Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
VLD, HWS, ICD |
2024-02-29 16:20 |
Okinawa |
(Primary: On-site, Secondary: Online) |
[Memorial Lecture]
Logic Locking over TFHE for Securing User Data and Algorithms Kohei Suemitsu, Kotaro Matsuoka, Takashi Sato, Masanori Hashimoto (Kyoto Univ.) VLD2023-118 HWS2023-78 ICD2023-107 |
This paper proposes the application of logic locking over TFHE to protect both user data and algorithms, such as input u... [more] |
VLD2023-118 HWS2023-78 ICD2023-107 p.100 |
IN, IA (Joint) |
2022-12-13 09:50 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
A Study on Obfuscation of Node Centrality in Large-Scale Networks Hiroki Kawamura, Takeaki Iwata, Ryotaro Matsuo, Hiroyuki Ohsaki (Kwansei Gakuin Univ.) IA2022-55 |
Node centrality (e.g., degree centrality, eigenvector centrality, betweenness centrality), which is determined by the ne... [more] |
IA2022-55 pp.40-46 |
IA |
2019-11-15 13:15 |
Tokyo |
Kwansei Gakuin University, Tokyo Marunouchi Campus (Sapia Tower) |
Malicious URL Classification using Machine Learning Techniques Yu-Chen Chen, Li-Dong Chen, Yan-Ju Chen, Jiann-Liang Chen (NTUST) IA2019-41 |
The Website security is an important research topic that must be pursued to protect internet users. Traditionally, black... [more] |
IA2019-41 pp.79-83 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 13:40 |
Hokkaido |
Sapporo Convention Center |
[Invited Talk]
Obfustopia Built on Secret-Key Functional Encryption (from EUROCRYPT 2018) Fuyuki Kitagawa (Tokyo Tech), Ryo Nishimaki (NTT), Keisuke Tanaka (Tokyo Tech) ISEC2018-23 SITE2018-15 HWS2018-20 ICSS2018-26 EMM2018-22 |
We show that indistinguishability obfuscation (IO) for all circuits can be constructed solely from secret-key functional... [more] |
ISEC2018-23 SITE2018-15 HWS2018-20 ICSS2018-26 EMM2018-22 p.91 |
IT, EMM |
2018-05-18 14:45 |
Tokyo |
Ookayama Campus, Tokyo Institute of Technology |
A Data Embedding Method for Ruby Scripts transformed into Non-Alphanumeric Characters based on Structure of Numerical Expressions Hirohisa Hioki (Kyoto Univ.) IT2018-11 EMM2018-11 |
An esoteric method is known, which can convert any Ruby script into an equivalent one consisting only of non-alphanumeri... [more] |
IT2018-11 EMM2018-11 pp.59-64 |
CS |
2017-07-27 09:39 |
Nagasaki |
Fukue Bunka Kaikan |
Obfuscated Malicious JavaScript Detection Scheme Using the Feature Based on Divided URL Shoya Morishige, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-15 |
Recently, obfuscated malicious JavaScript codes which divide URL into segments to evade the pattern matching of anti-vir... [more] |
CS2017-15 pp.13-18 |
SS, KBSE, IPSJ-SE [detail] |
2017-07-20 16:15 |
Hokkaido |
|
A compiler that translates to Malbolge from a C-language subset containing recursive calls Genki Sakanashi, Shohei Kobe, Masahiko Sakai, Naoki Nishida, Kenji Hashimoto (Nagoya Univ.) SS2017-18 KBSE2017-18 |
Malbolge is an esoteric programming language, which is promising to protect intellectual property rights due to its diff... [more] |
SS2017-18 KBSE2017-18 pp.145-150 |
IA, ICSS |
2017-06-08 14:25 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
A First Trend Review of Runtime Packers for IoT Malware Ryoichi Isawa (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Tao Ban, Daisuke Inoue (NICT) IA2017-4 ICSS2017-4 |
Malicious software (malware) specimens that infect IoT (Internet of Things) devices rapidly increase. If those specimens... [more] |
IA2017-4 ICSS2017-4 pp.19-24 |
EMM, IT |
2017-05-22 13:00 |
Yamagata |
Yamagata University(Yonezawa Campus) |
A Data Embedding Method based on the JavaScript Encoder jjencode Hirohisa Hioki, Takayuki Matsushita (Kyoto Univ.) IT2017-1 EMM2017-1 |
We have been implemented a data hiding method for JavaScript programs based on an obfuscator called jjencode. We can emb... [more] |
IT2017-1 EMM2017-1 pp.1-6 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 11:10 |
Yamaguchi |
|
Fully Secure Secret-sharing Schemes Using Indistinguishability Obfuscation Hui Zhao, Kouichi Sakurai (Kyushu Univ.) ISEC2016-31 SITE2016-25 ICSS2016-31 EMM2016-39 |
