Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SITE, IPSJ-EIP |
2024-06-06 09:55 |
Tokyo |
Rikkyo Univ. (Ikebukuro) |
Addressing 'systemic risk' in EU digital policy.
-- A study from regulatory trends in the financial domain -- Hideyuki Fujii (NRI Secure) |
[more] |
|
CQ, CS (Joint) |
2024-05-17 14:10 |
Aichi |
(Primary: On-site, Secondary: Online) |
Study on Indoor Radio Tomographic Imaging using LOS Component Estimation and TOA-based Localization Shino Shiraki (Tokyo Metropolitan Univ.), Yoshiaki Nishikawa (Secure System Platform Research Laboratories, NEC Corporation), Takahiro Matsuda (Tokyo Metropolitan Univ.), Eiji Takahashi, Takeo Onishi (Secure System Platform Research Laboratories, NEC Corporation), Toshiki Takeuchi (Advanced Network Research Laboratories, NEC Corporation) |
(To be available after the conference date) [more] |
|
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
A Study on the Application of Nudge to Improve Cybersecurity Hideyuki Fujii (NRI Secure) ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50 |
One possible measure to improve cybersecurity is the use of "Nudge". Nudge is designed (choice architectures) that chang... [more] |
ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50 pp.232-238 |
MSS, CAS, SIP, VLD |
2023-07-07 14:30 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
CAS2023-26 VLD2023-26 SIP2023-42 MSS2023-26 |
(To be available after the conference date) [more] |
CAS2023-26 VLD2023-26 SIP2023-42 MSS2023-26 pp.131-136 |
SITE, IPSJ-EIP |
2023-06-12 16:50 |
Tokyo |
Rissho Univ. Shinagawa Campus |
[Invited Talk]
Please fill in this blank. Hideyuki Fujii (NRI SecureTechnologies) |
[more] |
|
SITE, IPSJ-EIP |
2023-06-13 11:40 |
Tokyo |
Rissho Univ. Shinagawa Campus |
Digital Identity Regulatory Trends Worldwide Hideyuki Fujii (NRI Secure) SITE2023-3 |
[more] |
SITE2023-3 pp.13-19 |
ICSS, IPSJ-SPT |
2023-03-13 17:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
URL Warning List Creation and Manage Methods using VirusTotal and Web Access Log Kyohei Takao, Chika Hiraishi (YNU), Kazuki Takada (SecureBrain), Akira Fujita, Daisuke Inoue (NICT), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-66 |
Security services such as URL blocklists are widely used to prevent users from accessing malicious websites.
However, ... [more] |
ICSS2022-66 pp.109-114 |
ICSS, IPSJ-SPT |
2023-03-14 13:10 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Towards observation of online fraud exploiting multiple SNS Yamato Kawaguchi (Yokohama National Univ.), Kazuki Takada (SecureBrain), Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2022-77 |
SNS (Social Networking Service) fraud has been reported in accordance with the increase in SNS users. In this study, we ... [more] |
ICSS2022-77 pp.175-180 |
ISEC, SITE, LOIS |
2022-11-18 10:05 |
Online |
Online |
[Invited Talk]
About "Ctrl + Z: Right to be forgotten"(1) Hideyuki Fujii (NRI Secure) |
[more] |
|
SITE, IPSJ-EIP |
2022-06-10 13:15 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Trends regarding access to vehicle data in European Union Hideyuki Fujii (NRI Secure) SITE2022-9 |
As the distribution of connected cars expands, discussions on the handling of vehicle data are becoming more active. In ... [more] |
SITE2022-9 pp.52-58 |
ICSS, IPSJ-SPT |
2022-03-08 10:00 |
Online |
Online |
Input predictive attack by keyboard acoustic emanations using BERT and its countermeasures Masahiro Iida (Teikyo Univ.), Mitsuaki Akiyama (NTT), Masaki Kamizono (DTCY), Takahiro Kasama (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Kyoto Sangyo Univ.), Atsuo Inomata (Osaka Univ.) ICSS2021-67 |
The Keyboard Acoustic Emanations has been proposed to estimate the input key from keystroke sounds as a kind of side-cha... [more] |
ICSS2021-67 pp.49-54 |
SITE, ISEC, LOIS |
2021-11-12 13:50 |
Online |
Online |
Security notions of decryption-controllable identity-based encryption Hidekazu Miyanaga, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Yuki Okano (NTT), Koutarou Suzuki (Toyohashi Univ. of Tech.), Kazuki Yoneyama (Ibaraki Univ.) ISEC2021-43 SITE2021-37 LOIS2021-26 |
In recent years, there have been increasing opportunities for a single user to have multiple devices. A similar situati... [more] |
ISEC2021-43 SITE2021-37 LOIS2021-26 pp.13-17 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 11:20 |
Online |
Online |
ISEC2021-33 SITE2021-27 BioX2021-34 HWS2021-33 ICSS2021-38 EMM2021-38 |
(To be available after the conference date) [more] |
ISEC2021-33 SITE2021-27 BioX2021-34 HWS2021-33 ICSS2021-38 EMM2021-38 pp.141-146 |
QIT (2nd) |
2021-05-24 09:00 |
Online |
Online |
[Invited Talk]
Classical Verification of Quantum Computations with Efficient Verifier Takashi Yamakawa (NTT) |
[more] |
|
WBS, IT, ISEC |
2021-03-05 13:30 |
Online |
Online |
Information retrieval for security reports using behavior of cyber attacker Yuki Kawaguchi, Mayo Yamasaki (NTT) IT2020-154 ISEC2020-84 WBS2020-73 |
Cyber security incident responders require related information about related incidents for the quick and comprehensive
... [more] |
IT2020-154 ISEC2020-84 WBS2020-73 pp.257-264 |
ICSS, IPSJ-SPT |
2021-03-01 10:00 |
Online |
Online |
Understanding the Adoption and Operation of DNS Cookie: Current State and Future Prospects Masanori Yajima (Waseda Univ.), Daiki Chiba (NTT), Yoshiro Yoneya (JPRS), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-28 |
DNS cache poisoning attacks have received increasing attention these days.
As a countermeasure against such attacks, DN... [more] |
ICSS2020-28 pp.13-18 |
ICSS, IPSJ-SPT |
2021-03-01 09:10 |
Online |
Online |
On the Privacy Risk of Exposure Notification Framework: Assessment and Countermeasures Kazuki Nomoto (Waseda Univ.), Mitsuaki Akiyama (NTT), Masashi Eto (NICT), Atsuo Inomata (Osaka Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-34 |
The Exposure Notification Framework uses the Bluetooth Low Energy (BLE) signal generated by a smartphone to determine cl... [more] |
ICSS2020-34 pp.49-54 |
ICSS, IPSJ-SPT |
2021-03-01 09:35 |
Online |
Online |
A Method for Reconstructing Hidden Background Image in Tele-conference with Virtual Background Satoki Tsuji, Ryusei Ishikawa (Ritsumeikan Univ.), Masashi Eto (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Hiroshima City Univ.) ICSS2020-35 |
Interpersonal communications through video chat software has become essential since a remote work is now encouraged. Whe... [more] |
ICSS2020-35 pp.55-60 |
ICSS, IPSJ-SPT |
2021-03-01 10:00 |
Online |
Online |
Implementation and Evaluation of a Plagiarism Detection Method for Source Code on Programming Contest Ryusei Ishikawa (Ritsumeikan Univ.), Yuichi Hattori (Secure Cycle), Hiroyuki Inoue (Hiroshima City Univ.), Atsuo Inomata (Osaka Univ.) ICSS2020-36 |
Programming competitions are held all over the world to write programs accurately in a short time. However, because many... [more] |
ICSS2020-36 pp.61-65 |
ICSS, IPSJ-SPT |
2021-03-01 14:55 |
Online |
Online |
Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41 |
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] |
ICSS2020-41 pp.90-95 |