|
Chair |
|
Noboru Kunihiro (Tsukuba Univ.) |
Vice Chair |
|
Junji Shikata (Yokohama National Univ.), Goichiro Hanaoka (AIST) |
Secretary |
|
Takahiro Matsuda (AIST), Kazuki Yoneyama (Ibaraki Univ.) |
Assistant |
|
Yoshikazu Hanatani (Toshiba) |
|
Technical Committee on Social Implications of Technology and Information Ethics (SITE) |
[schedule] [select]
|
|
Chair |
|
Takushi Otani (Kibi International Univ.) |
Vice Chair |
|
Soichiro Morishita (Cyber Agent), Takeo Tatsumi (Open Univ. of Japan) |
Secretary |
|
Hideyuki Fujii (NRI-Secure), Daisuke Suzuki (Hokuriku Univ.) |
Assistant |
|
Yusuke Tachibana (Fukuoka Inst. of Tech.) |
|
|
Chair |
|
Hitoshi Imaoka (NEC) |
Vice Chair |
|
Norihiko Okui (KDDI Research), Naoyuki Takada (SECOM) |
Secretary |
|
Akihiro Hayasaka (NEC), Emiko Sano (MitsubishiElectric) |
Assistant |
|
Hiroyuki Suzuki (Gunma Univ), Shinichi Shirakawa (Yokohama National Univ.) |
|
|
Chair |
|
Makoto Nagata (Kobe Univ.) |
Vice Chair |
|
Yuichi Hayashi (NAIST), Daisuke Suzuki (Mitsubishi Electric) |
Secretary |
|
Hirotake Yamamotoi (Sony LSI Design), Daisuke Fujimotoi (NAIST) |
|
Technical Committee on Information and Communication System Security (ICSS) |
[schedule] [select]
|
|
Chair |
|
Katsunari Yoshioka (Yokohama National Univ.) |
Vice Chair |
|
Takahiro Kasama (NICT) |
Secretary |
|
Akira Yamada (KDDI labs.), Toshihiro Yamauchi (Okayama Univ.) |
Assistant |
|
Keisuke Kito (Mitsubishi Electric), Takeshi Sugawara (Univ. of Electro-Comm.), Yo Kanemoto (NTT) |
|
|
Chair |
|
Ryoichi Nishimura (NICT) |
Vice Chair |
|
Kotaro Sonoda (Nagasaki Univ.), Masatsugu Ichino (Univ. of Electro-Comm.) |
Secretary |
|
Youichi Takashima (Kaishi Professional Univ.), Shoko Imaizumi (Chiba Univ.) |
Assistant |
|
Tomoko Kajiyama (Hiroshima City Univ.), Shieyuki Sakazawa (Osaka Inst. of Tech.) |
|
Conference Date |
Tue, Jul 19, 2022 09:00 - 17:30
Wed, Jul 20, 2022 09:00 - 17:05 |
Topics |
|
Conference Place |
Online |
Registration Fee |
This workshop will be held as the IEICE workshop in fully electronic publishing. Registration fee will be necessary except the speakers and participants other than the participants to workshop(s) in non-electronic publishing. See the registration fee page. We request the registration fee or presentation fee to participants who will attend the workshop(s) on EMM, BioX, ISEC, SITE, ICSS, HWS. |
Due for Registration |
Please proceed the payment of registration fee by 3 days before the workshop date.
The meeting URL will be announced from the registration for online. Please submit the registration form, too. |
Tue, Jul 19 AM Special Session 09:00 - 11:30 |
(1) |
09:00-09:05 |
Opening talk |
(2) |
09:05-09:20 |
|
(3) |
09:20-09:35 |
|
(4) |
09:35-09:50 |
|
|
09:50-10:00 |
Break ( 10 min. ) |
(5) |
10:00-10:40 |
|
|
10:40-10:50 |
Break ( 10 min. ) |
(6) |
10:50-11:30 |
|
|
11:30-13:00 |
Lunch Break ( 90 min. ) |
Tue, Jul 19 AM HWS1(Track 1) 13:00 - 14:40 |
(7) HWS |
13:00-13:25 |
Side-Channel Attacks on Post-Quantum KEMs Using Multi-class Classification Neural Network |
Yutaro Tanaka, Rei Ueno (Tohoku Univ.), Keita Xagawa, Akitra Ito, Junko Takahashi (NTT), Naofumi Homma (Tohoku Univ.) |
(8) HWS |
13:25-13:50 |
Revisit of Non Profiled Side Channel Analysis via Deep Learning |
Kentaro Imafuku, Shinichi Kawamura, Hanae Nozaki, Junichi Sakamoto, Saki Osuka (AIST) |
(9) HWS |
13:50-14:15 |
Randomness evaluation of TERO-based TRNG with a side-channel attack countermeasure |
Saki Osuka (AIST), Daisuke Fujimoto, Yuichi Hayashi (NAIST), Shinichi Kawamura (AIST) |
(10) HWS |
14:15-14:40 |
