Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
VLD, HWS, ICD |
2024-03-02 09:45 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Demonstrating a Real Car Covered with Infra-red-cut Films to Hide itself from LiDAR Yuki Fukatsu, Akira Iwahashi, Naoki Yoshida, Tsutomu Matsumoto (YNU) VLD2023-135 HWS2023-95 ICD2023-124 |
In recent years, various technologies have been developed toward the practical application of fully automated driving. A... [more] |
VLD2023-135 HWS2023-95 ICD2023-124 pp.190-195 |
ICSS |
2023-11-16 13:00 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Implementation of Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities, and A Study on Its Large-scale Demonstration Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2023-51 |
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] |
ICSS2023-51 pp.1-6 |
HWS, VLD |
2023-03-04 10:25 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Fundamental study of distance spoofing attack against dToF lidar with interference mitigation function Midori Tomijima, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2022-116 HWS2022-87 |
In order to avoid interference with the spread of LiDAR, a simple mitigation method that changes the irradiation interva... [more] |
VLD2022-116 HWS2022-87 pp.239-244 |
NS, NWS (Joint) |
2023-01-26 13:00 |
Yamaguchi |
Hybrid Meeting (Yamaguchi Prefecture) (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
A User Authenticity Verification Method Using Behavioral and Cognitive Biometrics for Zero Trust Access Control Mechanisms Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-153 |
In recent years, remote access to confidential data necessary for work has been rapidly increasing due to the spread of ... [more] |
NS2022-153 pp.19-24 |
HWS, ICD |
2022-10-25 10:25 |
Shiga |
(Primary: On-site, Secondary: Online) |
A Study on Profiled Side-channel Analysis against AES-CTR Katsumi Ebina, Rei Ueno, Naohumi Homma (Tohoku Univ) HWS2022-31 ICD2022-23 |
This paper describes profiling Side-Channel Analysis for AES counter mode.
AES-CTR is a mode in which an internally sto... [more] |
HWS2022-31 ICD2022-23 pp.6-11 |
HWS, ICD |
2022-10-25 14:15 |
Shiga |
(Primary: On-site, Secondary: Online) |
An Estimation Method of the Irradiation Timing of an Attack Pulse for Distance Spoofing Attack Against Direct ToF LiDAR Midori Tomijima, Daisuke Fujimoto, Yuichi Hayashi (NAIST) HWS2022-37 ICD2022-29 |
Autonomous vehicles are equipped with numerous sensors, and the vehicle runs according to their measurements. Therefore,... [more] |
HWS2022-37 ICD2022-29 pp.41-45 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 16:40 |
Online |
Online |
Distance Spoofing Detection by LiDAR and Stereo Camera Ataru Kubo, Yuki Fukatsu, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2022-15 SITE2022-19 BioX2022-40 HWS2022-15 ICSS2022-23 EMM2022-23 |
Automatic driving vehicles use information obtained from onboard ranging sensors to recognize objects such as surroundin... [more] |
ISEC2022-15 SITE2022-19 BioX2022-40 HWS2022-15 ICSS2022-23 EMM2022-23 pp.46-51 |
VLD, HWS [detail] |
2022-03-08 16:50 |
Online |
Online |
Physical Spoofing Attack on LiDAR-based Object Detection and Its Demonstration Yuki Fukatsu, Ryuuya Ichinose, Shinsei Ueda, Ataru Kubo, Naoki Yoshida, Tsutomu Matsumoto (Yokohama National Univ.) VLD2021-104 HWS2021-81 |
A variety of technologies are being developed for the practical application of fully autonomous driving. Automated drivi... [more] |
VLD2021-104 HWS2021-81 pp.158-163 |
VLD, HWS [detail] |
2022-03-08 17:15 |
Online |
Online |
Development of a Test Environment for Attack-Resistance Evaluation of Matrix Direct ToF Lidar Masato Suzuki, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2021-105 HWS2021-82 |
Matrix-type Direct Time of flight (dToF) Lidar, which enables high-resolution and high-speed acquisition of distance inf... [more] |
VLD2021-105 HWS2021-82 pp.164-169 |
SR |
2021-05-21 14:00 |
Online |
Online |
[Technology Exhibit]
Invisible Sensing
-- Walk-through Security Screening System -- Kazumine Ogura, Tatsuya Sumiya, Nagma S Khan, Shingo Yamanouchi, Toshiyuki Nomura, Masayuki Ariyoshi (NEC) SR2021-13 |
