Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ITS, WBS, RCC |
2017-12-14 10:00 |
Okinawa |
Tiruru/Okinawa Jichikaikan |
[Poster Presentation]
GPS spoofing implementation using USRP Tomokazu Fukuda, Koji Ishii (Kagawa Univ.) WBS2017-43 ITS2017-20 RCC2017-59 |
Position information and time information based on GNSS (Global Navigation Satellite System) including GPS ( Globa Posit... [more] |
WBS2017-43 ITS2017-20 RCC2017-59 pp.45-49 |
IA, IN (Joint) |
2017-12-14 16:45 |
Hiroshima |
Hiroshima City Univ. |
Anomaly Detection for Smart Home IoT based on Users' Behavior Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.), Kensuke Ueda, Yoshiaki Kato (Mitsubishi Electric) IN2017-58 |
Many devices such as air conditioners and refrigerator have become connected to the Internet, and become a target of the... [more] |
IN2017-58 pp.73-78 |
BioX |
2017-10-12 15:00 |
Okinawa |
Nobumoto Ohama Memorial Hall |
A Study of a Liveness Detection Method Using Fully Convolutional Network for Face Recognition Systems Koichi Ito, Takehisa Okano, Takafumi Aoki (Tohoku Univ.) BioX2017-27 |
A face recognition system may accept a malicious person by presenting a printed photo of a user. To address this problem... [more] |
BioX2017-27 pp.11-15 |
EMM, IE, LOIS, IEE-CMN, ITE-ME [detail] |
2017-09-05 11:00 |
Kyoto |
Kyoto Univ. (Clock Tower Centennial Hall) |
[Fellow Memorial Lecture]
Controlling the information at border between cyber and physical worlds
-- Future outlook on security and privacy research for multimedia -- Isao Echizen (NII) LOIS2017-21 IE2017-42 EMM2017-50 |
Due to developments of the Internet of Things, computers, sensors and their networks are located in all places, and usef... [more] |
LOIS2017-21 IE2017-42 EMM2017-50 pp.63-64 |
MBE, BioX |
2017-07-29 17:25 |
Tokushima |
Tokushima University |
Security Evaluation of USB-Based Fingerprint Authentication Products under Spoofing Attacks using a Forged Fingerprint with Conductive Ink Takeshi Okamoto, Kaito Tanimoto (Kanagawa Inst. of Tech.) BioX2017-23 MBE2017-32 |
This paper presents tolerance and security evaluations of 22 USB-based fingerprint authentication products using a finge... [more] |
BioX2017-23 MBE2017-32 pp.73-76 |
SANE |
2017-05-22 11:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Measurement deception and its countermeasure in a navigation satellite system Takashi Iwamoto (Mitsubishi Electric Corp.) SANE2017-4 |
Broadened applications of navigation satellite systems as social bases have been revealing vulnerabilities of being inte... [more] |
SANE2017-4 pp.19-22 |
SP |
2017-01-21 11:00 |
Tokyo |
The University of Tokyo |
[Poster Presentation]
Evaluation of DNN-Based Voice Conversion Deceiving Anti-spoofing Verification Yuki Saito, Shinnosuke Takamichi, Hiroshi Saruwatari (UT) SP2016-69 |
This paper proposes a novel training algorithm for high-quality Deep Neural Network (DNN)-based voice conversion. To imp... [more] |
SP2016-69 pp.29-34 |
CPSY, DC, IPSJ-ARC (Joint) [detail] |
2016-08-09 12:15 |
Nagano |
Kissei-Bunka-Hall (Matsumoto) |
Formulating Attack Condition on Received Signal Strength Indicator based Device Authentication Tatsuya Fujii, Takatsugu Ono, Haruichi Kanaya, Koji Inoue (Kyushu Univ.) CPSY2016-22 DC2016-19 |
Spoofing attack in wireless communications is a critical issue, in which a malicious transmitter attempts to pretend to ... [more] |
CPSY2016-22 DC2016-19 pp.139-146(CPSY), pp.15-22(DC) |
IA, SITE, IPSJ-IOT [detail] |
2016-03-03 13:00 |
Saga |
Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) |
Collaborative Spoofing Detection and Mitigation - SDN based looping authentication for DNS services Nor Masri bin Sahri, Koji Okamura (Kyushu University) SITE2015-58 IA2015-90 |
As DNS packet are mostly UDP-based, make it as a perfect platform for hackers to launch a well-known type of distributed... [more] |
SITE2015-58 IA2015-90 pp.55-60 |
RCC, ITS, WBS |
2015-12-18 14:50 |
Okinawa |
Okinawa Industry Support Center |
Secure Personal Attribute Message Authentication for Pedestrian-Friendly Intelligent Transport Systems Seiichiro Mizoguchi (KDDI R&D LABS), Daisuke Oshida, Hisataka Takagi (Renesas Electronics), Hideaki Kawabata, Keisuke Takemori, Ayumu Kubota (KDDI R&D LABS) WBS2015-78 ITS2015-50 RCC2015-80 |
In the case of providing safety services to pedestrians in the intelligent transport system (ITS), considering pedestria... [more] |
WBS2015-78 ITS2015-50 RCC2015-80 pp.221-226 |
IN, NS, CS, NV (Joint) |
2015-09-04 17:05 |
Iwate |
Iwate-ken Kokaido |
A Study of Dynamic Private View SandBox Network to prevent DoS attack, IP spoofing and IP based-gathering Takeshi Ogawa, Yuta Kobayashi, Noriharu Miyaho (Tokyo Denki Univ.) NS2015-84 |
Dos attacks, IP address spoofing and name-based aggregation are important issues to be solved in the Internet. In this p... [more] |
NS2015-84 pp.77-82 |
IN, NS, CS, NV (Joint) |
2015-09-04 17:30 |
Iwate |
Iwate-ken Kokaido |
A study on solutions against caller identity spoofing over IMS networks Kenjiro Arai, Koji Tanida, Tsuyoshi Jocha (NTT) NS2015-85 |
The IMS networks defined in the 3rd Generation Partnership Project (3GPP) provides a reliable caller’s identity presenta... [more] |
NS2015-85 pp.83-88 |
CS |
2015-07-03 11:40 |
Okinawa |
Eef Information Plaza (Kumejima Is.) |
Privacy-preserving Biometric Authentication with Homomorphic Encryption by Comparing Partial Bio-information Takumi Matsunaga, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2015-28 |
In recent years, the privacy-preserving biometric authentication executed on encrypted biometric information is getting ... [more] |
CS2015-28 pp.103-108 |
IA, IN (Joint) |
2014-12-18 15:00 |
Hiroshima |
Hiroshima City University |
A Study on the Attack and Protection Mechanisms for an In-vehicle Network Connected with the Internet Takaya Ezaki, Tomohiro Date, Hiroyuki Inoue (Hiroshima City Univ.) IA2014-71 |
With advanced features and the diversification of services for an automobile, various problems of the information securi... [more] |
IA2014-71 pp.13-18 |
BioX |
2014-10-17 11:25 |
Okinawa |
Nobumoto Ohama Memorial Hall (Ishigaki) |
Evaluation of Liveness Detection Methods against Flat Panel-based Presentation Attack Tatsuya Takehisa (Nissin), Tetsushi Ohki, Akira Otsuka (AIST), Manabu Inuma (Josai Univ.) BioX2014-38 |
Recently, The presentation attack spoofing to the biometrics authentication system that use fake biometric samples are ... [more] |
BioX2014-38 pp.55-59 |
NS, IN (Joint) |
2014-03-07 13:40 |
Miyazaki |
Miyazaki Seagia |
A study on ID Spoofing solution of IETF STIR appliying to IMS Shunsuke Kanegae, Kenjiro Arai, Satoru Furukawa (NTT) NS2013-254 |
The trouble caused by caller ID spoofing (impersonate or obscure calling party number) are increasing in USA VoIP networ... [more] |
NS2013-254 pp.451-455 |
SANE |
2013-06-21 16:50 |
Ibaraki |
Tsukuba Space Center, JAXA |
The development of decrease of vulnerabilities of Civilian GNSS in targeting of spoofing Koichi Chino, Dinesh Manandhar, Ryosuke Shibasaki (Univ. of Tokyo) SANE2013-34 |
We address the current situation of the potential vulnerabilities (Spoofing and Meaconing) of Global Positioning System ... [more] |
SANE2013-34 pp.109-116 |
NS, IN (Joint) |
2013-03-08 15:30 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
A Study of a Trust-aware Routing Protocol in Wireless Multi-hop Networks Kazuya Kohara (Osaka Univ.), Hirotake Abe (Univ. of Tsukuba), Ken-ichi Baba, Shinji Shimojo (Osaka Univ.) NS2012-223 |
In wireless multihop networks, conventional trust based routing protocols are vulnerable to Spoofing ACK Attack.Maliciou... [more] |
NS2012-223 pp.337-342 |
NS, IN (Joint) |
2013-03-08 15:30 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
Prototype implementation and evaluation of DHCP enhancement method to prevent IP address spoofing attacks using released address Masao Oishi, Takuya Omizo, Katsuyoshi Iida (Tokyo Inst. of Tech.) NS2012-289 |
Currently, many researchers are focussing to eliminate the 3--way~handshake protocol to improve the TCP performance.
A ... [more] |
NS2012-289 pp.723-728 |
MoNA, IE, ITE-CE, ITE-ME, IPSJ-AVM (Joint) [detail] |
2012-07-20 11:00 |
Ibaraki |
University Hall, University of Tsukuba |
Location Proof by GPS and WLAN Information Tadashi Yamaguchi, Naoshi Sato (IISEC) MoMuC2012-18 IE2012-43 |
Location-based services (LBS) of mobile phone have entered a period of expansion, as number of smartphones equipped with... [more] |
MoMuC2012-18 IE2012-43 pp.43-48 |