Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CNR, BioX |
2024-02-29 13:30 |
Tokyo |
NHK Science & Technology Research Laboratories (Primary: On-site, Secondary: Online) |
Design of Aerial dialing PIN code input authentication system using deep learning hand shape authentication Jun Wang, Bo Wu, Kiminori Sato (TUT) BioX2023-70 CNR2023-37 |
With the continuous development of modern technology, the demand for contactless authentication is increasing, and a sim... [more] |
BioX2023-70 CNR2023-37 pp.1-6 |
SIS, ITE-BCT |
2023-10-12 16:30 |
Yamaguchi |
HISTORIA UBE (Primary: On-site, Secondary: Online) |
[Tutorial Lecture]
Technical Development of Intrusion Prevention Systems with Reconfigurable Devices Tomoaki Sato (Hokusei Gakuen Univ.) SIS2023-19 |
The frequency of Internet use continues to increase in telework and remote work environments. Concurrently, there has be... [more] |
SIS2023-19 pp.19-24 |
PN |
2023-08-29 15:40 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
A Jitter-Constrained High-Speed Multilayer Combined-Path Design Algorithm for Center-Based Security Analysis Ryuta Murakami, Takashi Kurimoto, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2023-24 |
In order to realize a highly reliable network infrastructure in the Beyond 5G era, we have proposed the“Reconfigurable I... [more] |
PN2023-24 pp.40-46 |
ISEC |
2023-05-17 15:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros (from CT-RSA 2023) Kazuma Taka, Kosei Sakamoto (Hyogo Univ.), Tatsuya Ishikawa (WDB KOUGAKU Co.,Ltd.), Takanori Isobe (Hyogo Univ.) ISEC2023-12 |
As low-latency designs tend to have a small number of rounds to decrease latency, the differential-type cryptanalysis ca... [more] |
ISEC2023-12 p.65 |
HWS |
2023-04-15 09:40 |
Oita |
(Primary: On-site, Secondary: Online) |
Investigation of automated design technique of pairing engine Momoko Fukuda, Makoto Ikeda (UT) HWS2023-10 |
We have realized a design automation platform of hardware accelerator for pairing operation over multiple elliptic curve... [more] |
HWS2023-10 pp.37-42 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2022-11-30 14:20 |
Kumamoto |
(Primary: On-site, Secondary: Online) |
On the performance evaluation of a PUF circuit using the Delay Testable Circuit under temperature effects Eisuke Ohama, Hiroyuki Yotsuyanagi, Masaki Hashizume (Tokushima Univ.) VLD2022-46 ICD2022-63 DC2022-62 RECONF2022-69 |
In this study, we have proposed a method to make the design-for-testability circuity function as a security mechanism by... [more] |
VLD2022-46 ICD2022-63 DC2022-62 RECONF2022-69 pp.156-161 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 11:35 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Design and Trial of Cyber Security Exercise for Basic CISO Skillset Tatsumi Seko, Touri Nakagawa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-104 |
Conventional security officers lack the authority and responsibility to make decisions related to management and are not... [more] |
NS2022-104 pp.23-28 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 13:50 |
Online |
Online |
An overview of the secrecy of patent applications in the Japanese Law Makoto Koike (MK Microwave) ISEC2022-23 SITE2022-27 BioX2022-48 HWS2022-23 ICSS2022-31 EMM2022-31 |
Economic security promotion law enacted on May 11, 2022 includes the provisions to keep patent application secret in Jap... [more] |
ISEC2022-23 SITE2022-27 BioX2022-48 HWS2022-23 ICSS2022-31 EMM2022-31 pp.88-97 |
DC |
2021-12-10 14:00 |
Kagawa |
(Primary: On-site, Secondary: Online) |
A SAT and FALL Attacks Resistant Logic Locking Method at Register Transfer Level Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.), Masayoshi Yoshimura (Kyoto Sangyo Univ.) DC2021-57 |
In recent years, to meet strict time-to-market constraints, it has become difficult for only one semiconductor design co... [more] |
DC2021-57 pp.13-18 |
RCS |
2021-10-21 10:50 |
Online |
Online |
Beamforming Design and Secrecy capacity analysis for Cell-Free massive MIMO Kengo Ando (UEC), Hiroki Iimori, Giuseppe Abreu (JUB), Koji Ishibashi (UEC) RCS2021-120 |
In this paper, we investigate a secure beamforming (BF) design for cell-free massive multiple input mul tiple output (CF... [more] |
RCS2021-120 pp.13-18 |
EMCJ, EMD, WPT (Joint) |
2021-07-02 13:30 |
Online |
Online |
Three-dimensional Communication Range Design for Transceiver Coils in HF Broadband Communication Kensi Kuwahara, Toshiyuki Wakisaka, Tohlu Matsushima, Yuki Fukumoto (kyutech) EMCJ2021-26 |
With the spread of IoT systems in recent years, selecting the appropriate communication system for the application will ... [more] |
EMCJ2021-26 pp.7-12 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2021-03-26 12:00 |
Online |
Online |
A Logic Locking Method Based on Anti-SAT at Register Transfer Level Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.), Masayoshi Yoshimura (Kyoto Sangyo Univ.) CPSY2020-64 DC2020-94 |
In recent years, increasing circuit density, it has become difficult for only one semiconductor design company to design... [more] |
CPSY2020-64 DC2020-94 pp.85-90 |
ICD, HWS [detail] |
2020-10-26 17:40 |
Online |
Online |
Investigation of High-Efficiency Simulation Method for Detection of Physical Design Falsification in Secure IC Chip Kazuki Yasuda, Kazuki Monta, Daichi Nakagawa, Makoto Nagata (Kobe Univ.) HWS2020-41 ICD2020-30 |
With the development of the IoT society in recent years, various security measures have been developed for integrated ci... [more] |
HWS2020-41 ICD2020-30 pp.94-98 |
CPSY, DC, IPSJ-ARC [detail] |
2020-07-31 17:30 |
Online |
Online |
An Area Reduction Oriented Controller Augmentation Method Based on Functionally Equivalent Finite State Machine Generation Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.), Masayoshi Yoshimura (Kyoto Sangyo Univ.) CPSY2020-15 DC2020-15 |
In recent year, controller augmentation has been used for design-for-testability and design-for-security at register tra... [more] |
CPSY2020-15 DC2020-15 pp.93-98 |
ICSS, IPSJ-SPT |
2020-03-02 10:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Estimation method of information asset security attributes using design mode Takeshi Ueda, Koichi Shimizu, Shun Hinatsu, Fumio Omatsu (Mitsubishi Electric Corp.) ICSS2019-69 |
In security evaluation such as risk analysis, analysis is performed based on the value of information assets in the syst... [more] |
ICSS2019-69 pp.7-12 |
KBSE |
2019-03-02 09:00 |
Kyoto |
Doshisha University Kambaikan |
Development of Knowledge Presentation Method in Security Requirement Analysis and Design Using a Software Security Knowledge Base and Evaluation by a Case Study Yuki Yamada, Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII) KBSE2018-62 |
In recent years, the threat of cyber attacks such as information disclosure due to unauthorized access has become seriou... [more] |
KBSE2018-62 pp.51-56 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 15:25 |
Hokkaido |
Sapporo Convention Center |
Practice and Evaluation of Penetration Testing Exercises for Raising Cybersecurity Awareness Daisuke Suzuki (Hokuriku Univ.) ISEC2018-25 SITE2018-17 HWS2018-22 ICSS2018-28 EMM2018-24 |
The aim of this study is to clarify the educational effect of a penetration testing exercise aimed at raising cybersecur... [more] |
ISEC2018-25 SITE2018-17 HWS2018-22 ICSS2018-28 EMM2018-24 pp.131-136 |
KBSE |
2018-03-01 15:50 |
Okinawa |
|
Development of a System Supporting Security Design from Security Requirements Analysis using a Software Security Knowledge Base Hikaru Miyahara, Atsuo Hazeyama (Tokyo Gakugei Univ.), Takafumi Tanaka (TUAT), Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC), Nobukazu Yoshioka (NII) KBSE2017-50 |
The importance of software security is recognized because the Internet is permeating into our society. In particular, di... [more] |
KBSE2017-50 pp.67-72 |
LOIS, ISEC, SITE |
2017-11-09 09:30 |
Kyoto |
|
Consciousness Investigation of Passwords Management in University Students
-- Questionnaire Design based on Friend Relationships -- Takuyoshi Kumagai, Takuto Kikuchi, Shingo Sawa (Tokyo City Univ), Namie Kato (JMAR), Yoshiaki Seki (Tokyo City Univ) ISEC2017-50 SITE2017-32 LOIS2017-27 |
ID and password are used in information systems in companies and universities. Sometimes, students tell passwords to the... [more] |
ISEC2017-50 SITE2017-32 LOIS2017-27 pp.7-12 |
LOIS, ISEC, SITE |
2017-11-10 14:00 |
Kyoto |
|
Implementation Planning of Penetration Testing Exercises for Raising Cybersecurity Awareness Daisuke Suzuki (Hokuriku Univ.) ISEC2017-67 SITE2017-49 LOIS2017-44 |
In the information security class at the university, it is common to learn from the defender's perspective how to protec... [more] |
ISEC2017-67 SITE2017-49 LOIS2017-44 pp.103-106 |