Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
MSS, CAS, IPSJ-AL [detail] |
2023-11-17 15:45 |
Okinawa |
|
Construction of criminal models using kernel density estimation Kenta Sakakura, Eiji Konaka (Meijo Univ.) |
(To be available after the conference date) [more] |
|
LOIS, SITE, ISEC |
2023-11-09 10:50 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
[Invited Talk]
Security Technologies to Improve Content-Distribution and Broadcasting Services Kazuto Ogawa (NICT) |
(To be available after the conference date) [more] |
|
MW, EMCJ, EST, IEE-EMC [detail] |
2023-10-19 13:10 |
Yamagata |
Yamagata University (Primary: On-site, Secondary: Online) |
Genetic Algorithm XSS Attack Payload Generation and WAF Evaluation Yu Funahashi, Hideaki Kimura (Chubu Univ) |
(To be available after the conference date) [more] |
|
BioX |
2023-10-12 14:45 |
Okinawa |
Nobumoto Ohama Memorial Hall |
A study on a federated learning system for high accuracy biometric authentication Yusei Suzuki, Yosuke Kaga (Hitachi) |
(To be available after the conference date) [more] |
|
IA |
2023-09-22 15:00 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Signing key management in cryptocurrency custodians learned from DNSSEC Yuto Takei (Mercari/Tokyo Tech), Kazuyuki Shudo (Kyoto Univ.) IA2023-30 |
Japanese cryptocurrency exchanges hold over 1 trillion yen worth of cryptocurrency in total as of June 2023. The exchang... [more] |
IA2023-30 pp.115-122 |
CPSY, DC, IPSJ-ARC [detail] |
2023-08-04 13:40 |
Hokkaido |
Hakodate Arena (Primary: On-site, Secondary: Online) |
A Classification of Security Threats and Countermeasure Directions for Cloud-based Railway Signalling Systems Using COTS Components Takashi Toyama, Akihiro Gion (RTRI) |
Research and development of cloud-based railway signaling systems, which remotely control signalling devices or trains f... [more] |
|
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 13:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
ISEC2023-35 SITE2023-29 BioX2023-38 HWS2023-35 ICSS2023-32 EMM2023-35 |
The Hardware Security Technical Committee invited the author to give a presentation about his recent elevation to IEEE F... [more] |
ISEC2023-35 SITE2023-29 BioX2023-38 HWS2023-35 ICSS2023-32 EMM2023-35 pp.141-146 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 10:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
An Implementation and Evaluation of Communication Schemes Using Authenticated Cryptography for MAVLink Communication Ryuto Kuwada, Nobuya Ishihara, Yuta Kodera, Yasuyuki Nogami (Okayama Univ.) ISEC2023-39 SITE2023-33 BioX2023-42 HWS2023-39 ICSS2023-36 EMM2023-39 |
MAVLink is a lightweight communication protocol used between drones and ground stations to transmit drone status and con... [more] |
ISEC2023-39 SITE2023-33 BioX2023-42 HWS2023-39 ICSS2023-36 EMM2023-39 pp.165-170 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Secure Cryptographic Unit with built-in Signature Generation Hardware for Aggregate Signature Schemes and its FPGA Implementation Toshihiro Sato, Shohei Kawasaki (SCU), Kaoru Masada (Tokyo Univ.), Riku Anzai, Junichi Sakamoto, Naoki Yoshida (YNU), Yasuyoshi Uemura (SCU), Makoto Ikeda (Tokyo Univ.), Tsutomu Matsumoto (YNU) ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42 |
Secure Cryptographic Unit (SCU) consists of a hardware cryptographic engine and an access control mechanism for the engi... [more] |
ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42 pp.182-187 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Is Copying for Information Security Research ‘Fair Use’?
-- Apple Inc. v. Corellium, Inc., No. 21-12835 (11th Cir. 2023) -- Yusuke Tachibana (FIT) ISEC2023-49 SITE2023-43 BioX2023-52 HWS2023-49 ICSS2023-46 EMM2023-49 |
The replication of third-party software in the realm of information security research has the potential to encroach upon... [more] |
ISEC2023-49 SITE2023-43 BioX2023-52 HWS2023-49 ICSS2023-46 EMM2023-49 pp.229-231 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
A Study on the Application of Nudge to Improve Cybersecurity Hideyuki Fujii (NRI Secure) ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50 |
One possible measure to improve cybersecurity is the use of "Nudge". Nudge is designed (choice architectures) that chang... [more] |
ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50 pp.232-238 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 14:50 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Anomaly detection with dataset including replay-attack communication Koushi Nishi, Futa Yuichi (TUT), Okazaki Hiroyuki (Shinshu University) ISEC2023-52 SITE2023-46 BioX2023-55 HWS2023-52 ICSS2023-49 EMM2023-52 |
General-purpose devices and communications are increasingly introduced to control systems in factories and power plants ... [more] |
ISEC2023-52 SITE2023-46 BioX2023-55 HWS2023-52 ICSS2023-49 EMM2023-52 pp.247-254 |
EST, MW, EMT, OPE, MWPTHz, IEE-EMT [detail] |
2023-07-20 11:25 |
Hokkaido |
Muroran Institute of Technology (Primary: On-site, Secondary: Online) |
Millimeter-Wave Three-Dimensional Imaging using Dielectric Lens for Security Application Arie Setiawan, Shu Sato (Mie Univ.), Naruto Yonemoto (ENRI), Hitoshi Nohmi (Alouette Technlogy Inc.), Hiroshi Murata (Mie Univ.) EMT2023-27 MW2023-45 OPE2023-27 EST2023-27 MWPTHz2023-23 |
Millimeter-wave (mmW) has been an increasingly attractive research area in security solutions due to its ability to pene... [more] |
EMT2023-27 MW2023-45 OPE2023-27 EST2023-27 MWPTHz2023-23 pp.100-105 |
SeMI, RCS, RCC, NS, SR (Joint) |
2023-07-13 09:25 |
Osaka |
Osaka University Nakanoshima Center + Online (Primary: On-site, Secondary: Online) |
A Study on Complexity Reduction of Bit Assignment and Performance Improvement by Channel Code Concatenation in Chaos Modulation Ryo Tozawa, Yuuki Mori, Seiya Yamashita, Eiji Okamoto (NITech), Tetsuya Yamamoto (Panasonic) RCS2023-86 |
In recent years, with the rapid increase of Internet of Things (IoT) devices in industries, healthcare, and other fields... [more] |
RCS2023-86 pp.33-38 |
IA, ICSS |
2023-06-20 16:00 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
[Invited Talk]
Cybersecurity education and the role of universities Hiroshi Koide (Kyushu Univ.) IA2023-6 ICSS2023-6 |
In this presentation, the speaker will first discuss his experiences in the cybersecurity human resource development pro... [more] |
IA2023-6 ICSS2023-6 p.31 |
SWIM, KBSE |
2023-05-19 15:10 |
Shizuoka |
(Primary: On-site, Secondary: Online) |
DARPA-Like Organization and Role of Univeristy
-- A Global Perspective Regarding AI R&D -- Haruki Ueno (NII) KBSE2023-3 SWIM2023-3 |
Dual-use technology (DUT) refers to technology that can be used for both peaceful and military purposes, and has its roo... [more] |
KBSE2023-3 SWIM2023-3 pp.13-20 |
HWS |
2023-04-15 09:15 |
Oita |
(Primary: On-site, Secondary: Online) |
An AES Cryptographic Processor with Partial Re-Keying Scheme Utilizing Physical Attack Sensor Ryuki Ikemoto, Soichiro Fujii (Osaka Univ.), Yuki Yamashita, Makoto Nagata (Kobe Univ.), Jun Shiomi, Yoshihiro Midoh, Noriyuki Miura (Osaka Univ.) HWS2023-9 |
We propose a partial secret key update method for AES cryptography using sensors that can detect physical attacks on cry... [more] |
HWS2023-9 pp.34-36 |
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2023-03-24 09:00 |
Kagoshima |
Amagi Town Disaster Prevention Center (Tokunoshima) (Primary: On-site, Secondary: Online) |
A preliminary study on time-dependency of cyber security vulnerability assessment Takashi Minohara, Naohiro Kubota (Takushoku Univ.) CPSY2022-42 DC2022-101 |
Information system administrators must pay attention to system vulnerability information and take appropriate measures a... [more] |
CPSY2022-42 DC2022-101 pp.49-54 |
IA, SITE, IPSJ-IOT [detail] |
2023-03-17 10:25 |
Gunma |
Maebashi Institute of Technology (Primary: On-site, Secondary: Online) |
[Invited Talk]
Dual-Use of Cybersecurity
-- From the Threat Landscape in Cyberspace with a Focus on IoT Security -- Tsukasa Ogino (CCDS) SITE2022-62 IA2022-85 |
The Internet of Things (IoT), in which automobiles, drones, home appliances, and other devices are connected via the Int... [more] |
SITE2022-62 IA2022-85 pp.45-52 |
RCC, ISEC, IT, WBS |
2023-03-14 09:25 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
A Study on Secure Coded Communications Using Discrete Fourier Transform over Finite Fields Shoichiro Yamasaki (Hiroshima City Univ), Tomoko K. Matsushima (Yokohama College of Commerce), Hirokazu Tanaka (Hiroshima City Univ) IT2022-79 ISEC2022-58 WBS2022-76 RCC2022-76 |
The authors have proposed a security enhancement scheme using a shortened non-systematic
Reed-Solomon codes construc... [more] |
IT2022-79 ISEC2022-58 WBS2022-76 RCC2022-76 pp.74-79 |