IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev ISEC Conf / Next ISEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 

===============================================
Technical Committee on Information Security (ISEC)
Chair: Atsushi Fujioka (Kanagawa Univ.) Vice Chair: Shiho Moriai (NICT), Shoichi Hirose (Univ. of Fukui)
Secretary: Toshihiro Ohigashi (Tokai Univ.), Keita Emura (NICT)
Assistant: Kazunari Omote (Tsukuba Univ.), Yuuji Suga (IIJ)

===============================================
Technical Committee on Social Implications of Technology and Information Ethics (SITE)
Chair: Tetsuya Morizumi (Kanagawa Univ.)
Vice Chair: Masaru Ogawa (Kobe Gakuin Univ.), Takushi Otani (Kibi International Univ.)
Secretary: Kanako Kawaguchi (Tokyo Univ. of the Arts), Akiyoshi Kabeya (Toyo Eiwa Univ.)
Assistant: Hisanori Kato (KDDI Research), Nobuyuki Yoshinaga (Yamaguchi Pref Univ.), Daisuke Suzuki (Hokuriku Univ.)

===============================================
Technical Committee on Hardware Security (HWS)
Chair: Tsutomu Matsumoto (Yokohama National Univ.) Vice Chair: Shinichi Kawamura (Toshiba), Makoto Ikeda (Univ. of Tokyo)
Secretary: Noriyuki Miura (Kobe Univ.), Hiroki Kunii (SECOM)

===============================================
Technical Committee on Information and Communication System Security (ICSS)
Chair: Yoshiaki Shiraishi (Kobe Univ.)
Vice Chair: Hiroki Takakura (NII), Katsunari Yoshioka (Yokohama National Univ.)
Secretary: Kazunori Kamiya (NTT), Takahiro Kasama (NICT)
Assistant: Akira Yamada (KDDI labs.), Keisuke Kito (Mitsubishi Electric)

===============================================
Technical Committee on Enriched MultiMedia (EMM)
Chair: Keiichi Iwamura (TUC)
Vice Chair: Minoru Kuribayashi (Okayama Univ.), Tetsuya Kojima (NIT,Tokyo College)
Secretary: Kan Hyonho (NIT, Tokyo), Harumi Murata (Tyukyo Univ.)
Assistant: Hiroko Akiyama (National Institute of Technology, Nagano College), キタヒロ カネダ (CANON)

===============================================
Special Interest Group on Computer Security (IPSJ-CSEC)


===============================================
Special Interest Group on Security Psychology and Trust (IPSJ-SPT)


DATE:
Wed, Jul 25, 2018 09:55 - 18:00
Thu, Jul 26, 2018 09:30 - 15:50

PLACE:
Sapporo Convention Center(1-1-1 Higashi-Sapporo 6-jo, Shiroishi-ku, Sapporo, 003-0006, Japan. Sapporo Convention Center is located approximately 10 min. by taxi from Sapporo city center. Also, Sapporo's highly developed public transportation system provides easy assess to all the visitors.https://www.sora-scc.jp/eng/)

TOPICS:
Security, etc.

----------------------------------------
Wed, Jul 25 AM B-1:ISEC(1):204 (09:55 - 11:35)
----------------------------------------

(1)/ISEC 09:55 - 10:20
Truly Efficient Robust Secret Sharing for the Real World
Yohei Watanabe (UEC), Kazuma Ohara (UEC/NEC), Mitsugu Iwamoto, Kazuo Ohta (UEC)

(2)/ISEC 10:20 - 10:45
Construction of Revocable HIBE with Adaptive Security
Atsushi Takayasu (Univ. Tokyo)

(3)/ISEC 10:45 - 11:10
Code-Based Signature Scheme without Trapdoors
Partha Sarathi Roy (KDDI Research), Kirill Morozov (Univ. of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Tsuyoshi Takagi (Univ. of Tokyo)

(4)/ISEC 11:10 - 11:35
On the integration of SCF-PEKS and PKE
Tatsuya Suzuki (Tokai Univ.), Keita Emura (NICT), Ohigashi Toshihiro (Tokai Univ.)

