IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 81 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-20
14:50
Online Online Deep Learning Side-Channel Attacks against Unprotected AES and RSM-AES Implemented in ASIC
Yuta Fukuda, Kota Yoshida, Hisashi Hashimoto, Takeshi Fujino (Ritsumeikan Univ.) ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29
The cryptographic key can be revealed by exploiting side-channel information such as power traces under operation.
Rec... [more]
ISEC2021-24 SITE2021-18 BioX2021-25 HWS2021-24 ICSS2021-29 EMM2021-29
pp.86-91
ICSS, IPSJ-SPT 2021-03-02
16:25
Online Online Security Evaluation of PUF utilizing Unrolled Architecture
Yusuke Nozaki, Kensaku Asahi, Masaya Yoshikawa (Meijo Univ.) ICSS2020-53
To improve the security of LSI circuit, physically unclonable functions (PUF) have been attracted attention. The glitch ... [more] ICSS2020-53
pp.160-165
MSS, SS 2021-01-27
13:25
Online Online Distributed State Estimation for Linear Singular Systems and Its Application to Sensor Networks
Kei Isono, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) MSS2020-37 SS2020-22
The sensor attack detection problem is one of the important problems in cybersecurity and control theory. An attack to a... [more] MSS2020-37 SS2020-22
pp.49-53
NS, NWS
(Joint)
2021-01-22
13:30
Online Online [Encouragement Talk] A Study on Detection and Prevention of Stealthy DNS Water Torture Attack
Keita Hasegawa, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2020-116
A distributed denial-of-service (DDoS) attack is a major social problem. As one of the actual attacks, Dyn DNS, the Doma... [more] NS2020-116
pp.31-36
IBISML 2020-03-11
15:10
Kyoto Kyoto University
(Cancelled but technical report was issued)
Fairness Causes Vulnerability to Adversarial Attacks
Koki Wataoka, Takashi Matsubara, Kuniaki Uehara (Kobe Univ.) IBISML2019-48
When using machine learning models in society, it is essential to be ensure classifiers are fair to race and gender. In ... [more] IBISML2019-48
pp.101-105
ISEC, IT, WBS 2020-03-11
09:30
Hyogo University of Hyogo
(Cancelled but technical report was issued)
Security Evaluation of Differential Attacks against KCipher-2
Jin Hoki, Kosei Sakamoto (Hyogo Univ.), Kazuhiko Minematsu (NEC), Takanori Isobe (Hyogo Univ./NICT) IT2019-108 ISEC2019-104 WBS2019-57
This paper will investigate the resistance of KCipger-2 against differential attacks, which is the unique official strea... [more] IT2019-108 ISEC2019-104 WBS2019-57
pp.121-126
VLD, DC, CPSY, RECONF, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2019-11-15
09:40
Ehime Ehime Prefecture Gender Equality Center Modeling attacks against device authentication using CMOS image sensor PUF
Hiroshi Yamada, Shunsuke Okura, Mitsuru Shiozaki, Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) ICD2019-34 IE2019-40
A CMOS image sensor physically unclonable function (CIS-PUF) for device authentication by the unique responses extracted... [more] ICD2019-34 IE2019-40
pp.31-36
ISEC, SITE, LOIS 2019-11-02
15:00
Osaka Osaka Univ. On Robustness of Machine-Learning-Based Malware Detection
Wanjia Zheng (U. Tsukuba), Kazumasa Omote (U. Tsukuba/NICT) ISEC2019-83 SITE2019-77 LOIS2019-42
As the 2020 Tokyo Olympics are approaching, the possibility of being targeted by attackers has further increased in Japa... [more] ISEC2019-83 SITE2019-77 LOIS2019-42
pp.133-140
AI 2019-07-22
16:30
Hokkaido   Modeling of Cyber Attack Based on POMDP
Kazuma Igami, Hirofumi Yamaki (Tokyo Denki Univ.) AI2019-15
APTs(Advanced Persistent Threats), which are a type of cyber-attack, are a major threat to information systems because t... [more] AI2019-15
pp.77-82
ISEC 2019-05-17
11:45
Tokyo Kikai-Shinko-Kaikan Bldg. Examination of quantitative evaluation of attack method to restore the anonymized data
Takaya Yamazoe, Kazumasa Omote (Tsukuba Univ.) ISEC2019-4
With the increasing scale of data, integrated analysis of data distributed to multiple institutions is required. On the ... [more] ISEC2019-4
pp.7-13
IT, ISEC, WBS 2019-03-08
11:15
Tokyo University of Electro-Communications A Lower Bound of the Joint Capacity of Digital Fingerprinting Codes against a Mixed Attack
Tatsuya Sekine, Hiroki Koga (U. Tsukuba) IT2018-119 ISEC2018-125 WBS2018-120
Digital fingerprinting codes are embedded in digital contents for protecting copyrights of the digital contents against m... [more] IT2018-119 ISEC2018-125 WBS2018-120
pp.269-274
HWS, VLD 2019-03-01
14:55
Okinawa Okinawa Ken Seinen Kaikan Performance and Security Evaluation of Ring Oscillator PUF Implemented on ASIC
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-131 HWS2018-94
This study evaluates the performance and the security of ring oscillator physical unclonable function (RO PUF) implement... [more] VLD2018-131 HWS2018-94
pp.225-230
HWS, VLD 2019-03-01
15:20
Okinawa Okinawa Ken Seinen Kaikan An Attack with Linear Model Against Improved Arbiter PUF
Susumu Matsumi, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-132 HWS2018-95
Imitations of electronic parts are distributed to the market, which is a serious problem. PUFs have attracted attention ... [more] VLD2018-132 HWS2018-95
pp.231-236
HWS, VLD 2019-03-01
15:45
Okinawa Okinawa Ken Seinen Kaikan On Machine Learning Attack Tolerance for PUF-based Device Authentication System
Tomoki Iizuka (UTokyo), Yasuhiro Ogasahara, Toshihiro Katashita, Yohei Hori (AIST), Hiromitsu Awano (Osaka Univ.), Makoto Ikeda (UTokyo) VLD2018-133 HWS2018-96
Double-Arbiter PUF (DAPUF) and PL-PUF are known to be highly resistant to machine learning attacks.
In this paper, we p... [more]
VLD2018-133 HWS2018-96
pp.237-242
ITS, IE, ITE-MMS, ITE-HI, ITE-ME, ITE-AIT [detail] 2019-02-20
16:00
Hokkaido Hokkaido Univ. [Invited Talk] Anomaly Detection for Smart Home Based on User Behavior -- ICCE2019 Report --
Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.), Kensuke Ueda, Yoshiaki Kato (Mitsubishi Electric)
The operations of home IoT devices by attackers can cause serious problems.
However, such attacks are difficult to dete... [more]

EMCJ, IEE-EMC, IEE-MAG 2018-11-22
11:30
Overseas KAIST [Invited Talk] Security Simulation of Cryptographic Module in Side-Channel Attack
Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) EMCJ2018-61
Side-channel attacks (SCAs) are one of the biggest threats to cryptography and one of important issues in IoT modules, c... [more] EMCJ2018-61
p.19
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
14:35
Hokkaido Sapporo Convention Center Side-Channel Countermeasure for XOR based PUF and Its Evaluation
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ISEC2018-42 SITE2018-34 HWS2018-39 ICSS2018-45 EMM2018-41
XOR based physical unclonable functions (PUFs) have been proposed as countermeasures against modeling attacks. On the ot... [more] ISEC2018-42 SITE2018-34 HWS2018-39 ICSS2018-45 EMM2018-41
pp.337-342
VLD, HWS
(Joint)
2018-03-02
14:30
Okinawa Okinawa Seinen Kaikan Modeling Attacks on Double-Arbiter PUF Using Deep Neural Network
Tomoki Iizuka, Hiromitsu Awano, Makoto Ikeda (UTokyo) VLD2017-127
A deep neural network-based modeling attack for Double-Arbiter PUF (DAPUF) is proposed. Although DAPUF is known to be hi... [more] VLD2017-127
pp.231-236
CQ 2017-07-27
11:40
Hyogo Kobe University Effectiveness of Link Addition Strategies for Improving Robustness of Multiplex Networks against Layer Node-based Attack
Yui Kazawa, Sho Tsugawa (Univ. of Tsukuba) CQ2017-34
Recent research trends in network science are shifting from the analysis of single-layer networks to the analysis of mul... [more] CQ2017-34
pp.31-36
ICSS, IPSJ-SPT 2017-03-14
09:55
Nagasaki University of Nagasaki Towards Reducing False Positives of Host based Intrusion Detection by Static Code Analysis of Web Applications
Yang Zhong, Tohru Sato, Masaki Tanikawa (NTT) ICSS2016-59
A host-based intrusion detection is an approach for detecting critical web attacks. Because anomaly detection is leverag... [more] ICSS2016-59
pp.117-122
 Results 21 - 40 of 81 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan