Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS, VLD |
2023-03-04 11:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Clone Resistance of Artifact Metrics Systems Based on White Light Interferometry and Phase Only Correlation Akira Iwahashi, Naoki Yoshida, Tsutomu Matsumoto (YNU) VLD2022-118 HWS2022-89 |
Artifact Metrics is a technique for authenticating artifacts using characteristics unique to each artifact. Unlike conve... [more] |
VLD2022-118 HWS2022-89 pp.251-256 |
HWS, VLD |
2023-03-04 11:55 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Cloud Based Evaluation of Communication Bandwidth and Tracking Time of Traceable Aggregate Signature Protocols Koudai Aoyama, Riku Anzai, Junichi Sakamoto, Naoki Yoshida, Tsutomu Matsumoto (Yokohama National Univ.) VLD2022-119 HWS2022-90 |
Traceable Aggregate Signature is a scheme that has the ability to identify the source of an illegal signature if it is i... [more] |
VLD2022-119 HWS2022-90 pp.257-260 |
ICSS |
2022-11-07 15:00 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Observation of Attack Infrastructures by Scripts that Mimic C&C Communications of IoT Bots Kaichi Sameshima, Yuki Endo, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2022-44 |
(To be available after the conference date) [more] |
ICSS2022-44 pp.37-42 |
ICSS |
2022-11-07 15:25 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Analysis of Environmental Sensitivity of Persistent IoT Malware using Sandboxes with File Systems from Various IoT Devices Takahiro Inoue (YNU), Eizo Okada, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2022-45 |
(To be available after the conference date) [more] |
ICSS2022-45 pp.43-48 |
HWS, ICD |
2022-10-25 15:15 |
Shiga |
(Primary: On-site, Secondary: Online) |
A Memory-Saving Software Implementation of Pairing Computation on the GMT8-544 Curve Hiroto Miyata, Junichi Sakamoto, Naoki Yoshida, Riku Anzai, Tsutomu Matsumoto (YNU) HWS2022-39 ICD2022-31 |
There has been a lot of research on increasing the security of IoT, and encryption is one of the methods. Pairing crypto... [more] |
HWS2022-39 ICD2022-31 pp.52-57 |
HWS, ICD |
2022-10-25 17:05 |
Shiga |
(Primary: On-site, Secondary: Online) |
How to Identify the Physical Direction of CAN Message Transmission Yosuke Maekawa, Camille Gay (TOYOTA/YNU), Tsutomu Matsumoto (YNU) HWS2022-43 ICD2022-35 |
The impact of cyber-attacks on automobiles is becoming more serious as vehicles become more connected and multi-function... [more] |
HWS2022-43 ICD2022-35 pp.76-81 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 15:40 |
Online |
Online |
Security of Systems that Automatically Authenticate a User's Credentials and Location using Wireless Technology Kazuki Tachibana, Junichi Sakamoto, Tsutomu Matsumoto (YNU) ISEC2022-13 SITE2022-17 BioX2022-38 HWS2022-13 ICSS2022-21 EMM2022-21 |
To enhance user convenience, there is a movement to automate certain processes in systems by performing authentication v... [more] |
ISEC2022-13 SITE2022-17 BioX2022-38 HWS2022-13 ICSS2022-21 EMM2022-21 pp.35-39 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 16:15 |
Online |
Online |
Security Assessment and Countermeasures for Magnetic Malfunction of Electromagnetic Relays Takumi Owada, Kazuki Tachibana, Tsutomu Matsumoto (YNU) ISEC2022-14 SITE2022-18 BioX2022-39 HWS2022-14 ICSS2022-22 EMM2022-22 |
Relays are used in many electrical and electronic devices, including switches and sensors. Some relays are electromagnet... [more] |
ISEC2022-14 SITE2022-18 BioX2022-39 HWS2022-14 ICSS2022-22 EMM2022-22 pp.40-45 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 16:40 |
Online |
Online |
Distance Spoofing Detection by LiDAR and Stereo Camera Ataru Kubo, Yuki Fukatsu, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2022-15 SITE2022-19 BioX2022-40 HWS2022-15 ICSS2022-23 EMM2022-23 |
Automatic driving vehicles use information obtained from onboard ranging sensors to recognize objects such as surroundin... [more] |
ISEC2022-15 SITE2022-19 BioX2022-40 HWS2022-15 ICSS2022-23 EMM2022-23 pp.46-51 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 17:05 |
Online |
Online |
Security Evaluation of Cryptographic Circuits with Laser Sensors by Double-Spot Laser Irradiation Masaki Chikano, Naoki Yoshida, Junichi Sakamoto, Syungo Hayashi, Tsutomu Matsumoto (YNU) ISEC2022-16 SITE2022-20 BioX2022-41 HWS2022-16 ICSS2022-24 EMM2022-24 |
