Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SITE, ISEC, LOIS |
2021-11-12 13:50 |
Online |
Online |
Security notions of decryption-controllable identity-based encryption Hidekazu Miyanaga, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Yuki Okano (NTT), Koutarou Suzuki (Toyohashi Univ. of Tech.), Kazuki Yoneyama (Ibaraki Univ.) ISEC2021-43 SITE2021-37 LOIS2021-26 |
In recent years, there have been increasing opportunities for a single user to have multiple devices. A similar situati... [more] |
ISEC2021-43 SITE2021-37 LOIS2021-26 pp.13-17 |
OFT, OCS, LSJ (Joint) [detail] |
2021-08-26 14:45 |
Online |
Online |
A method for continuously measuring backscattered light at an arbitrary point on an optical fiber Shiro Ryu (Meiji Univ.), Takafumi Tsuboya (SECOM) OFT2021-14 |
We have proposed a continuous measurement method for Rayleigh backscattered light in the time domain at any point on the... [more] |
OFT2021-14 pp.13-18 |
QIT (2nd) |
2021-05-24 09:00 |
Online |
Online |
[Invited Talk]
Classical Verification of Quantum Computations with Efficient Verifier Takashi Yamakawa (NTT) |
[more] |
|
WBS, IT, ISEC |
2021-03-05 13:30 |
Online |
Online |
Information retrieval for security reports using behavior of cyber attacker Yuki Kawaguchi, Mayo Yamasaki (NTT) IT2020-154 ISEC2020-84 WBS2020-73 |
Cyber security incident responders require related information about related incidents for the quick and comprehensive
... [more] |
IT2020-154 ISEC2020-84 WBS2020-73 pp.257-264 |
HWS, VLD [detail] |
2021-03-04 14:15 |
Online |
Online |
Experiments of Data Authenticity Verification in Multi-Node IoT Systems Using Elliptic Curve Digital Signature Chips Yuya Takahashi, Takuya Matsumaru, Kazuki Monta (Kobe Univ.), Toshihiro Sato, Takaaki Okidono (ECSEC Lab), Takuji Miki, Noriyuki Miura, Makoto Nagata (Kobe Univ.) VLD2020-85 HWS2020-60 |
Practicality of IoT systems requires the efficiency and speed of crypto processing in edge nodes and remote servers. So ... [more] |
VLD2020-85 HWS2020-60 pp.97-101 |
HWS, VLD [detail] |
2021-03-04 16:00 |
Online |
Online |
Survey on intrusion detection system for Vehicle Security Techniques Ayaka Matsushita, Takao Okubo (IISEC) VLD2020-88 HWS2020-63 |
The purpose of this paper is to identify the factors that cause the characteristics of voltage waveforms of ECUs in auto... [more] |
VLD2020-88 HWS2020-63 pp.114-119 |
ICSS, IPSJ-SPT |
2021-03-01 09:10 |
Online |
Online |
Developing and Characterizing a New Approach to Extracting Communication Sessions Associated with NIDS Alerts Ryosuke Ishibashi, Hiroki Goto (Kyushu Univ.), Chansu Han, Tao Ban, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.) ICSS2020-26 |
(To be available after the conference date) [more] |
ICSS2020-26 pp.1-6 |
ICSS, IPSJ-SPT |
2021-03-01 10:25 |
Online |
Online |
Construction of Vulnerability Evaluation System with Machine Learning Methods Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota (KDDIR), Junpei Urakawa (KDS/KDDIR) ICSS2020-29 |
Recently, the cyberattacks aimed at software vulnerabilities are more popular and powerful. Therefore, various incidents... [more] |
ICSS2020-29 pp.19-24 |
ICSS, IPSJ-SPT |
2021-03-01 09:10 |
Online |
Online |
On the Privacy Risk of Exposure Notification Framework: Assessment and Countermeasures Kazuki Nomoto (Waseda Univ.), Mitsuaki Akiyama (NTT), Masashi Eto (NICT), Atsuo Inomata (Osaka Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-34 |
The Exposure Notification Framework uses the Bluetooth Low Energy (BLE) signal generated by a smartphone to determine cl... [more] |
ICSS2020-34 pp.49-54 |
ICSS, IPSJ-SPT |
2021-03-01 09:35 |
Online |
Online |
A Method for Reconstructing Hidden Background Image in Tele-conference with Virtual Background Satoki Tsuji, Ryusei Ishikawa (Ritsumeikan Univ.), Masashi Eto (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Hiroshima City Univ.) ICSS2020-35 |
Interpersonal communications through video chat software has become essential since a remote work is now encouraged. Whe... [more] |
ICSS2020-35 pp.55-60 |
ICSS, IPSJ-SPT |
2021-03-01 10:00 |
Online |
Online |
Implementation and Evaluation of a Plagiarism Detection Method for Source Code on Programming Contest Ryusei Ishikawa (Ritsumeikan Univ.), Yuichi Hattori (Secure Cycle), Hiroyuki Inoue (Hiroshima City Univ.), Atsuo Inomata (Osaka Univ.) ICSS2020-36 |
Programming competitions are held all over the world to write programs accurately in a short time. However, because many... [more] |
ICSS2020-36 pp.61-65 |
ICSS, IPSJ-SPT |
2021-03-01 14:55 |
Online |
Online |
Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41 |
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] |
ICSS2020-41 pp.90-95 |
ICSS, IPSJ-SPT |
2021-03-02 14:05 |
Online |
Online |
Developing an Interactive Analysis System for Voice Assistant Apps Atsuko Natatsuka (Waseda Univ.), Ryo Iijima (Waseda Univ./NICT), Takuya Watanabe, Mitsuaki Akiyama (NTT), Tetsuya Sakai (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-48 |
In Voice Assistant Services, official or third-party Voice Assistant Apps (VA apps) are provided. Since a VA app works a... [more] |
ICSS2020-48 pp.132-137 |
ICSS, IPSJ-SPT |
2021-03-02 14:30 |
Online |
Online |
ICSS2020-49 |
[more] |
ICSS2020-49 pp.138-143 |
ICSS, IPSJ-SPT |
2021-03-02 09:10 |
Online |
Online |
A Study on the Adoption of Link Preview by the Phishing Sites Norihito Omori (Waseda Univ.), Satoshi Furutani, Takuya Watanabe, Toshiki Shibahara, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.) ICSS2020-54 |
Search engines are not the only means of accessing online content. The distribution of malicious content has become mor... [more] |
ICSS2020-54 pp.166-171 |
ICSS, IPSJ-SPT |
2021-03-02 10:00 |
Online |
Online |
Evaluation of Uncertain Reports by Multiple Anti-virus Engines Kazuya Nomura (Waseda Univ.), Mistuaki Akiyama (NTT), Masaki Kamizono (Deloitte Tohmatsu Cyber LLC), Takahiro Kasama (NICT) ICSS2020-56 |
VirusTotal is an online service that provides detection results from multiple anti-virus engines. It is used in a wide r... [more] |
ICSS2020-56 pp.178-183 |
US |
2021-02-22 17:40 |
Online |
Online |
Detection method of waterdrops on steel plate using ultrasonic oscillation Tomonori Kimura (MELCO), Akihiro Sakamoto (RSEC) US2020-76 |
A method to detect waterdrops on a steel plate by using ultrasonic oscillation is shown. Two angle beam probes are set ... [more] |
US2020-76 pp.45-48 |
SWIM |
2020-11-28 14:10 |
Online |
Online |
Governance and accessment of the use of IT and AI for sustainable development Hiroyuki Ogura (Nihon Univ.), Yonosuke Harada (Inst. of Information Security), Shunsuke Managi (Kyushu Univ.) SWIM2020-8 |
It is required that the management of everything surrounding the organization becomes smarter and that it is transformed... [more] |
SWIM2020-8 pp.10-17 |
VLD, DC, RECONF, ICD, IPSJ-SLDM (Joint) [detail] |
2020-11-18 14:50 |
Online |
Online |
Evaluation of operating performance of ECDSA hardware module II Yuya Takahashi, Takuya Matsumaru, Kazuki Monta (Kobe Univ.), Toshihiro Sato, Takaaki Okidono (ECSEC Lab), Takuji Miki, Noriyuki Miura, Makoto Nagata (Kobe Univ.) VLD2020-32 ICD2020-52 DC2020-52 RECONF2020-51 |
[more] |
VLD2020-32 ICD2020-52 DC2020-52 RECONF2020-51 pp.118-121 |
ICD, HWS [detail] |
2020-10-26 13:50 |
Online |
Online |
Security Threats and Preventions for Photonics Computing Model Junko Takahashi, Koji Chida, Takeshi Sakamoto (NTT) HWS2020-33 ICD2020-22 |
This paper presents security analysis on photonic computing models in All-Photonics Network (APN). New computing archite... [more] |
HWS2020-33 ICD2020-22 pp.48-53 |