Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
A Study on the Application of Nudge to Improve Cybersecurity Hideyuki Fujii (NRI Secure) ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50 |
One possible measure to improve cybersecurity is the use of "Nudge". Nudge is designed (choice architectures) that chang... [more] |
ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50 pp.232-238 |
IA, ICSS |
2023-06-20 16:00 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
[Invited Talk]
Cybersecurity education and the role of universities Hiroshi Koide (Kyushu Univ.) IA2023-6 ICSS2023-6 |
In this presentation, the speaker will first discuss his experiences in the cybersecurity human resource development pro... [more] |
IA2023-6 ICSS2023-6 p.31 |
HWS |
2023-04-15 09:15 |
Oita |
(Primary: On-site, Secondary: Online) |
An AES Cryptographic Processor with Partial Re-Keying Scheme Utilizing Physical Attack Sensor Ryuki Ikemoto, Soichiro Fujii (Osaka Univ.), Yuki Yamashita, Makoto Nagata (Kobe Univ.), Jun Shiomi, Yoshihiro Midoh, Noriyuki Miura (Osaka Univ.) HWS2023-9 |
We propose a partial secret key update method for AES cryptography using sensors that can detect physical attacks on cry... [more] |
HWS2023-9 pp.34-36 |
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2023-03-24 09:00 |
Kagoshima |
Amagi Town Disaster Prevention Center (Tokunoshima) (Primary: On-site, Secondary: Online) |
A preliminary study on time-dependency of cyber security vulnerability assessment Takashi Minohara, Naohiro Kubota (Takushoku Univ.) CPSY2022-42 DC2022-101 |
Information system administrators must pay attention to system vulnerability information and take appropriate measures a... [more] |
CPSY2022-42 DC2022-101 pp.49-54 |
IA, SITE, IPSJ-IOT [detail] |
2023-03-17 10:25 |
Gunma |
Maebashi Institute of Technology (Primary: On-site, Secondary: Online) |
[Invited Talk]
Dual-Use of Cybersecurity
-- From the Threat Landscape in Cyberspace with a Focus on IoT Security -- Tsukasa Ogino (CCDS) SITE2022-62 IA2022-85 |
The Internet of Things (IoT), in which automobiles, drones, home appliances, and other devices are connected via the Int... [more] |
SITE2022-62 IA2022-85 pp.45-52 |
RCC, ISEC, IT, WBS |
2023-03-14 09:25 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
A Study on Secure Coded Communications Using Discrete Fourier Transform over Finite Fields Shoichiro Yamasaki (Hiroshima City Univ), Tomoko K. Matsushima (Yokohama College of Commerce), Hirokazu Tanaka (Hiroshima City Univ) IT2022-79 ISEC2022-58 WBS2022-76 RCC2022-76 |
The authors have proposed a security enhancement scheme using a shortened non-systematic
Reed-Solomon codes construc... [more] |
IT2022-79 ISEC2022-58 WBS2022-76 RCC2022-76 pp.74-79 |
RCC, ISEC, IT, WBS |
2023-03-14 13:50 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Secure communication based on high precision space-time synchronization Kouki Yonaga, Nobuyasu Shiga, Satoshi Yasuda, Kenichi Takizawa, Maki Yoshida (NICT) IT2022-83 ISEC2022-62 WBS2022-80 RCC2022-80 |
This research aims to establish a new technology to realize secure communication based on space-time synchro- nization c... [more] |
IT2022-83 ISEC2022-62 WBS2022-80 RCC2022-80 pp.97-102 |
RCC, ISEC, IT, WBS |
2023-03-14 15:45 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Enhancing physical-layer security by 4PPM space division multiplexing for smartphone screen to camera uplink communication Alisa Kawade, Wataru Chujo, Kentaro Kobayashi (Meijo Univ.) IT2022-86 ISEC2022-65 WBS2022-83 RCC2022-83 |
In indoor 3.5-m uplink screen camera communication using a smartphone screen and a video camera, it has been shown that ... [more] |
IT2022-86 ISEC2022-65 WBS2022-83 RCC2022-83 pp.114-119 |
ICSS, IPSJ-SPT |
2023-03-13 13:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Basic Study on IoT Security Using Robot Arm Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ICSS2022-51 |
The introduction of IoT devices in industrial systems is becoming increasingly active in order to realise Industry 4.0. ... [more] |
ICSS2022-51 pp.19-24 |
ICSS, IPSJ-SPT |
