Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICM, NS, CQ, NV (Joint) |
2023-11-22 12:30 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
[Invited Talk]
Secure Middlebox Communication over TLS against Middlebox Compromise Toru Hasegawa, Kentaro Kita, Junji Takemasa, Yuki Koizumi (Osaka Univ.) CQ2023-46 |
A large portion of Internet traffic passes through middleboxes that read or modify messages. However, such middleboxes a... [more] |
CQ2023-46 pp.50-53 |
ICSS |
2023-11-17 10:25 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Chameleon Hash Function with Forward-Security Pengxuan Wei, Atsuko Miyaji (Osaka Univ.), Yangguang Tian (University Of Surrey) ICSS2023-61 |
Chameleon Hash Function (CH) is a hash function with a public and secret key pair. CH is collision-resistant for users w... [more] |
ICSS2023-61 pp.70-76 |
LOIS, SITE, ISEC |
2023-11-10 10:45 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
NTP Tunneling Threat Model Verification and Countermeasure Shinjisangeru Sugasawa, Hisayoshi Kunimune, Shigeaki Tanimoto (CIT) ISEC2023-64 SITE2023-58 LOIS2023-22 |
Fraudulent covert communication methods are techniques used by attackers to avoid detection of malicious communication b... [more] |
ISEC2023-64 SITE2023-58 LOIS2023-22 pp.66-71 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 10:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
An Implementation and Evaluation of Communication Schemes Using Authenticated Cryptography for MAVLink Communication Ryuto Kuwada, Nobuya Ishihara, Yuta Kodera, Yasuyuki Nogami (Okayama Univ.) ISEC2023-39 SITE2023-33 BioX2023-42 HWS2023-39 ICSS2023-36 EMM2023-39 |
MAVLink is a lightweight communication protocol used between drones and ground stations to transmit drone status and con... [more] |
ISEC2023-39 SITE2023-33 BioX2023-42 HWS2023-39 ICSS2023-36 EMM2023-39 pp.165-170 |
ICSS, IPSJ-SPT |
2023-03-13 16:10 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Implementation and Evaluation for Remote-Control Security System of IoT Devices Masaru Takeuchi (JDC), Yohei Watanabe (UEC/JDC), Naoto Yanai (OU/JDC), Akira Takeuchi (JDC), Tatsuya Takehisa (Nisshin), Yukitoshi Sanada (KU/JDC), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2022-67 |
We have proposed the Remote-Control System for securing IoT devices from malwares. It consists of a control algorithm ba... [more] |
ICSS2022-67 pp.115-120 |
CS |
2022-10-27 11:30 |
Hiroshima |
Hiroshima City University Satellite campus (Primary: On-site, Secondary: Online) |
Implementation of a large-scale evaluation platform in a BACnet/IP environment Kohei Miyazawa, Tetsuya Yokotani, Hiroaki Mukai, Yuki Hatanaka, Satoru Murakami (KIT) CS2022-45 |
In deploying BACnet/IP on large buildings, it is necessary to analyze the impact of unauthorized access on the facilitie... [more] |
CS2022-45 pp.11-14 |
HWS, ICD |
2022-10-25 17:05 |
Shiga |
(Primary: On-site, Secondary: Online) |
How to Identify the Physical Direction of CAN Message Transmission Yosuke Maekawa, Camille Gay (TOYOTA/YNU), Tsutomu Matsumoto (YNU) HWS2022-43 ICD2022-35 |
The impact of cyber-attacks on automobiles is becoming more serious as vehicles become more connected and multi-function... [more] |
HWS2022-43 ICD2022-35 pp.76-81 |
IN, CCS (Joint) |
2022-08-05 15:00 |
Hokkaido |
Hokkaido University(Centennial Hall) (Primary: On-site, Secondary: Online) |
Countermeasure of In-vehicle System using Authenticated Encryption against DoS Attacks Daichi Hirose, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) IN2022-22 |
In-vehicle systems adopt Controller Area Network (CAN) which is the standard communication protocol. Many kinds of data ... [more] |
IN2022-22 pp.39-44 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 13:50 |
Online |
Online |
An overview of the secrecy of patent applications in the Japanese Law Makoto Koike (MK Microwave) ISEC2022-23 SITE2022-27 BioX2022-48 HWS2022-23 ICSS2022-31 EMM2022-31 |
Economic security promotion law enacted on May 11, 2022 includes the provisions to keep patent application secret in Jap... [more] |
ISEC2022-23 SITE2022-27 BioX2022-48 HWS2022-23 ICSS2022-31 EMM2022-31 pp.88-97 |
IT, ISEC, RCC, WBS |
2022-03-10 09:40 |
Online |
Online |
Construction GKW Transformation for Arithmetic Circuits Kotaro Chinen, Hiroaki Anada (Univ. Nagasaki) IT2021-88 ISEC2021-53 WBS2021-56 RCC2021-63 |
Garbled ciruits is a cryptographic framework for secure two-party computation introduced by Yao. Yao's protocol is a met... [more] |
IT2021-88 ISEC2021-53 WBS2021-56 RCC2021-63 pp.31-37 |
IA, SITE, IPSJ-IOT [detail] |
2022-03-08 13:30 |
Kyoto |
Kyoto University, Yoshida Campus (Primary: On-site, Secondary: Online) |
IoT Device Security Survey Using Home Automation Apps Mizuki Ohno, Takahiro Endo, Kenichi Kanayama, Kenichi Nagami (INTEC) SITE2021-57 IA2021-70 |
We have released a home automation application called "KADENTECHO". Based on the accumulated data from this app, we cond... [more] |
SITE2021-57 IA2021-70 pp.69-74 |
ICSS, IPSJ-SPT |
2022-03-08 13:00 |
Online |
Online |
Remote-Control System for Securing IoT Devices Masaru Takeuchi (JDC), Yohei Watanabe (UEC/ジャパンデータコム), Naoto Yanai (OU/ジャパンデータコム), Tatsuya Takehisa (Nisshin), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2021-73 |
The number of malwares targeting IoT devices increases, and security issues in many systems such as critical infrastruct... [more] |
ICSS2021-73 pp.87-92 |
CAS, CS |
2022-03-04 14:10 |
Online |
Online |
Secure In-vehicle System using Authenticated Encryption Midori-OTR and its Implementation Evaluation Daichi Hirose, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-95 CS2021-97 |
In recent years, many electronic control units called ECUs have been installed in automobiles to perform various functio... [more] |
CAS2021-95 CS2021-97 pp.112-117 |
QIT (2nd) |
2021-11-30 15:30 |
Online |
Online |
[Invited Talk]
Recent progress in the security proof of quantum key distribution in the finite-key regime Toshihiko Sasaki (Univ. of Tokyo) |
We show a finite-key analysis method for a broad type of quantum key distribution protocols based on a numerical optimiz... [more] |
|
ICTSSL, IEE-SMF, IN |
2021-10-21 09:50 |
Online |
Online |
Proposal and Evaluation of Cryptographic Communication Method that Separates Components Related to Coding and Decoding in IoT Environment Reita Suzuki (Niigata Univ.), Takafumi Hayashi (Nihon Univ.), Keisuke Nakano (Niigata Univ.) ICTSSL2021-20 |
MQTT is one of the lightweight messaging protocols currently used in the IoT environment, but there is no clear rule reg... [more] |
ICTSSL2021-20 pp.12-17 |
IA |
2021-10-15 16:50 |
Online |
Online |
Malware Traffic Detection at Certain Time Using IP Flow Information Seiya Komatsu, Yusei Katsura, Masatoshi Kakiuchi, Ismail Arai, Kazutoshi Fujikawa (NAIST) IA2021-27 |
The damage caused by the activities of malware such as botnets and ransomware has become a social problem. In order to d... [more] |
IA2021-27 pp.6-11 |
PN |
2021-08-30 10:35 |
Online |
Online |
On Information-Theoretic Secure Authentication Key Exchange via Y00 Quantum Cryptography Takehisa Iwakoshi (Mie Univ.) PN2021-12 |
We propose an information-theoretically secure (ITS) procedure for a secret key agreement to share a secret key with a n... [more] |
PN2021-12 pp.1-6 |
IN, NS (Joint) |
2021-03-05 11:20 |
Online |
Online |
Proposal for LDoS attack using indirect transmission in Zigbee and a countermeasure against it Satoshi Okada, Daisuke Miyamoto, Yuji Sekiya, Hiroshi Nakamura (The University of Tokyo) NS2020-153 |
Low-Rate DoS (LDoS) attack degrades the quality of service with less traffic than typical DoS attacks. LDoS attack has a... [more] |
NS2020-153 pp.179-184 |
ICSS, IPSJ-SPT |
2021-03-01 14:30 |
Online |
Online |
A path authentication framework based on One-way cross networks Kosuke Ishibashi, Masakazu Soshi (Hiroshima City Univ.) ICSS2020-33 |
Since MANETs can transmit information between mobile devices, it is critically important to guarantee that the transmitt... [more] |
ICSS2020-33 pp.43-48 |
ISEC |
2020-05-20 16:05 |
Online |
Online |
Identity-based Authenticated Key Exchange for IoT Devices and its Security against Malicious Private Key Generator Kazuma Wariki, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.), Koutarou Suzuki (Toyohashi Univ. of Tech.), Junichi Tomida (NTT) ISEC2020-12 |
With a rapid increase in the number of IoT devices, many
identity-based authenticated key exchange (IBAKE) protocols fo... [more] |
ISEC2020-12 pp.55-61 |