----------------------------------------
Wed, Jul 25 AM C-1:CSEC(1):207 (09:55 - 11:35)
----------------------------------------

(5) 09:55 - 10:20
Infrastructure as codeによるシステム試験環境の自動生成および自動試験による情報セキュリティリスクの検出手法の提案
○沼田晋作・中井悠人・橋本昭二・柏大(NTTコミュニケーションズ)

(6) 10:20 - 10:45
Man In The Browser攻撃対策を実現する人間・銀行サーバ間のセキュア通信プロトコル(その3)
○向平浩貴・神農泰圭(静岡大学)・土屋貴史(静岡大学)・大木哲史(静岡大学), 高橋健太((株)日立製作所), 尾形わかは(東京工業大学), 西垣正勝(静岡大学)

(7) 10:45 - 11:10
情報ハイディング可能なワンタイムパスワード認証方式
○須賀祐治(株式会社インターネットイニシアティブ)

(8) 11:10 - 11:35
ブロックチェーンと中央集権型サーバの連携による実用的スマートコントラクトの実現手法
○福光正幸(北海道情報大学)・長谷川真吾・磯辺秀司(東北大学), 岩田直樹(株式会社デンソー), 岩﨑淳也・小泉英介(東北大学), 中田恒夫(株式会社デンソー), 酒井正夫(東北大学)

----------------------------------------
Wed, Jul 25 PM A-2:HWS(1):201,202 (13:10 - 15:15)
----------------------------------------

(9)/HWS 13:10 - 13:35
A Study on Amplitude Controlling Using Modulated Wave toward Countermeasure against Spoofing Attack on Ultrasonic Rangefinder
Daisuke Fujimoto, Yu-ichi Hayashi (NAIST)

(10)/HWS 13:35 - 14:00
A System for Evaluating Instrumentation Security of ToF Depth-Image Cameras against Pulse-light Spoofing
Satoru Sakurazawa, Daisuke Fujimoto, Tsutomu Matsumoto (YNU)

(11)/HWS 14:00 - 14:25
How to Evaluate Instrumentation Security of Stereo Vision Cameras against DoS and Illusion Attacks
Naoki Yoshida, Hiroki Nohira, Yasushi Iwata, Tsutomu Matsumoto (YNU)

(12)/HWS 14:25 - 14:50
Immunity Evaluation of Cryptographic Devices using Gaussian Noise against IEMI Fault Injection
Takumi Okamoto, Daisuke Fujimoto, Yuichi Hayashi (NAIST), Naofumi Homma (Tohoku Univ.), Arthur Beckers, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede (KU Leuven)

(13)/HWS 14:50 - 15:15
Fundamental Study on Identification of EM Leakage Source of Audio Information from a Smart Device
Izumi Nishina, Daisuke Fujimoto (NAIST), Masahiro Kinugawa (NIT), Yu-ichi Hayashi (NAIST)

----------------------------------------
Wed, Jul 25 PM B-2:ISEC(2):204 (13:10 - 14:40)
----------------------------------------

(14)/ISEC 13:10 - 13:40
[Invited Talk]
Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model (from EUROCRYPT 2018)
Tsunekazu Saito, Keita Xagawa, Takashi Yamakawa (NTT)

(15)/ISEC 13:40 - 14:10
[Invited Talk]
Obfustopia Built on Secret-Key Functional Encryption (from EUROCRYPT 2018)
Fuyuki Kitagawa (Tokyo Tech), Ryo Nishimaki (NTT), Keisuke Tanaka (Tokyo Tech)

(16)/ISEC 14:10 - 14:40
[Invited Talk]
Memory Lower Bounds of Reductions Revisited (from EUROCRYPT 2018)
Yuyu Wang (Tokyo Tech/AIST/IOHK), Takahiro Matsuda, Goichiro Hanaoka (AIST), Keisuke Tanaka (Tokyo Tech)

----------------------------------------
Wed, Jul 25 PM C-2:CSEC(2):207 (13:10 - 15:15)
----------------------------------------

(17) 13:10 - 13:35
インターネット依存社会における情報発信者・情報送信機器の匿名性と特定・追跡性
○才所敏明・辻井重男(中央大学研究開発機構)

(18) 13:35 - 14:00
複数回にわたる匿名加工情報の提供に対する再識別リスク評価方法:PWSCUP2017における安全性指標の考察と分析から
○チャン クワン カイ・坂本一仁・松永昌浩(セコム株式会社)

(19) 14:00 - 14:25
経営マネジメント状況による情報漏洩インシデント削減効果の評価
○山田道洋(明治大学大学院先端数理科学研究科)・池上和輝・菊池浩明・乾孝治(明治大学総合数理学部)

(20) 14:25 - 14:50
セーフティ機能のセキュリ ティ脅威に対する効果の分析
○大久保隆夫(情報セキュリティ大学院大学)

(21) 14:50 - 15:15
金融サービスのセキュリティに対する量子コンピュータの影響と今後の暗号の移行について
○宇根正志(日本銀行)

----------------------------------------
Wed, Jul 25 PM A-3:SITE(1):201,202 (15:25 - 16:40)
----------------------------------------

(22)/SITE 15:25 - 15:50
Practice and Evaluation of Penetration Testing Exercises for Raising Cybersecurity Awareness
Daisuke Suzuki (Hokuriku Univ.)

