE-IST [detail] 2022-08-08
15:45
Online (Online) Evaluation of Low-Latency Cryptography MANTIS based Low-Power oriented Tamper-Resistant Circuit
Kosuke Hamaguchi, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SDM2022-41 ICD2022-9
Lightweight cryptography can not only be implemented in a small area, but also with low latency and low power consumptio... [more] SDM2022-41 ICD2022-9
pp.31-36
ICSS, IPSJ-SPT 2022-03-08
10:40
Online Online (Online) A Study on Self Destructive Tamper Resistant Software utilizing Return-Oriented Programming (Part 2)
Kazuomi Oishi (SIST) ICSS2021-69
Taking into account CPU-level ROP (Return-Oriented Programming) defenses such as Intel CET, we study implementation feas... [more] ICSS2021-69
pp.61-65
ICSS 2021-11-29
13:25
Kochi KOCHIJYO HALL (Kochi, Online)
(Primary: On-site, Secondary: Online)
A Study on Tamper Resistance of Trusted Execution Environment
Kazuomi Oishi (SIST) ICSS2021-47
A Trusted Execution Environment (TEE) provides isolated execution inside a TEE from the outside. The outside environment... [more] ICSS2021-47
pp.7-12
HWS, VLD 2019-03-01
16:20
Okinawa Okinawa Ken Seinen Kaikan (Okinawa) Low-Cost Power Analysis Countermeasures for Unrolled Architecture Implementation PRINCE
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-134 HWS2018-97
Lightweight block ciphers, which can be implemented with low cost, are suitable for improving the safety of small device... [more] VLD2018-134 HWS2018-97
pp.243-248
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
14:35
Hokkaido Sapporo Convention Center (Hokkaido) Side-Channel Countermeasure for XOR based PUF and Its Evaluation
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ISEC2018-42 SITE2018-34 HWS2018-39 ICSS2018-45 EMM2018-41
XOR based physical unclonable functions (PUFs) have been proposed as countermeasures against modeling attacks. On the ot... [more] ISEC2018-42 SITE2018-34 HWS2018-39 ICSS2018-45 EMM2018-41
pp.337-342
VLD, HWS
(Joint)
2018-03-02
14:55
Okinawa Okinawa Seinen Kaikan (Okinawa) Machine Learning Attack Using Selectable Challenge Set for Feed-Forward PUF
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2017-128
The dreadful of machine learning attack for physical unclonable functions (PUFs) has been reported. Therefore, PUFs with... [more] VLD2017-128
pp.237-242
ISEC, COMP 2017-12-21
16:40
Kochi Eikokuji Campus, Kochi University of Technology (Kochi) Implementation Difficulty of Dynamic Self-Modifying Based Self Destructive Tamper Response
Kazuomi Oishi (SIST) ISEC2017-82 COMP2017-36
Tamper resistant software, which has sufficient resistance against analysis and attack, is a necessary and important tec... [more] ISEC2017-82 COMP2017-36
pp.67-74
NLP 2017-07-14
10:25
Okinawa Miyako Island Marine Terminal (Okinawa) Power Analysis Attack for SIMON-JAMBU
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NLP2017-40
Authenticated encryption mode, which can perform the encryption of data and the authentication simultaneously, has been ... [more] NLP2017-40
pp.67-72
ISEC, WBS, IT 2017-03-10
11:20
Tokyo TOKAI University (Tokyo) Software Protection by Hash-Table-Based Interlocking of Self Integrity Verification
Naoki Watanabe, Naoki Yoshida, Tsutomu Matsumoto (YNU) IT2016-120 ISEC2016-110 WBS2016-96
In order to detect unauthorized modification, tamper-resistant software often adopts self integrity verification mechani... [more] IT2016-120 ISEC2016-110 WBS2016-96
pp.137-144
NLP 2016-12-12
15:50
Aichi Chukyo Univ. (Aichi) Fault Analysis for Midori
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NLP2016-90
Lightweight block ciphers, which can be utilized in low power and small area, have attracted attention in the security o... [more] NLP2016-90
pp.33-38
CAS, NLP 2016-10-28
10:20
Tokyo (Tokyo) Power Analysis Attack for Midori
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2016-53 NLP2016-79
Recently, lightweight block ciphers, which can be implemented on small area and low energy, have attracted attention. Mi... [more] CAS2016-53 NLP2016-79
pp.79-84
VLD 2016-03-01
10:30
Okinawa Okinawa Seinen Kaikan (Okinawa) Electromagnetic Analysis Attack for Simeck and Simon
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2015-121
The risk of attack against IoT devices has been increased. Since IoT devices require constraint of area and power consum... [more] VLD2015-121
pp.61-66
CAS 2016-01-28
14:45
Tokyo Kikai-Shinko-Kaikan Bldg. (Tokyo) Fault Analysis Attack for a Lightweight Block Cipher Simeck
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2015-67
Since internet of things (IoT) devices such as sensor device or automotive equipment, become widespread, the security of... [more] CAS2015-67
pp.33-38
CAS 2016-01-28
16:15
Tokyo Kikai-Shinko-Kaikan Bldg. (Tokyo) Quantitative Evaluation of Tamper Resistance for Random Number Masking
Ryoma Matsuhisa, Masaya Yoshikawa (Meijo Univ.) CAS2015-70
When a cryptographic circuit is used, it is extremely important to verify its tamper resistance against side-channel att... [more] CAS2015-70
pp.51-56
DC 2015-12-18
14:50
Niigata Kurieito Mulakami (Murakami City) (Niigata) Electromagnetic Analysis for Lightweight Block Ciphers and its Evaluation
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) DC2015-78
The security of embedded devices became an important issue for internet of things (IoT). So, lightweight block ciphers h... [more] DC2015-78
pp.29-34
COMP 2015-12-01
11:00
Osaka (Osaka) Power Analysis Attack for a Lightweight Block Cipher Simeck
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) COMP2015-32
Lightweight block ciphers have attracted attention, because an interest against the security of embedded devices has bee... [more] COMP2015-32
pp.17-22
 Results 1 - 20 of 24  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan