Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS |
2022-04-26 10:55 |
Tokyo |
AIST Tokyo Waterfront (Annex) (Primary: On-site, Secondary: Online) |
Deep Learning Side-Channel Attacks against Hardware-Implemented Lightweight Cipher Midori64 Madoka Sako, Kunihiro Kuroda, Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) HWS2022-2 |
Midori is a lightweight cipher and it is developed to achieve superior circuit size, low latency, and low power consumpt... [more] |
HWS2022-2 pp.7-12 |
CQ, IMQ, MVE, IE (Joint) [detail] |
2022-03-11 15:40 |
Online |
Online (Zoom) |
Evaluation of the sense of security by focusing on frontal EEG beta frequency band on experiencing VR traffic environment Sho Ohnishi, Hidehiko Shishido, Yoshinari Kameda (U-Tsukuba) IMQ2021-63 IE2021-125 MVE2021-92 |
The road must be safe and secure for pedestrians to use. Therefore, it is desirable to evaluate the road environment qua... [more] |
IMQ2021-63 IE2021-125 MVE2021-92 pp.278-283 |
ICSS, IPSJ-SPT |
2022-03-07 13:30 |
Online |
Online |
Time Efficient Risk Assessment Tool for IoT Systems Rajulapati Shourya, Takashi Kawauchi (Hitachi) ICSS2021-60 |
We have developed an integrated security design platform that provides security analysis independent of the consultant's... [more] |
ICSS2021-60 p.13 |
VLD, HWS [detail] |
2022-03-08 11:00 |
Online |
Online |
Evaluation of a Lightweight Cryptographic Finalist on SROS2 Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2021-94 HWS2021-71 |
In cyber-physical systems, small devices are connected to the network to enable the analysis of sensor values. Also, sin... [more] |
VLD2021-94 HWS2021-71 pp.99-104 |
CAS, CS |
2022-03-04 14:10 |
Online |
Online |
Secure In-vehicle System using Authenticated Encryption Midori-OTR and its Implementation Evaluation Daichi Hirose, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-95 CS2021-97 |
In recent years, many electronic control units called ECUs have been installed in automobiles to perform various functio... [more] |
CAS2021-95 CS2021-97 pp.112-117 |
CAS, CS |
2022-03-04 14:35 |
Online |
Online |
Unrolled Architecture oriented Countermeasure Circuit for Low-power Cryptography Midori128 and its Evaluation Shunsuke Miwa, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-96 CS2021-98 |
The number of IoT devices is growing rapidly, ensuring security in those devices is an important issue. Lightweight bloc... [more] |
CAS2021-96 CS2021-98 pp.118-123 |
QIT (2nd) |
2021-11-30 15:30 |
Online |
Online |
[Invited Talk]
Recent progress in the security proof of quantum key distribution in the finite-key regime Toshihiko Sasaki (Univ. of Tokyo) |
We show a finite-key analysis method for a broad type of quantum key distribution protocols based on a numerical optimiz... [more] |
|
ICSS |
2021-11-29 13:50 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Automation of Security Vulnerability Analysis by Auto-generated DFD Shun Miyazaki, Junpei Kamimura (NEC) ICSS2021-48 |
System vulnerabilities can be caused by bugs such as buffer overflow, misconfigurations such as improper permission cont... [more] |
ICSS2021-48 pp.13-18 |
RCS |
2021-10-21 10:50 |
Online |
Online |
Beamforming Design and Secrecy capacity analysis for Cell-Free massive MIMO Kengo Ando (UEC), Hiroki Iimori, Giuseppe Abreu (JUB), Koji Ishibashi (UEC) RCS2021-120 |
In this paper, we investigate a secure beamforming (BF) design for cell-free massive multiple input mul tiple output (CF... [more] |
RCS2021-120 pp.13-18 |
CS |
2021-10-15 10:15 |
Online |
Online |
A study on traffic monitoring method for control networks Ginga Katsurai, Hiroaki Mukai, Tetsuya Yokotani (KIT) CS2021-56 |
In recent years, cyber attacks targeting control systems such as buildings and factories have become apparent. There is ... [more] |
