Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 10:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Takayuki Kondo, Taiki Kitazawa, Shugo Kaji, Daisuke Fujimoto, Yuichi Hayashi (NAIST) ISEC2023-40 SITE2023-34 BioX2023-43 HWS2023-40 ICSS2023-37 EMM2023-40 |
(To be available after the conference date) [more] |
ISEC2023-40 SITE2023-34 BioX2023-43 HWS2023-40 ICSS2023-37 EMM2023-40 pp.171-175 |
EMCJ, MW, EST, IEE-EMC [detail] |
2022-10-14 09:50 |
Akita |
Akita University (Primary: On-site, Secondary: Online) |
Development of an Evaluation System for Modeling of Information Leakage Induced by Low-Power IEMI Seiya Takano, Shugo Kaji (NAIST), Masahiro Kinugawa (Univ. of Fukuchiyama), Daisuke Fujimoto, Yuichi Hayashi (NAIST) EMCJ2022-53 MW2022-99 EST2022-63 |
The threats of electromagnetic (EM) information leakage induced by low-power intentional EM interference have been repor... [more] |
EMCJ2022-53 MW2022-99 EST2022-63 pp.93-96 |
VLD, HWS [detail] |
2022-03-08 16:10 |
Online |
Online |
Fundamental Evaluation Method for EM Information Leakage Caused by Hardware Trojans on Signal Cables
-- Impact of Modulation Factor and Emission Intensity -- Taiga Yukawa, Shugo Kaji, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2021-103 HWS2021-80 |
The threats of electromagnetic (EM) information leakage caused by hardware Trojans (HTs) implemented on signal cables ha... [more] |
VLD2021-103 HWS2021-80 pp.153-157 |
HWS |
2019-04-12 15:55 |
Miyagi |
Tohoku University |
Fundamental Study on Suppression of Self-Interference Wave Caused by Intentional Information Leakage with IEMI Riho Kawakami, Shugo Kaji (NAIST), Masahiro Kinugawa (NIT, Sendai College), Diasuke Fujimoto, Yu-ichi Hayashi (NAIST) HWS2019-6 |
There is a threat of information leakage through unintentional electromagnetic (EM) emissions from equipment. The feasib... [more] |
HWS2019-6 pp.31-35 |
EMCJ |
2017-11-22 15:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study on Evaluation Method for EM Information Leakage Utilizing Controlled Image Displaying Gentaro Tanabe (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) EMCJ2017-74 |
Evaluation of electromagnetic information leakage from display devices are generally conducted by actual attacks retriev... [more] |
EMCJ2017-74 pp.57-62 |
EMCJ |
2017-11-22 16:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Efficient Evaluation Method for Information Leakage of Cryptographic Devices Based on Frequency Selection Airi Sugimoto (Tohoku Univ.), Daisuke Fujimoto, Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) EMCJ2017-75 |
Evaluating electromagnetic information leakage from a cryptographic device takes a considerable amount of time because o... [more] |
EMCJ2017-75 pp.63-66 |
ISEC, LOIS, SITE |
2016-11-08 11:30 |
Fukui |
Community Hall & AOSSA Mall, Fukui |
[Invited Talk]
Threat of Electromagnetic Information Leakage and Countermeasures Yu-ichi Hayashi (Tohoku Gakuin Univ.) ISEC2016-63 SITE2016-53 LOIS2016-41 |
As our information society has further developed, the widespread use of personal electronic devices like smartphones and... [more] |
ISEC2016-63 SITE2016-53 LOIS2016-41 p.75 |
IA, ICSS |
2015-06-12 13:00 |
Fukuoka |
Kyushu Institute of Technology Univ. |
[Invited Talk]
Hardware Security for Mobile Devices in Public Spaces Yu-ichi Hayashi (Tohoku Gakuin Univ.), Naofumi Homma, Takafumi Aoki, Hideaki Sone (Tohoku Univ.) IA2015-13 ICSS2015-13 |
The users of tablet PCs are rapidly spreading, and accordingly there are many scenes browsing and inputting personal inf... [more] |
IA2015-13 ICSS2015-13 pp.69-74 |
EMCJ |
2013-04-12 15:25 |
Okayama |
Okayama Univ. |
Fundamental Study on Visualization of Intentional Electromagnetic Interference Fault Injection on Cryptographic Device Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone (Tohoku Univ.) EMCJ2013-8 |
An IEMI-based fault injection is drawing much attention in the field of physical attacks on cryptographic devices due to... [more] |
EMCJ2013-8 pp.43-47 |