Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICD |
2024-04-11 10:45 |
Kanagawa |
(Primary: On-site, Secondary: Online) |
[Invited Lecture]
An SPN Strong PUF with SRAM-based Entropy Source Featuring Both 100-Bit Output Space and Modeling Attack Resilience Kunyang Liu (Kyoto Univ.), Yichen Tang (Lenovo), Shufan Xu, Kiichi Niitsu (Kyoto Univ.), Hirofumi Shinohara (Waseda Univ.) ICD2024-2 |
Strong physically unclonable function (Strong PUF) is a hardware-security circuit that generates response outputs corres... [more] |
ICD2024-2 p.7 |
CCS |
2024-03-27 16:50 |
Hokkaido |
RUSUTSU RESORT |
JPEG Compression Quality Setting Considering Image Quality and Information Loss for Correlated Steganography Mariiko Aikawa, Sumiko Miyata (SIT), Kaito Hosono, Hirotsugu Kinoshita (KU) CCS2023-50 |
As more and more confidential information, including personal information, is transmitted and received over the Internet... [more] |
CCS2023-50 pp.64-69 |
ICM |
2024-03-22 09:10 |
Okinawa |
Okinawa Prefectural Museum and Art Museum (Primary: On-site, Secondary: Online) |
Proposal of an implication relationship estimation method for information security related regulatory documents Kouki Nakanishi, Tkakani ikuko, Sakamoto Masanobu, Ohishi Haruo (NTT) ICM2023-51 |
In recent years, internal controls regarding information security have become increasingly important from the perspectiv... [more] |
ICM2023-51 pp.35-40 |
ICSS, IPSJ-SPT |
2024-03-21 14:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
ICSS2023-75 |
With the proliferation of IoT devices, there has been an increase in security incidents targeting IoT devices. To active... [more] |
ICSS2023-75 pp.43-50 |
ICSS, IPSJ-SPT |
2024-03-22 08:30 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Proposal of Moving Target Defense Approach on Reliability in Web Services Mamoru Saita (Keio Univ.), Shunsuke Hashimoto (Univ. of Hyogo), Atsuo Inomata (Osaka Univ.), Hiroyuki Inoue (Kyoto Sangyo Univ.) ICSS2023-82 |
Although modern Web services are built on a high level of security and reliability, the static properties of networks re... [more] |
ICSS2023-82 pp.93-99 |
ICSS, IPSJ-SPT |
2024-03-22 12:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Study of the Label-Flipping Poisoning Attack on Machine-Learning Based Malicious URL Query Detection. Akira Matsunami (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-90 |
In recent years, there have been a large increase of cyber attacks with increasing use of web applications. A method to... [more] |
ICSS2023-90 pp.153-159 |
RCC, ISEC, IT, WBS |
2024-03-13 10:45 |
Osaka |
Osaka Univ. (Suita Campus) |
Note on Impossibility of Tight Reduction on IND-CCA secure IdentityBased Encryption with Multiple Private-Key Generators Yudai Suzuki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai (NTT Social Informatics Lab.) IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63 |
Identity-Based Encryption with Multiple Private-Key Generators (mPKG-IBE) has been proposed by Fujioka and Yoneyama at P... [more] |
IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63 pp.38-43 |
RCC, ISEC, IT, WBS |
2024-03-13 11:10 |
Osaka |
Osaka Univ. (Suita Campus) |
Revisiting the Soundness of 5-Pass Identification Scheme Daigo Kuroki, Kaoru Takemure, Bagus Santoso (UEC) IT2023-82 ISEC2023-81 WBS2023-70 RCC2023-64 |
We observe that mostly, the security of 5-pass identification schemes
have only been analyzed in a emph{rough} way as f... [more] |
IT2023-82 ISEC2023-81 WBS2023-70 RCC2023-64 pp.44-51 |
RCC, ISEC, IT, WBS |
2024-03-14 15:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Secrity Oriented Design of Polar-Coded OFDM on Selective Fading Channels Yuki Kuraya, Hideki Ochiai (YNU) IT2023-124 ISEC2023-123 WBS2023-112 RCC2023-106 |
We introduce a physical layer security scheme based on a polar-coded OFDM system in wireless communication. Our approach... [more] |
IT2023-124 ISEC2023-123 WBS2023-112 RCC2023-106 pp.306-311 |
IA, SITE, IPSJ-IOT [detail] |
2024-03-12 10:20 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
Supporting Collaborative Learning through the Integration of Knowledge Constructive Jigsaw Method in a University Class on Network Security Masaki Maruyama (Tsukuba Gakuin Univ.) SITE2023-71 IA2023-77 |
In this study, an approach to support collaborative learning was implemented in a class on computer systems, incorporati... [more] |
SITE2023-71 IA2023-77 pp.18-21 |
IA, SITE, IPSJ-IOT [detail] |
2024-03-12 13:45 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
Dynamic control of redundancy factor k in the byzantine-resilient structured overlay network ByzSkip Toyokazu Akiyama (Kyoto Sangyo Univ.), Yuuichi Teranishi (NICT), Kota Abe (Osaka Metropolitan Univ.) SITE2023-74 IA2023-80 |
While key-order preserving structured overlay networks (KOPSONs) with Byzantine Fault Tolerance (BFT) are expected to ha... [more] |
SITE2023-74 IA2023-80 pp.36-42 |
IA, SITE, IPSJ-IOT [detail] |
2024-03-13 11:35 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
Law and Policy on the Cybersecurity Supply Chain in the European Union Yusuke Tachibana (FIT) SITE2023-95 IA2023-101 |
This paper explores the legal policy concerning the cybersecurity supply chain in the EU. The term "cyber supply chain" ... [more] |
SITE2023-95 IA2023-101 pp.169-171 |
SS |
2024-03-09 11:25 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Developing Conversational Agents Using GPT-4 for Application in Information Security Education Atsuya Tsuda, Kazutaka Matsuzaki (Chuo Univ.) SS2023-80 |
In this paper, we report on the development of an interactive agent using a large language model, aimed at being introdu... [more] |
SS2023-80 pp.186-189 |
PRMU, IBISML, IPSJ-CVIM |
2024-03-04 09:36 |
Hiroshima |
Hiroshima Univ. Higashi-Hiroshima campus (Primary: On-site, Secondary: Online) |
Disabling Adversarial Examples through Color Information Processing Ryo Soeda, Masato Uchida (Waseda Univ.) PRMU2023-67 |
Image classification using neural networks is expected to have a wide range of applications, including automated driving... [more] |
PRMU2023-67 pp.94-99 |
ET |
2024-03-03 12:40 |
Miyazaki |
Miyazaki University |
Development of a Wireless LAN Visualization System with a Focus on Information Security for Secondary Education Kazuaki Yoshihara (Kindai Univ.) ET2023-68 |
In junior high technology classes and high school information classes, learning about information security is a compulso... [more] |
ET2023-68 pp.100-103 |
VLD, HWS, ICD |
2024-03-01 12:05 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Security Evaluation of Fault Analysis for SuperSonic Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-126 HWS2023-86 ICD2023-115 |
SuperSonic, a low-latency lightweight block cipher, is suitable for securing edge devices with high real-time performanc... [more] |
VLD2023-126 HWS2023-86 ICD2023-115 pp.141-144 |
VLD, HWS, ICD |
2024-03-02 09:45 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Demonstrating a Real Car Covered with Infra-red-cut Films to Hide itself from LiDAR Yuki Fukatsu, Akira Iwahashi, Naoki Yoshida, Tsutomu Matsumoto (YNU) VLD2023-135 HWS2023-95 ICD2023-124 |
In recent years, various technologies have been developed toward the practical application of fully automated driving. A... [more] |
VLD2023-135 HWS2023-95 ICD2023-124 pp.190-195 |
ITS, IE, ITE-MMS, ITE-ME, ITE-AIT [detail] |
2024-02-19 10:45 |
Hokkaido |
Hokkaido Univ. |
Brightness Adjustment based Countermeasure against Adversarial Examples Takumi Tojo, Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2023-47 IE2023-36 |
Recently, image classification using deep learning AI has been used for in-vehicle AI, and its accuracy and response spe... [more] |
ITS2023-47 IE2023-36 pp.7-12 |
SAT, SANE (Joint) |
2024-02-09 13:20 |
Kagoshima |
AmaHome PLAZA (Amami City Shimin Koryu Center) (Primary: On-site, Secondary: Online) |
Secure Firmware Updates for Nano-Satellites: Design Considerations and PoC Implementation Yuta Nakagawa, Keika Mori, Ryoya Furukawa, Hiroshi Kumagai, Masaki Kamizono (DTCY) SANE2023-111 |
With the increase in the number of satellite launches in recent years, cyber attacks on satellites have become a serious... [more] |
SANE2023-111 pp.43-48 |
SAT, SANE (Joint) |
2024-02-09 13:45 |
Kagoshima |
AmaHome PLAZA (Amami City Shimin Koryu Center) (Primary: On-site, Secondary: Online) |
Cyber Threat Analysis for Nano-Satellites Keika Mori, Ryoya Furukawa, Yuta Nakagawa, Kotaro Saito, Yusuke Yamamoto, FajardoTapia Isai, Shogo Suzuki, Hiroshi Kumagai, Masaki Kamizono (DTCY) SANE2023-112 |
The number of launches of nano-satellites is increasing due to more frequent launch opportunities and lower development ... [more] |
SANE2023-112 pp.49-54 |