Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
VLD, HWS, ICD |
2024-03-02 09:45 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Demonstrating a Real Car Covered with Infra-red-cut Films to Hide itself from LiDAR Yuki Fukatsu, Akira Iwahashi, Naoki Yoshida, Tsutomu Matsumoto (YNU) VLD2023-135 HWS2023-95 ICD2023-124 |
In recent years, various technologies have been developed toward the practical application of fully automated driving. A... [more] |
VLD2023-135 HWS2023-95 ICD2023-124 pp.190-195 |
ITS, IE, ITE-MMS, ITE-ME, ITE-AIT [detail] |
2024-02-19 10:45 |
Hokkaido |
Hokkaido Univ. |
Brightness Adjustment based Countermeasure against Adversarial Examples Takumi Tojo, Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2023-47 IE2023-36 |
Recently, image classification using deep learning AI has been used for in-vehicle AI, and its accuracy and response spe... [more] |
ITS2023-47 IE2023-36 pp.7-12 |
SAT, SANE (Joint) |
2024-02-09 13:20 |
Kagoshima |
AmaHome PLAZA (Amami City Shimin Koryu Center) (Primary: On-site, Secondary: Online) |
Secure Firmware Updates for Nano-Satellites: Design Considerations and PoC Implementation Yuta Nakagawa, Keika Mori, Ryoya Furukawa, Hiroshi Kumagai, Masaki Kamizono (DTCY) SANE2023-111 |
With the increase in the number of satellite launches in recent years, cyber attacks on satellites have become a serious... [more] |
SANE2023-111 pp.43-48 |
ED, MWPTHz |
2023-12-21 16:45 |
Miyagi |
RIEC, Tohoku Univ. (Primary: On-site, Secondary: Online) |
Demonstration of a secure wireless communication system based on XOR operation between two data in terahertz waves Takuya Yano, Ming Che, Hanwei Chen, Naoya Seiki, Takashi Shiramizu, Yuya Mikami (Kyushu Univ.), Yuta Ueda (NTT), Kazutoshi Kato (Kyushu Univ.) ED2023-56 MWPTHz2023-66 |
Future wireless communications will require high security as well as high capacity. We have proposed a wireless communic... [more] |
ED2023-56 MWPTHz2023-66 pp.16-19 |
ICM, NS, CQ, NV (Joint) |
2023-11-21 13:15 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
Security Evaluation of Low-latency Cipher based on Improved Simon against Deep Learning Analysis using Profiled Power Consumption Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2023-114 |
Society 5.0 aims to solve problems in social systems through the intercommunication of small devices. On the other hand,... [more] |
NS2023-114 pp.20-25 |
ICM, NS, CQ, NV (Joint) |
2023-11-22 12:30 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
[Invited Talk]
Secure Middlebox Communication over TLS against Middlebox Compromise Toru Hasegawa, Kentaro Kita, Junji Takemasa, Yuki Koizumi (Osaka Univ.) CQ2023-46 |
A large portion of Internet traffic passes through middleboxes that read or modify messages. However, such middleboxes a... [more] |
CQ2023-46 pp.50-53 |
ICM, NS, CQ, NV (Joint) |
2023-11-22 09:50 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
A survey on suitable hook points for outbound packet monitoring using eBPF Masaya Okabe, Hiroshi Tsunoda (Tohtech) ICM2023-27 |
The use of VPNs and similar technologies has made it difficult to define network boundaries, and traditional boundary se... [more] |
ICM2023-27 pp.26-31 |
ICSS |
2023-11-16 13:00 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Implementation of Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities, and A Study on Its Large-scale Demonstration Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2023-51 |
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] |
ICSS2023-51 pp.1-6 |
ICSS |
2023-11-16 15:20 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Attack Verification and Evaluation of Incremental Fault Analysis against AES Encryption Processing Device Miran Tamagawa, Yuichi Futa (TUT), Takehiko Mieno (AVASYS), Hiroyuki Okazaki (Shinshu University) ICSS2023-56 |
In recent years,there has been a growing concern about the impact of fault analysis attack,which use hardware failures a... [more] |
ICSS2023-56 pp.35-41 |
ICSS |
2023-11-17 11:30 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Investigation of Technical Support Scams Targeting Japan Hiroyuki Ito (NICT), Kosuke Kajimoto, Tetsuya Kageyama, Taichi Aoki (JC3), Takahiro Kasama, Daisuke Inoue (NICT) ICSS2023-63 |
(To be available after the conference date) [more] |
ICSS2023-63 pp.85-92 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-16 09:55 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Primary: On-site, Secondary: Online) |
MTJ-PUF with Input Decoder and Evaluation of Machine Learning Resistance Takumi Kikuchi, Kimiyoshi Usami (SIT) VLD2023-44 ICD2023-52 DC2023-51 RECONF2023-47 |
Physically Unclonable Function (PUF), one of the LSI individual authentication techniques, is vulnerable to machine lear... [more] |
VLD2023-44 ICD2023-52 DC2023-51 RECONF2023-47 pp.82-87 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2023-11-16 13:20 |
Kumamoto |
Civic Auditorium Sears Home Yume Hall (Primary: On-site, Secondary: Online) |
Tamper Resistance Evaluation on FPGA for Low-Latency Cipher Sonic Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52 |
Industry 5.0 promotes smart factories for system optimization by utilizing IoT and AI in the industrial field. The smart... [more] |
VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52 pp.101-105 |
LOIS, SITE, ISEC |
2023-11-09 10:50 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
[Invited Talk]
Security Technologies to Improve Content-Distribution and Broadcasting Services Kazuto Ogawa (NICT) ISEC2023-54 SITE2023-48 LOIS2023-12 |
Nowadays, technologies for information security have become essential in the world cyber-space.
PC users know their val... [more] |
ISEC2023-54 SITE2023-48 LOIS2023-12 p.1 |
LOIS, SITE, ISEC |
2023-11-10 10:45 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
NTP Tunneling Threat Model Verification and Countermeasure Shinjisangeru Sugasawa, Hisayoshi Kunimune, Shigeaki Tanimoto (CIT) ISEC2023-64 SITE2023-58 LOIS2023-22 |
Fraudulent covert communication methods are techniques used by attackers to avoid detection of malicious communication b... [more] |
ISEC2023-64 SITE2023-58 LOIS2023-22 pp.66-71 |
MW, EMCJ, EST, IEE-EMC [detail] |
2023-10-19 13:10 |
Yamagata |
Yamagata University (Primary: On-site, Secondary: Online) |
An Application of Genetic Algorithms for XSS Attack Payload Generation and WAF Evaluation Yu Funahashi, Hideaki Kimura (Chubu Univ) EMCJ2023-43 MW2023-97 EST2023-70 |
We propose a method of generating and evolving malicious scripts (payloads) used in cross-site scripting (XSS) attacks b... [more] |
EMCJ2023-43 MW2023-97 EST2023-70 pp.42-45 |
IN, ICTSSL, IEE-SMF |
2023-10-20 14:40 |
Fukuoka |
Fukuoka University |
A Study on Applying Digital Twin-Assisted Security Platform for Cyber-Physical Systems to Supply Chain Keizo Sugiyama (KDDI Research) ICTSSL2023-32 |
The convergence of cyberspace and physical space is becoming more significant towards Beyond 5G. The impact of attacks, ... [more] |
ICTSSL2023-32 pp.42-46 |
BioX |
2023-10-12 14:45 |
Okinawa |
Nobumoto Ohama Memorial Hall |
A Study on Federated Learning System for Highly Accurate Biometric Authentication Yusei Suzuki, Yosuke Kaga (Hitachi) BioX2023-58 |
With the development of machine learning on large-scale datasets, the accuracy of biometric authentication has significa... [more] |
BioX2023-58 pp.2-7 |
IA |
2023-09-22 15:00 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Signing key management in cryptocurrency custodians learned from DNSSEC Yuto Takei (Mercari/Tokyo Tech), Kazuyuki Shudo (Kyoto Univ.) IA2023-30 |
Japanese cryptocurrency exchanges hold over 1 trillion yen worth of cryptocurrency in total as of June 2023. The exchang... [more] |
IA2023-30 pp.115-122 |
CPSY, DC, IPSJ-ARC [detail] |
2023-08-04 13:40 |
Hokkaido |
Hakodate Arena (Primary: On-site, Secondary: Online) |
A Classification of Security Threats and Countermeasure Directions for Cloud-based Railway Signalling Systems Using COTS Components Takashi Toyama, Akihiro Gion (RTRI) |
Research and development of cloud-based railway signaling systems, which remotely control signalling devices or trains f... [more] |
|
CPSY, DC, IPSJ-ARC [detail] |
2023-08-04 18:45 |
Hokkaido |
Hakodate Arena (Primary: On-site, Secondary: Online) |
CPSY2023-26 DC2023-26 |
(To be available after the conference date) [more] |
CPSY2023-26 DC2023-26 pp.106-111 |