Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 15:40 |
Online |
Online |
Security of Systems that Automatically Authenticate a User's Credentials and Location using Wireless Technology Kazuki Tachibana (YNU), Junichi Sakamoto (AIST), Tsutomu Matsumoto (YNU) |
(To be available after the conference date) [more] |
|
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 16:15 |
Online |
Online |
Security Assessment and Countermeasures for Magnetic Malfunction of Electromagnetic Relays Takumi Owada, Kazuki Tachibana, Tsutomu Matsumoto (YNU) |
(To be available after the conference date) [more] |
|
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 16:40 |
Online |
Online |
Distance Spoofing Detection by LiDAR and Stereo Camera Ataru Kubo, Yuki Fukatsu, Naoki Yoshida, Tsutomu Matsumoto (YNU) |
(To be available after the conference date) [more] |
|
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 17:05 |
Online |
Online |
Security Evaluation of Cryptographic Circuits with Laser Sensors by Double-Spot Laser Irradiation Masaki Chikano, Naoki Yoshida, Junichi Sakamoto, Syungo Hayashi, Tsutomu Matsumoto (YNU) |
(To be available after the conference date) [more] |
|
ICSS, IPSJ-SPT |
2022-03-07 12:50 |
Online |
Online |
am I infected? A New Web Service to Inspect End Users' IoT Devices for Malware Infection and Vulnerabilities Songwei He, Takaya Noma, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2021-58 |
IoT devices have become prevalent in recent years, but unfortunately, many devices are infected by malware due to their ... [more] |
ICSS2021-58 pp.1-6 |
ICSS, IPSJ-SPT |
2022-03-07 13:50 |
Online |
Online |
Internet-wide discovery of IoT devices deployed at important facilities Mizuki Hiraku, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ) ICSS2021-61 |
Previous study has revealed that there are a number of IoT devices used at important facilities, such as water treatment... [more] |
ICSS2021-61 pp.14-19 |
VLD, HWS [detail] |
2022-03-08 16:50 |
Online |
Online |
Physical Spoofing Attack on LiDAR-based Object Detection and Its Demonstration Yuki Fukatsu, Ryuuya Ichinose, Shinsei Ueda, Ataru Kubo, Naoki Yoshida, Tsutomu Matsumoto (Yokohama National Univ.) VLD2021-104 HWS2021-81 |
A variety of technologies are being developed for the practical application of fully autonomous driving. Automated drivi... [more] |
VLD2021-104 HWS2021-81 pp.158-163 |
ICSS, IPSJ-SPT |
2022-03-08 13:20 |
Online |
Online |
Analyzing network status of IoT malware by dynamic analysis with bare-metal device Kota Ogawa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2021-74 |
In this study, we first investigate the network state changes caused by IoT malware infection by executing malware sampl... [more] |
ICSS2021-74 pp.93-98 |
ICSS, IPSJ-SPT |
2022-03-08 13:40 |
Online |
Online |
ML-based detection of C&C communications for sandbox analysis of IoT malware Yuki Endo, Kaichi Sameshima, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2021-75 |
In order to analyze the behavior of malware, dynamic analysis has been widely utilized. Among various communication of m... [more] |
ICSS2021-75 pp.99-104 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 13:55 |
Online |
Online |
Memory-saving implementation of BLS12-381 Pairing-based cryptography Riku Anzai, Junichi Sakamoto, Zihao Song, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2021-11 SITE2021-5 BioX2021-12 HWS2021-11 ICSS2021-16 EMM2021-16 |
For smart security management of IoT systems, it is expected to utilize advanced cryptography such as identity-based enc... [more] |
ISEC2021-11 SITE2021-5 BioX2021-12 HWS2021-11 ICSS2021-16 EMM2021-16 pp.8-13 |
IA, ICSS |
2021-06-22 09:25 |
Online |
Online |
Analtsis of cost-effectiveness in malicious site detection using VirusTotal Kyohei Takao (YNU), Hiroshi Mori (Deloitte Tohmatsu Cyber LLC), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) IA2021-10 ICSS2021-10 |
VirusTotal receives to-be-tested files and URLs and provides scan results by more than 70 security software.
Its incre... [more] |
IA2021-10 ICSS2021-10 pp.50-55 |
HWS |
2021-04-12 10:50 |
Tokyo |
Tokyo University/Online (Primary: On-site, Secondary: Online) |
Performance Evaluation of an FPGA-Based Pairing Computation Accelerator Junichi Sakamoto, Naoki Yoshida, Tsutomu Matsumoto (YNU) HWS2021-3 |
Several hardware-based accelerators have been proposed to speed up or reduce the power consumption of computationally ex... [more] |
HWS2021-3 pp.13-18 |
HWS |
2021-04-12 11:15 |
Tokyo |
Tokyo University/Online (Primary: On-site, Secondary: Online) |
An Implementation of a Pairing on Cocks-Pinch Curve with Embedding Degree 6 Zihao Song, Junichi Sakamoto, Tsutomu Matsumoto (YNU) HWS2021-4 |
In recent years, with the proliferation of IoT devices and computer performance improvement, there are increasing expect... [more] |
HWS2021-4 pp.19-24 |
ICSS, IPSJ-SPT |
2021-03-01 14:30 |
Online |
Online |
Analyzing the Transition of Vulnerabilities Targeted by IoT Malware Kaichi Sameshima, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-40 |
While the popularity of IoT devices are rapidly growing, vulnerable IoT devices have been the target of cyber-attacks. I... [more] |
ICSS2020-40 pp.84-89 |
ICSS, IPSJ-SPT |
2021-03-01 14:55 |
Online |
Online |
Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41 |
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] |
ICSS2020-41 pp.90-95 |
ICSS, IPSJ-SPT |
2021-03-02 11:05 |
Online |
Online |
Study on analyzing Memcached DRDoS attacks and their infrastructures Mizuki Kondo, Natsuo Shintani (YNU), Daisuke Makita (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-45 |
Internet-facing Memcached services are known to have been misused as powerful reflectors of DRDoS attacks. In this paper... [more] |
ICSS2020-45 pp.114-119 |
ICSS, IPSJ-SPT |
2021-03-02 09:35 |
Online |
Online |
An Efficient Discovery of Malicious URL Using VirusTotal and Web Access Log Chika Hiraishi, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-55 |
The threats of malicious websites are increasing that, urgent countermeasures are needed. Using a block list of known ma... [more] |
ICSS2020-55 pp.172-177 |
ICSS, IPSJ-SPT |
2021-03-02 10:25 |
Online |
Online |
Proof of concept of sandbox evasion attack using email address stored in target machine Yuta Inoue, Rui Tanabe (YNU), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-57 |
In recent years, malware sandbox appliances that dynamically analyze target files are becoming popular. However, malware... [more] |
ICSS2020-57 pp.184-189 |
ICD, HWS [detail] |
2020-10-26 09:25 |
Online |
Online |
Power Analysis Attack Using Pipeline Scheduling on Pairing Hardware Mitsufumi Yamazaki, Junichi Sakamoto, Tsutomu Matsumoto (YNU) HWS2020-26 ICD2020-15 |
To reduce the latency of pairing calculation for advanced cryptography, hardware implementations with pipelined modular ... [more] |
HWS2020-26 ICD2020-15 pp.7-12 |
ICD, HWS [detail] |
2020-10-26 10:30 |
Online |
Online |
Laser-based Attacks on Ultrasonic Sensors Tatsuya Suehiro, Taku Toyama, Junichi Sakamoto, Tsutomu Matsumoto (Yokohama National Univ.) HWS2020-28 ICD2020-17 |
We examine the instrumentation security threat of irradiating laser for a piezoelectric MEMS transducer in a MEMS ultras... [more] |
HWS2020-28 ICD2020-17 pp.18-23 |