CS2021-56 pp.20-25 |
IA, ICSS |
2021-06-22 09:00 |
Online |
Online |
Feature analysis of phishing website and phishing detection based on machine learning algorithms Yi Wei, Yuji Sekiya (Todai) IA2021-9 ICSS2021-9 |
Phishing is a kind of cybercrime that uses disguised websites to trick people into providing personally sensitive inform... [more] |
IA2021-9 ICSS2021-9 pp.44-49 |
SR |
2021-05-21 14:00 |
Online |
Online |
[Technology Exhibit]
Invisible Sensing
-- Walk-through Security Screening System -- Kazumine Ogura, Tatsuya Sumiya, Nagma S Khan, Shingo Yamanouchi, Toshiyuki Nomura, Masayuki Ariyoshi (NEC) SR2021-13 |
Many facilities, e.g., office buildings, schools and railway stations are potential terrorism targets but security scree... [more] |
SR2021-13 pp.86-90 |
HWS, VLD [detail] |
2021-03-04 15:20 |
Online |
Online |
Power Analysis Attack on a Unrolled Midori128 and its Evaluation Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2020-87 HWS2020-62 |
The lightweight block cipher Midori has been proposed as a cryptographic algorithm for low-power operation, which is imp... [more] |
VLD2020-87 HWS2020-62 pp.108-113 |
HWS, VLD [detail] |
2021-03-04 16:00 |
Online |
Online |
Survey on intrusion detection system for Vehicle Security Techniques Ayaka Matsushita, Takao Okubo (IISEC) VLD2020-88 HWS2020-63 |
The purpose of this paper is to identify the factors that cause the characteristics of voltage waveforms of ECUs in auto... [more] |
VLD2020-88 HWS2020-63 pp.114-119 |
ICSS, IPSJ-SPT |
2021-03-02 10:25 |
Online |
Online |
Proof of concept of sandbox evasion attack using email address stored in target machine Yuta Inoue, Rui Tanabe (YNU), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-57 |
In recent years, malware sandbox appliances that dynamically analyze target files are becoming popular. However, malware... [more] |
ICSS2020-57 pp.184-189 |
IN |
2021-01-18 15:50 |
Online |
Online |
[Invited Talk]
Risk Analysis Methods and Actual Conditions in Cyber Security Kentaro Sonoda, Haruka Nakashima (NEC) IN2020-49 |
Risks in corporations mean business risks, and a cyber security (cyber attack) is positioned as one of the important bus... [more] |
IN2020-49 p.37 |
IA, IN (Joint) |
2020-12-15 10:50 |
Online |
Online |
Development of an Intrusion Detection System Utilizing Social Network Analysis Principles James Lu, Yuji Sekiya (Univ. of Tokyo) IA2020-29 |
As computer networks grow increasingly complex and cyberattacks become more sophisticated, better methods are needed to ... [more] |
IA2020-29 pp.18-21 |
ICSS |
2020-11-26 15:00 |
Online |
Online |
Initial Study of Incident Response Support System for Multi-Located Network Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Naoya Univ.), Hiroki Takakura (NII) ICSS2020-22 |
In the organization network which are consisted multi-sites, there are differences in security strength between the head... [more] |
ICSS2020-22 pp.17-20 |
ICD, HWS [detail] |
2020-10-26 09:25 |
Online |
Online |
Power Analysis Attack Using Pipeline Scheduling on Pairing Hardware Mitsufumi Yamazaki, Junichi Sakamoto, Tsutomu Matsumoto (YNU) HWS2020-26 ICD2020-15 |
To reduce the latency of pairing calculation for advanced cryptography, hardware implementations with pipelined modular ... [more] |
HWS2020-26 ICD2020-15 pp.7-12 |
ICD, HWS [detail] |
2020-10-26 13:50 |
Online |
Online |
Security Threats and Preventions for Photonics Computing Model Junko Takahashi, Koji Chida, Takeshi Sakamoto (NTT) HWS2020-33 ICD2020-22 |
This paper presents security analysis on photonic computing models in All-Photonics Network (APN). New computing archite... [more] |
HWS2020-33 ICD2020-22 pp.48-53 |