(23)/SITE 15:50 - 16:15
A Study on Public Wi-Fi Authentication Method with Anonymity and Traceability Using Blockchain
Tomoyuki Sanda, Hiroyuki Inaba (Kyoto Inst. of Tech.)

(24)/SITE 16:15 - 16:40
A design of interest-rate recordable cryptocurrency management program
Yusuke Kaneko (SMBC/JRI), Shigeyuki Osada (JRI), Shigeyuki Azuchi (HAW), Hitoshi Okada (NII), Shigeichiro Yamasaki (KINDAI Univ.)

----------------------------------------
Wed, Jul 25 PM B-3:ISEC(3):204 (15:25 - 17:05)
----------------------------------------

(25)/ISEC 15:25 - 15:50
Application of the Singular Curve Point Decompression Attack to the Bitcoin Curve
Akira Takahashi (Kyoto Univ.), Mehdi Tibouchi, Masayuki Abe (NTT)

(26)/ISEC 15:50 - 16:15
Extended Partial Key Exposure Attacks on RSA
Kaichi Suzuki, Atsushi Takayasu, Noboru Kunihiro (Univ. of Tokyo)

(27)/ISEC 16:15 - 16:40
Secure Multiparty Computation of Ranking Using a Deck of Cards
Ken Takashima, Yuta Abe, Tatsuya Sasaki, Daiki Miyahara (Tohoku Univ.), Kazumasa Shinagawa (Tokyo Inst. of Tech./AIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.)

(28)/ISEC 16:40 - 17:05
Chi-Squared Test for Independence Between Single Nucleotide Polymorphisms and Diseases Using Mis-operation Resistant Searchable Homomorphic Encryption
Keita Emura, Takuya Hayashi (NICT/JST), Wenjie Lu (University of Tsukuba/JST CREST), Shiho Moriai (NICT/JST), Jun Sakuma (University of Tsukuba/JST CREST/RIKEN), Yoshiji Yamada (Mie University/JST CREST)

----------------------------------------
Wed, Jul 25 PM C-3:CSEC(3):207 (15:25 - 16:40)
----------------------------------------

(29) 15:25 - 15:50
権限の変更に着目した権限昇格攻撃防止手法のARMへの拡張
○吉谷亮汰・山内利宏(岡山大学大学院自然科学研究科)

(30) 15:50 - 16:15
SELinux CILを利用した不要なポリシ削減手法の提案
○齋藤凌也・山内利宏(岡山大学大学院自然科学研究科)

(31) 16:15 - 16:40
KLEEとLibfuzzerを組み合わせたハイブリッド型KleeFuzzerに関する提案
○三嶋秀宗・中沢実・西川幸延(金沢工業大学)

----------------------------------------
Wed, Jul 25 PM (17:15 - 18:00)
----------------------------------------

(32) 17:15 - 18:00
これからの夏のセキュリティワークショップ開催に向けて

----------------------------------------
Thu, Jul 26 AM A-4:SPT:201,202 (09:30 - 11:10)
----------------------------------------

(33) 09:30 - 09:55
プライバシ保護設定推測における推測値の平行シフトが受容度に与える影響
〇中村 徹(国際電気通信基礎技術研究所(ATR))・アダムス アンドリュー A.(明治大学)・清本晋作(KDDI総合研究所)・村田潔(明治大学)・鈴木信夫(国際電気通信基礎技術研究所(ATR))

(34) 09:55 - 10:20
プライバシー保護技術の事業活用に関する一考察
〇杉尾信行・青野博・関野公彦(株式会社NTTドコモ)

(35) 10:20 - 10:45
日本人が付けるパスワードの特性調査と他国データとの比較
愛野乃子・〇金岡晃(東邦大学)

(36) 10:45 - 11:10
[招待講演]サイバーセキュリティで重要度を増すCSIRTと組織・人のトラスト
〇斯波万恵(東芝デジタルソリューションズ)

----------------------------------------
Thu, Jul 26 AM B-4:EMM:204 (09:30 - 10:20)
----------------------------------------

(37)/EMM 09:30 - 09:55
Some tips for information hiding from the viewpoint of magic trick
Naofumi Aoki (Hokkaido Univ.)

