Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2021-03-01 14:55 |
Online |
Online |
Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41 |
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] |
ICSS2020-41 pp.90-95 |
ICSS, IPSJ-SPT |
2021-03-02 14:05 |
Online |
Online |
Developing an Interactive Analysis System for Voice Assistant Apps Atsuko Natatsuka (Waseda Univ.), Ryo Iijima (Waseda Univ./NICT), Takuya Watanabe, Mitsuaki Akiyama (NTT), Tetsuya Sakai (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-48 |
In Voice Assistant Services, official or third-party Voice Assistant Apps (VA apps) are provided. Since a VA app works a... [more] |
ICSS2020-48 pp.132-137 |
ICSS, IPSJ-SPT |
2021-03-02 09:10 |
Online |
Online |
A Study on the Adoption of Link Preview by the Phishing Sites Norihito Omori (Waseda Univ.), Satoshi Furutani, Takuya Watanabe, Toshiki Shibahara, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.) ICSS2020-54 |
Search engines are not the only means of accessing online content. The distribution of malicious content has become mor... [more] |
ICSS2020-54 pp.166-171 |
ICSS, IPSJ-SPT |
2021-03-02 10:00 |
Online |
Online |
Evaluation of Uncertain Reports by Multiple Anti-virus Engines Kazuya Nomura (Waseda Univ.), Mistuaki Akiyama (NTT), Masaki Kamizono (Deloitte Tohmatsu Cyber LLC), Takahiro Kasama (NICT) ICSS2020-56 |
VirusTotal is an online service that provides detection results from multiple anti-virus engines. It is used in a wide r... [more] |
ICSS2020-56 pp.178-183 |
ICD, HWS [detail] |
2020-10-26 13:50 |
Online |
Online |
Security Threats and Preventions for Photonics Computing Model Junko Takahashi, Koji Chida, Takeshi Sakamoto (NTT) HWS2020-33 ICD2020-22 |
This paper presents security analysis on photonic computing models in All-Photonics Network (APN). New computing archite... [more] |
HWS2020-33 ICD2020-22 pp.48-53 |
SITE, IPSJ-EIP [detail] |
2020-06-04 10:55 |
Online |
Online |
Reconsideration of 'Risk' in information security/cybersecurity governance
-- Based on the discussion in Science, Technology and Society (STS) -- Takumi Kimura (NRI SecureTechnologies) SITE2020-2 |
As information security/cybersecurity has been increasing, so is the importance of (Information) Security Governance. Ho... [more] |
SITE2020-2 pp.7-12 |
ISEC |
2020-05-20 16:05 |
Online |
Online |
Identity-based Authenticated Key Exchange for IoT Devices and its Security against Malicious Private Key Generator Kazuma Wariki, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.), Koutarou Suzuki (Toyohashi Univ. of Tech.), Junichi Tomida (NTT) ISEC2020-12 |
With a rapid increase in the number of IoT devices, many
identity-based authenticated key exchange (IBAKE) protocols fo... [more] |
ISEC2020-12 pp.55-61 |
HWS |
2020-04-07 |
Online |
Online |
A Study on Timing Information Acquiring Methodology for TLB Side-Channel Attacks Yuki Matsumoto (Kyushu Univ.), Yuichiro Dan, Junko Takahashi (NTT), Takatsugu Ono (Kyushu Univ.) HWS2020-6 |
We report on the method of acquiring Translation Look-aside Buffer (TLB) access latency which required
for implementing... [more] |
HWS2020-6 pp.29-34 |
ICSS, IPSJ-SPT |
2020-03-02 13:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
ICSS2019-74 |
(To be available after the conference date) [more] |
ICSS2019-74 pp.37-42 |
ICSS, IPSJ-SPT |
2020-03-03 11:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Model checking RNNs with modal μ-calculus Tatsuhiro Aoshima, Toshinori Usui (NTT) ICSS2019-88 |
Machine learning models have been applied to many cyber-physical systems such as self-driving cars, robotics, and factor... [more] |
ICSS2019-88 pp.119-124 |
HWS (2nd) |
2019-12-06 16:00 |
Tokyo |
Asakusabashi Hulic Conference |
[Poster Presentation]
