Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICD, HWS [detail] |
2020-10-26 15:45 |
Online |
Online |
Low-Latency Countermeasure Circuit Oriented Hardware Trojan and its Evaluation Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) HWS2020-37 ICD2020-26 |
Outsourcing and the use of IP are the mainstream in the design and manufacturing of system LSIs. On the other hand, the ... [more] |
HWS2020-37 ICD2020-26 pp.71-76 |
IN, CCS (Joint) |
2020-08-03 13:00 |
Online |
Online |
5G Threat Analysis Based on Smart Factory Operational Scenario
-- Security from a NFV perspective -- Takahashi Hideaki, Taenaka Yuzo, Kadobayashi Youki (NAIST) IN2020-13 |
The 5th generation mobile communication system (5G) is expected to bring major innovations to mobile communication netwo... [more] |
IN2020-13 pp.25-30 |
NS, IN (Joint) |
2020-03-06 10:00 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
[Technology Exhibit]
Machine learning pipeline for analyzing Large-scale traffic Morikawa Akira, Bo Hu (NTT) NS2019-212 IN2019-103 |
Recently, machine learning becomes promising to automatically extract intelligence from network traffic for cybersecurit... [more] |
NS2019-212 IN2019-103 p.191(NS), p.151(IN) |
ICSS, IPSJ-SPT |
2020-03-02 10:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Estimation method of information asset security attributes using design mode Takeshi Ueda, Koichi Shimizu, Shun Hinatsu, Fumio Omatsu (Mitsubishi Electric Corp.) ICSS2019-69 |
In security evaluation such as risk analysis, analysis is performed based on the value of information assets in the syst... [more] |
ICSS2019-69 pp.7-12 |
ICSS, IPSJ-SPT |
2020-03-03 09:50 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Analysis of Cyber-attacks Observed by a Simple TLS Honeypot Listening on All Ports Daisuke Makita (NICT), Jumpei Shimamura (clwit), Masaki Kubo, Daisuke Inoue (NICT) ICSS2019-85 |
As various devices have been connected to the Internet, cyber-attacks targeting them have also been increasing. Since va... [more] |
ICSS2019-85 pp.103-108 |
SSS |
2019-12-17 14:10 |
Tokyo |
|
Proposal of a Risk Access Method of Steel Plant Control System using Remote Acccess Shuji Tsuchida (Nippon Steel) SSS2019-24 |
In plant control system, there is an increasing need for online operation analysis and maintenance using a remote access... [more] |
SSS2019-24 pp.9-10 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 11:20 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Experiment of DDoS Attack Detection with UTM Log Analysis Using Decision Tree Aoshi Fujioka, Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) NS2019-123 |
In recent years, AI technology such as machine learning has been developed and the number of application examples are in... [more] |
NS2019-123 pp.19-25 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 11:45 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Analysis of UTM traffic log using LLL algorithm Takuya Morita, Hikofumi Suzuki, Hiroyuki Okazaki (Shinshu Univ.) NS2019-124 |
In recent years, with the spread of information communication equipment and the development of the Internet, various ser... [more] |
NS2019-124 pp.27-30 |
ICSS |
2019-11-13 15:45 |
Miyazaki |
MRT Terrace(Miyazaki) |
Attack Behavior Analysis System that Diverts Internal Attacks to Virtual Environment Shuji Ohashi, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-65 |
It is difficult to completely prevent targeted attackers intrusion, so countermeasures after the intrusion is necessary.... [more] |
ICSS2019-65 pp.31-36 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 14:00 |
Kochi |
Kochi University of Technology |
A Countermeasure against Side-Channel Analysis using Dynamic Power Control Tomoaki Ukezono (Fukuoka Univ.) ISEC2019-28 SITE2019-22 BioX2019-20 HWS2019-23 ICSS2019-26 EMM2019-31 |
With the spread of IoT devices, there is an interest in physical security for cryptography. Among them, side-channel att... [more] |
ISEC2019-28 SITE2019-22 BioX2019-20 HWS2019-23 ICSS2019-26 EMM2019-31 pp.145-149 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 09:30 |
Kochi |
Kochi University of Technology |
Generation of Family Resemblance Inference Rules by Boid Annotation and Labeled-LDA
-- A Machine Learning Approach to Integrate Inference Attack Analysis and Covert Channel Attack Analysis -- Kosuke Kurebayashi, Tetsuya Morizumi, Hirotsugu Kinoshita (KU) ISEC2019-42 SITE2019-36 BioX2019-34 HWS2019-37 ICSS2019-40 EMM2019-45 |
In this paper we propose a method for machine learning similar chains of words (word chains) similar to "rules for infer... [more] |
ISEC2019-42 SITE2019-36 BioX2019-34 HWS2019-37 ICSS2019-40 EMM2019-45 pp.243-249 |
EMCJ |
2019-07-18 13:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Fundamental study on influence of intentional electromagnetic interference on IC communication Hikaru Nishiyama, Takumi Okamoto, Daisuke Fujimoto, Yuichi Hayashi (NAIST) EMCJ2019-23 |
Low-Power Intentional Electromagnetic Interference (IEMI) has been reported, which causes malfunction without damaging t... [more] |
EMCJ2019-23 pp.29-33 |
SC |
2019-06-01 10:30 |
Ibaraki |
National Institute for Materials Science |
An Introduction of Security Case Studies for Service Robots and IoT Devices Jiro Yamazaki, Hidenori Tsuiji, Fumiaki Yamasaki (NOS) SC2019-8 |
In the past years, robots worked in very restricted area such as industrial factory for a certain purposes and
also iso... [more] |
SC2019-8 pp.45-50 |
ICSS, IPSJ-SPT |
2019-03-08 14:25 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Traffic analysis to detect abnormal smartphone application behavior Iifan Tyou, Takahiro Nukushina, Yukio Nagafuchi, Masaki Tanikawa (NTT) ICSS2018-87 |
With the spread of smartphones, its security management has become important. For smartphones, it is also necessary to c... [more] |
ICSS2018-87 pp.167-172 |
ICSS, IPSJ-SPT |
2019-03-08 14:50 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Performance survey for IoT security function on smartphone Yukio Nagafuchi, Takahiro Nukushina, Iifan Tyou, Masaki Tanikawa (NTT) ICSS2018-68 |
Recently, IoT devices are wide spreading, and its security management has become more important. There are two kinds of ... [more] |
ICSS2018-68 pp.1-6 |
IBISML |
2019-03-05 17:00 |
Tokyo |
RIKEN AIP |
A Study on Automatic Generation of False Data Injection Attack against Connected Car Service Based on Reinforcement Learning Yuichiro Dan, Keita Hasegawa, Takafumi Harada, Tomoaki Washio, Yoshihito Oshima (NTT) IBISML2018-109 |
While the connected car is predicted to prevail by 2025, the appearance of novel cyber attacks is concerned. In this pap... [more] |
IBISML2018-109 pp.31-38 |
IN, NS (Joint) |
2019-03-05 14:10 |
Okinawa |
Okinawa Convention Center |
Scraping for Statistical Analysis on Dark Web Market Focusing on Cyber Attack Takahiro Iwanaga, Akihiro Nakao (Univ. of Tokyo) NS2018-271 |
In recent years, cyber attack tools and attack agency services are traded in markets called “Dark Web Markets” developed... [more] |
NS2018-271 pp.455-460 |
KBSE |
2019-03-02 09:00 |
Kyoto |
Doshisha University Kambaikan |
Development of Knowledge Presentation Method in Security Requirement Analysis and Design Using a Software Security Knowledge Base and Evaluation by a Case Study Yuki Yamada, Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII) KBSE2018-62 |
In recent years, the threat of cyber attacks such as information disclosure due to unauthorized access has become seriou... [more] |
KBSE2018-62 pp.51-56 |
HWS, VLD |
2019-03-01 16:20 |
Okinawa |
Okinawa Ken Seinen Kaikan |
Low-Cost Power Analysis Countermeasures for Unrolled Architecture Implementation PRINCE Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-134 HWS2018-97 |
Lightweight block ciphers, which can be implemented with low cost, are suitable for improving the safety of small device... [more] |
VLD2018-134 HWS2018-97 pp.243-248 |
RCS, SIP, IT |
2019-01-31 16:10 |
Osaka |
Osaka University |
[Special Invited Talk]
Engaged in Studies on Wireless Communication and Physical Layer Security using Antenna and Propagation Hideichi Sasaoka (Doshisha Univ.) IT2018-51 SIP2018-81 RCS2018-258 |
In this paper, the history passing in the past 35 years of my study on wireless communication and physical layer securit... [more] |
IT2018-51 SIP2018-81 RCS2018-258 pp.91-96 |