IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev ICSS Conf / Next ICSS Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 

===============================================
Technical Committee on Information and Communication System Security (ICSS)
Chair: Hiroki Takakura (NII)
Vice Chair: Katsunari Yoshioka (Yokohama National Univ.), Kazunori Kamiya (NTT)
Secretary: Takahiro Kasama (NICT), Akira Yamada (KDDI labs.)
Assistant: Keisuke Kito (Mitsubishi Electric), Toshihiro Yamauchi (Okayama Univ.)

===============================================
Technical Committee on Information Security (ISEC)
Chair: Shiho Moriai (NICT)
Vice Chair: Shoichi Hirose (Univ. of Fukui), Tetsuya Izu (Fujitsu Labs.)
Secretary: Keita Emura (NICT), Kazunari Omote (Tsukuba Univ.)
Assistant: Dai Yamamoto (Fujitsu Labs.), Yuuji Suga (IIJ)

===============================================
Technical Committee on Social Implications of Technology and Information Ethics (SITE)
Chair: Tetsuya Morizumi (Kanagawa Univ.)
Vice Chair: Masaru Ogawa (Kobe Gakuin Univ.), Takushi Otani (Kibi International Univ.)
Secretary: Akiyoshi Kabeya (Toyo Eiwa Univ.), Hisanori Kato (KDDI Research)
Assistant: Nobuyuki Yoshinaga (Yamaguchi Pref Univ.), Daisuke Suzuki (Hokuriku Univ.)

===============================================
Technical Committee on Biometrics (BioX)
Chair: Akira Otsuka (IISEC)
Vice Chair: Tetsushi Ohki (Shizuoka Univ.), Takahiro Aoki (Fujitsu Labs.)
Secretary: Masatsugu Ichino (Univ. of Electro-Comm.), Naoyuki Takada (SECOM)
Assistant: Daishi Watabe (Saitama Inst. of Tech.), Ryota Horie (Shibaura Inst. of Tech.)

===============================================
Technical Committee on Hardware Security (HWS)
Chair: Shinichi Kawamura (Toshiba)
Vice Chair: Makoto Ikeda (Univ. of Tokyo), Yasuhisa Shimazaki (Renesas Electronics)
Secretary: Hiroki Kunii (SECOM), Takatsugu Ono (Kyushu Univ.)

===============================================
Technical Committee on Enriched MultiMedia (EMM)
Chair: Masaki Kawamura (Yamaguchi Univ.)
Vice Chair: Motoi Iwata (Osaka Prefecture Univ.), Tetsuya Kojima (NIT,Tokyo College)
Secretary: Hiroko Akiyama (NIT, Nagano College), キタヒロ カネダ (Nagase)
Assistant: Masaki Inamura (Tokyo Denki Univ.), Kazuhiro Kono (Kansai Univ.)

===============================================
Special Interest Group on Computer Security (IPSJ-CSEC)


===============================================
Special Interest Group on Security Psychology and Trust (IPSJ-SPT)


DATE:
Tue, Jul 23, 2019 09:55 - 18:00
Wed, Jul 24, 2019 09:05 - 15:50

PLACE:
Eikokuji Campus, Kochi University of Technology(It is about 15minute walk from JR Kochi Station.)

TOPICS:
Security, etc.

----------------------------------------
Tue, Jul 23 AM A-1:ISEC(1):101 (09:55 - 12:00)
----------------------------------------

(1)/ISEC 09:55 - 10:20
Implementation of gathering system configuration and design vulnerability assessment for zero-day attack countermeasure using vulnerability information
Motoki Kusume, Koji Kida, Keizo Saisho (Kagawa Univ.)

(2)/ISEC 10:20 - 10:45
An Approach to Attack Scenario Generation for Simulation of Targeted Attacks
Yusuke Takahashi, Shigeyoshi Shima, Atsunori Naito (NEC), Rui Tanabe, Katsunari Yoshioka (YNU)

(3)/ISEC 10:45 - 11:10
Profiling of malicious users towards honeypot installation in the blockchain network
Kazuki Hara, Teppei Sato, Mitsuyoshi Imamura (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT)

(4)/ISEC 11:10 - 11:35
Risk analysis of zero downtime mechanism by dispersibility in blockchain technology
Wataru Taguchi, Mitsuyoshi Imamura (Tsukuba Univ.), Kazumasa Omote (uba Univ./NICT)

(5)/ISEC 11:35 - 12:00
A method of giving trust to users in Bitcoin
Asuka Suzuki, Teppei Sato (Tsukuba Univ.), Omote Kazumasa (Tsukuba Univ./NICT)

----------------------------------------
Tue, Jul 23 AM B-1:CSEC(1):213 (09:55 - 12:00)
----------------------------------------

(6) 09:55 - 10:20
金融サービスにおける機械学習システムの適切な活用について:セキュリティと品質に焦点を当てて
○清藤 武暢・宇根 正志(日本銀行)

(7) 10:20 - 10:45
対象者の人数と人間関係に制約のない移動履歴とSNSアカウントの照合
○大岡 拓斗・松本 瞬・市野 将嗣・吉浦 裕(電通大)

(8) 10:45 - 11:10
マルウェア対策のための研究用データセット~MWS Datasets 2019~
荒木 粧子(ソリトンシステムズ)・○笠間 貴弘(NICT)・押場 博光(FFRI)千葉 大紀(NTTセキュアプラットフォーム研究所)・畑田 充弘(NTT)・寺田 真敏(電機大学)

(9) 11:10 - 11:35
擬似C&Cサーバを用いたIoTマルウェア駆除手法の検討
○三須 剛史・高田 一樹(セキュアブレイン)

(10) 11:35 - 12:00
観測ロケットMOMO3号機によるセキュア通信方式の基礎実験
○吉田 真紀(NICT)・森岡 澄夫(インターステラテクノロジズ)・尾花 賢(法政大学)

----------------------------------------
Tue, Jul 23 AM D-1:BioX:328 (09:55 - 11:35)
----------------------------------------

(11)/BioX 09:55 - 10:20
Evaluation of Similarity Calculation Methods for Image Clustering based on PRNU Noise
Mai Uchida, Yoichi Tomioka (UoA)

(12)/BioX 10:20 - 10:45
Development of 2,400ppi fingerprint sensor for capturing neonate fingerprint within 24 hours after Birth
Yoshinori Koda, Ai Takahashi, Koichi Ito, Takafumi Aoki (Tohoku Univ.)

(13)/BioX 10:45 - 11:10
Introduction of Second-order Differential Phase Spectrum into Person Authentication using Intra-Palm Propagation Signal
Kohei Fujita, Yuya Isimoto, Isao Nakanishi (Tottori Univ)

(14)/BioX 11:10 - 11:35
Empirical Evaluation on Face-Detection Prevention Technologies
Kazuki Eto, Kazushi Waki, Takafumi Mori, Hiroaki Kikuchi (Meiji Univ.)

----------------------------------------
Tue, Jul 23 PM A-2:ISEC(2):104 (13:10 - 15:15)
----------------------------------------

(15)/ISEC 13:10 - 13:35
Constructing More Efficient Lattice-based Revocable IBE with Adaptive Security
Atsushi Takayasu (Univ. Tokyo)

(16)/ISEC 13:35 - 14:00
A Revocable Group Signature Scheme with Strong Anonymity for Crowdsensing
Yuto Nakazawa, Toru Nakanishi (Hiroshima Univ.)

(17)/ISEC 14:00 - 14:25
Generic Even-Mansour Construction Based on Group Actions
Hector Hougaard, Chen-Mou Cheng, Miyaji Atsuko (Graduate School of Engineering, Osaka Univ.)

(18)/ISEC 14:25 - 14:50
New Quantum Algorithms for Modular Inverse and Their Application on the Elliptic Curve Discrete Logarithm Problem
Ryo Kurama (Univ. of Tokyo), Noboru Kunihiro (Tsukuba Univ.)

(19)/ISEC 14:50 - 15:15
Attribute-Based Group Signatures for Revocable Members
Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama (ATR)

----------------------------------------
Tue, Jul 23 PM B-2:HWS(1):213 (13:10 - 15:15)
----------------------------------------

(20)/HWS 13:10 - 13:35
A Formal Approach to Verifying Trojan-freeness of Cryptographic Circuits Based on Galois-Field Arithmetic
Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.)

(21)/HWS 13:35 - 14:00
Side-channel leakage evaluation of cryptographic module by IC chip level consumption simulation
Kazuki Yasuda, Kazuki Monta, Akihiro Tsukioka, Noriyuki Miura, Makoto Nagata (Kobe Univ.)

(22)/HWS 14:00 - 14:25
A Countermeasure against Side-Channel Analysis using Dynamic Power Control
Tomoaki Ukezono (Fukuoka Univ.)

