Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICD |
2024-04-11 10:45 |
Kanagawa |
(Primary: On-site, Secondary: Online) |
[Invited Lecture]
An SPN Strong PUF with SRAM-based Entropy Source Featuring Both 100-Bit Output Space and Modeling Attack Resilience Kunyang Liu (Kyoto Univ.), Yichen Tang (Lenovo), Shufan Xu, Kiichi Niitsu (Kyoto Univ.), Hirofumi Shinohara (Waseda Univ.) |
(To be available after the conference date) [more] |
|
CCS |
2024-03-27 16:50 |
Hokkaido |
RUSUTSU RESORT |
JPEG Compression Quality Setting Considering Image Quality and Information Loss for Correlated Steganography Mariiko Aikawa, Sumiko Miyata (SIT), Kaito Hosono, Hirotsugu Kinoshita (KU) CCS2023-50 |
As more and more confidential information, including personal information, is transmitted and received over the Internet... [more] |
CCS2023-50 pp.64-69 |
ICM |
2024-03-22 09:10 |
Okinawa |
Okinawa Prefectural Museum and Art Museum (Primary: On-site, Secondary: Online) |
Proposal of an implication relationship estimation method for information security related regulatory documents Kouki Nakanishi, Tkakani ikuko, Sakamoto Masanobu, Ohishi Haruo (NTT) ICM2023-51 |
In recent years, internal controls regarding information security have become increasingly important from the perspectiv... [more] |
ICM2023-51 pp.35-40 |
ICSS, IPSJ-SPT |
2024-03-21 14:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
ICSS2023-75 |
With the proliferation of IoT devices, there has been an increase in security incidents targeting IoT devices. To active... [more] |
ICSS2023-75 pp.43-50 |
ICSS, IPSJ-SPT |
2024-03-22 08:30 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Proposal of Moving Target Defense Approach on Reliability in Web Services Mamoru Saita (Keio Univ.), Shunsuke Hashimoto (Univ. of Hyogo), Atsuo Inomata (Osaka Univ.), Hiroyuki Inoue (Kyoto Sangyo Univ.) ICSS2023-82 |
Although modern Web services are built on a high level of security and reliability, the static properties of networks re... [more] |
ICSS2023-82 pp.93-99 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Secrity Oriented Design of Polar-Coded OFDM on Selective Fading Channels Yuki Kuraya, Hideki Ochiai (YNU) IT2023-124 ISEC2023-123 WBS2023-112 RCC2023-106 |
We introduce a physical layer security scheme based on a polar-coded OFDM system in wireless communication. Our approach... [more] |
IT2023-124 ISEC2023-123 WBS2023-112 RCC2023-106 pp.306-311 |
SS |
2024-03-09 11:25 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Developing Conversational Agents Using GPT-4 for Application in Information Security Education Atsuya Tsuda, Kazutaka Matsuzaki (Chuo Univ.) SS2023-80 |
In this paper, we report on the development of an interactive agent using a large language model, aimed at being introdu... [more] |
SS2023-80 pp.186-189 |
PRMU, IBISML, IPSJ-CVIM |
2024-03-04 09:36 |
Hiroshima |
Hiroshima Univ. Higashi-Hiroshima campus (Primary: On-site, Secondary: Online) |
Disabling Adversarial Examples through Color Information Processing Ryo Soeda, Masato Uchida (Waseda Univ.) PRMU2023-67 |
Image classification using neural networks is expected to have a wide range of applications, including automated driving... [more] |
PRMU2023-67 pp.94-99 |
ET |
2024-03-03 12:40 |
Miyazaki |
Miyazaki University |
Development of a Wireless LAN Visualization System with a Focus on Information Security for Secondary Education Kazuaki Yoshihara (Kindai Univ.) ET2023-68 |
In junior high technology classes and high school information classes, learning about information security is a compulso... [more] |
ET2023-68 pp.100-103 |
SIP, IT, RCS |
2024-01-18 17:35 |
Miyagi |
(Primary: On-site, Secondary: Online) |
A Study on Decoding Performance Improvement by Using Non-binary LDPC Codes in Outer Channel Coding-Concatenated Chaos Coded Modulation Ryo Tozawa, Seiya Yamashita, Eiji Okamoto (NITech), Horiike Naoto, Tetsuya Yamamoto (Panasonic) IT2023-55 SIP2023-88 RCS2023-230 |
With the rapid expansion of the Internet of Things (IoT) in recent years, the need to improve the confidentiality of wir... [more] |
IT2023-55 SIP2023-88 RCS2023-230 pp.133-138 |
ICM, NS, CQ, NV (Joint) |
2023-11-21 13:15 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
Security Evaluation of Low-latency Cipher based on Improved Simon against Deep Learning Analysis using Profiled Power Consumption Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2023-114 |
Society 5.0 aims to solve problems in social systems through the intercommunication of small devices. On the other hand,... [more] |
NS2023-114 pp.20-25 |
ICM, NS, CQ, NV (Joint) |
2023-11-22 09:50 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
A survey on suitable hook points for outbound packet monitoring using eBPF Masaya Okabe, Hiroshi Tsunoda (Tohtech) ICM2023-27 |
The use of VPNs and similar technologies has made it difficult to define network boundaries, and traditional boundary se... [more] |
ICM2023-27 pp.26-31 |
ICSS |
2023-11-16 13:00 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Implementation of Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities, and A Study on Its Large-scale Demonstration Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2023-51 |
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] |
ICSS2023-51 pp.1-6 |
ICSS |
2023-11-16 15:20 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Attack Verification and Evaluation of Incremental Fault Analysis against AES Encryption Processing Device Miran Tamagawa, Yuichi Futa (TUT), Takehiko Mieno (AVASYS), Hiroyuki Okazaki (Shinshu University) ICSS2023-56 |
In recent years,there has been a growing concern about the impact of fault analysis attack,which use hardware failures a... [more] |
ICSS2023-56 pp.35-41 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-16 13:20 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Primary: On-site, Secondary: Online) |
Tamper Resistance Evaluation on FPGA for Low-Latency Cipher Sonic Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52 |
Industry 5.0 promotes smart factories for system optimization by utilizing IoT and AI in the industrial field. The smart... [more] |
VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52 pp.101-105 |
LOIS, SITE, ISEC |
2023-11-09 10:50 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
[Invited Talk]
Security Technologies to Improve Content-Distribution and Broadcasting Services Kazuto Ogawa (NICT) ISEC2023-54 SITE2023-48 LOIS2023-12 |
Nowadays, technologies for information security have become essential in the world cyber-space.
PC users know their val... [more] |
ISEC2023-54 SITE2023-48 LOIS2023-12 p.1 |
LOIS, SITE, ISEC |
2023-11-10 10:45 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
NTP Tunneling Threat Model Verification and Countermeasure Shinjisangeru Sugasawa, Hisayoshi Kunimune, Shigeaki Tanimoto (CIT) ISEC2023-64 SITE2023-58 LOIS2023-22 |
Fraudulent covert communication methods are techniques used by attackers to avoid detection of malicious communication b... [more] |
ISEC2023-64 SITE2023-58 LOIS2023-22 pp.66-71 |
SR |
2023-11-10 11:10 |
Miyagi |
(Primary: On-site, Secondary: Online) |
[Short Paper]
Model Sharing and Learning for Visually Secure Deep Joint Source Channel Coding Yuyang Fu, Katsuya Suto (UEC) SR2023-59 |
Research and development of Deep Joint Source Channel Coding (DeepJSCC) technology, which is a data-driven design of inf... [more] |
SR2023-59 pp.64-66 |
IN, ICTSSL, IEE-SMF |
2023-10-20 14:40 |
Fukuoka |
Fukuoka University |
A Study on Applying Digital Twin-Assisted Security Platform for Cyber-Physical Systems to Supply Chain Keizo Sugiyama (KDDI Research) ICTSSL2023-32 |
The convergence of cyberspace and physical space is becoming more significant towards Beyond 5G. The impact of attacks, ... [more] |
ICTSSL2023-32 pp.42-46 |
BioX |
2023-10-12 14:45 |
Okinawa |
Nobumoto Ohama Memorial Hall |
A Study on Federated Learning System for Highly Accurate Biometric Authentication Yusei Suzuki, Yosuke Kaga (Hitachi) BioX2023-58 |
With the development of machine learning on large-scale datasets, the accuracy of biometric authentication has significa... [more] |
BioX2023-58 pp.2-7 |