Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2024-11-21 14:00 |
Kanagawa |
MUZA Kawasaki Symphony Hall (Kanagawa) |
How to Utilize The LLVM Compiler Infrastructure for Self Destructive Tamper Resistant Software Kazuomi Oishi (SIST) ICSS2024-66 |
Self destructive tamper resistant software can protect program from analysis and attacks. After the concept was proposed... [more] |
ICSS2024-66 pp.1-7 |
SC, KBSE |
2024-11-09 09:00 |
Kochi |
Kochi-City Culture Plaza CUL-PORT (Kochi) |
Proposal for a Personal Information Retention System using the Tamper Resistance of SIM Cards in a Super-Emergency Situation Kaito Watanabe (Tsukuba Univ), Rei Sakomoto, Takahiro Matsuki (NFLabs.), Naoto Hoshikawa (Tsukuba Univ) KBSE2024-31 SC2024-34 |
In catastrophic situations such as airplane crashes and tsunamis, the last message and personal information of terminal ... [more] |
KBSE2024-31 SC2024-34 pp.71-76 |
ICSS |
2023-11-16 14:55 |
Ishikawa |
IT Business Plaza Musashi and Online (Ishikawa, Online) (Primary: On-site, Secondary: Online) |
A Study on Self Destructive Tamper Resistant Software utilizing Return-Oriented Programming (Part 3) Kazuomi Oishi (SIST) ICSS2023-55 |
Self destructive tamper resistant software (SDTRS) is a tamper resistance technology that can protect a program by itsel... [more] |
ICSS2023-55 pp.30-34 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-16 14:10 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Kumamoto, Online) (Primary: On-site, Secondary: Online) |
Hardware obfuscation method using Obfuscator-LLVM and Bambu Mikiya Ogura, Shuichi Ichikawa (Toyohashi Univ. Tech.) VLD2023-54 ICD2023-62 DC2023-61 RECONF2023-57 |
Hardware obfuscation serves as a countermeasure against hardware reverse engineering. Yamada et al. employed the OLLVM s... [more] |
VLD2023-54 ICD2023-62 DC2023-61 RECONF2023-57 pp.125-130 |
ICD, SDM, ITE-IST [detail] |
2022-08-08 15:45 |
Online |
(Online) |
Evaluation of Low-Latency Cryptography MANTIS based Low-Power oriented Tamper-Resistant Circuit Kosuke Hamaguchi, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SDM2022-41 ICD2022-9 |
Lightweight cryptography can not only be implemented in a small area, but also with low latency and low power consumptio... [more] |
SDM2022-41 ICD2022-9 pp.31-36 |
ICSS, IPSJ-SPT |
2022-03-08 10:40 |
Online |
Online (Online) |
A Study on Self Destructive Tamper Resistant Software utilizing Return-Oriented Programming (Part 2) Kazuomi Oishi (SIST) ICSS2021-69 |
Taking into account CPU-level ROP (Return-Oriented Programming) defenses such as Intel CET, we study implementation feas... [more] |
ICSS2021-69 pp.61-65 |
ICSS |
2021-11-29 13:25 |
Kochi |
KOCHIJYO HALL (Kochi, Online) (Primary: On-site, Secondary: Online) |
A Study on Tamper Resistance of Trusted Execution Environment Kazuomi Oishi (SIST) ICSS2021-47 |
A Trusted Execution Environment (TEE) provides isolated execution inside a TEE from the outside. The outside environment... [more] |
ICSS2021-47 pp.7-12 |
HWS, VLD |
2019-03-01 16:20 |
Okinawa |
Okinawa Ken Seinen Kaikan (Okinawa) |
Low-Cost Power Analysis Countermeasures for Unrolled Architecture Implementation PRINCE Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-134 HWS2018-97 |
Lightweight block ciphers, which can be implemented with low cost, are suitable for improving the safety of small device... [more] |
VLD2018-134 HWS2018-97 pp.243-248 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 14:35 |
Hokkaido |
Sapporo Convention Center (Hokkaido) |
Side-Channel Countermeasure for XOR based PUF and Its Evaluation Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ISEC2018-42 SITE2018-34 HWS2018-39 ICSS2018-45 EMM2018-41 |
XOR based physical unclonable functions (PUFs) have been proposed as countermeasures against modeling attacks. On the ot... [more] |
ISEC2018-42 SITE2018-34 HWS2018-39 ICSS2018-45 EMM2018-41 pp.337-342 |
VLD, HWS (Joint) |
2018-03-02 14:55 |
Okinawa |
Okinawa Seinen Kaikan (Okinawa) |
Machine Learning Attack Using Selectable Challenge Set for Feed-Forward PUF Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2017-128 |
The dreadful of machine learning attack for physical unclonable functions (PUFs) has been reported. Therefore, PUFs with... [more] |
VLD2017-128 pp.237-242 |
ISEC, COMP |
2017-12-21 16:40 |
Kochi |
Eikokuji Campus, Kochi University of Technology (Kochi) |
Implementation Difficulty of Dynamic Self-Modifying Based Self Destructive Tamper Response Kazuomi Oishi (SIST) ISEC2017-82 COMP2017-36 |
Tamper resistant software, which has sufficient resistance against analysis and attack, is a necessary and important tec... [more] |
ISEC2017-82 COMP2017-36 pp.67-74 |
NLP |
2017-07-14 10:25 |
Okinawa |
Miyako Island Marine Terminal (Okinawa) |
Power Analysis Attack for SIMON-JAMBU Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NLP2017-40 |
Authenticated encryption mode, which can perform the encryption of data and the authentication simultaneously, has been ... [more] |
NLP2017-40 pp.67-72 |
ISEC, WBS, IT |
2017-03-10 11:20 |
Tokyo |
TOKAI University (Tokyo) |
Software Protection by Hash-Table-Based Interlocking of Self Integrity Verification Naoki Watanabe, Naoki Yoshida, Tsutomu Matsumoto (YNU) IT2016-120 ISEC2016-110 WBS2016-96 |
In order to detect unauthorized modification, tamper-resistant software often adopts self integrity verification mechani... [more] |
IT2016-120 ISEC2016-110 WBS2016-96 pp.137-144 |
NLP |
2016-12-12 15:50 |
Aichi |
Chukyo Univ. (Aichi) |
Fault Analysis for Midori Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NLP2016-90 |
Lightweight block ciphers, which can be utilized in low power and small area, have attracted attention in the security o... [more] |
NLP2016-90 pp.33-38 |
CAS, NLP |
2016-10-28 10:20 |
Tokyo |
(Tokyo) |
Power Analysis Attack for Midori Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2016-53 NLP2016-79 |
Recently, lightweight block ciphers, which can be implemented on small area and low energy, have attracted attention. Mi... [more] |
CAS2016-53 NLP2016-79 pp.79-84 |
VLD |
2016-03-01 10:30 |
Okinawa |
Okinawa Seinen Kaikan (Okinawa) |
Electromagnetic Analysis Attack for Simeck and Simon Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2015-121 |
The risk of attack against IoT devices has been increased. Since IoT devices require constraint of area and power consum... [more] |
VLD2015-121 pp.61-66 |
CAS |
2016-01-28 14:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Tokyo) |
Fault Analysis Attack for a Lightweight Block Cipher Simeck Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2015-67 |
Since internet of things (IoT) devices such as sensor device or automotive equipment, become widespread, the security of... [more] |
CAS2015-67 pp.33-38 |
CAS |
2016-01-28 16:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Tokyo) |
Quantitative Evaluation of Tamper Resistance for Random Number Masking Ryoma Matsuhisa, Masaya Yoshikawa (Meijo Univ.) CAS2015-70 |
When a cryptographic circuit is used, it is extremely important to verify its tamper resistance against side-channel att... [more] |
CAS2015-70 pp.51-56 |
DC |
2015-12-18 14:50 |
Niigata |
Kurieito Mulakami (Murakami City) (Niigata) |
Electromagnetic Analysis for Lightweight Block Ciphers and its Evaluation Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) DC2015-78 |
The security of embedded devices became an important issue for internet of things (IoT). So, lightweight block ciphers h... [more] |
DC2015-78 pp.29-34 |
COMP |
2015-12-01 11:00 |
Osaka |
(Osaka) |
Power Analysis Attack for a Lightweight Block Cipher Simeck Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) COMP2015-32 |
Lightweight block ciphers have attracted attention, because an interest against the security of embedded devices has bee... [more] |
COMP2015-32 pp.17-22 |