Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
VLD, HWS, ICD |
2024-03-02 09:45 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Demonstrating a Real Car Covered with Infra-red-cut Films to Hide itself from LiDAR Yuki Fukatsu, Akira Iwahashi, Naoki Yoshida, Tsutomu Matsumoto (YNU) VLD2023-135 HWS2023-95 ICD2023-124 |
In recent years, various technologies have been developed toward the practical application of fully automated driving. A... [more] |
VLD2023-135 HWS2023-95 ICD2023-124 pp.190-195 |
HWS |
2023-04-15 09:15 |
Oita |
(Primary: On-site, Secondary: Online) |
An AES Cryptographic Processor with Partial Re-Keying Scheme Utilizing Physical Attack Sensor Ryuki Ikemoto, Soichiro Fujii (Osaka Univ.), Yuki Yamashita, Makoto Nagata (Kobe Univ.), Jun Shiomi, Yoshihiro Midoh, Noriyuki Miura (Osaka Univ.) HWS2023-9 |
We propose a partial secret key update method for AES cryptography using sensors that can detect physical attacks on cry... [more] |
HWS2023-9 pp.34-36 |
HWS, VLD |
2023-03-01 13:50 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Circuit Optimization and Simulation Evaluation for Ultra-Low Voltage of LRPUF Using Manufacturing Variability of Leakage Current Shunkichi Hata, Kimiyoshi Usami (SIT) VLD2022-77 HWS2022-48 |
Low power consumption and low-voltage operation become critical issues to be addressed when PUF (Physically Unclonable F... [more] |
VLD2022-77 HWS2022-48 pp.25-30 |
HWS, VLD |
2023-03-04 10:25 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Fundamental study of distance spoofing attack against dToF lidar with interference mitigation function Midori Tomijima, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2022-116 HWS2022-87 |
In order to avoid interference with the spread of LiDAR, a simple mitigation method that changes the irradiation interva... [more] |
VLD2022-116 HWS2022-87 pp.239-244 |
CPSY, IPSJ-ARC |
2023-01-11 11:40 |
Online |
Online |
Reliability Enhancement Techniques for On-Device Learning on Wireless Sensor Nodes Kazuki Sunaga (Keio Univ.), Kota Yoshida (Ritsumeikan Univ.), Hiroki Matsutani (Keio Univ.) CPSY2022-33 |
(To be available after the conference date) [more] |
CPSY2022-33 pp.29-34 |
HWS, ICD |
2022-10-25 14:15 |
Shiga |
(Primary: On-site, Secondary: Online) |
An Estimation Method of the Irradiation Timing of an Attack Pulse for Distance Spoofing Attack Against Direct ToF LiDAR Midori Tomijima, Daisuke Fujimoto, Yuichi Hayashi (NAIST) HWS2022-37 ICD2022-29 |
Autonomous vehicles are equipped with numerous sensors, and the vehicle runs according to their measurements. Therefore,... [more] |
HWS2022-37 ICD2022-29 pp.41-45 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 16:15 |
Online |
Online |
Security Assessment and Countermeasures for Magnetic Malfunction of Electromagnetic Relays Takumi Owada, Kazuki Tachibana, Tsutomu Matsumoto (YNU) ISEC2022-14 SITE2022-18 BioX2022-39 HWS2022-14 ICSS2022-22 EMM2022-22 |
Relays are used in many electrical and electronic devices, including switches and sensors. Some relays are electromagnet... [more] |
ISEC2022-14 SITE2022-18 BioX2022-39 HWS2022-14 ICSS2022-22 EMM2022-22 pp.40-45 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 16:40 |
Online |
Online |
Distance Spoofing Detection by LiDAR and Stereo Camera Ataru Kubo, Yuki Fukatsu, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2022-15 SITE2022-19 BioX2022-40 HWS2022-15 ICSS2022-23 EMM2022-23 |
Automatic driving vehicles use information obtained from onboard ranging sensors to recognize objects such as surroundin... [more] |
ISEC2022-15 SITE2022-19 BioX2022-40 HWS2022-15 ICSS2022-23 EMM2022-23 pp.46-51 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 17:05 |
Online |
Online |
Security Evaluation of Cryptographic Circuits with Laser Sensors by Double-Spot Laser Irradiation Masaki Chikano, Naoki Yoshida, Junichi Sakamoto, Syungo Hayashi, Tsutomu Matsumoto (YNU) ISEC2022-16 SITE2022-20 BioX2022-41 HWS2022-16 ICSS2022-24 EMM2022-24 |
A fault injection attack is an attack method that intentionally injects faults into a device to cause it to malfunction,... [more] |
ISEC2022-16 SITE2022-20 BioX2022-41 HWS2022-16 ICSS2022-24 EMM2022-24 pp.52-57 |
VLD, HWS [detail] |
2022-03-08 11:00 |
Online |
Online |
Evaluation of a Lightweight Cryptographic Finalist on SROS2 Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2021-94 HWS2021-71 |
In cyber-physical systems, small devices are connected to the network to enable the analysis of sensor values. Also, sin... [more] |
VLD2021-94 HWS2021-71 pp.99-104 |
VLD, HWS [detail] |
2022-03-08 13:25 |
Online |
Online |
A Study on Small Area Circuits for CMOS Image Sensors with Message Authentication Codes (1)
-- Drive Circuit and Pixel Array Configuration -- Yoshihiro Akamatsu, Hiroaki Ogawa, Tatsuya Oyama, Hayato Tatsuno, Yu Sekioka, Shunsuke Okura, Takeshi Fujino (Ritsumeikan Univ) VLD2021-97 HWS2021-74 |
In edge AI, the information acquired by sensors is classified or recognized at the edge, and therefore, guaranteeing the... [more] |
VLD2021-97 HWS2021-74 pp.117-122 |
VLD, HWS [detail] |
2022-03-08 16:50 |
Online |
Online |
Physical Spoofing Attack on LiDAR-based Object Detection and Its Demonstration Yuki Fukatsu, Ryuuya Ichinose, Shinsei Ueda, Ataru Kubo, Naoki Yoshida, Tsutomu Matsumoto (Yokohama National Univ.) VLD2021-104 HWS2021-81 |
A variety of technologies are being developed for the practical application of fully autonomous driving. Automated drivi... [more] |
VLD2021-104 HWS2021-81 pp.158-163 |
IN, NS (Joint) |
2021-03-05 11:20 |
Online |
Online |
Proposal for LDoS attack using indirect transmission in Zigbee and a countermeasure against it Satoshi Okada, Daisuke Miyamoto, Yuji Sekiya, Hiroshi Nakamura (The University of Tokyo) NS2020-153 |
Low-Rate DoS (LDoS) attack degrades the quality of service with less traffic than typical DoS attacks. LDoS attack has a... [more] |
NS2020-153 pp.179-184 |
ICD (2nd) |
2021-03-01 14:10 |
Online |
Online |
Multimodal Sense-and-React Countermeasure Against Physical Attacks on Cryptographic Processors Sho Tada, Yuki Yamashita, Takuji Miki, Makoto Nagata (Kobe Univ.), Noriyuki Miura (Osaka Univ.) |
This paper presents a sense-and-react countermeasure that detects various physical attacks on cryptographic processors a... [more] |
|
MSS, SS |
2021-01-27 13:25 |
Online |
Online |
Distributed State Estimation for Linear Singular Systems and Its Application to Sensor Networks Kei Isono, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) MSS2020-37 SS2020-22 |
The sensor attack detection problem is one of the important problems in cybersecurity and control theory. An attack to a... [more] |
MSS2020-37 SS2020-22 pp.49-53 |
ICD, HWS [detail] |
2020-10-26 10:30 |
Online |
Online |
Laser-based Attacks on Ultrasonic Sensors Tatsuya Suehiro, Taku Toyama, Junichi Sakamoto, Tsutomu Matsumoto (Yokohama National Univ.) HWS2020-28 ICD2020-17 |
We examine the instrumentation security threat of irradiating laser for a piezoelectric MEMS transducer in a MEMS ultras... [more] |
HWS2020-28 ICD2020-17 pp.18-23 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-21 10:50 |
Online |
Online |
Adversarial scan attack against ICP algorithm for pose estimation on LiDAR-based SLAM Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) ISEC2020-26 SITE2020-23 BioX2020-29 HWS2020-19 ICSS2020-13 EMM2020-23 |
An autonomous robot is controlled on physical information acquired by various sensors. Some physical attacks are propose... [more] |
ISEC2020-26 SITE2020-23 BioX2020-29 HWS2020-19 ICSS2020-13 EMM2020-23 pp.81-86 |
CQ, CS (Joint) |
2020-06-26 15:20 |
Online |
Online |
[Special Invited Talk]
LPWA and Security Techniques for IoT Era Yasuyuki Nogami (Okayama Univ.) CS2020-14 CQ2020-21 |
There are various sensors and small terminals that support many advanced technologies in the IoT era, and while a lot of... [more] |
CS2020-14 CQ2020-21 pp.59-61(CS), pp.103-105(CQ) |
NS, IN (Joint) |
2020-03-06 10:10 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
Anomaly Detection in Smart Home Networks using Situation Estimation in-Home Activities Masahiro Tanaka, Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.), Kensuke Ueda, Yoshiaki Kato (mitsubishi) IN2019-115 |
In this paper, we propose a method to detect the anomalous operation of home IoT devices focusing on the condition.
Our... [more] |
IN2019-115 pp.219-224 |
SS, MSS |
2020-01-14 15:25 |
Hiroshima |
|
Sensor Attack Detection in Control Systems Using Moving Horizon Estimation Kei Isono, Koichi Kobayashi (Hokkaido Univ.), Ryosuke Adachi (Yamaguchi Univ.), Yuh Yamashita (Hokkaido Univ.) MSS2019-46 SS2019-30 |
The sensor attack detection problem in control systems is important in cybersecurity. In this paper, we propose a method... [more] |
MSS2019-46 SS2019-30 pp.31-36 |