A fault injection attack is an attack method that intentionally injects faults into a device to cause it to malfunction,... [more] |
ISEC2022-16 SITE2022-20 BioX2022-41 HWS2022-16 ICSS2022-24 EMM2022-24 pp.52-57 |
ICSS, IPSJ-SPT |
2022-03-07 12:50 |
Online |
Online |
am I infected? A New Web Service to Inspect End Users' IoT Devices for Malware Infection and Vulnerabilities Songwei He, Takaya Noma, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2021-58 |
IoT devices have become prevalent in recent years, but unfortunately, many devices are infected by malware due to their ... [more] |
ICSS2021-58 pp.1-6 |
ICSS, IPSJ-SPT |
2022-03-07 13:50 |
Online |
Online |
Internet-wide discovery of IoT devices deployed at important facilities Mizuki Hiraku, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ) ICSS2021-61 |
Previous study has revealed that there are a number of IoT devices used at important facilities, such as water treatment... [more] |
ICSS2021-61 pp.14-19 |
VLD, HWS [detail] |
2022-03-08 16:50 |
Online |
Online |
Physical Spoofing Attack on LiDAR-based Object Detection and Its Demonstration Yuki Fukatsu, Ryuuya Ichinose, Shinsei Ueda, Ataru Kubo, Naoki Yoshida, Tsutomu Matsumoto (Yokohama National Univ.) VLD2021-104 HWS2021-81 |
A variety of technologies are being developed for the practical application of fully autonomous driving. Automated drivi... [more] |
VLD2021-104 HWS2021-81 pp.158-163 |
ICSS, IPSJ-SPT |
2022-03-08 13:20 |
Online |
Online |
Analyzing network status of IoT malware by dynamic analysis with bare-metal device Kota Ogawa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2021-74 |
In this study, we first investigate the network state changes caused by IoT malware infection by executing malware sampl... [more] |
ICSS2021-74 pp.93-98 |
ICSS, IPSJ-SPT |
2022-03-08 13:40 |
Online |
Online |
ML-based detection of C&C communications for sandbox analysis of IoT malware Yuki Endo, Kaichi Sameshima, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2021-75 |
In order to analyze the behavior of malware, dynamic analysis has been widely utilized. Among various communication of m... [more] |
ICSS2021-75 pp.99-104 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 13:55 |
Online |
Online |
Memory-saving implementation of BLS12-381 Pairing-based cryptography Riku Anzai, Junichi Sakamoto, Zihao Song, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2021-11 SITE2021-5 BioX2021-12 HWS2021-11 ICSS2021-16 EMM2021-16 |
For smart security management of IoT systems, it is expected to utilize advanced cryptography such as identity-based enc... [more] |
ISEC2021-11 SITE2021-5 BioX2021-12 HWS2021-11 ICSS2021-16 EMM2021-16 pp.8-13 |
IA, ICSS |
2021-06-22 09:25 |
Online |
Online |
Analtsis of cost-effectiveness in malicious site detection using VirusTotal Kyohei Takao (YNU), Hiroshi Mori (Deloitte Tohmatsu Cyber LLC), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) IA2021-10 ICSS2021-10 |
VirusTotal receives to-be-tested files and URLs and provides scan results by more than 70 security software.
Its incre... [more] |
IA2021-10 ICSS2021-10 pp.50-55 |
HWS |
2021-04-12 10:50 |
Tokyo |
Tokyo University/Online (Primary: On-site, Secondary: Online) |
Performance Evaluation of an FPGA-Based Pairing Computation Accelerator Junichi Sakamoto, Naoki Yoshida, Tsutomu Matsumoto (YNU) HWS2021-3 |
Several hardware-based accelerators have been proposed to speed up or reduce the power consumption of computationally ex... [more] |
HWS2021-3 pp.13-18 |
HWS |
2021-04-12 11:15 |
Tokyo |
Tokyo University/Online (Primary: On-site, Secondary: Online) |
An Implementation of a Pairing on Cocks-Pinch Curve with Embedding Degree 6 Zihao Song, Junichi Sakamoto, Tsutomu Matsumoto (YNU) HWS2021-4 |
In recent years, with the proliferation of IoT devices and computer performance improvement, there are increasing expect... [more] |
HWS2021-4 pp.19-24 |
ICSS, IPSJ-SPT |
2021-03-01 14:30 |
Online |
Online |
Analyzing the Transition of Vulnerabilities Targeted by IoT Malware Kaichi Sameshima, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-40 |
While the popularity of IoT devices are rapidly growing, vulnerable IoT devices have been the target of cyber-attacks. I... [more] |
ICSS2020-40 pp.84-89 |