Many facilities, e.g., office buildings, schools and railway stations are potential terrorism targets but security scree... [more] |
SR2021-13 pp.86-90 |
ICD, HWS [detail] |
2020-10-26 10:30 |
Online |
Online |
Laser-based Attacks on Ultrasonic Sensors Tatsuya Suehiro, Taku Toyama, Junichi Sakamoto, Tsutomu Matsumoto (Yokohama National Univ.) HWS2020-28 ICD2020-17 |
We examine the instrumentation security threat of irradiating laser for a piezoelectric MEMS transducer in a MEMS ultras... [more] |
HWS2020-28 ICD2020-17 pp.18-23 |
HCS, HIP, HI-SIGCOASTER [detail] |
2019-05-16 13:10 |
Okinawa |
Okinawa Industry Support Center |
The Message to Effectively Promote Information Security Measurements Toshihide Saito, Asuka Ono, Asuka Miyake, Ai Nakane (NTT), Yutaro Kiyomura, Kazuhiro Matsuzaki, Tatsuya Ishihara (NTT WEST) HCS2019-8 HIP2019-8 |
The risk of security incidents is increasing year by year, and it is becoming more important for individual users to tak... [more] |
HCS2019-8 HIP2019-8 pp.39-44 |
ICSS |
2018-11-21 13:25 |
Kagoshima |
|
Investigation of Security-Related Factors of Satisfactions in Internet Services Yukiko Sawaya, Akira Yamada, Ayumu Kubota (KDDI Research) ICSS2018-54 |
The number of services on the Internet and devices connected to the Internet has been increased. Under such circumstance... [more] |
ICSS2018-54 pp.7-12 |
RCS, AP (Joint) |
2018-11-20 11:15 |
Okinawa |
Okinawa Industry Support Center |
A Study on Space Selective Modulation in Land Mobile Communication Daiki Fukushima, Hideiti Sasaoka, Hisato Iwai (Doshisha Univ.) RCS2018-181 |
As a physical layer security technique, Directional Modulation with multiple antennas which forms desired modulated sign... [more] |
RCS2018-181 pp.19-24 |
ISEC |
2018-09-07 09:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Development of Portable Automotive Security Testbed with Adaptability: PASTA Tsuyoshi Toyama, Hisashi Oguma (TOYOTA-ITC), Tsutomu Matsumoto (YNU) ISEC2018-51 |
For accelerating the development of sophisticated driving-assist technologies such as automated driving, securing vehicl... [more] |
ISEC2018-51 pp.7-14 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 13:10 |
Hokkaido |
Sapporo Convention Center |
A Study on Amplitude Controlling Using Modulated Wave toward Countermeasure against Spoofing Attack on Ultrasonic Rangefinder Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) ISEC2018-17 SITE2018-9 HWS2018-14 ICSS2018-20 EMM2018-16 |
Various sensors are increasing with spread of applications such as automatic operation. Ultrasonic rangefinders have bec... [more] |
ISEC2018-17 SITE2018-9 HWS2018-14 ICSS2018-20 EMM2018-16 pp.55-59 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 13:35 |
Hokkaido |
Sapporo Convention Center |
A System for Evaluating Instrumentation Security of ToF Depth-Image Cameras against Pulse-light Spoofing Satoru Sakurazawa, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) ISEC2018-18 SITE2018-10 HWS2018-15 ICSS2018-21 EMM2018-17 |
The ToF depth-image camera is a device capable of simultaneously measuring distances within a certain range and it is be... [more] |
ISEC2018-18 SITE2018-10 HWS2018-15 ICSS2018-21 EMM2018-17 pp.61-68 |
QIT (2nd) |
2018-06-04 13:20 |
Hiroshima |
ICCH Ran |
[Poster Presentation]
Certifying Quantum Randomness by Probability Estimation Yanbao Zhang (NTT-BRL), Emanuel Knill, Peter Bierhorst (NIST) |
We introduce probability estimation, a broadly applicable framework to certify
randomness in a finite sequence of mea... [more] |
|
HWS |
2018-04-13 15:50 |
Fukuoka |
|
An analog security technique on a physical-cyber boundary Takuji Miki, Kento Mizuta, Noriyuki Miura, Makoto Nagata (Kobe Univ.) HWS2018-9 |
This paper presents an analog measurement security technique for sensor systems. A sensor analog circuit is indispensabl... [more] |
HWS2018-9 pp.45-48 |
EMM |
2017-11-07 13:25 |
Kagoshima |
Kagoshima Univ. (Inamori Academy) |
A study of obfuscation for the security enhancement of watermarking schemes Koichiro Yamashita, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) EMM2017-65 |
In general, watermark information is embedded into the host signals selected from digital content according to a secret ... [more] |
EMM2017-65 pp.53-58 |