Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, ICM, CQ, NV (Joint) |
2022-11-24 11:35 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Design and Trial of Cyber Security Exercise for Basic CISO Skillset Tatsumi Seko, Touri Nakagawa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-104 |
Conventional security officers lack the authority and responsibility to make decisions related to management and are not... [more] |
NS2022-104 pp.23-28 |
NS, ICM, CQ, NV (Joint) |
2022-11-25 16:20 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
[Invited Talk]
Operation and Management of Microservices-based Distributed System using Service Mesh Takaya Ide, Hitoshi Yabusaki (Hitachi) NS2022-127 CQ2022-60 ICM2022-30 |
Distributed systems such as microservice architectures are complex and change rapidly. A network model called a service ... [more] |
NS2022-127 CQ2022-60 ICM2022-30 pp.137-141(NS), pp.58-62(CQ), pp.31-35(ICM) |
R |
2022-10-07 14:50 |
Fukuoka |
(Primary: On-site, Secondary: Online) |
A Note on A Transformer Encoder-Based Malware Classification Using API Calls Chen Li (Kyutech), Junjun Zheng (Osaka Univ.) R2022-36 |
Malware is a major security threat to computer systems and significantly impacts system reliability. Recurrent neural ne... [more] |
R2022-36 pp.25-30 |
AP, SANE, SAT (Joint) |
2022-07-29 11:15 |
Hokkaido |
Asahikawa Taisetsu Crystal Hall (Primary: On-site, Secondary: Online) |
Evaluation of Secure Transmission Performance of Spatially-Selective Modulation in an Indoor Environment Hitoro Yonawa, Yuka Morishima, Hisato Iwai, Shinsuke Ibi (Doshisha Univ.) AP2022-57 |
As a physical layer security technique, we have proposed spatially-selective modulation (SSM) which consists of multiple... [more] |
AP2022-57 pp.129-134 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 16:40 |
Online |
Online |
Efficient Constructions of Adaptively and CCA-secure Identity-based Encryption with Equality Test from LWE Assumption in the Standard Model Kyoichi Asano (UEC/NICT), Keita Emura (NICT), Atsushi Takayasu (Univ. Tokyo) ISEC2022-29 SITE2022-33 BioX2022-54 HWS2022-29 ICSS2022-37 EMM2022-37 |
Identity-based Encryption with Equality Test (IBEET) is an extension of identity-based Encryption (IBE) that can check t... [more] |
ISEC2022-29 SITE2022-33 BioX2022-54 HWS2022-29 ICSS2022-37 EMM2022-37 pp.131-138 |
CQ, CS (Joint) |
2022-05-12 14:20 |
Fukui |
Fukui (Fuku Pref.) (Primary: On-site, Secondary: Online) |
Distributed Network Intrusion Detection System Using Federated Learning Yuya Tsuru, Tomoya Kawakami, Tatsuhito Hasegawa (Univ. of Fukui) CQ2022-5 |
A network-based intrusion detection system (NIDS) monitors a network and detects unauthorized traffic. Currently, a vari... [more] |
CQ2022-5 pp.20-25 |
HWS |
2022-04-26 10:55 |
Tokyo |
AIST Tokyo Waterfront (Annex) (Primary: On-site, Secondary: Online) |
Deep Learning Side-Channel Attacks against Hardware-Implemented Lightweight Cipher Midori64 Madoka Sako, Kunihiro Kuroda, Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) HWS2022-2 |
Midori is a lightweight cipher and it is developed to achieve superior circuit size, low latency, and low power consumpt... [more] |
HWS2022-2 pp.7-12 |
IT, ISEC, RCC, WBS |
2022-03-11 11:10 |
Online |
Online |
Corruption-Correctable Message Authentication Code Isamu Furuya, Akiko Inoue, Kazuhiko Minematsu (NEC) IT2021-114 ISEC2021-79 WBS2021-82 RCC2021-89 |
We propose correction correctable MAC, which enables to verify data integrity and to correct corruptions of the data.