(23)/HWS 14:25 - 14:50
Side Channel Security of an FPGA Pairing Implementation with Pipelined Modular Multiplier
Mitsufumi Yamazaki, Junichi Sakamoto, Yuta Okuaki, Tsutomu Matsumoto (YNU)

(24)/HWS 14:50 - 15:15
An FPGA Implementation of Aggregate Signature Schemes with Pipelined Modular Multiplier
Yota Okuaki, Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto (YNU)

----------------------------------------
Tue, Jul 23 PM D-2:SITE(1):328 (13:10 - 14:50)
----------------------------------------

(25)/SITE 13:10 - 13:35
Proposal and Implementation of Password Reminder System for Partial Forgetting
Ryota Hosoda, Hiroyuki Inaba (KIT)

(26)/SITE 13:35 - 14:00
Proposal of Spam Filter by Applying Neural Network for Mitigating Catastrophic Forgetting
Shuiti Kawahara, Lu Chen, Hiroyuki Inaba (KIT)

(27)/SITE 14:00 - 14:25
Video Watermarking Using Difference of Persistent Homology in Consecutive Frames
Takaya Kimura, Hiroyuki Inaba (KIT)

(28)/SITE 14:25 - 14:50
A simulation of a 3-D visual cryptography using holography
Takumi Takazawa, Kazuhiro Suzuki, Naoki Takada (Kochi Univ.)

----------------------------------------
Tue, Jul 23 PM (15:30 - 16:30)
----------------------------------------

(29) 15:30 - 16:30


----------------------------------------
Tue, Jul 23 PM (16:30 - 17:30)
----------------------------------------

(30) 16:30 - 17:30


----------------------------------------
Tue, Jul 23 PM (17:30 - 18:00)
----------------------------------------

(31) 17:30 - 18:00


----------------------------------------
Wed, Jul 24 AM A-3:ISEC(3):104 (09:30 - 10:45)
----------------------------------------

(32)/ISEC 09:30 - 09:55
SecureHID: Securing the USB Interface
Jan Goette (Waseda Univ.), Naoto Yanai (Osaka Univ.), Tatsuya Mori (Waseda Univ.)

(33)/ISEC 09:55 - 10:20
A Performance Analysis of Supersingular Isogeny Diffie-Hellman with Several Classes of the Quadratic Extension Fields
Yuki Nanjo (Okayama Univ.), Masaaki Shirase (Future Univ. Hakodate), Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.)

(34)/ISEC 10:20 - 10:45
Privacy for Documents and Prototype of Risk Evaluation Tool
Tomoaki Mimoto, Shinsaku Kiyomoto (KDDI Research), Koji Kitamura (AIST), Atsuko Miyaji (Osaka Univ.)

----------------------------------------
Wed, Jul 24 AM B-3:HWS(2):213 (09:05 - 10:45)
----------------------------------------

(35)/HWS 09:05 - 09:30
Instruction Replacement Fault Attack for TVC using Double Laser Station
Tomoro Suzuki, Junichi Sakamoto, Tsutomu Matsumoto (YNU)

(36)/HWS 09:30 - 09:55
Electromagnetic Analysis Attacks on an ASIC Implementation of a Ring-Oscillator PUF
Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ.)

(37)/HWS 09:55 - 10:20
Fundamental Study on an Estimation Method of Irradiate Frequencies to Forcibly Cause Electromagnetic Information Leakage
Shugo Kaji (NAIST), Masahiro Kinugawa (NIT), Daisuke Fujimoto, Yu-ichi Hayashi (NAIST)

(38)/HWS 10:20 - 10:45
Instrumentation Security of Ranging Pulse LIDARs Using Multiple Photodetectors
Tatsuya Suehiro, Ryuya Ichinose, Satoru Sakurazawa, Naoki Yoshida, Tsutomu Matsumoto (YNU)

----------------------------------------
Wed, Jul 24 AM C-3:SITE(2):210 (09:30 - 10:45)
----------------------------------------

(39)/SITE 09:30 - 09:55
Generation of Family Resemblance Inference Rules by Boid Annotation and Labeled-LDA
-- A Machine Learning Approach to Integrate Inference Attack Analysis and Covert Channel Attack Analysis --
Kosuke Kurebayashi, Tetsuya Morizumi, Hirotsugu Kinoshita (KU)

(40)/SITE 09:55 - 10:20
Implicit Guidance & Control at OODA Loop using as Countermeasures
-- against SMS phishing --
Yuidhi Takigawa (N.D.A.), Takeo Tatsumi (O.U.J/)

(41)/SITE 10:20 - 10:45
Server Configuration Training Including Vulnerability Assessment and Remediation process
Daisuke Suzuki (Hokuriku Univ.)