2023-03-13 14:40 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Consideration of a Packet Level Anomaly Communication Classification Model Using Word Embedding and LSTM Yoshikatsu Kashiwabara, Kohei Miyamoto, Iida Masazumi, Shota Kawanaka (Kyushu Univ), Han Chansu, Ban Tao, Kenshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ) ICSS2022-53 |
In recent years, network-based intrusion detection systems (NIDS), which are systems for detecting unauthorized access o... [more] |
ICSS2022-53 pp.31-36 |
ICSS, IPSJ-SPT |
2023-03-13 16:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Evaluation and countermeasures of notification destination restoration attacks using password recovery functions of multiple web services Ryusei Ishikawa, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ., Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2022-62 |
Many web services with a login function using pair of ID and password have the password recovery function in case the us... [more] |
ICSS2022-62 pp.85-90 |
ICSS, IPSJ-SPT |
2023-03-13 16:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
A Study on Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2022-68 |
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] |
ICSS2022-68 pp.121-126 |
ICSS, IPSJ-SPT |
2023-03-14 10:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Port-aware IPv6 Scanning and Large-scale Security Surveys Tatsuya Takemura, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama (NTT) ICSS2022-73 |
(To be available after the conference date) [more] |
ICSS2022-73 pp.151-156 |
HWS, VLD |
2023-03-01 13:50 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Circuit Optimization and Simulation Evaluation for Ultra-Low Voltage of LRPUF Using Manufacturing Variability of Leakage Current Shunkichi Hata, Kimiyoshi Usami (SIT) VLD2022-77 HWS2022-48 |
Low power consumption and low-voltage operation become critical issues to be addressed when PUF (Physically Unclonable F... [more] |
VLD2022-77 HWS2022-48 pp.25-30 |
HWS, VLD |
2023-03-02 15:20 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Secure Cache System against On-Chip Threats Keisuke Kamahori, Shinya Takamaeda (UTokyo) VLD2022-95 HWS2022-66 |
In this paper, we propose a new threat model for secure processor design that considers on-chip threats.
Also, we desi... [more] |
VLD2022-95 HWS2022-66 pp.113-118 |
HWS, VLD |
2023-03-02 15:45 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Hiding Memory Structure for IP Protection Sun Tanaka, Shinya Takamaeda (UTokyo) VLD2022-96 HWS2022-67 |
This paper proposes a concept and a method of hiding memory structure for IP protection. [more] |
VLD2022-96 HWS2022-67 pp.119-124 |
HWS, VLD |
2023-03-02 17:15 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Communication-Efficient Federated Learning with Gradient Boosting Decision Trees Kotaro Shimamura, Shinya Takamaeda (UTokyo) VLD2022-99 HWS2022-70 |
Federated learning (FL) is a machine learning method in which clients learn cooperatively without disclosing private dat... [more] |
VLD2022-99 HWS2022-70 pp.137-142 |
HWS, VLD |
2023-03-03 13:25 |
Okinawa |
(Primary: On-site, Secondary: Online) |
High-Performance and Programmer-Friendly Secure Non-Volatile Memory using Temporal Memory-Access Redirection Ryo Koike, Shinya Takamaeda (UTokyo) VLD2022-106 HWS2022-77 |
Byte-addressable non-volatile memory (NVM) has two challenges, performance degradation due to high-latency integrity tre... [more] |
VLD2022-106 HWS2022-77 pp.179-184 |
HWS, VLD |
2023-03-04 10:25 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Fundamental study of distance spoofing attack against dToF lidar with interference mitigation function Midori Tomijima, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2022-116 HWS2022-87 |
In order to avoid interference with the spread of LiDAR, a simple mitigation method that changes the irradiation interva... [more] |
VLD2022-116 HWS2022-87 pp.239-244 |
HWS, VLD |
2023-03-04 13:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Threat of EM Information Leakage from Speakerphones Due to IEMI and Suppression Indexes for EMC Countermeasures Seiya Takano, Yuichi Hayashi (NAIST) VLD2022-120 HWS2022-91 |
Threats of causing forced electromagnetic information leakage by irradiating devices with electromagnetic waves have bee... [more] |
VLD2022-120 HWS2022-91 pp.261-266 |