(38)/EMM 09:55 - 10:20
Effects of high frequency components on steganalysis of data hiding in low-order bits of an audio waveform
Akira Nishimura (Tokyo Univ. Info. Sci.)

----------------------------------------
Thu, Jul 26 AM C-4:CSEC(4):207 (09:30 - 11:10)
----------------------------------------

(39) 09:30 - 09:55
マルウェア対策のための研究用データセット ~MWS Datasets 2018~
○高田雄太(日本電信電話株式会社)・寺田真敏(株式会社日立製作所)・松木隆宏(株式会社FFRI)・笠間貴弘(国立研究開発法人 情報通信研究機構)・荒木粧子(株式会社ソリトンシステムズ)・畑田充弘(NTTコミュニケーションズ株式会社)

(40) 09:55 - 10:20
シンボリック実行を活用したマルウェア解析作業の効率化の研究
○窪優司・大久保隆夫(情報セキュリティ大学院大学)

(41) 10:20 - 10:45
インターネットに接続されたサイバー攻撃観測用センサーの環境に関する考察
○芦野佑樹・鮫島礼佳・須尭一志・矢野由紀子(NEC ナショナルセキュリティソリューション事業部 サイバーセキュリティ・ファクトリー), 中村康弘(防衛大学校電気情報学群情報工学科)

(42) 10:45 - 11:10
サイバー攻撃の有無が不明な通信データからサイバー攻撃目的と推定される通信を抽出する手法の提案
○鮫島礼佳・芦野佑樹・須尭一志・矢野由紀子(日本電気株式会社ナショナルセキュリティ・ソリューション事業部サイバーセキュリティ・ファクトリ), 中村康弘(防衛大学校電気情報学群情報工学科)

----------------------------------------
Thu, Jul 26 AM A-5:SITE(2):201,202 (11:20 - 12:35)
----------------------------------------

(43)/SITE 11:20 - 11:45
Regulatory Policies Regarding Mobile Spectrum Holdings in the United States and EU Countries
Tomoko Yamajo (KDDI Research)

(44)/SITE 11:45 - 12:10
A Study on Limitation on Copyright in Machine Learning
-- Review of the reform bill in Japan --
Naonori Kato (KDDI Research), Masatomo Suzuki (Niigata Univ./RIKEN), Yosuke Murakami (KDDI Research)

(45)/SITE 12:10 - 12:35
About Access Control with the Deconstruction Device in Probability Measures on Metric Spaces
Tetsuya Morizumi, Hirotsugu Kinoshita (KU)

----------------------------------------
Thu, Jul 26 AM B-5:ICSS:204 (11:20 - 12:35)
----------------------------------------

(46)/ICSS 11:20 - 11:45

Kenta Watanabe, Miwako Mishima (Gifu Univ.)

(47)/ICSS 11:45 - 12:10
Real-time Botnet Detection Using Nonnegative Tucker Decomposition
Hideaki Kanehara, Yuma Murakami (Waseda Univ.), Jumpei Shimamura (Clwit), Takeshi Takahashi (NICT), Noboru Murata (Waseda Univ.), Daisuke Inoue (NICT)

(48)/ICSS 12:10 - 12:35
(See Japanese page.)

----------------------------------------
Thu, Jul 26 AM C-5:CSEC(5):207 (11:20 - 12:10)
----------------------------------------

(49) 11:20 - 11:45
FPGAインスタンスを用いたクラウドログ異常検知の実装と評価
○千田拓矢・杉尾信行・青野博・関野公彦(NTTドコモ)

(50) 11:45 - 12:10
ファイルサーバーにおけるHIDSの適用研究
○宮脇一晃・辰己丈夫(放送大学大学院)

----------------------------------------
Thu, Jul 26 PM A-6:HWS(2):201,202 (13:45 - 15:50)
----------------------------------------

(51)/HWS 13:45 - 14:10
Consideration on Crypto Key Management Devices on the Market.
Kohei Isobe, Keisuke Hasegawa, Tadahiko Ito (SECOM)

(52)/HWS 14:10 - 14:35
Compensation of Temperature Induced Flipping-Bits in CMOS SRAM PUF by NMOS Body-Bias
Xuanhao Zhang, Xiang Chen, Hanfeng Sun, Hirofumi Shinohara (Waseda Univ.)