A Study for Predicting Correlation Power Analysis Results by Using High-SNR Plaintexts Selected Based on Linear Leakage Model [updated] |
Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) |
|
14:40-14:50 |
Break ( 10 min. ) |
Tue, Jul 19 PM HWS2(Track 1) 14:50 - 16:05 |
(11) HWS |
14:50-15:15 |
Issues and Considerations for Improvement of Verification in ECDSA Attestation of Intel SGX [updated] |
Yagawa Takashi (Tsukuba Univ.), Suzaki Kuniyasu, Teruya Tadanori, Ohara Kazuma (AIST), Abe Hirotake (Tsukuba Univ.) [updated] |
(12) HWS |
15:15-15:40 |
Revealing PUF Responses by Differential Power Analysis against Reed-Muller-Code-based Fuzzy Extractor |
Soma Watanabe, Yuta Fukuda, Tatsuya Oyama, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ) |
(13) HWS |
15:40-16:05 |
Security of Systems that Automatically Authenticate a User's Credentials and Location using Wireless Technology [updated] |
Kazuki Tachibana (YNU), Junichi Sakamoto (AIST), Tsutomu Matsumoto (YNU) |
|
16:05-16:15 |
Break ( 10 min. ) |
Tue, Jul 19 PM HWS3(Track 1) 16:15 - 17:30 |
(14) HWS |
16:15-16:40 |
Security Assessment and Countermeasures for Magnetic Malfunction of Electromagnetic Relays [updated] |
Takumi Owada, Kazuki Tachibana, Tsutomu Matsumoto (YNU) [updated] |
(15) HWS |
16:40-17:05 |
Distance Spoofing Detection by LiDAR and Stereo Camera |
Ataru Kubo, Yuki Fukatsu, Naoki Yoshida, Tsutomu Matsumoto (YNU) |
(16) HWS |
17:05-17:30 |
Security Evaluation of Cryptographic Circuits with Laser Sensors by Double-Spot Laser Irradiation [updated] |
Masaki Chikano, Naoki Yoshida, Junichi Sakamoto, Syungo Hayashi, Tsutomu Matsumoto (YNU) |
Tue, Jul 19 PM CSEC1 (Track 2) 13:00 - 14:40 |
(17) |
13:00-13:25 |
|
(18) |
13:25-13:50 |
|
(19) |
13:50-14:15 |
|
(20) |
14:15-14:40 |
|
|
14:40-14:50 |
Break ( 10 min. ) |
Tue, Jul 19 PM CSEC2 (Track 2) 14:50 - 15:40 [updated] |
(21) |
14:50-15:15 |
|
(22) [updated] |
15:15-15:40 [updated] |
|
|
15:40-16:15 [updated] |
Break ( 35 min. ) [updated] |
Tue, Jul 19 PM CSEC3 (Track 2) 16:15 - 17:30 |
(23) [updated] |
16:15-16:40 |
|
(24) [updated] |
16:40-17:05 |
|
(25) [updated] |
17:05-17:30 |
|
Wed, Jul 20 AM Invited Lecture 09:00 - 10:00 |
(26) EMM [updated] |
09:00-10:00 |
[Invited Talk]
Audio forensics and recording property estimation |
Akira Nishimura (TUIS) |
|
10:00-10:15 |
Break ( 15 min. ) |
Wed, Jul 20 PM BioX (Track 1) 10:15 - 11:55 |
(27) BioX [updated] |
10:15-10:40 |
Person Verification Using Evoked EEG by Ultrasound
-- Examination of Correlation in Fusing Features -- [updated] |
Yuta Ishikawa, Kotaro Mukai, Isao Nakanishi (Tottori Univ.) |
(28) BioX [updated] |
10:40-11:05 |
Person Verification Using EEG Evoked by Ultrasound
-- Introduction of mutual features between electrodes -- |
Kotaro Mukai, Isao Nakanishi (Tottori Univ.) |
(29) BioX [updated] |
11:05-11:30 |
A Study on Biometric Modality for Continuous Authentication of Smart Devices |
Yuka Watanabe, Yasushi Yamazaki (Kitakyushu Univ.) |
(30) BioX [updated] |
11:30-11:55 |
Person verification using evoked EEG from imperceptible vibratory stimulation
-- Introduction of normalization into EEG spectral content ratio -- [updated] |
Hiroki Kobayashi, Hirotomo Nakashima, Isao Nakanishi (Tottori Univ.) |
|
11:55-13:00 |
Break ( 65 min. ) |
Wed, Jul 20 PM SITE (Track 1) 13:00 - 14:15 |
(31) SITE [updated] |
13:00-13:25 |
Investigation of credit card fraud model and deterrence method on SNS |
Zhixian Zhao, Shigeyuki Osada (JRI) |
(32) SITE [updated] |
13:25-13:50 |
What type of document is CWA (CEN Workshop Agreement) in European Committee for Standardization |
Takushi Otani (Kibi International Univ.) |
(33) SITE [updated] |
13:50-14:15 |
An overview of the secrecy of patent applications in the Japanese Law |
Makoto Koike (MK Microwave) |
|
14:15-14:25 |
Break ( 10 min. ) |
Wed, Jul 20 PM 14:25 - 15:15 |
(34) ICSS [updated] |
14:25-14:50 |
Cryptocurrency Analysis System for Investigating Cyber Crime Economy |
Hiroshi Mori, Hiroshi Kumagai, Yin Minn Pa Pa, Yuta Takata, Ryoya Furukawa, Yuji Sakurai, Masaki Kamizono (DTCY) |
(35) ICSS [updated] |
14:50-15:15 |
Distributed Random Number Generation Method on Smart Contracts |
Kentaro Sako (Waseda Univ), Shin'ichiro Matsuo (Georgetown Univ), Tatsuya Mori (Waseda Univ) |
|
15:15-15:25 |
Break ( 10 min. ) |
Wed, Jul 20 PM ISEC (Track1) 15:25 - 17:05 |
(36) ISEC [updated] |
15:25-15:50 |
An Efficient Sparse Multiplication Algorithm For Pairing-Friendly Elliptic Curves With Cubic Twist |
Daiki Hayashida, Kenichiro Hayasaka (Mitsubishi Electric Corp.), Tadanori Teruya (AIST) |
(37) ISEC [updated] |
15:50-16:15 |
Revocable Identity-Based Encryption With Multiple Private-Key Generators secure against Chosen Ciphertext Attacks and Decryption Key Exposure |
Yudai Suzuki, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Akira Nagai (NTT) |
(38) ISEC [updated] |
16:15-16:40 |
Identification and tracking of website users in consideration of privacy in browser fingerprinting [updated] |
Takashi Tsukazaki, Yuichi Futa (TUT), Tomomichi Suzuki (PitApp), Hiroyuki Okazaki (Shinshu Univ.) |
(39) ISEC [updated] |
16:40-17:05 |
Efficient Constructions of Adaptively and CCA-secure Identity-based Encryption with Equality Test from LWE Assumption in the Standard Model [updated] |
Kyoichi Asano (UEC/NICT), Keita Emura (NICT), Atsushi Takayasu (Univ. Tokyo) |
Wed, Jul 20 AM CSEC4 (Track 2) 10:15 - 11:30 [updated] |
(40) [updated] |
10:15-10:40 |
|
(41) [updated] |
10:40-11:05 [updated] |
|
(42) [updated] |
11:05-11:30 [updated] |
|
|
11:30-13:00 [updated] |
Lunch Break ( 90 min. ) [updated] |
Wed, Jul 20 PM SPT (Track 2) 13:00 - 13:50 |
(43) [updated] |
13:00-13:25 |
|
(44) [updated] |
13:25-13:50 |
|
|
13:50-14:25 |
Break ( 35 min. ) |
Wed, Jul 20 PM PWS Special Session (Track2) 14:25 - 15:30 |
(45) [updated] |
14:25-15:30 |
[updated] |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Invited Talk | Each speech will have 50 minutes for presentation and 10 minutes for discussion. |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Takahiro Matsuda (AIST)
E- : i c- c  (to ISEC secretaries) |
SITE |
Technical Committee on Social Implications of Technology and Information Ethics (SITE) [Latest Schedule]
|
Contact Address |
|
BioX |
Technical Committee on Biometrics (BioX) [Latest Schedule]
|
Contact Address |
|
HWS |
Technical Committee on Hardware Security (HWS) [Latest Schedule]
|
Contact Address |
Takatsugu Ono(Kyushu University), Junko Takahashi(NTT)
E- :hws- c  |
ICSS |
Technical Committee on Information and Communication System Security (ICSS) [Latest Schedule]
|
Contact Address |
ICSS Technical Committee
E- : i s-adm- q  |
Announcement |
Latest information will be presented on the homepage:
https://www.ieice.org/iss/icss/index-en.html |
EMM |
Technical Committee on Enriched MultiMedia (EMM) [Latest Schedule]
|
Contact Address |
Enriched MultiMedia (EMM) Secretaries
E- : emm-ad n  |
IPSJ-CSEC |
Special Interest Group on Computer Security (IPSJ-CSEC) [Latest Schedule]
|
Contact Address |
|
IPSJ-SPT |
Special Interest Group on Security Psychology and Trust (IPSJ-SPT) [Latest Schedule]
|
Contact Address |
|
Last modified: 2022-07-06 16:06:08
|