We provide an cryptographic realization of secret-sharing scheme based on obfuscation, and prove that this model is UC s... [more] |
ISEC2016-31 SITE2016-25 ICSS2016-31 EMM2016-39 pp.137-143 |
ICSS, IA |
2016-06-07 13:00 |
Saga |
Saga University |
On the Effect Assessment of Malicious Web Sites Using Multi-Environment Analysis Yuya Nishio, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2016-11 ICSS2016-11 |
The malicious websites used by Drive-by Download Attacks change their behavior for web client environments. To analyze t... [more] |
IA2016-11 ICSS2016-11 pp.57-62 |
IT, ISEC, WBS |
2016-03-11 13:05 |
Tokyo |
The University of Electro-Communications |
[Invited Talk]
A Brief Overview and Survey on Some Advanced Cryptographic Primitives and Tools Takahiro Matsuda (AIST) IT2015-136 ISEC2015-95 WBS2015-119 |
In this talk, we will give a brief overview and survey on the history, properties, and applications of some advanced cry... [more] |
IT2015-136 ISEC2015-95 WBS2015-119 p.219 |
ICSS |
2015-03-03 16:40 |
Okinawa |
Meio Univiersity |
Implementation and evaluation of Drive by Download Attack detection using the features of the obfuscation Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama (NAIST), Takuji Iimura (UT), Youki Kadobayashi (NAIST) ICSS2014-71 |
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in a browser or in browse... [more] |
ICSS2014-71 pp.49-54 |
RECONF, CPSY, VLD, IPSJ-SLDM [detail] |
2015-01-30 15:55 |
Kanagawa |
Hiyoshi Campus, Keio University |
Obfuscated Hardware Implementation of PLC Instructions with Opaque Predicates Kazuki Uyama, Naoki Fujieda, Shuichi Ichikawa (Toyohashi Tech.) VLD2014-148 CPSY2014-157 RECONF2014-81 |
Tamper-proofing technology for instruction sequences of programmable logic controllers(PLCs)is required to protect trade... [more] |
VLD2014-148 CPSY2014-157 RECONF2014-81 pp.221-226 |
ICSS |
2014-11-28 10:45 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
A Study of Drive by Download Attack detection using the features of the obfuscation Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama, Youki Kadobayashi (NAIST) ICSS2014-60 |
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in the browser or its plu... [more] |
ICSS2014-60 pp.55-60 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-28 15:35 |
Ishikawa |
Hotel Rurikoh |
Fingerprinting in Executable Files for Tracking Illegal Uploaders Masayuki Tsubouchi, Yasuo Okabe (Kyoto Univ.) SITE2013-74 IA2013-99 |
Nowadays illegal uploading of digital contents is a serious problem. Some software venders have solved this issue by aut... [more] |
SITE2013-74 IA2013-99 pp.189-193 |
IT, ISEC, WBS |
2012-03-02 17:25 |
Kanagawa |
|
A New Watermarking Method with Block Diffusion and Biased-Chirp Transformation Kazuo Ohzeki, Yuan-Yu Wei, Mao Kuraki, Yutaka Hirakawa (SIT), Kiyotsugu Sato (CIT) IT2011-78 ISEC2011-105 WBS2011-79 |
The digital watermark has been taken as an element of security. Systematic processing of embedding the difference betwee... [more] |
IT2011-78 ISEC2011-105 WBS2011-79 pp.201-206 |
CPSY, DC (Joint) |
2010-08-03 - 2010-08-05 |
Ishikawa |
Kanazawa Cultural Hall |
Runtime Self Metamorphosing Software without Online Updates Yuu Shibata, Kei Hiraki (Univ. of Tokyo.) CPSY2010-22 |
With the developments and spreads of computers, the number of digital media that we treat on computers
has been increas... [more] |
CPSY2010-22 pp.85-90 |
CPSY, DC (Joint) |
2009-08-04 - 2009-08-05 |
Miyagi |
|
Adaptive Protection Mechanism Using Obfuscation Compiler Yuu Shibata, Kei Hiraki (Univ. of Tokyo) CPSY2009-17 |
Attempts of illegal software usages have been increasing. It is an important problem to protect software
from these att... [more] |
CPSY2009-17 pp.43-48 |
SS |
2005-06-24 11:15 |
Nagano |
Shinshu Univ. Ohta-Kokusai-Kinenkan |
Programming Method in Obfuscated Language Malbolge Hisashi Iizawa, Toshiki Sakabe, Masahiko Sakai, Keiichirou Kusakari, Naoki Nishida (Nagoya Univ.) |
Malbolge is an obfuscated (esoteric) programming language, which is designed to be difficult to program in. In this pape... [more] |
SS2005-22 pp.25-30 |