Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS, VLD |
2023-03-03 13:25 |
Okinawa |
(Primary: On-site, Secondary: Online) |
High-Performance and Programmer-Friendly Secure Non-Volatile Memory using Temporal Memory-Access Redirection Ryo Koike, Shinya Takamaeda (UTokyo) VLD2022-106 HWS2022-77 |
Byte-addressable non-volatile memory (NVM) has two challenges, performance degradation due to high-latency integrity tre... [more] |
VLD2022-106 HWS2022-77 pp.179-184 |
HWS, VLD |
2023-03-04 10:25 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Fundamental study of distance spoofing attack against dToF lidar with interference mitigation function Midori Tomijima, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2022-116 HWS2022-87 |
In order to avoid interference with the spread of LiDAR, a simple mitigation method that changes the irradiation interva... [more] |
VLD2022-116 HWS2022-87 pp.239-244 |
HWS, VLD |
2023-03-04 13:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Threat of EM Information Leakage from Speakerphones Due to IEMI and Suppression Indexes for EMC Countermeasures Seiya Takano, Yuichi Hayashi (NAIST) VLD2022-120 HWS2022-91 |
Threats of causing forced electromagnetic information leakage by irradiating devices with electromagnetic waves have bee... [more] |
VLD2022-120 HWS2022-91 pp.261-266 |
HWS, VLD |
2023-03-04 13:55 |
Okinawa |
(Primary: On-site, Secondary: Online) |
* Masaru Mashiba, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Nagata Makoto (Kobe Univ.) VLD2022-121 HWS2022-92 |
With the development of IoT, security is becoming increasingly important. Confidential information and other information... [more] |
VLD2022-121 HWS2022-92 pp.267-272 |
IE, ITS, ITE-MMS, ITE-ME, ITE-AIT [detail] |
2023-02-22 10:15 |
Hokkaido |
Hokkaido Univ. |
Generation Method of Targeted Adversarial Examples using Gradient Information for the Target Class of the Image Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2022-61 IE2022-78 |
With the advancement of AI technology, the vulnerability of AI system is pointed out. The adversarial examples (AE), whi... [more] |
ITS2022-61 IE2022-78 pp.107-111 |
NS, NWS (Joint) |
2023-01-26 13:00 |
Yamaguchi |
Hybrid Meeting (Yamaguchi Prefecture) (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
A User Authenticity Verification Method Using Behavioral and Cognitive Biometrics for Zero Trust Access Control Mechanisms Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-153 |
In recent years, remote access to confidential data necessary for work has been rapidly increasing due to the spread of ... [more] |
NS2022-153 pp.19-24 |
MSS, SS |
2023-01-11 10:00 |
Osaka |
(Primary: On-site, Secondary: Online) |
Prohibited Items Detection in X-ray Security Inspection by Using a Deep Learning Method Qingqi Zhang (Yamaguchi Univ.), Ren Wu (Yamaguchi Junior College), Mitsuru Nakata, Qi-Wei Ge (Yamaguchi Univ.) MSS2022-52 SS2022-37 |
Security screening machines using X-ray scanners are usually used to find out whether there are prohibited items in pack... [more] |
MSS2022-52 SS2022-37 pp.42-47 |
CPSY, IPSJ-ARC |
2023-01-11 11:40 |
Online |
Online |
Reliability Enhancement Techniques for On-Device Learning on Wireless Sensor Nodes Kazuki Sunaga (Keio Univ.), Kota Yoshida (Ritsumeikan Univ.), Hiroki Matsutani (Keio Univ.) CPSY2022-33 |
(To be available after the conference date) [more] |
CPSY2022-33 pp.29-34 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2022-11-29 15:05 |
Kumamoto |
(Primary: On-site, Secondary: Online) |
Evaluation of power delivery networks in secure semiconductor systems Masaru Mashiba, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Makoto Nagata (Kobe Univ.) VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56 |
With the development of the IoT, hardware security is becoming increasingly important. Physical attacks on cryptoprocess... [more] |
VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56 pp.82-86 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2022-11-30 15:10 |
Kumamoto |
(Primary: On-site, Secondary: Online) |
FPGA Implementation and Area Evaluation of JTAG Access Mechanism Using Lightweight One-Time Password Authentication Scheme Hisashi Okamoto, Jun Ma, Senling Wang, Hiroshi Kai, Hiroshi Takahashi (Ehime Univ), Akihiro Shimizu (Kochi Univ. of Technology) VLD2022-48 ICD2022-65 DC2022-64 RECONF2022-71 |
When building a cyber-physical system (CPS), it is essential to guarantee the fault tolerance and security of edge devic... [more] |
VLD2022-48 ICD2022-65 DC2022-64 RECONF2022-71 pp.168-173 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 11:10 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Deep Learning Side-Channel Attack in Noise Based Countermeasure Simon Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2022-103 |
The IoT requires the implementation of cryptographic techniques to ensure the confidentiality, integrity, and availabili... [more] |
NS2022-103 pp.19-22 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 11:35 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Design and Trial of Cyber Security Exercise for Basic CISO Skillset Tatsumi Seko, Touri Nakagawa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-104 |
Conventional security officers lack the authority and responsibility to make decisions related to management and are not... [more] |
NS2022-104 pp.23-28 |
NS, ICM, CQ, NV (Joint) |
2022-11-25 16:20 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
[Invited Talk]
Operation and Management of Microservices-based Distributed System using Service Mesh Takaya Ide, Hitoshi Yabusaki (Hitachi) NS2022-127 CQ2022-60 ICM2022-30 |
Distributed systems such as microservice architectures are complex and change rapidly. A network model called a service ... [more] |
NS2022-127 CQ2022-60 ICM2022-30 pp.137-141(NS), pp.58-62(CQ), pp.31-35(ICM) |
EA, EMM, ASJ-H |
2022-11-22 13:00 |
Online |
Online |
[Fellow Memorial Lecture]
Security and Privacy Preservation for Speech Signal
-- Approach from speech information hiding technology -- Masashi Unoki (JAIST) EA2022-60 EMM2022-60 |
Non-authentic but skillfully fabricated artificial replicas of authentic media in the real world are known as “media clo... [more] |
EA2022-60 EMM2022-60 pp.99-104 |
ISEC, SITE, LOIS |
2022-11-18 09:25 |
Online |
Online |
Analysis of EU Cyber Resilience Act
-- from a Perspective of Cyber Supply Chain Security -- Yusuke Tachibana (FIT) ISEC2022-32 SITE2022-36 LOIS2022-16 |
This past September, the European Commission published the Cyber Resilience Act. It will establish security requirements... [more] |
ISEC2022-32 SITE2022-36 LOIS2022-16 pp.16-19 |
ITE-BCT, OCS, IEE-CMN, OFT |
2022-11-10 14:00 |
Miyagi |
Forest-Sendai (Primary: On-site, Secondary: Online) |
Y-00 Quantum Noise Stream Cipher with Quantum Deliberate Signal Randomization and Its Application to Optical Fiber Transmission System Fumio Futami, Ken Tanizawa, Kentaro Kato (Tamagawa Univ.) OCS2022-41 |
Deliberate signal randomization (DSR) driven by quantum random numbers is proposed for enhancing security. PSK Y-00 ciph... [more] |
OCS2022-41 pp.7-12 |
ICSS |
2022-11-08 10:30 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Design and Implementation of a Task Scheduler for Delaying Ransomware Shuhei Enomoto (TUAT), Hiroki Kuzuno (Kobe Univ.), Hiroshi Yamada (TUAT), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2022-46 |
(To be available after the conference date) [more] |
ICSS2022-46 pp.49-54 |
CS |
2022-10-27 11:30 |
Hiroshima |
Hiroshima City University Satellite campus (Primary: On-site, Secondary: Online) |
Implementation of a large-scale evaluation platform in a BACnet/IP environment Kohei Miyazawa, Tetsuya Yokotani, Hiroaki Mukai, Yuki Hatanaka, Satoru Murakami (KIT) CS2022-45 |
In deploying BACnet/IP on large buildings, it is necessary to analyze the impact of unauthorized access on the facilitie... [more] |
CS2022-45 pp.11-14 |
ICTSSL, IN, NWS, IEE-SMF |
2022-10-27 14:55 |
Nagano |
Shinshu University (Primary: On-site, Secondary: Online) |
Data Security Verification in Supply Chain Keizo Sugiyama, Yuto Nakano, Yasuaki Kobayashi, Toru Nakamura, Haruki Ota, Takao Kojima, Yutaka Miyake, Shinsaku Kiyomoto (KDDI Research) ICTSSL2022-19 |
Highly sensitive data such as inspection data, design data, program module are often handled in a supply chain. As speci... [more] |
ICTSSL2022-19 pp.12-17 |
HWS, ICD |
2022-10-25 10:25 |
Shiga |
(Primary: On-site, Secondary: Online) |
A Study on Profiled Side-channel Analysis against AES-CTR Katsumi Ebina, Rei Ueno, Naohumi Homma (Tohoku Univ) HWS2022-31 ICD2022-23 |
This paper describes profiling Side-Channel Analysis for AES counter mode.
AES-CTR is a mode in which an internally sto... [more] |
HWS2022-31 ICD2022-23 pp.6-11 |