A... [more] |
IT2021-114 ISEC2021-79 WBS2021-82 RCC2021-89 pp.180-187 |
VLD, HWS [detail] |
2022-03-08 13:00 |
Online |
Online |
Implementation Evaluation of Glitch PUF Using a Low-Latency Cryptography MANTIS Kosuke Hamaguchi, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2021-96 HWS2021-73 |
This paper proposes a low-latency cipher MANTIS based PUF which uses signal glitch during encryption. The security level... [more] |
VLD2021-96 HWS2021-73 pp.111-116 |
CAS, CS |
2022-03-04 13:45 |
Online |
Online |
Evaluation of Trojan Detector for AI Hardware Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-94 CS2021-96 |
In recent years, AI edge computing has been expanding to realize real-time inference by implementing AI models on edge d... [more] |
CAS2021-94 CS2021-96 pp.106-111 |
MBE, NC (Joint) |
2022-03-02 10:20 |
Online |
Online |
A Glass Breaking Sound Detection Method for Security Systems using SVM Yuhei Mazaki, Susumu Kuroyanagi (NIT) NC2021-48 |
In this study, a sound-based security system which detect glass breaking sound made by burglars are proposed. In the pre... [more] |
NC2021-48 pp.11-16 |
SR |
2021-05-21 14:00 |
Online |
Online |
[Technology Exhibit]
Invisible Sensing
-- Walk-through Security Screening System -- Kazumine Ogura, Tatsuya Sumiya, Nagma S Khan, Shingo Yamanouchi, Toshiyuki Nomura, Masayuki Ariyoshi (NEC) SR2021-13 |
Many facilities, e.g., office buildings, schools and railway stations are potential terrorism targets but security scree... [more] |
SR2021-13 pp.86-90 |
IN, NS (Joint) |
2021-03-05 10:10 |
Online |
Online |
A Convolutional Autoencoder Based Method for Cyber Intrusion Detection Xinyi She, Yuji Sekiya (Tokyo Univ.) IN2020-77 |
Cyber intrusion detection systems are increasingly crucial due to the monumental growth of internet applications. Howeve... [more] |
IN2020-77 pp.138-143 |
ICSS, IPSJ-SPT |
2021-03-02 16:25 |
Online |
Online |
Security Evaluation of PUF utilizing Unrolled Architecture Yusuke Nozaki, Kensaku Asahi, Masaya Yoshikawa (Meijo Univ.) ICSS2020-53 |
To improve the security of LSI circuit, physically unclonable functions (PUF) have been attracted attention. The glitch ... [more] |
ICSS2020-53 pp.160-165 |
IE, ITS, ITE-MMS, ITE-ME, ITE-AIT [detail] |
2021-02-19 15:20 |
Online |
Online |
[Special Talk]
A Note on Customer's Interest Estimation Method Using Security Camera Video Data from the Real Store
-- Validation of the accuracy of an anomaly detection model using features obtained from a posture estimation model -- Yuki Honma, Ren Togo, Maiku Abe, Takahiro Ogawa, Miki Haseyama (Hokkaido Univ.) |
In this paper, we propose a method for estimating customers’ interests using videos recorded by a security camera in a r... [more] |
|
AI |
2021-02-12 16:30 |
Online |
Online |
A Defense Method for Machine Learning Poisoning Attacks in IoT Environments Considering the Removal Priority of Poisonous Data Tomoki Chiba, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga (UEC) AI2020-36 |
In recent years, machine learning has been attracting attention for its potential to further enrich people's lives. Howe... [more] |
AI2020-36 pp.73-78 |
MSS, SS |
2021-01-27 13:25 |
Online |
Online |
Distributed State Estimation for Linear Singular Systems and Its Application to Sensor Networks Kei Isono, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) MSS2020-37 SS2020-22 |
The sensor attack detection problem is one of the important problems in cybersecurity and control theory. An attack to a... [more] |
MSS2020-37 SS2020-22 pp.49-53 |
NS, NWS (Joint) |
2021-01-21 13:55 |
Online |
Online |
Prototyping Zero Trust Network for Enterprise Network with Considering the Security Policy Masataka Kawai, Yuzo Taenaka, Yuki Kadobayashi (NAIST) NS2020-111 |
The Zero Trust Network (ZTN) is a security model designed to deal with threats such as information theft by spies and cr... [more] |
NS2020-111 pp.9-15 |
IA, IN (Joint) |
2020-12-15 10:50 |
Online |
Online |
Development of an Intrusion Detection System Utilizing Social Network Analysis Principles James Lu, Yuji Sekiya (Univ. of Tokyo) IA2020-29 |
As computer networks grow increasingly complex and cyberattacks become more sophisticated, better methods are needed to ... [more] |
IA2020-29 pp.18-21 |
VLD, DC, RECONF, ICD, IPSJ-SLDM (Joint) [detail] |
2020-11-18 14:00 |
Online |
Online |
Physically Unclonable Functions(PUF) curcuit using Non-Volatile Flip-Flop and security evaluation against modeling attacks Hiroki Ishihara, Kimiyoshi Usami (Shibaura IT) VLD2020-37 ICD2020-57 DC2020-57 RECONF2020-56 |
In recent years, imitative LSIs have become a serious problem and security technology PUF to use manufacturing variabili... [more] |
VLD2020-37 ICD2020-57 DC2020-57 RECONF2020-56 pp.139-144 |