IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 20  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
VLD, HWS, ICD 2024-02-29
16:20
Okinawa
(Primary: On-site, Secondary: Online)
[Memorial Lecture] Logic Locking over TFHE for Securing User Data and Algorithms
Kohei Suemitsu, Kotaro Matsuoka, Takashi Sato, Masanori Hashimoto (Kyoto Univ.) VLD2023-118 HWS2023-78 ICD2023-107
This paper proposes the application of logic locking over TFHE to protect both user data and algorithms, such as input u... [more] VLD2023-118 HWS2023-78 ICD2023-107
p.100
IN, IA
(Joint)
2022-12-13
09:50
Hiroshima Higashi-Senda campus, Hiroshima Univ.
(Primary: On-site, Secondary: Online)
A Study on Obfuscation of Node Centrality in Large-Scale Networks
Hiroki Kawamura, Takeaki Iwata, Ryotaro Matsuo, Hiroyuki Ohsaki (Kwansei Gakuin Univ.) IA2022-55
Node centrality (e.g., degree centrality, eigenvector centrality, betweenness centrality), which is determined by the ne... [more] IA2022-55
pp.40-46
IA 2019-11-15
13:15
Tokyo Kwansei Gakuin University, Tokyo Marunouchi Campus (Sapia Tower) Malicious URL Classification using Machine Learning Techniques
Yu-Chen Chen, Li-Dong Chen, Yan-Ju Chen, Jiann-Liang Chen (NTUST) IA2019-41
The Website security is an important research topic that must be pursued to protect internet users. Traditionally, black... [more] IA2019-41
pp.79-83
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
13:40
Hokkaido Sapporo Convention Center [Invited Talk] Obfustopia Built on Secret-Key Functional Encryption (from EUROCRYPT 2018)
Fuyuki Kitagawa (Tokyo Tech), Ryo Nishimaki (NTT), Keisuke Tanaka (Tokyo Tech) ISEC2018-23 SITE2018-15 HWS2018-20 ICSS2018-26 EMM2018-22
We show that indistinguishability obfuscation (IO) for all circuits can be constructed solely from secret-key functional... [more] ISEC2018-23 SITE2018-15 HWS2018-20 ICSS2018-26 EMM2018-22
p.91
IT, EMM 2018-05-18
14:45
Tokyo Ookayama Campus, Tokyo Institute of Technology A Data Embedding Method for Ruby Scripts transformed into Non-Alphanumeric Characters based on Structure of Numerical Expressions
Hirohisa Hioki (Kyoto Univ.) IT2018-11 EMM2018-11
An esoteric method is known, which can convert any Ruby script into an equivalent one consisting only of non-alphanumeri... [more] IT2018-11 EMM2018-11
pp.59-64
CS 2017-07-27
09:39
Nagasaki Fukue Bunka Kaikan Obfuscated Malicious JavaScript Detection Scheme Using the Feature Based on Divided URL
Shoya Morishige, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-15
Recently, obfuscated malicious JavaScript codes which divide URL into segments to evade the pattern matching of anti-vir... [more] CS2017-15
pp.13-18
SS, KBSE, IPSJ-SE [detail] 2017-07-20
16:15
Hokkaido   A compiler that translates to Malbolge from a C-language subset containing recursive calls
Genki Sakanashi, Shohei Kobe, Masahiko Sakai, Naoki Nishida, Kenji Hashimoto (Nagoya Univ.) SS2017-18 KBSE2017-18
Malbolge is an esoteric programming language, which is promising to protect intellectual property rights due to its diff... [more] SS2017-18 KBSE2017-18
pp.145-150
IA, ICSS 2017-06-08
14:25
Kochi Kochi University of Technolo, Eikokuji Campus A First Trend Review of Runtime Packers for IoT Malware
Ryoichi Isawa (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Tao Ban, Daisuke Inoue (NICT) IA2017-4 ICSS2017-4
Malicious software (malware) specimens that infect IoT (Internet of Things) devices rapidly increase. If those specimens... [more] IA2017-4 ICSS2017-4
pp.19-24
EMM, IT 2017-05-22
13:00
Yamagata Yamagata University(Yonezawa Campus) A Data Embedding Method based on the JavaScript Encoder jjencode
Hirohisa Hioki, Takayuki Matsushita (Kyoto Univ.) IT2017-1 EMM2017-1
We have been implemented a data hiding method for JavaScript programs based on an obfuscator called jjencode. We can emb... [more] IT2017-1 EMM2017-1
pp.1-6
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
11:10
Yamaguchi   Fully Secure Secret-sharing Schemes Using Indistinguishability Obfuscation
Hui Zhao, Kouichi Sakurai (Kyushu Univ.) ISEC2016-31 SITE2016-25 ICSS2016-31 EMM2016-39
We provide an cryptographic realization of secret-sharing scheme based on obfuscation, and prove that this model is UC s... [more] ISEC2016-31 SITE2016-25 ICSS2016-31 EMM2016-39
pp.137-143
ICSS, IA 2016-06-07
13:00
Saga Saga University On the Effect Assessment of Malicious Web Sites Using Multi-Environment Analysis
Yuya Nishio, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2016-11 ICSS2016-11
The malicious websites used by Drive-by Download Attacks change their behavior for web client environments. To analyze t... [more] IA2016-11 ICSS2016-11
pp.57-62
IT, ISEC, WBS 2016-03-11
13:05
Tokyo The University of Electro-Communications [Invited Talk] A Brief Overview and Survey on Some Advanced Cryptographic Primitives and Tools
Takahiro Matsuda (AIST) IT2015-136 ISEC2015-95 WBS2015-119
In this talk, we will give a brief overview and survey on the history, properties, and applications of some advanced cry... [more] IT2015-136 ISEC2015-95 WBS2015-119
p.219
ICSS 2015-03-03
16:40
Okinawa Meio Univiersity Implementation and evaluation of Drive by Download Attack detection using the features of the obfuscation
Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama (NAIST), Takuji Iimura (UT), Youki Kadobayashi (NAIST) ICSS2014-71
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in a browser or in browse... [more] ICSS2014-71
pp.49-54
RECONF, CPSY, VLD, IPSJ-SLDM [detail] 2015-01-30
15:55
Kanagawa Hiyoshi Campus, Keio University Obfuscated Hardware Implementation of PLC Instructions with Opaque Predicates
Kazuki Uyama, Naoki Fujieda, Shuichi Ichikawa (Toyohashi Tech.) VLD2014-148 CPSY2014-157 RECONF2014-81
Tamper-proofing technology for instruction sequences of programmable logic controllers(PLCs)is required to protect trade... [more] VLD2014-148 CPSY2014-157 RECONF2014-81
pp.221-226
ICSS 2014-11-28
10:45
Miyagi Tohoku Gakuin University (Tagajo Campus) A Study of Drive by Download Attack detection using the features of the obfuscation
Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama, Youki Kadobayashi (NAIST) ICSS2014-60
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in the browser or its plu... [more] ICSS2014-60
pp.55-60
IA, IPSJ-IOT, SITE [detail] 2014-02-28
15:35
Ishikawa Hotel Rurikoh Fingerprinting in Executable Files for Tracking Illegal Uploaders
Masayuki Tsubouchi, Yasuo Okabe (Kyoto Univ.) SITE2013-74 IA2013-99
Nowadays illegal uploading of digital contents is a serious problem. Some software venders have solved this issue by aut... [more] SITE2013-74 IA2013-99
pp.189-193
IT, ISEC, WBS 2012-03-02
17:25
Kanagawa   A New Watermarking Method with Block Diffusion and Biased-Chirp Transformation
Kazuo Ohzeki, Yuan-Yu Wei, Mao Kuraki, Yutaka Hirakawa (SIT), Kiyotsugu Sato (CIT) IT2011-78 ISEC2011-105 WBS2011-79
The digital watermark has been taken as an element of security. Systematic processing of embedding the difference betwee... [more] IT2011-78 ISEC2011-105 WBS2011-79
pp.201-206
CPSY, DC
(Joint)
2010-08-03
- 2010-08-05
Ishikawa Kanazawa Cultural Hall Runtime Self Metamorphosing Software without Online Updates
Yuu Shibata, Kei Hiraki (Univ. of Tokyo.) CPSY2010-22
With the developments and spreads of computers, the number of digital media that we treat on computers
has been increas... [more]
CPSY2010-22
pp.85-90
CPSY, DC
(Joint)
2009-08-04
- 2009-08-05
Miyagi   Adaptive Protection Mechanism Using Obfuscation Compiler
Yuu Shibata, Kei Hiraki (Univ. of Tokyo) CPSY2009-17
Attempts of illegal software usages have been increasing. It is an important problem to protect software
from these att... [more]
CPSY2009-17
pp.43-48
SS 2005-06-24
11:15
Nagano Shinshu Univ. Ohta-Kokusai-Kinenkan Programming Method in Obfuscated Language Malbolge
Hisashi Iizawa, Toshiki Sakabe, Masahiko Sakai, Keiichirou Kusakari, Naoki Nishida (Nagoya Univ.)
Malbolge is an obfuscated (esoteric) programming language, which is designed to be difficult to program in. In this pape... [more] SS2005-22
pp.25-30
 Results 1 - 20 of 20  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan