Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SS, IPSJ-SE, KBSE [detail] |
2022-07-28 16:30 |
Hokkaido |
Hokkaido-Jichiro-Kaikan (Sapporo) (Primary: On-site, Secondary: Online) |
Deep Learning Power Analysis Against Protected PRINCE Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SS2022-4 KBSE2022-14 |
In recent years, with the development of deep learning, AI has been incorporated in the field of cyber security. On the ... [more] |
SS2022-4 KBSE2022-14 pp.19-24 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 16:15 |
Online |
Online |
Security Assessment and Countermeasures for Magnetic Malfunction of Electromagnetic Relays Takumi Owada, Kazuki Tachibana, Tsutomu Matsumoto (YNU) ISEC2022-14 SITE2022-18 BioX2022-39 HWS2022-14 ICSS2022-22 EMM2022-22 |
Relays are used in many electrical and electronic devices, including switches and sensors. Some relays are electromagnet... [more] |
ISEC2022-14 SITE2022-18 BioX2022-39 HWS2022-14 ICSS2022-22 EMM2022-22 pp.40-45 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 16:40 |
Online |
Online |
Distance Spoofing Detection by LiDAR and Stereo Camera Ataru Kubo, Yuki Fukatsu, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2022-15 SITE2022-19 BioX2022-40 HWS2022-15 ICSS2022-23 EMM2022-23 |
Automatic driving vehicles use information obtained from onboard ranging sensors to recognize objects such as surroundin... [more] |
ISEC2022-15 SITE2022-19 BioX2022-40 HWS2022-15 ICSS2022-23 EMM2022-23 pp.46-51 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 17:05 |
Online |
Online |
Security Evaluation of Cryptographic Circuits with Laser Sensors by Double-Spot Laser Irradiation Masaki Chikano, Naoki Yoshida, Junichi Sakamoto, Syungo Hayashi, Tsutomu Matsumoto (YNU) ISEC2022-16 SITE2022-20 BioX2022-41 HWS2022-16 ICSS2022-24 EMM2022-24 |
A fault injection attack is an attack method that intentionally injects faults into a device to cause it to malfunction,... [more] |
ISEC2022-16 SITE2022-20 BioX2022-41 HWS2022-16 ICSS2022-24 EMM2022-24 pp.52-57 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 13:50 |
Online |
Online |
An overview of the secrecy of patent applications in the Japanese Law Makoto Koike (MK Microwave) ISEC2022-23 SITE2022-27 BioX2022-48 HWS2022-23 ICSS2022-31 EMM2022-31 |
Economic security promotion law enacted on May 11, 2022 includes the provisions to keep patent application secret in Jap... [more] |
ISEC2022-23 SITE2022-27 BioX2022-48 HWS2022-23 ICSS2022-31 EMM2022-31 pp.88-97 |
SANE |
2022-05-24 09:30 |
Kanagawa |
Information Technology R & D Center, MITSUBISHI Electric Corp. (Primary: On-site, Secondary: Online) |
An Overview of Specific Emitter Identification (SEI) Technology and its Latest R&D Trends Masaaki Kobayashi (AOCJ) SANE2022-2 |
Specific Emitter Identification (SEI) technology for electronic warfare, also known as radio fingerprinting, has been ac... [more] |
SANE2022-2 pp.7-11 |
ICSS, IPSJ-SPT |
2022-03-07 12:50 |
Online |
Online |
am I infected? A New Web Service to Inspect End Users' IoT Devices for Malware Infection and Vulnerabilities Songwei He, Takaya Noma, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2021-58 |
IoT devices have become prevalent in recent years, but unfortunately, many devices are infected by malware due to their ... [more] |
ICSS2021-58 pp.1-6 |
ICSS, IPSJ-SPT |
2022-03-07 13:30 |
Online |
Online |
Time Efficient Risk Assessment Tool for IoT Systems Rajulapati Shourya, Takashi Kawauchi (Hitachi) ICSS2021-60 |
We have developed an integrated security design platform that provides security analysis independent of the consultant's... [more] |
ICSS2021-60 p.13 |
IA, SITE, IPSJ-IOT [detail] |
2022-03-07 14:45 |
Kyoto |
Kyoto University, Yoshida Campus (Primary: On-site, Secondary: Online) |
A Research of U.K Telecommunications (Security) Act 2021
-- Toward a Study of How to Change Information Security into Mandatory -- Yusuke Tachibana (FIT) SITE2021-53 IA2021-66 |
In December 2021, the UK passed the Telecommunications (Security) Act 2021. This act requires telecom operators to take ... [more] |
SITE2021-53 IA2021-66 pp.45-51 |
VLD, HWS [detail] |
2022-03-08 17:15 |
Online |
Online |
Development of a Test Environment for Attack-Resistance Evaluation of Matrix Direct ToF Lidar Masato Suzuki, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2021-105 HWS2021-82 |
Matrix-type Direct Time of flight (dToF) Lidar, which enables high-resolution and high-speed acquisition of distance inf... [more] |
VLD2021-105 HWS2021-82 pp.164-169 |
CAS, CS |
2022-03-04 14:10 |
Online |
Online |
Secure In-vehicle System using Authenticated Encryption Midori-OTR and its Implementation Evaluation Daichi Hirose, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-95 CS2021-97 |
In recent years, many electronic control units called ECUs have been installed in automobiles to perform various functio... [more] |
CAS2021-95 CS2021-97 pp.112-117 |
ICSS |
2021-11-30 10:20 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Monitoring IPv6 packets by dynamic routing in a LAN configured with IPv4 Yuki Yagi, Hideya Ochiai, Hiroshi Esaki (the Univ. of Tokyo) ICSS2021-56 |
With IPv4 address exhaustion, the transition to IPv6 has been progressing in recent years, but the security measures for... [more] |
ICSS2021-56 pp.61-66 |
CS |
2021-10-15 10:15 |
Online |
Online |
A study on traffic monitoring method for control networks Ginga Katsurai, Hiroaki Mukai, Tetsuya Yokotani (KIT) CS2021-56 |
In recent years, cyber attacks targeting control systems such as buildings and factories have become apparent. There is ... [more] |
CS2021-56 pp.20-25 |
IN, NS, CS, NV (Joint) |
2021-09-09 14:05 |
Online |
Online |
A Machine Learning Based Network Intrusion Detection System with Appling Different Algorithms in Multiple Stages Seiichi Sasa, Hiroyuki Suzuki, Akio Koyama (Yamagata Univ.) NS2021-63 |
In recent years, the rapid development of Information and Communication Technology (ICT) has led to the provision of a w... [more] |
NS2021-63 pp.36-41 |
SANE |
2021-05-13 10:25 |
Online |
Online |
New Developments in Electronic Warfare Technology Viewed as a Military-civilian Dual-use Technology Masaaki Kobayashi () SANE2021-2 |
In the military field, various types of electromagnetic waves are used for surveillance, target acquisition, fire contro... [more] |
SANE2021-2 pp.5-10 |
IN |
2021-01-18 15:50 |
Online |
Online |
[Invited Talk]
Risk Analysis Methods and Actual Conditions in Cyber Security Kentaro Sonoda, Haruka Nakashima (NEC) IN2020-49 |
Risks in corporations mean business risks, and a cyber security (cyber attack) is positioned as one of the important bus... [more] |
IN2020-49 p.37 |
ICD, HWS [detail] |
2020-10-26 10:30 |
Online |
Online |
Laser-based Attacks on Ultrasonic Sensors Tatsuya Suehiro, Taku Toyama, Junichi Sakamoto, Tsutomu Matsumoto (Yokohama National Univ.) HWS2020-28 ICD2020-17 |
We examine the instrumentation security threat of irradiating laser for a piezoelectric MEMS transducer in a MEMS ultras... [more] |
HWS2020-28 ICD2020-17 pp.18-23 |
ICD, HWS [detail] |
2020-10-26 13:50 |
Online |
Online |
Security Threats and Preventions for Photonics Computing Model Junko Takahashi, Koji Chida, Takeshi Sakamoto (NTT) HWS2020-33 ICD2020-22 |
This paper presents security analysis on photonic computing models in All-Photonics Network (APN). New computing archite... [more] |
HWS2020-33 ICD2020-22 pp.48-53 |
ET |
2020-03-07 13:50 |
Kagawa |
National Institute of Technology, Kagawa Collage (Cancelled but technical report was issued) |
Redefining Risk Assessment Based on Interpretation of Viewpoints and Researching Validity by Visualization System Kazuya Nitta, Naka Gotoda, Yusuke Kometani, Shigemi Ono, Rihito Yaegashi, Toshihiro Hayashi, Giro Imai, Koji Kida, Keizo Saisho (Kagawa Univ) ET2019-92 |
While information security threats become more sophisticated and complicated, an increasing number of organizations have... [more] |
ET2019-92 pp.93-98 |
HWS, VLD [detail] |
2020-03-07 11:20 |
Okinawa |
Okinawa Ken Seinen Kaikan (Cancelled but technical report was issued) |
Color Alteration Attacks on Lane Detection Function Fumiki Miyazono, Naoki Yoshida, Tsutomu Matsumoto (Yokohama National Univ.) VLD2019-140 HWS2019-113 |
Various functions have been incorporated into automobiles to realize fully automatic driving. In particular, the functio... [more] |
VLD2019-140 HWS2019-113 pp.269-274 |