(53)/HWS 14:35 - 15:00
Side-Channel Countermeasure for XOR based PUF and Its Evaluation
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.)

(54)/HWS 15:00 - 15:25
Side-Channel Attacks on an Error-Correction Circuit of Fuzzy Extractor
Yuta Goto, Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ)

(55)/HWS 15:25 - 15:50
A Study on Systematic Insertion of Hardware Trojan Based on Path Delay
Akira Ito, Rei Ueno, Naofumi Homma, Takafumi Aoki (Tohoku Univ.)

----------------------------------------
Thu, Jul 26 PM B-6:ISEC(4):204 (13:45 - 15:50)
----------------------------------------

(56)/ISEC 13:45 - 14:10
Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT
Shigeo Tsujii, Ryo Fujita, Masahito Gotaishi (Chuo Univ.)

(57)/ISEC 14:10 - 14:35
A New Embedding Method for Generalized LWE
Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi (Univ. Tokyo)

(58)/ISEC 14:35 - 15:00
The Precise Security Analysis of Block Ciphers Enhanced by FX-Construction against a Quantum Algorithm
Syo Yasui, Noboru Kunihiro (UTokyo)

(59)/ISEC 15:00 - 15:25
Plaintext Recovery Attacks against WPA-TKIP Using Iterated RC4 Key Correlations
Ryoma Ito, Atsuko Miyaji (Osaka Univ.)

(60)/ISEC 15:25 - 15:50
A construction of generic Multiparty Private Set Intersection
Katsunari Shishido, Motoi Hayashi, Atsuko Miyaji (Osaka Univ.)

----------------------------------------
Thu, Jul 26 PM C-6:CSEC(6):207 (13:45 - 14:35)
----------------------------------------

(61) 13:45 - 14:10
1台のサーバで実行可能な秘密分散法を用いた秘匿計算法
○山根将司・岩村惠市(東京理科大学)・安田裕之(東京大学)

(62) 14:10 - 14:35
2ビット毎に大小比較を行う暗号文出力型の秘匿比較方式の提案
○小林拓美(島根大学大学院総合理工学研究科)・伯田恵輔(島根大学学術研究院理工学系)

# Information for speakers
General Talk will have 20 minutes for presentation and 5 minutes for discussion.


=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:

Fri, Sep 7, 2018: Kikai-Shinko-Kaikan Bldg. [Tue, Jul 10]

# SECRETARY:
Kazumasa Omote (University of Tsukuba)
E-mail: ic-c (to ISEC secretaries)

=== Technical Committee on Social Implications of Technology and Information Ethics (SITE) ===

=== Technical Committee on Hardware Security (HWS) ===
# FUTURE SCHEDULE:

Mon, Oct 29, 2018: Kobe Univ. Umeda Intelligent Laboratory , Topics: HardwareSecurity, etc.

# SECRETARY:
Noriyuki Miura(Kobe University), Hiroki Kunii(SECOM)
E-mail:hws-adn

=== Technical Committee on Information and Communication System Security (ICSS) ===

# SECRETARY:
Yoshiaki Shiraishi (Kobe University)
E-mail: is-adm-q

# ANNOUNCEMENT:
# Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html

=== Technical Committee on Enriched MultiMedia (EMM) ===
# FUTURE SCHEDULE:

Thu, Sep 27, 2018 - Fri, Sep 28, 2018: Beppu Int'l Convention Ctr. aka B-CON Plaza [Mon, Jul 16], Topics: Multimedia Communication/System, Lifelog Applications, IP Broadcasting/Video Transmission, Media Security, Media Processing (AI, Deep Learning), etc.

=== Special Interest Group on Computer Security (IPSJ-CSEC) ===

=== Special Interest Group on Security Psychology and Trust (IPSJ-SPT) ===


Last modified: 2018-07-13 10:07:48


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /   [Return to SITE Schedule Page]   /   [Return to HWS Schedule Page]   /   [Return to ICSS Schedule Page]   /   [Return to EMM Schedule Page]   /   [Return to IPSJ-CSEC Schedule Page]   /   [Return to IPSJ-SPT Schedule Page]   /  
 
 Go Top  Go Back   Prev ISEC Conf / Next ISEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan