Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS |
2023-10-04 18:45 |
Hokkaido |
Hokkaidou University + Online (Primary: On-site, Secondary: Online) |
Proposal of location data protection mechanism by TEE considering privacy zone setting Tomoya Suzuki, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2023-83 |
In recent years, there has been an increasing trend in sharing and utilizing individuals’ mobility trajectories. Among t... [more] |
NS2023-83 pp.65-70 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 16:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
A Multiple Vantage Point-based Concept for Open-Source Information Space Awareness Blumbergs Bernhards (NAIST) ISEC2023-34 SITE2023-28 BioX2023-37 HWS2023-34 ICSS2023-31 EMM2023-34 |
The proposed concept bolsters visibility and provides context to cyber incident response teams countering malicious acti... [more] |
ISEC2023-34 SITE2023-28 BioX2023-37 HWS2023-34 ICSS2023-31 EMM2023-34 pp.133-140 |
MSS, CAS, SIP, VLD |
2023-07-06 13:00 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
[Panel Discussion]
Democratization of Researches in Circuits and Systems fields and Initiatives in Technical Groups Makoto Ikeda (The Univ. of Tokyo), Yasutoshi Aibara (OVT), Shigetoshi Nakatake (The Univ. of Kitakyushu), Takayuki Nakachi (Univ. of Ryukyus), Shingo Yamaguchi (Yamaguchi Univ.) CAS2023-7 VLD2023-7 SIP2023-23 MSS2023-7 |
Open Access initiatives, which allow access and use of research results funded by public research funds not only by the ... [more] |
CAS2023-7 VLD2023-7 SIP2023-23 MSS2023-7 pp.34-36 |
EMCJ, IEE-EMC, IEE-SPC |
2023-05-12 13:15 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Evaluating Transmission Efficiency Impact on Screen Reconstruction Accuracy for High-Resolution Displays Taiki Kitazawa, Yuichi Hayashi (NAIST) EMCJ2023-6 |
In TEMPEST attacks targeting high-resolution displays with divided screens, reconstructing screen information proves dif... [more] |
EMCJ2023-6 pp.1-6 |
EMCJ |
2023-01-27 13:30 |
Okayama |
WASHU BLUE RESORT (Primary: On-site, Secondary: Online) |
Fundamental Study on Reconstruction of Sound Information from EM Leakage Focusing on Multiple Demodulation Methods Taiki Kitazawa, Seiya Takano, Yuichi Hayashi (NAIST) EMCJ2022-83 |
It has been reported that speakerphones used in remote work environments leak audio information through electromagnetic ... [more] |
EMCJ2022-83 pp.60-65 |
EMCJ, MW, EST, IEE-EMC [detail] |
2022-10-13 09:55 |
Akita |
Akita University (Primary: On-site, Secondary: Online) |
Fundamental Study on Leakage Source Model for Electromagnetic Information Leakage from Video Display Units Taiki Kitazawa (NAIST), Hiroyuki Kubo (Chiba Univ.), Yuichi Hayashi (NAIST) EMCJ2022-37 MW2022-83 EST2022-47 |
In the case of applying zoning countermeasures against the threat of information leakage using electromagnetic (EM) wave... [more] |
EMCJ2022-37 MW2022-83 EST2022-47 pp.11-15 |
EMCJ, MW, EST, IEE-EMC [detail] |
2022-10-14 09:50 |
Akita |
Akita University (Primary: On-site, Secondary: Online) |
Development of an Evaluation System for Modeling of Information Leakage Induced by Low-Power IEMI Seiya Takano, Shugo Kaji (NAIST), Masahiro Kinugawa (Univ. of Fukuchiyama), Daisuke Fujimoto, Yuichi Hayashi (NAIST) EMCJ2022-53 MW2022-99 EST2022-63 |
The threats of electromagnetic (EM) information leakage induced by low-power intentional EM interference have been repor... [more] |
EMCJ2022-53 MW2022-99 EST2022-63 pp.93-96 |
HWS |
2022-04-26 13:55 |
Tokyo |
AIST Tokyo Waterfront (Annex) (Primary: On-site, Secondary: Online) |
Evaluation of Electromagnetic Information Leakage Intensity from Displays under Different Usage Environment Yoshiki Kitamura, Taiki Kitazawa, Daisuke Fujimoto, Yuichi Hayahi (NAIST) HWS2022-5 |
The threat of TEMPEST attack which reconstructs the screen information from the electromagnetic leakage caused by operat... [more] |
HWS2022-5 pp.24-27 |
VLD, HWS [detail] |
2022-03-08 15:45 |
Online |
Online |
Evaluation Method for EM Information Leakage from Speakerphone Using Voice Frequency Spectrum Analysis Hiroyuki Ueda, Seiya Takano, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2021-102 HWS2021-79 |
The usage environment for speakerphones becomes more diverse with remote work. As a result, the surrounding environment ... [more] |
VLD2021-102 HWS2021-79 pp.147-152 |
VLD, HWS [detail] |
2022-03-08 16:10 |
Online |
Online |
Fundamental Evaluation Method for EM Information Leakage Caused by Hardware Trojans on Signal Cables
-- Impact of Modulation Factor and Emission Intensity -- Taiga Yukawa, Shugo Kaji, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2021-103 HWS2021-80 |
The threats of electromagnetic (EM) information leakage caused by hardware Trojans (HTs) implemented on signal cables ha... [more] |
VLD2021-103 HWS2021-80 pp.153-157 |
WBS, IT, ISEC |
2021-03-04 15:45 |
Online |
Online |
Upper and Lower Bounds on the Capacity of Private Information Retrieval Allowing Information Leakage from Queries with Different Limits for Each Database Naoto Toyoda, Tetsunao Matsuta, Uyematsu Tomohiko (Tokyo Tech) IT2020-133 ISEC2020-63 WBS2020-52 |
In this paper, we consider the private information retrieval using multiple databases with multiple messages in the case... [more] |
IT2020-133 ISEC2020-63 WBS2020-52 pp.128-133 |
HWS, VLD [detail] |
2021-03-04 17:15 |
Online |
Online |
Fundamental Study on Evaluation of EM Information Leakage from Smart Speakers with Different Installation Environments and Its Countermeasures Shogo Fukushima, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2020-91 HWS2020-66 |
Conventional studies on EM information leakage have mainly focused on only individual information devices. On the other ... [more] |
VLD2020-91 HWS2020-66 pp.130-135 |
ICSS, IPSJ-SPT |
2021-03-01 11:55 |
Online |
Online |
Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-32 |
Recent sophisticated targeted attacks make it difficult for us to protect our corporate resources perfectly. Therefore, ... [more] |
ICSS2020-32 pp.37-42 |
ICSS |
2020-11-26 15:25 |
Online |
Online |
Initial Study of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-23 |
Recently, cyber attacks become more sophisticated and cause serious damage.
Especially in targeted attacks, it is diffi... [more] |
ICSS2020-23 pp.21-25 |
ICD, HWS [detail] |
2020-10-26 09:50 |
Online |
Online |
Fundamental Evaluation Method of EM Information Leakage Caused by Intentional Electromagnetic Interference
-- Impact of Impedance Change in Digital Output Circuits -- Shugo Kaji, Daisuke Fujimoto (NAIST), Masahiro Kinugawa (Univ. of Fukuchiyama), Yuichi Hayashi (NAIST) HWS2020-27 ICD2020-16 |
New threats have been shown to cause information leakage by irradiating electromagnetic (EM) waves of specific intensity... [more] |
HWS2020-27 ICD2020-16 pp.13-17 |
EMCJ |
2020-07-02 15:20 |
Online |
Online |
Fundamental Evaluation of EM Information Leakage Caused by Intentional Electromagnetic Interference Shugo Kaji, Daisuke Fujimoto, Yuichi Hayashi (NAIST) EMCJ2020-15 |
The threat of electromagnetic (EM) information leakage has been focused on the acquisition of information inside the dev... [more] |
EMCJ2020-15 pp.25-28 |
KBSE |
2020-03-06 15:30 |
Okinawa |
Tenbusu-Naha (Cancelled but technical report was issued) |
Fusion of information security games and introduction education to improve incident literacy Tsukasa Hirose, Tatsuo Fujii, Takako Nakatani (OUJ) KBSE2019-50 |
Recently, information security education has been emphasized due to the increase of personal information leakage cases. ... [more] |
KBSE2019-50 pp.25-30 |
SS, MSS |
2020-01-14 16:55 |
Hiroshima |
|
Dynamic Leakage Analysis Based on Model Counting and Its Evaluation Daichi Fukuda, Hiroyuki Seki (Nagoya Univ.) MSS2019-49 SS2019-33 |
We propose a method of analyzing dynamic information leakage of a given program that has a secret input, a public output... [more] |
MSS2019-49 SS2019-33 pp.49-54 |
SR |
2019-12-05 13:50 |
Okinawa |
Ishigaki City Hall (Ishigaki Island) |
[Poster Presentation]
Performance Evaluation of Secure Wireless Communications for PLNC with Untrusted Relay by Double-objective Optimization Problem Go Ikeuchi, Osamu Takyu (Shinshu Univ), Takeo Fujii (UEC), Tomoaki Ohtsuki (Keio Univ), Fumihito Sasamori, Shiro Handa (Shinshu Univ) SR2019-88 |
In this study, we have focused on wireless communication networks which can easily construct a network by using the rela... [more] |
SR2019-88 pp.15-22 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 09:55 |
Kochi |
Kochi University of Technology |
Fundamental Study on an Estimation Method of Irradiate Frequencies to Forcibly Cause Electromagnetic Information Leakage Shugo Kaji (NAIST), Masahiro Kinugawa (NIT), Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) ISEC2019-40 SITE2019-34 BioX2019-32 HWS2019-35 ICSS2019-38 EMM2019-43 |
The threats of electromagnetic (EM) information leakage from the input/output (I/O) signal of an IC mounted on a de-vice... [more] |
ISEC2019-40 SITE2019-34 BioX2019-32 HWS2019-35 ICSS2019-38 EMM2019-43 pp.235-238 |