Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
VLD, DC, CPSY, RECONF, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC (Joint) [detail] |
2019-11-15 09:40 |
Ehime |
Ehime Prefecture Gender Equality Center |
Modeling attacks against device authentication using CMOS image sensor PUF Hiroshi Yamada, Shunsuke Okura, Mitsuru Shiozaki, Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) ICD2019-34 IE2019-40 |
A CMOS image sensor physically unclonable function (CIS-PUF) for device authentication by the unique responses extracted... [more] |
ICD2019-34 IE2019-40 pp.31-36 |
SC |
2019-06-01 10:30 |
Ibaraki |
National Institute for Materials Science |
An Introduction of Security Case Studies for Service Robots and IoT Devices Jiro Yamazaki, Hidenori Tsuiji, Fumiaki Yamasaki (NOS) SC2019-8 |
In the past years, robots worked in very restricted area such as industrial factory for a certain purposes and
also iso... [more] |
SC2019-8 pp.45-50 |
HWS |
2019-04-12 13:55 |
Miyagi |
Tohoku University |
Construction of a System to Evaluate Instrumentation Security Enhancement Techniques for Ranging Pulse LIDARs Tatsuya Suehiro, Satoru Sakurazawa, Naoki Yoshida, Tsutomu Matsumoto (YNU) HWS2019-2 |
Since the output of instrumentation systems such as sensors in a broad sense can have a significant impact on a system t... [more] |
HWS2019-2 pp.7-12 |
ITS, IE, ITE-MMS, ITE-HI, ITE-ME, ITE-AIT [detail] |
2019-02-20 16:00 |
Hokkaido |
Hokkaido Univ. |
[Invited Talk]
Anomaly Detection for Smart Home Based on User Behavior
-- ICCE2019 Report -- Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.), Kensuke Ueda, Yoshiaki Kato (Mitsubishi Electric) |
The operations of home IoT devices by attackers can cause serious problems.
However, such attacks are difficult to dete... [more] |
|
EMCJ, IEE-EMC, IEE-MAG |
2018-11-22 15:10 |
Overseas |
KAIST |
[Poster Presentation]
Study on Estimation of Sensing Timing Based on Observation of EM Radiation from Ultrasonic Range Finder Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) EMCJ2018-76 |
Recently, Various studies on instrumentation security which aims spoofing on sensor are reported. EM radiation from sens... [more] |
EMCJ2018-76 pp.55-56 |
ASN, SRW (Joint) |
2018-11-05 10:25 |
Tokyo |
Tokyo Denki University, Tokyo Senju Campus |
Study on obstacle avoidance in video surveillance system using a drone Daiki Suzuki, Susumu Matsui (OIT) ASN2018-52 |
The needs of home security systems are increasing against the background of the solitary old people’s increase. As funct... [more] |
ASN2018-52 pp.1-5 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 13:10 |
Hokkaido |
Sapporo Convention Center |
A Study on Amplitude Controlling Using Modulated Wave toward Countermeasure against Spoofing Attack on Ultrasonic Rangefinder Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) ISEC2018-17 SITE2018-9 HWS2018-14 ICSS2018-20 EMM2018-16 |
Various sensors are increasing with spread of applications such as automatic operation. Ultrasonic rangefinders have bec... [more] |
ISEC2018-17 SITE2018-9 HWS2018-14 ICSS2018-20 EMM2018-16 pp.55-59 |
HWS |
2018-04-13 15:25 |
Fukuoka |
|
A Compact Countermeasure against Laser-Fault-Injection Attack Utilizing Bulk-Current Sensor and Instantaneous Supply-Shunt Circuit Kohei Matsuda (Kobe Univ.), Tatsuya Fujii, Shoji Natsu, Takeshi Sugawara, Kazuo Sakiyama (UCE), Yu-ichi Hayashi (NAIST), Makoto Nagata, Noriyuki Miura (Kobe Univ.) HWS2018-8 |
A compact sense-and-reacts countermeasure is proposed against laser fault injection attack on cryptographic processors. ... [more] |
HWS2018-8 pp.41-44 |
HWS |
2018-04-13 15:50 |
Fukuoka |
|
An analog security technique on a physical-cyber boundary Takuji Miki, Kento Mizuta, Noriyuki Miura, Makoto Nagata (Kobe Univ.) HWS2018-9 |
This paper presents an analog measurement security technique for sensor systems. A sensor analog circuit is indispensabl... [more] |
HWS2018-9 pp.45-48 |
IA, IN (Joint) |
2017-12-14 16:45 |
Hiroshima |
Hiroshima City Univ. |
Anomaly Detection for Smart Home IoT based on Users' Behavior Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.), Kensuke Ueda, Yoshiaki Kato (Mitsubishi Electric) IN2017-58 |
Many devices such as air conditioners and refrigerator have become connected to the Internet, and become a target of the... [more] |
IN2017-58 pp.73-78 |
ICSS |
2017-11-20 14:15 |
Oita |
Beppu International Convention Center |
[Invited Talk]
Case Study and Future Perspective on Security Assessment of Connected Car Masaki Kamizono (PwC) ICSS2017-38 |
Various cyber security threats and vulnerabilities are reported in accordance with the remarkable rise of the connected ... [more] |
ICSS2017-38 pp.1-4 |
MSS, CAS, IPSJ-AL [detail] |
2016-11-24 10:00 |
Hyogo |
Kobe Institute of Computing |
Hardware Trojan with Sensor Trigger Takato Iwase, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2016-58 MSS2016-38 |
Recently, in-vehicle system technology has been rapidly developed. However, in-vehicle system is vulnerable because of s... [more] |
CAS2016-58 MSS2016-38 pp.1-6 |
IA |
2016-11-03 14:45 |
Overseas |
Taipei (Taiwan) |
A Design and Implementation of The Raspberry Gate
-- A Small Security Gateway for IoT Generations -- Hiroyuki Ohno (Kanazawa Univ.), Hironobu Suzuki (Senshu Univ.), Yoshiaki Kitaguchi (Kanazawa Univ.) IA2016-30 |
Tens of millions of ultra-small electronic devices, sensors, and actuators are ready to be connected to the internet. We... [more] |
IA2016-30 pp.21-26 |
RECONF |
2016-05-19 17:30 |
Kanagawa |
FUJITSU LAB. |
[Invited Talk]
Overviews on key technologies to substantialize 'IoT society' Toshihiro Matsui, Hisashi Sekine, Hideki Hayashi, Hiroaki Ohkubo, Hirotaka Sunaguchi, Naoyuki Matsuo, Yoshitatsu Sato (NEDO TSC) RECONF2016-16 |
Regarding non-volatile memories, sensors, embedded software, and cyber security as the key components in the coming IoT ... [more] |
RECONF2016-16 pp.77-82 |
ISEC |
2016-05-19 14:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Research Problems in "Instrumentation Security" Tsutomu Matsumoto (YNU) ISEC2016-8 |
“Instrumentation Security” studies the security with respect to data acquisition phase in IoT or CPS. It examines attack... [more] |
ISEC2016-8 p.35 |
ICSS, IPSJ-SPT |
2016-03-04 14:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
An Autonomous DDoS Backscatter Detection System from Darknet Traffic Yuki Ukawa, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-67 |
This paper proposes an autonomous DDoS backscatter detection system from UDP darknet traffic. To identify DDoS backscatt... [more] |
ICSS2015-67 pp.123-128 |
IA |
2016-01-29 16:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. B3 Kenshu-2 room |
Study on Network Architecture for the efficient transport of Encrypted IoT/M2M packets Shu Yamamoto, Akihiro Nakao (U-Tokyo) IA2015-87 |
When the sensor data is collected from the huge number of IOT/M2M sensor devices through the Internet, the traffic conta... [more] |
IA2015-87 pp.49-54 |
MBE, BioX, NC |
2015-10-25 17:10 |
Osaka |
Osaka Electro-Communication University |
A New Biometrics Technique with Flick Operation on Electronic Device Yoshitomo Matsubara, Haruhiko Nishimura (Univ. of Hyogo), Toshiharu Samura (NCT, Akashi College), Hiroyuki Yoshimoto, Ryohei Tanimoto (Step One) BioX2015-39 MBE2015-50 NC2015-34 |
Electronic devices adopting a touch-screen display such as smart phone, tablet and wearable devices have been getting us... [more] |
BioX2015-39 MBE2015-50 NC2015-34 pp.91-96 |
BioX, ITE-ME, ITE-IST |
2015-06-30 10:30 |
Ishikawa |
Kanazawa University, Kakuma Campus |
Performance estimation based on artifact species Tetsushi Ohki, Akira Otsuka (AIST) BioX2015-10 |
Technology evaluation of biometric authentication systems is widely conducted based on public biometric databases especi... [more] |
BioX2015-10 pp.73-78 |
PRMU, BioX |
2015-03-19 14:30 |
Kanagawa |
|
Personal authentication from Walking measured by Kinect in the night Takuya Toyama, Masanobu Yamamoto (Niigata Univ.) BioX2014-49 PRMU2014-169 |
For crimes that often occur at night, we identify a walking person from a skeletal movement of the body captured by Kine... [more] |
BioX2014-49 PRMU2014-169 pp.59-64 |