IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 35  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
HWS 2024-04-19
16:25
Tokyo
(Primary: On-site, Secondary: Online)
Non-Destructive Hardware Trojan Inspection by Backside Near Infrared Imaging
Junichi Sakamoto, Yohei Hori, Shinichi Kawamura (AIST), Yuichi Hayashi (NAIST), Makoto Nagata (KU) HWS2024-5
Hardware Trojan detection is a critical topic for maintaining the security of IC supply chain. Previous studies have rep... [more] HWS2024-5
pp.18-23
HWS 2024-04-19
17:15
Tokyo
(Primary: On-site, Secondary: Online)
Supply chain security of semiconductor chips and countermeasure design technologies
Makoto Nagata (Kobe Univ.), Kazuki Monta (Secafy Co., Ltd.), Yuichi Hayashi (NAIST), Naofumi Homma (Tohoku Univ.) HWS2024-7
This report is dedicated to the threats and countermeasures of semiconductor supply chain security, regarding the authen... [more] HWS2024-7
pp.30-33
HWS 2023-04-14
13:20
Oita
(Primary: On-site, Secondary: Online)
Exploration of hardware Trojan detection through power supply current simulation
Takafumi Oki, Kazuki Monta, Takuji Miki, Makoto Nagata (Kobe Univ.) HWS2023-1
The recent development of information and communication technology has increased the demand for integrated circuit (IC) ... [more] HWS2023-1
pp.1-5
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2022-11-30
17:05
Kumamoto  
(Primary: On-site, Secondary: Online)
Error detection and countermeasures caused by hardware trojan inserted computers
Takuro Kasai, Masashi Imai (Hirosaki Univ.) VLD2022-55 ICD2022-72 DC2022-71 RECONF2022-78
In recent years, the threat of hardware Trojans has become a serious problem. However, due to the nature of hardware Tro... [more] VLD2022-55 ICD2022-72 DC2022-71 RECONF2022-78
pp.206-211
HWS, ICD 2022-10-25
11:50
Shiga
(Primary: On-site, Secondary: Online)
Optical Microscopic Observation of Semiconductor Devices toward Hardware Trojan Detection
Hirofumi Sakane, Junichi Sakamoto, Shinichi Kawamura (AIST), Makoto Nagata (Kobe Univ.), Yuichi Hayashi (NAIST) HWS2022-34 ICD2022-26
In this paper we focus on detection of hardware Trojan (HT) in semiconductor devices under a scenario with following ste... [more] HWS2022-34 ICD2022-26
pp.23-28
VLD, HWS [detail] 2022-03-08
16:10
Online Online Fundamental Evaluation Method for EM Information Leakage Caused by Hardware Trojans on Signal Cables -- Impact of Modulation Factor and Emission Intensity --
Taiga Yukawa, Shugo Kaji, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2021-103 HWS2021-80
The threats of electromagnetic (EM) information leakage caused by hardware Trojans (HTs) implemented on signal cables ha... [more] VLD2021-103 HWS2021-80
pp.153-157
CAS, CS 2022-03-04
13:45
Online Online Evaluation of Trojan Detector for AI Hardware
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-94 CS2021-96
In recent years, AI edge computing has been expanding to realize real-time inference by implementing AI models on edge d... [more] CAS2021-94 CS2021-96
pp.106-111
HWS, ICD [detail] 2021-10-19
14:20
Online Online Fundamental Study on Hardware Trojan Detection on Cable Using On-chip Sensor
Yo Nishitoba, Shugo Kaji (NAIST), Masahiro Kinugawa (Fukuchiyama Univ.), Daisuke Fujimoto, Yuichi Hayshi (NAIST) HWS2021-48 ICD2021-22
There have been reports of threats that cause information leakage by inserting Hardware Trojans (HT) into the connection... [more] HWS2021-48 ICD2021-22
pp.38-42
DC 2021-02-05
10:55
Online Online Hardware Trojan Detection by Learning Power Side Channel Signals Considering Random Process Variation
Michiko Inoue, Riaz-Ul-Haque Mian (NAIST) DC2020-70
Due to the globalization and complexity of the supply chain, there is a growing concern about the insertion of hardware ... [more] DC2020-70
pp.7-11
VLD, DC, RECONF, ICD, IPSJ-SLDM
(Joint) [detail]
2020-11-18
14:25
Online Online On-chip power supply noise monitoring for evaluation of multi-chip board power delivery networks
Daichi Nakagawa, Kazuki Yasuda, Masaru Mashiba, Kazuki Monta, Takaaki Okidono, Takuji Miki, Makoto Nagata (Kobe Univ) VLD2020-31 ICD2020-51 DC2020-51 RECONF2020-50
In these days, information and communication technology has been evolving more and more, and hardware security has been ... [more] VLD2020-31 ICD2020-51 DC2020-51 RECONF2020-50
pp.115-117
ICD, HWS [detail] 2020-10-26
14:55
Online Online Physical-Level Detection Approach against Hardware Trojans inside Semiconductor Chips (II)
Hirofumi Sakane, Shinichi Kawamura, Kentaro Imafuku, Yohei Hori, Makoto Nagata, Yuichi Hayashi, Tsutomu Matsumoto (AIST) HWS2020-35 ICD2020-24
Hardware Trojans, known to be designed and crafted with malicious intent and deployed to be part of the hardware of the ... [more] HWS2020-35 ICD2020-24
pp.59-64
ICD, HWS [detail] 2020-10-26
15:20
Online Online Hardware Trojan using LUT Structure of AI Inference Devices
Yusuke Nozaki, Shu Takemoto, Yoshiya Ikezaki, Masaya Yoshikawa (Meijo Univ.) HWS2020-36 ICD2020-25
The artificial intelligence (AI) technology has been attracted attention in several fields. On the other hand, security ... [more] HWS2020-36 ICD2020-25
pp.65-70
ICD, HWS [detail] 2020-10-26
15:45
Online Online Low-Latency Countermeasure Circuit Oriented Hardware Trojan and its Evaluation
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) HWS2020-37 ICD2020-26
Outsourcing and the use of IP are the mainstream in the design and manufacturing of system LSIs. On the other hand, the ... [more] HWS2020-37 ICD2020-26
pp.71-76
ICD, HWS [detail] 2020-10-26
17:40
Online Online Investigation of High-Efficiency Simulation Method for Detection of Physical Design Falsification in Secure IC Chip
Kazuki Yasuda, Kazuki Monta, Daichi Nakagawa, Makoto Nagata (Kobe Univ.) HWS2020-41 ICD2020-30
With the development of the IoT society in recent years, various security measures have been developed for integrated ci... [more] HWS2020-41 ICD2020-30
pp.94-98
VLD, DC, CPSY, RECONF, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2019-11-14
16:35
Ehime Ehime Prefecture Gender Equality Center Test Generation for Hardware Trojan Detection Using the Delay Difference of a Pair of Independent Paths
Suguru Rikino, Yushiro Hiramoto, Satoshi Ohtake (Oita Univ.) VLD2019-46 DC2019-70
Hardware Trojan detection is important to ensure security of LSIs.
If a hardware Trojan is inserted in a signal line o... [more]
VLD2019-46 DC2019-70
pp.151-155
HWS, ICD [detail] 2019-11-01
16:00
Osaka DNP Namba SS Bld. A Study of Hardware Trojan Detection Method using Deep Learning in Asynchronous Circuits
Hikaru Inafune, Masashi Imai (Hirosaki Univ.) HWS2019-63 ICD2019-24
There are typically two timing methods in VLSI designs known as
synchronous circuits which use a global clock and async... [more]
HWS2019-63 ICD2019-24
pp.35-40
HWS, ICD [detail] 2019-11-01
16:50
Osaka DNP Namba SS Bld. Physical-level detection approach against hardware Trojans inside semiconductor chips (I)
Shinichi Kawamura, Kentaro Imafuku, Hirofumi Sakane, Yohei Hori (AIST), Makoto Nagata (AIST/Kobe Univ.), Yuichi Hayashi (AIST/NAIST), Tsutomu Matsumoto (AIST/YNU) HWS2019-65 ICD2019-26
It is of great concern that malicious hardware should be inserted inside semiconductor chips and on printed circuit boar... [more] HWS2019-65 ICD2019-26
pp.47-52
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
13:10
Kochi Kochi University of Technology A Formal Approach to Verifying Trojan-freeness of Cryptographic Circuits Based on Galois-Field Arithmetic
Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2019-26 SITE2019-20 BioX2019-18 HWS2019-21 ICSS2019-24 EMM2019-29
This paper proposes a formal method for verifying whether Hardware Trojan (HT) exists or not (i.e., HT-freeness) in cryp... [more] ISEC2019-26 SITE2019-20 BioX2019-18 HWS2019-21 ICSS2019-24 EMM2019-29
pp.133-138
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
09:55
Kochi Kochi University of Technology Fundamental Study on an Estimation Method of Irradiate Frequencies to Forcibly Cause Electromagnetic Information Leakage
Shugo Kaji (NAIST), Masahiro Kinugawa (NIT), Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) ISEC2019-40 SITE2019-34 BioX2019-32 HWS2019-35 ICSS2019-38 EMM2019-43
The threats of electromagnetic (EM) information leakage from the input/output (I/O) signal of an IC mounted on a de-vice... [more] ISEC2019-40 SITE2019-34 BioX2019-32 HWS2019-35 ICSS2019-38 EMM2019-43
pp.235-238
EMCJ 2018-07-27
14:55
Tokyo Kikai-Shinko-Kaikan Bldg. Fundamental Study on Data Injection Attacks Using a Hardware Trojan against ICT Devices
Shugo Kaji (NAIST), Masahiro Kinugawa (NIT), Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) EMCJ2018-30
Intentional electromagnetic interference (IEMI) is a threat to destroy integrated circuits (ICs) or elements by using hi... [more] EMCJ2018-30
pp.49-54
 Results 1 - 20 of 35  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan