Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICM, NS, CQ, NV (Joint) |
2023-11-21 13:15 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
Security Evaluation of Low-latency Cipher based on Improved Simon against Deep Learning Analysis using Profiled Power Consumption Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2023-114 |
Society 5.0 aims to solve problems in social systems through the intercommunication of small devices. On the other hand,... [more] |
NS2023-114 pp.20-25 |
ICM, NS, CQ, NV (Joint) |
2023-11-22 12:30 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
[Invited Talk]
Secure Middlebox Communication over TLS against Middlebox Compromise Toru Hasegawa, Kentaro Kita, Junji Takemasa, Yuki Koizumi (Osaka Univ.) CQ2023-46 |
A large portion of Internet traffic passes through middleboxes that read or modify messages. However, such middleboxes a... [more] |
CQ2023-46 pp.50-53 |
ICM, NS, CQ, NV (Joint) |
2023-11-22 09:50 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
A survey on suitable hook points for outbound packet monitoring using eBPF Masaya Okabe, Hiroshi Tsunoda (Tohtech) ICM2023-27 |
The use of VPNs and similar technologies has made it difficult to define network boundaries, and traditional boundary se... [more] |
ICM2023-27 pp.26-31 |
ICSS |
2023-11-16 13:00 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Implementation of Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities, and A Study on Its Large-scale Demonstration Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2023-51 |
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] |
ICSS2023-51 pp.1-6 |
ICSS |
2023-11-16 15:20 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Attack Verification and Evaluation of Incremental Fault Analysis against AES Encryption Processing Device Miran Tamagawa, Yuichi Futa (TUT), Takehiko Mieno (AVASYS), Hiroyuki Okazaki (Shinshu University) ICSS2023-56 |
In recent years,there has been a growing concern about the impact of fault analysis attack,which use hardware failures a... [more] |
ICSS2023-56 pp.35-41 |
ICSS |
2023-11-17 11:30 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Investigation of Technical Support Scams Targeting Japan Hiroyuki Ito (NICT), Kosuke Kajimoto, Tetsuya Kageyama, Taichi Aoki (JC3), Takahiro Kasama, Daisuke Inoue (NICT) ICSS2023-63 |
(To be available after the conference date) [more] |
ICSS2023-63 pp.85-92 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-16 09:55 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Primary: On-site, Secondary: Online) |
MTJ-PUF with Input Decoder and Evaluation of Machine Learning Resistance Takumi Kikuchi, Kimiyoshi Usami (SIT) VLD2023-44 ICD2023-52 DC2023-51 RECONF2023-47 |
Physically Unclonable Function (PUF), one of the LSI individual authentication techniques, is vulnerable to machine lear... [more] |
VLD2023-44 ICD2023-52 DC2023-51 RECONF2023-47 pp.82-87 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-16 13:20 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Primary: On-site, Secondary: Online) |
Tamper Resistance Evaluation on FPGA for Low-Latency Cipher Sonic Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52 |
Industry 5.0 promotes smart factories for system optimization by utilizing IoT and AI in the industrial field. The smart... [more] |
VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52 pp.101-105 |
LOIS, SITE, ISEC |
2023-11-09 10:50 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
[Invited Talk]
Security Technologies to Improve Content-Distribution and Broadcasting Services Kazuto Ogawa (NICT) ISEC2023-54 SITE2023-48 LOIS2023-12 |
Nowadays, technologies for information security have become essential in the world cyber-space.
PC users know their val... [more] |
ISEC2023-54 SITE2023-48 LOIS2023-12 p.1 |
LOIS, SITE, ISEC |
2023-11-10 10:45 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
NTP Tunneling Threat Model Verification and Countermeasure Shinjisangeru Sugasawa, Hisayoshi Kunimune, Shigeaki Tanimoto (CIT) ISEC2023-64 SITE2023-58 LOIS2023-22 |
Fraudulent covert communication methods are techniques used by attackers to avoid detection of malicious communication b... [more] |
ISEC2023-64 SITE2023-58 LOIS2023-22 pp.66-71 |
MW, EMCJ, EST, IEE-EMC [detail] |
2023-10-19 13:10 |
Yamagata |
Yamagata University (Primary: On-site, Secondary: Online) |
An Application of Genetic Algorithms for XSS Attack Payload Generation and WAF Evaluation Yu Funahashi, Hideaki Kimura (Chubu Univ) EMCJ2023-43 MW2023-97 EST2023-70 |
We propose a method of generating and evolving malicious scripts (payloads) used in cross-site scripting (XSS) attacks b... [more] |
EMCJ2023-43 MW2023-97 EST2023-70 pp.42-45 |
IN, ICTSSL, IEE-SMF |
2023-10-20 14:40 |
Fukuoka |
Fukuoka University |
A Study on Applying Digital Twin-Assisted Security Platform for Cyber-Physical Systems to Supply Chain Keizo Sugiyama (KDDI Research) ICTSSL2023-32 |
The convergence of cyberspace and physical space is becoming more significant towards Beyond 5G. The impact of attacks, ... [more] |
ICTSSL2023-32 pp.42-46 |
BioX |
2023-10-12 14:45 |
Okinawa |
Nobumoto Ohama Memorial Hall |
A Study on Federated Learning System for Highly Accurate Biometric Authentication Yusei Suzuki, Yosuke Kaga (Hitachi) BioX2023-58 |
With the development of machine learning on large-scale datasets, the accuracy of biometric authentication has significa... [more] |
BioX2023-58 pp.2-7 |
IA |
2023-09-22 15:00 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Signing key management in cryptocurrency custodians learned from DNSSEC Yuto Takei (Mercari/Tokyo Tech), Kazuyuki Shudo (Kyoto Univ.) IA2023-30 |
Japanese cryptocurrency exchanges hold over 1 trillion yen worth of cryptocurrency in total as of June 2023. The exchang... [more] |
IA2023-30 pp.115-122 |
CPSY, DC, IPSJ-ARC [detail] |
2023-08-04 13:40 |
Hokkaido |
Hakodate Arena (Primary: On-site, Secondary: Online) |
A Classification of Security Threats and Countermeasure Directions for Cloud-based Railway Signalling Systems Using COTS Components Takashi Toyama, Akihiro Gion (RTRI) |
Research and development of cloud-based railway signaling systems, which remotely control signalling devices or trains f... [more] |
|
CPSY, DC, IPSJ-ARC [detail] |
2023-08-04 18:45 |
Hokkaido |
Hakodate Arena (Primary: On-site, Secondary: Online) |
CPSY2023-26 DC2023-26 |
(To be available after the conference date) [more] |
CPSY2023-26 DC2023-26 pp.106-111 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 13:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
ISEC2023-35 SITE2023-29 BioX2023-38 HWS2023-35 ICSS2023-32 EMM2023-35 |
The Hardware Security Technical Committee invited the author to give a presentation about his recent elevation to IEEE F... [more] |
ISEC2023-35 SITE2023-29 BioX2023-38 HWS2023-35 ICSS2023-32 EMM2023-35 pp.141-146 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 10:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
An Implementation and Evaluation of Communication Schemes Using Authenticated Cryptography for MAVLink Communication Ryuto Kuwada, Nobuya Ishihara, Yuta Kodera, Yasuyuki Nogami (Okayama Univ.) ISEC2023-39 SITE2023-33 BioX2023-42 HWS2023-39 ICSS2023-36 EMM2023-39 |
MAVLink is a lightweight communication protocol used between drones and ground stations to transmit drone status and con... [more] |
ISEC2023-39 SITE2023-33 BioX2023-42 HWS2023-39 ICSS2023-36 EMM2023-39 pp.165-170 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Is Copying for Information Security Research ‘Fair Use’?
-- Apple Inc. v. Corellium, Inc., No. 21-12835 (11th Cir. 2023) -- Yusuke Tachibana (FIT) ISEC2023-49 SITE2023-43 BioX2023-52 HWS2023-49 ICSS2023-46 EMM2023-49 |
The replication of third-party software in the realm of information security research has the potential to encroach upon... [more] |
ISEC2023-49 SITE2023-43 BioX2023-52 HWS2023-49 ICSS2023-46 EMM2023-49 pp.229-231 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
A Study on the Application of Nudge to Improve Cybersecurity Hideyuki Fujii (NRI Secure) ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50 |
One possible measure to improve cybersecurity is the use of "Nudge". Nudge is designed (choice architectures) that chang... [more] |
ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50 pp.232-238 |