----------------------------------------
Wed, Jul 24 AM A-4:CSEC(2):104 (10:55 - 12:35)
----------------------------------------

(42) 10:55 - 11:20
n<2k-1において計算結果の正当性を検証可能な秘密分散を用いた秘匿計算
○落合 将吾・岩村 惠市(理科大)

(43) 11:20 - 11:45
ブロックチェーンを用いたIoTシステム向け証明サービス基盤の提案
○大久保 隆夫(情報セキュリティ大学院大学)・田嶋 健・上原 敏幸(アイビーシー)

(44) 11:45 - 12:10
ブロックチェーンを用いた公正なオンラインゲームの確立手法
○佐古 健太郎(早稲田大学)・森 達哉(早稲田大学)・松尾 真一郎(ジョージタウン大学)

(45) 12:10 - 12:35
Ethereumブロックチェーンで綿菓子を巻く方法
○須賀 祐治(IIJ)

----------------------------------------
Wed, Jul 24 AM B-4:EMM/ICSS:213 (10:55 - 12:35)
----------------------------------------

(46)/ICSS 10:55 - 11:20
Investigation on Blockchain-based Malware Information Sharing Method in Malware Detection System
Ryusei Fuji, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama (Univ. of Miyazaki), Mirang Park (Kanagawa Inst. of Tech.), Norio Shiratori (Chuo Univ.), Naonobu Okazaki (Univ. of Miyazaki)

(47)/ICSS 11:20 - 11:45
Automatic Node Manipulation System for Active Monitoring Environment
Shingo Yasuda, Nobuyuki Kanaya, Yu Tsuda, Satoshi Ohta, Ryosuke Miura, Daisuke Inoue (NICT)

(48)/EMM 11:45 - 12:10
A Study on Suppression of Inappropriate Use of Illegal Contents Based on Conformity Caused by Normative Influence
Hiroki Yamaguchi, Kazuhiro Kono (Kansai Univ.)

(49)/EMM 12:10 - 12:35
Recording device identification based on audio distortion depending on system-on-chip
Akira Nishimura (Tokyo Univ. Info. Sci.)

----------------------------------------
Wed, Jul 24 AM C-4:SITE(3):210 (10:55 - 12:10)
----------------------------------------

(50)/SITE 10:55 - 11:20
Stochastic Existence Connecting Logos that are not necessarily completely divided and Language Games
-- Limitations of Security Models and the Possibility of Artificial Intelligence --
Tetsuya Morizumi (KU)

(51)/SITE 11:20 - 11:45
International regulatory trend survey report on AI
-- Focusing on the OECD Principles on AI --
Naonori Kato (KDDI Research), Masatomo Suzuki (Niigata Univ./RIKEN), Yoichiro Itakura (Hikari Sogoh Law Offices/RIKEN), Yosuke Murakami (KDDI Research)

(52)/SITE 11:45 - 12:10
Development of the Ethics Assessment for Research & Innovation Guidelines under the SATORI project in Europe (1)
-- Background and Outline --
Takushi Otani (Kibi International Univ.), Hirotaka Osawa (Tsukuba Univ.), Minao Kukita (Nagoya Univ.), Reina Saijo (Kyoto Univ.)

----------------------------------------
Wed, Jul 24 PM A-5:ISEC(4):104 (13:45 - 15:50)
----------------------------------------

(53)/ISEC 13:45 - 14:10
3 Layers Public Key Cryptosystem with a Short Tandem Repeat DNA for Ultimate Personal Identification
-- Introduction of Short Tandem Repeat Coupled with Mai Nanbaa and its Application --
Shigeo Tsujii, Toshiaki Saisho, Masao Yamasawa, Ko Shikata (Chuo Univ.), Koji Sasaki, Nobuharu Suzuki (Ad.)

(54)/ISEC 14:10 - 14:35
Anonymous Public-Key Certificates based on Elliptic Curve
Kazuomi Oishi (SIST)

(55)/ISEC 14:35 - 15:00
A Method for Key-Updatable Symmetric Searchable Encryption
Natsume Matsuzaki, Hiroaki Anada (Univ. of Nagasaki)

(56)/ISEC 15:00 - 15:25
Participation Report of the 9th BIU Winter School on Cryptography
Hiroaki Anada (Univ. Nagasaki)

(57)/ISEC 15:25 - 15:50
Garbled Circuit by three valued logics by Bochvar
Shunsuke Hayashi, Taroh Sasaki, Athushi Fujioka (Kanagawa Univ.)

