|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2023-11-16 14:30 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Formal Verification of an Edge Computing Platform based on Modular Architecture using Intel SGX Yuma Nishihira (Tokai Univ.), Hayato Kimura (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-54 |
The proliferation of IoT devices requires an edge computing infrastructure that can process large amounts of data in a f... [more] |
ICSS2023-54 pp.22-29 |
VLD, HWS [detail] |
2022-03-08 15:20 |
Online |
Online |
Bypassing Isolated Execution on RISC-V Keystone using Fault Injection Shoei Nashimoto, Daisuke Suzuki (Mitsubishi Electric), Rei Ueno, Naofumi Homma (Tohoku Univ.) VLD2021-101 HWS2021-78 |
This paper summarizes an attack and countermeasure against RISC-V Keystone from a paper [1] to be presented at TCHES (IA... [more] |
VLD2021-101 HWS2021-78 pp.141-146 |
CPSY, DC, IPSJ-ARC [detail] |
2021-07-20 14:00 |
Online |
Online |
Prototype Implementation of Non-Volatile Memory Support for RISC-V Keystone Enclave Lena Yu, Yu Omori, Keiji Kimura (Waseda Univ.) CPSY2021-2 DC2021-2 |
Handling confidential information has become an increasingly important concern among many areas of society. However, cur... [more] |
CPSY2021-2 DC2021-2 pp.7-12 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 15:30 |
Online |
Online |
Implimentation of RISC-V TEE using PUF as Root of Trust Kota Yoshida (Ritsumeikan Univ.), Kuniyasu Suzaki (AIST), Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-25 SITE2021-19 BioX2021-26 HWS2021-25 ICSS2021-30 EMM2021-30 |
In society 5.0, acquiring trustworthy data from a huge amount of IoT devices in physical spaces, it is important to veri... [more] |
ISEC2021-25 SITE2021-19 BioX2021-26 HWS2021-25 ICSS2021-30 EMM2021-30 pp.92-97 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-15 13:50 |
Tokyo |
|
Security Evaluation of the Software Architecture of TEE-enabled Device and Its Open-source Implementation Naoki Yoshida (YNU), Kazuhiko Fukushima, Shigenori Miyauchi (Renesas Electronics), Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) ISEC2017-36 SITE2017-28 ICSS2017-35 EMM2017-39 |
It emerges that the use of security systems which separate device resources into Trusted Execution Environment (TEE) and... [more] |
ISEC2017-36 SITE2017-28 ICSS2017-35 EMM2017-39 pp.267-274 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|