Comparison of 3 TEEs (Intel SGX, ARM TrustZone, RISC-V Keystone) Kuniyasu Suzaki, Akira Tsukamoto (AIST), Kazumoto Kojima (TRASIO), Hoang Trong-Thuc, Akira Moroo (AIST) |
[more] |
|
ISEC, SITE, LOIS |
2019-11-01 14:00 |
Osaka |
Osaka Univ. |
Lattice basis reduction over projected lattices and its application to solving the LWE problem Satoshi Nakamura, Nariaki Tateiwa (Kyushu Univ.), Koha Kinjo (NTT), Yasuhiko Ikematsu, Masaya Yasuda (Kyushu Univ.) ISEC2019-68 SITE2019-62 LOIS2019-27 |
The security of modern lattice-based schemes is based on the computational hardness of solving the learning with errors ... [more] |
ISEC2019-68 SITE2019-62 LOIS2019-27 pp.41-48 |
ISEC, SITE, LOIS |
2019-11-02 13:30 |
Osaka |
Osaka Univ. |
Consideration regarding Critical Infrastructure Protection Policies in Cybersecurity
-- Approach from the "Science and Technology Studies (STS)" -- Hideyuki Fujii, Takumi Kimura (NRI Secure) ISEC2019-80 SITE2019-74 LOIS2019-39 |
A comparison of critical infrastructure protection strategies in each country's cyber security policy reveals that there... [more] |
ISEC2019-80 SITE2019-74 LOIS2019-39 pp.115-120 |
ICSS, IPSJ-SPT |
2019-03-07 16:15 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Analyzing Deceptive Internationalized Domain Names Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide (NTT), Yuta Sawabe, Shigeki Goto (Waseda Univ.), Mitsuaki Akiyama (NTT) ICSS2018-76 |
Internationalized domain names (IDNs) are abused to create domain names visually similar to those of legitimate brands. ... [more] |
ICSS2018-76 pp.47-52 |
IBISML |
2019-03-05 17:00 |
Tokyo |
RIKEN AIP |
A Study on Automatic Generation of False Data Injection Attack against Connected Car Service Based on Reinforcement Learning Yuichiro Dan, Keita Hasegawa, Takafumi Harada, Tomoaki Washio, Yoshihito Oshima (NTT) IBISML2018-109 |
While the connected car is predicted to prevail by 2025, the appearance of novel cyber attacks is concerned. In this pap... [more] |
IBISML2018-109 pp.31-38 |
HWS, VLD |
2019-03-01 17:10 |
Okinawa |
Okinawa Ken Seinen Kaikan |
An Extended of Secure Remote Management Architecture for IoT-device Masahiro Shiraishi, Hiroki Ito, Keiichi Okabe (NTT) VLD2018-136 HWS2018-99 |
This paper provides a feasibility study of secure remote management architecture for IoT-device. IoT services exist in v... [more] |
VLD2018-136 HWS2018-99 pp.255-260 |
QIT (2nd) |
2018-11-26 13:30 |
Tokyo |
The University of Tokyo |
[Poster Presentation]
Graph Convolutional Network for Topological stabilizer code. Amarsanaa Davaasuren (Tokyo Univ.), Yasunari Suzuki (NTT), Keisuke Fujii (Kyoto Univ.), Yasunobu Nakamura (Tokyo Univ.) |
Quantum Error Correction (QEC) is vital for fault tolerant quantum computation and requires fast and high-performance de... [more] |
|
QIT (2nd) |
2018-11-26 13:30 |
Tokyo |
The University of Tokyo |
[Poster Presentation]
Optimal condition for a cavity QED-based quantum gate Rui Asaoka, Rina Kanamoto (Meiji Univ,), Yuuki Tokunaga (NTT SP Labs.), Takao Aoki (Waseda Univ.) |
[more] |
|
QIT (2nd) |
2018-11-26 13:30 |
Tokyo |
The University of Tokyo |
[Poster Presentation]
Cross-Resonance gate on 2D-integrated system of superconducting qubits Kentaro Heya, Kiyoto Mekami, Amarsanaa Davaasuren, Yutaka Takeda, Akhil Pratap Singh, Singo Kono (UT), Yasunari Suzuki (NTT), Koh-ich Nittoh, Koichi Kusuyama (RIKEN), Shuhei Tamate, Yutaka Tabuchi (UT), Yasunobu Nakamura (UT/RIKEN) |
Quantum Error Correction is indispensable for large-scale quantum computing. However, quantum error correction codes suc... [more] |
|
ICSS |
2018-11-22 11:15 |
Kagoshima |
|
[Invited Talk]
An Overview of Cyber Security for Connected Vehicles Junko Takahashi (NTT) ICSS2018-63 |
This paper presents an overview of cyber security for connected vehicles based on the recent previous studies of vehicle... [more] |
ICSS2018-63 pp.55-59 |