----------------------------------------
Wed, Jul 24 PM B-5:HWS(3):213 (13:45 - 15:50)
----------------------------------------

(58)/HWS 13:45 - 14:10
Design Space Search Applying Bayesian Optimization to High-level Design Flow
Ryohei Nakayama (UTokyo), Hiromitsu Awano (Osaka Univ.), Makoto Ikeda (UTokyo)

(59)/HWS 14:10 - 14:35
Design of Highly Efficient AES Hardware Architectures Based on Multiplicative-Offset
Rei Ueno (Tohoku Univ.), Sumio Morioka (IST), Noriyuki Miura, Kohei Matsuda, Makoto Nagata (Kobe Univ.), Shivam Bhasin (NTU), Yves Mathieu, Tarik Graba, Jean-Luc Danger (TPT), Naofumi Homma (Tohoku Univ.)

(60)/HWS 14:35 - 15:00
Design of High Performance Processor for Paillier Algorithm With Homomorphism
Chun Cai, Hiromitsu Awano, Makoto Ikeda (Tokyo Univ.)

(61)/HWS 15:00 - 15:25
Potential Method to Extract Uniqueness from Non-Ideality of Sensor Device
Thibaut Constant, Makoto Nagata, Noriyuki Miura (Kobe Univ.)

(62)/HWS 15:25 - 15:50
Possibility of Identifying USB Device by Voltage Changing
Taku Toyama, Junichi Sakamoto, Naoki Yoshida, Tsutomu Matsumoto (YNU)

----------------------------------------
Wed, Jul 24 PM C-5:SPT:210 (13:45 - 15:25)
----------------------------------------

(63) 13:45 - 14:10
メールにおける誘導手口の推定手法に関する検討
○山本匠・西川弘毅・岩崎亜衣子(三菱電機)・上原 航汰(静岡大学)・Harsham Bret・WangYe・HoriChiori・河内清人(三菱電機)・西垣正勝(静岡大学)

(64) 14:10 - 14:35
新聞で報道される情報漏えい事故の属性分析
○新原功一・菊池浩明(明治大学)

(65) 14:35 - 15:00
セキュリティやプライバシーに関するSoK論文やサーベイ論文をSoKする
○金岡晃(東邦大学)

(66) 15:00 - 15:25
情報セキュリティに関連するガイドラインのDoc2Vecを用いた文書内容の可視化手法の提案とその評価
○尾崎敏司(筑波大学/トレンドマイクロ)

# Information for speakers
General Talk will have 20 minutes for presentation and 5 minutes for discussion.
Invited Talk will have 50 minutes for presentation and 10 minutes for discussion.


=== Technical Committee on Information and Communication System Security (ICSS) ===

# SECRETARY:
Hiroki Takakura(National Institute of Informatics)
E-mail: is-adm-q

# ANNOUNCEMENT:
# Latest information will be presented on the homepage:
https://www.ieice.org/iss/icss/index-en.html

=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:

Fri, Sep 6, 2019:

# SECRETARY:
Kazumasa Omote (University of Tsukuba)
E-mail: ic-c (to ISEC secretaries)

=== Technical Committee on Social Implications of Technology and Information Ethics (SITE) ===

=== Technical Committee on Biometrics (BioX) ===
# FUTURE SCHEDULE:

Thu, Oct 3, 2019 - Fri, Oct 4, 2019: [Fri, Aug 16]

=== Technical Committee on Hardware Security (HWS) ===

# SECRETARY:
Noriyuki Miura(Kobe University), Hiroki Kunii(SECOM)
E-mail:hws-c

=== Technical Committee on Enriched MultiMedia (EMM) ===
# FUTURE SCHEDULE:

Thu, Sep 19, 2019 - Fri, Sep 20, 2019: Tokimeito, Niigata University [Wed, Jul 17]

=== Special Interest Group on Computer Security (IPSJ-CSEC) ===

=== Special Interest Group on Security Psychology and Trust (IPSJ-SPT) ===


Last modified: 2019-07-06 20:49:13


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /   [Return to SITE Schedule Page]   /   [Return to BioX Schedule Page]   /   [Return to HWS Schedule Page]   /   [Return to ICSS Schedule Page]   /   [Return to EMM Schedule Page]   /   [Return to IPSJ-CSEC Schedule Page]   /   [Return to IPSJ-SPT Schedule Page]   /  
 
 Go Top  Go Back   Prev ICSS Conf / Next ICSS Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan