Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 14:50 |
Online |
Online |
Deep Learning Side-Channel Attacks against Unprotected AES and RSM-AES Implemented in ASIC Yuta Fukuda, Kota Yoshida, Hisashi Hashimoto, Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29 |
The cryptographic key can be revealed by exploiting side-channel information such as power traces under operation.
Rec... [more] |
ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29 pp.86-91 |
ICSS, IPSJ-SPT |
2021-03-02 16:25 |
Online |
Online |
Security Evaluation of PUF utilizing Unrolled Architecture Yusuke Nozaki, Kensaku Asahi, Masaya Yoshikawa (Meijo Univ.) ICSS2020-53 |
To improve the security of LSI circuit, physically unclonable functions (PUF) have been attracted attention. The glitch ... [more] |
ICSS2020-53 pp.160-165 |
MSS, SS |
2021-01-27 13:25 |
Online |
Online |
Distributed State Estimation for Linear Singular Systems and Its Application to Sensor Networks Kei Isono, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) MSS2020-37 SS2020-22 |
The sensor attack detection problem is one of the important problems in cybersecurity and control theory. An attack to a... [more] |
MSS2020-37 SS2020-22 pp.49-53 |
NS, NWS (Joint) |
2021-01-22 13:30 |
Online |
Online |
[Encouragement Talk]
A Study on Detection and Prevention of Stealthy DNS Water Torture Attack Keita Hasegawa, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2020-116 |
A distributed denial-of-service (DDoS) attack is a major social problem. As one of the actual attacks, Dyn DNS, the Doma... [more] |
NS2020-116 pp.31-36 |
IBISML |
2020-03-11 15:10 |
Kyoto |
Kyoto University (Cancelled but technical report was issued) |
Fairness Causes Vulnerability to Adversarial Attacks Koki Wataoka, Takashi Matsubara, Kuniaki Uehara (Kobe Univ.) IBISML2019-48 |
When using machine learning models in society, it is essential to be ensure classifiers are fair to race and gender. In ... [more] |
IBISML2019-48 pp.101-105 |
ISEC, IT, WBS |
2020-03-11 09:30 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Security Evaluation of Differential Attacks against KCipher-2 Jin Hoki, Kosei Sakamoto (Hyogo Univ.), Kazuhiko Minematsu (NEC), Takanori Isobe (Hyogo Univ./NICT) IT2019-108 ISEC2019-104 WBS2019-57 |
This paper will investigate the resistance of KCipger-2 against differential attacks, which is the unique official strea... [more] |
IT2019-108 ISEC2019-104 WBS2019-57 pp.121-126 |
VLD, DC, CPSY, RECONF, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC (Joint) [detail] |
2019-11-15 09:40 |
Ehime |
Ehime Prefecture Gender Equality Center |
Modeling attacks against device authentication using CMOS image sensor PUF Hiroshi Yamada, Shunsuke Okura, Mitsuru Shiozaki, Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) ICD2019-34 IE2019-40 |
A CMOS image sensor physically unclonable function (CIS-PUF) for device authentication by the unique responses extracted... [more] |
ICD2019-34 IE2019-40 pp.31-36 |
ISEC, SITE, LOIS |
2019-11-02 15:00 |
Osaka |
Osaka Univ. |
On Robustness of Machine-Learning-Based Malware Detection Wanjia Zheng (U. Tsukuba), Kazumasa Omote (U. Tsukuba/NICT) ISEC2019-83 SITE2019-77 LOIS2019-42 |
As the 2020 Tokyo Olympics are approaching, the possibility of being targeted by attackers has further increased in Japa... [more] |
ISEC2019-83 SITE2019-77 LOIS2019-42 pp.133-140 |
AI |
2019-07-22 16:30 |
Hokkaido |
|
Modeling of Cyber Attack Based on POMDP Kazuma Igami, Hirofumi Yamaki (Tokyo Denki Univ.) AI2019-15 |
APTs(Advanced Persistent Threats), which are a type of cyber-attack, are a major threat to information systems because t... [more] |
AI2019-15 pp.77-82 |
ISEC |
2019-05-17 11:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Examination of quantitative evaluation of attack method to restore the anonymized data Takaya Yamazoe, Kazumasa Omote (Tsukuba Univ.) ISEC2019-4 |
With the increasing scale of data, integrated analysis of data distributed to multiple institutions is required. On the ... [more] |
ISEC2019-4 pp.7-13 |
IT, ISEC, WBS |
2019-03-08 11:15 |
Tokyo |
University of Electro-Communications |
A Lower Bound of the Joint Capacity of Digital Fingerprinting Codes against a Mixed Attack Tatsuya Sekine, Hiroki Koga (U. Tsukuba) IT2018-119 ISEC2018-125 WBS2018-120 |
Digital fingerprinting codes are embedded in digital contents for protecting copyrights of the digital contents against m... [more] |
IT2018-119 ISEC2018-125 WBS2018-120 pp.269-274 |
HWS, VLD |
2019-03-01 14:55 |
Okinawa |
Okinawa Ken Seinen Kaikan |
Performance and Security Evaluation of Ring Oscillator PUF Implemented on ASIC Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-131 HWS2018-94 |
This study evaluates the performance and the security of ring oscillator physical unclonable function (RO PUF) implement... [more] |
VLD2018-131 HWS2018-94 pp.225-230 |
HWS, VLD |
2019-03-01 15:20 |
Okinawa |
Okinawa Ken Seinen Kaikan |
An Attack with Linear Model Against Improved Arbiter PUF Susumu Matsumi, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-132 HWS2018-95 |
Imitations of electronic parts are distributed to the market, which is a serious problem. PUFs have attracted attention ... [more] |
VLD2018-132 HWS2018-95 pp.231-236 |
HWS, VLD |
2019-03-01 15:45 |
Okinawa |
Okinawa Ken Seinen Kaikan |
On Machine Learning Attack Tolerance for PUF-based Device Authentication System Tomoki Iizuka (UTokyo), Yasuhiro Ogasahara, Toshihiro Katashita, Yohei Hori (AIST), Hiromitsu Awano (Osaka Univ.), Makoto Ikeda (UTokyo) VLD2018-133 HWS2018-96 |
Double-Arbiter PUF (DAPUF) and PL-PUF are known to be highly resistant to machine learning attacks.
In this paper, we p... [more] |
VLD2018-133 HWS2018-96 pp.237-242 |
ITS, IE, ITE-MMS, ITE-HI, ITE-ME, ITE-AIT [detail] |
2019-02-20 16:00 |
Hokkaido |
Hokkaido Univ. |
[Invited Talk]
Anomaly Detection for Smart Home Based on User Behavior
-- ICCE2019 Report -- Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.), Kensuke Ueda, Yoshiaki Kato (Mitsubishi Electric) |
The operations of home IoT devices by attackers can cause serious problems.
However, such attacks are difficult to dete... [more] |
|
EMCJ, IEE-EMC, IEE-MAG |
2018-11-22 11:30 |
Overseas |
KAIST |
[Invited Talk]
Security Simulation of Cryptographic Module in Side-Channel Attack Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) EMCJ2018-61 |
Side-channel attacks (SCAs) are one of the biggest threats to cryptography and one of important issues in IoT modules, c... [more] |
EMCJ2018-61 p.19 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 14:35 |
Hokkaido |
Sapporo Convention Center |
Side-Channel Countermeasure for XOR based PUF and Its Evaluation Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ISEC2018-42 SITE2018-34 HWS2018-39 ICSS2018-45 EMM2018-41 |
XOR based physical unclonable functions (PUFs) have been proposed as countermeasures against modeling attacks. On the ot... [more] |
ISEC2018-42 SITE2018-34 HWS2018-39 ICSS2018-45 EMM2018-41 pp.337-342 |
VLD, HWS (Joint) |
2018-03-02 14:30 |
Okinawa |
Okinawa Seinen Kaikan |
Modeling Attacks on Double-Arbiter PUF Using Deep Neural Network Tomoki Iizuka, Hiromitsu Awano, Makoto Ikeda (UTokyo) VLD2017-127 |
A deep neural network-based modeling attack for Double-Arbiter PUF (DAPUF) is proposed. Although DAPUF is known to be hi... [more] |
VLD2017-127 pp.231-236 |
CQ |
2017-07-27 11:40 |
Hyogo |
Kobe University |
Effectiveness of Link Addition Strategies for Improving Robustness of Multiplex Networks against Layer Node-based Attack Yui Kazawa, Sho Tsugawa (Univ. of Tsukuba) CQ2017-34 |
Recent research trends in network science are shifting from the analysis of single-layer networks to the analysis of mul... [more] |
CQ2017-34 pp.31-36 |
ICSS, IPSJ-SPT |
2017-03-14 09:55 |
Nagasaki |
University of Nagasaki |
Towards Reducing False Positives of Host based Intrusion Detection by Static Code Analysis of Web Applications Yang Zhong, Tohru Sato, Masaki Tanikawa (NTT) ICSS2016-59 |
A host-based intrusion detection is an approach for detecting critical web attacks. Because anomaly detection is leverag... [more] |
ICSS2016-59 pp.117-122 |