Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 10:20 |
Kochi |
Kochi University of Technology |
Instrumentation Security of Ranging Pulse LIDARs Using Multiple Photodetectors Tatsuya Suehiro, Ryuya Ichinose, Satoru Sakurazawa, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2019-41 SITE2019-35 BioX2019-33 HWS2019-36 ICSS2019-39 EMM2019-44 |
Instrumentation security, that is the security at the sensing or instrumentation stage, is recognized as a major issue i... [more] |
ISEC2019-41 SITE2019-35 BioX2019-33 HWS2019-36 ICSS2019-39 EMM2019-44 pp.239-242 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 15:25 |
Kochi |
Kochi University of Technology |
Possibility of Identifying USB Device by Voltage Changing Taku Toyama, Junichi Sakamoto, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2019-61 SITE2019-55 BioX2019-53 HWS2019-56 ICSS2019-59 EMM2019-64 |
In recent years, illegal USB devices have become problematic, such as malware infection by USB memory, incorrect key inp... [more] |
ISEC2019-61 SITE2019-55 BioX2019-53 HWS2019-56 ICSS2019-59 EMM2019-64 pp.391-396 |
HWS |
2019-04-12 13:55 |
Miyagi |
Tohoku University |
Construction of a System to Evaluate Instrumentation Security Enhancement Techniques for Ranging Pulse LIDARs Tatsuya Suehiro, Satoru Sakurazawa, Naoki Yoshida, Tsutomu Matsumoto (YNU) HWS2019-2 |
Since the output of instrumentation systems such as sensors in a broad sense can have a significant impact on a system t... [more] |
HWS2019-2 pp.7-12 |
HWS, VLD |
2019-03-02 13:55 |
Okinawa |
Okinawa Ken Seinen Kaikan |
A Study of Collision Attacks on Moving Vehicle Equipped with Stereo Vision Camera Hiroki Nohira, Yasushi Iwata, Naoki Yoshida, Tsutomu Matsumoto (YNU) VLD2018-142 HWS2018-105 |
Stereo vision cameras that measure distances based on the principle of triangulation are used in various fields. In orde... [more] |
VLD2018-142 HWS2018-105 pp.289-293 |
HWS, VLD |
2019-03-02 14:20 |
Okinawa |
Okinawa Ken Seinen Kaikan |
Conditions for Successful Attacks on Ultrasonic Range Finder to Output Incorrect Values Yuya Inoue, Hiroki Nohira, Naoki Yoshida, Daisuke Fujimoto, Tsutomu Matumoto (YNU) VLD2018-143 HWS2018-106 |
Discussion is made on the condition that an attacking device installed at a place not detected from the target ultrasoni... [more] |
VLD2018-143 HWS2018-106 pp.295-299 |
HWS (2nd) |
2018-12-13 16:10 |
Tokyo |
Tokyo Univ. Takeda Bldg. Takeda Hall |
[Poster Presentation]
Demonstration of Illusion Attack on Object Detection Algorithm of Stereo Vision Camera Hiroki Nohira, Yasushi Iwata, Naoki Yoshida, Tsutomu Matsumoto (YNU) |
(Advance abstract in Japanese is available) [more] |
|
HWS (2nd) |
2018-12-13 16:10 |
Tokyo |
Tokyo Univ. Takeda Bldg. Takeda Hall |
[Poster Presentation]
A System of Evaluating Instrumentation Security Enhancement Techniques for Ranging Pulse LIDARs Tatsuya Suehiro, Satoru Sakurazawa, Naoki Yoshida, Tsutomu Matsumoto (YNU) |
(Advance abstract in Japanese is available) [more] |
|
CQ, ICM, NS, NV (Joint) |
2018-11-16 12:20 |
Ishikawa |
|
Automation of Fault Isolation with Workflow Engine Tao Kawarai, Naoki Yoshida (Osaka City Univ.), Hiroki Nakayama, Tsunemasa Hayashi (BOSCO Tech.), Shingo Ata (Osaka City Univ.) ICM2018-34 |
Recent years, increasing the operational cost of network management due to complicated IT infrastructure is becoming a s... [more] |
ICM2018-34 pp.57-62 |
HWS, ICD |
2018-10-29 14:30 |
Osaka |
Kobe Univ. Umeda Intelligent Laboratory |
An Acceleration of Compressed Squaring for Pairing Implementation with Pipeline Modular Multiplier Yota Okuaki, Junichi Sakamoto, Naoki Yoshida, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) HWS2018-50 ICD2018-42 |
One of the biggest problems of the emerging cyber-physical and cloud computing systems is how to ensure security with en... [more] |
HWS2018-50 ICD2018-42 pp.19-24 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 14:00 |
Hokkaido |
Sapporo Convention Center |
How to Evaluate Instrumentation Security of Stereo Vision Cameras against DoS and Illusion Attacks Naoki Yoshida, Hiroki Nohira, Yasushi Iwata, Tsutomu Matsumoto (YNU) ISEC2018-19 SITE2018-11 HWS2018-16 ICSS2018-22 EMM2018-18 |
Stereo vision cameras that instrument distances by the principle of triangulation are used in various fields. Instrument... [more] |
ISEC2018-19 SITE2018-11 HWS2018-16 ICSS2018-22 EMM2018-18 pp.69-75 |
HWS |
2018-04-13 11:35 |
Fukuoka |
|
Optical 3D Nano Artifact-metrics using White Light Interferometry Naoki Yoshida (YNU), Yosuke Ueba, Shumpei Nishio, Yasuyuki Ohyagi (DNP), Morihisa Hoga (Compass21), Naoya Tate (KU), Makoto Naruse (NICT), Tsutomu Matsumoto (YNU) HWS2018-3 |
We propose an artificial-metric system which authenticates nanostructures with random irregularities by means of an inte... [more] |
HWS2018-3 pp.11-16 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-15 13:50 |
Tokyo |
|
Security Evaluation of the Software Architecture of TEE-enabled Device and Its Open-source Implementation Naoki Yoshida (YNU), Kazuhiko Fukushima, Shigenori Miyauchi (Renesas Electronics), Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) ISEC2017-36 SITE2017-28 ICSS2017-35 EMM2017-39 |
It emerges that the use of security systems which separate device resources into Trusted Execution Environment (TEE) and... [more] |
ISEC2017-36 SITE2017-28 ICSS2017-35 EMM2017-39 pp.267-274 |
ISEC, WBS, IT |
2017-03-10 11:20 |
Tokyo |
TOKAI University |
Software Protection by Hash-Table-Based Interlocking of Self Integrity Verification Naoki Watanabe, Naoki Yoshida, Tsutomu Matsumoto (YNU) IT2016-120 ISEC2016-110 WBS2016-96 |
In order to detect unauthorized modification, tamper-resistant software often adopts self integrity verification mechani... [more] |
IT2016-120 ISEC2016-110 WBS2016-96 pp.137-144 |
VLD |
2017-03-03 09:25 |
Okinawa |
Okinawa Seinen Kaikan |
A precise state-of-charge estimation system of primary battery for IoT devices Hirofumi Shioura, Naoki Yoshida, Lei Lin, Masahiro Fukui (Ritsumeikan Univ.) VLD2016-123 |
Due to the spread of portable devices, small primary batteries are used in various places. Due to the attention of IoT, ... [more] |
VLD2016-123 pp.115-120 |
ICM, LOIS |
2017-01-20 11:35 |
Nagasaki |
The Nagasaki Chamber of Commerce & Industry |
A Framework for Automating Operation and Management with Combination of Traffic and Configuration Histories Shingo Ata, Naoki Yoshida (Osaka City Univ.), Hiroki Nakayama, Tsunemasa Hayashi (BOSCO Technologies) ICM2016-52 LOIS2016-61 |
[more] |
ICM2016-52 LOIS2016-61 pp.75-80 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 15:20 |
Yamaguchi |
|
A Durability Evaluation for Metallic-Foil Artifact-Metrics Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2016-37 SITE2016-31 ICSS2016-37 EMM2016-45 |
We proposed that metallic foils such as aluminum foils and gold foils can be applied to artifact-metrics, because the me... [more] |
ISEC2016-37 SITE2016-31 ICSS2016-37 EMM2016-45 pp.229-236 |
PRMU, IBISML, IPSJ-CVIM [detail] |
2015-09-15 13:15 |
Ehime |
|
[Invited Talk]
A large-sky survey and statistical computational cosmology Naoki Yoshida (The Univ. of Tokyo) PRMU2015-86 IBISML2015-46 |
We explore the frontier of statistical computaional cosmology using the large imaging data delivered by Subaru Hyper-Sup... [more] |
PRMU2015-86 IBISML2015-46 p.141 |
PRMU, BioX |
2015-03-20 10:00 |
Kanagawa |
|
How to Design Scanning Resolution in Artifact-metrics Takuya Iwayoshi, Naoki Yoshida, Tsutomu Matsumoto (YNU) BioX2014-62 PRMU2014-182 |
Artifact-metrics is a security technology which authenticates individual artifacts based on intrinsic unique features wh... [more] |
BioX2014-62 PRMU2014-182 pp.141-146 |
ICSS |
2015-03-04 15:55 |
Okinawa |
Meio Univiersity |
An Experimental Implementation of Self Destructive Tamper Resistant Software and Its Evaluation Kazuomi Oishi (SIST), Naoki Yoshida, Naoki Watanabe, Jun'ichi Sakamoto, Tsutomu Matsumoto (YNU) ICSS2014-99 |
Self destructive tamper resistant software (SDTRS) has strong resistance
against attacker's analysis or modification
... [more] |
ICSS2014-99 pp.217-222 |
R |
2014-06-13 14:20 |
Tokyo |
|
Improvement idea of SA algorithms for optimal arrangement problem in a Multi-state k-out-of-n:F system Naoki Yoshida, Hisashi Yamamoto (Tokyo Metropolitan University), Koji Shingyochi (Jumonji Univ.), Tomoaki Akiba (Chiba Inst. of Tech.), Xiao Xiao (Tokyo Metropolitan University) R2014-11 |
[more] |
R2014-11 pp.13-18 |