Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS, VLD |
2023-03-02 15:45 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Hiding Memory Structure for IP Protection Sun Tanaka, Shinya Takamaeda (UTokyo) VLD2022-96 HWS2022-67 |
This paper proposes a concept and a method of hiding memory structure for IP protection. [more] |
VLD2022-96 HWS2022-67 pp.119-124 |
HWS, VLD |
2023-03-03 13:25 |
Okinawa |
(Primary: On-site, Secondary: Online) |
High-Performance and Programmer-Friendly Secure Non-Volatile Memory using Temporal Memory-Access Redirection Ryo Koike, Shinya Takamaeda (UTokyo) VLD2022-106 HWS2022-77 |
Byte-addressable non-volatile memory (NVM) has two challenges, performance degradation due to high-latency integrity tre... [more] |
VLD2022-106 HWS2022-77 pp.179-184 |
HWS, ICD |
2022-10-25 15:15 |
Shiga |
(Primary: On-site, Secondary: Online) |
A Memory-Saving Software Implementation of Pairing Computation on the GMT8-544 Curve Hiroto Miyata, Junichi Sakamoto, Naoki Yoshida, Riku Anzai, Tsutomu Matsumoto (YNU) HWS2022-39 ICD2022-31 |
There has been a lot of research on increasing the security of IoT, and encryption is one of the methods. Pairing crypto... [more] |
HWS2022-39 ICD2022-31 pp.52-57 |
EE |
2022-01-28 15:10 |
Online |
Online |
Bankruptcy of Elpida Memory, Inc. from the perspective of double-entry bookkeeping Daisuke Arai, Yu Yonezawa, Atsushi Imaoka, Masayoshi Yamamoto (Nagoya Univ.) EE2021-50 |
This paper is a sequel to the one presented at the last EE seminar (held on November 18, 2021). The spread of Covid-19 o... [more] |
EE2021-50 pp.106-111 |
CPSY, DC, IPSJ-ARC [detail] |
2021-07-20 14:00 |
Online |
Online |
Prototype Implementation of Non-Volatile Memory Support for RISC-V Keystone Enclave Lena Yu, Yu Omori, Keiji Kimura (Waseda Univ.) CPSY2021-2 DC2021-2 |
Handling confidential information has become an increasingly important concern among many areas of society. However, cur... [more] |
CPSY2021-2 DC2021-2 pp.7-12 |
HWS, VLD [detail] |
2021-03-04 13:25 |
Online |
Online |
A Low-Latency Memory Encryption Scheme with Tweakable Block Cipher and Its Hardware Design Maya Oda, Rei Ueno, Naofumi Homma (Tohoku Univ.), Akiko Inoue, Kazuhiko Minematsu (NEC) VLD2020-83 HWS2020-58 |
In this paper, we propose a highly efficient memory protection method based on the Tweakable block cipher (TBC). The lat... [more] |
VLD2020-83 HWS2020-58 pp.85-90 |
SDM, ICD, ITE-IST [detail] |
2019-08-07 16:30 |
Hokkaido |
Hokkaido Univ., Graduate School /Faculty of Information Science and |
[Invited Talk]
High-temperature stable Physical Unclonable Functions with error-free readout scheme based on 28nm SGMONOS flash memory for security applications Takahiro Shimoi, Tomoya Saito, Hirokazu Nagase, Masayuki Izuna, Akihiko Kanda, Takashi Ito, Takashi Kono (Renesas Electronics) SDM2019-39 ICD2019-4 |
Highly reliable Physical Unclonable Functions (PUF) based on 28nm Split-Gate MONOS (SG-MONOS) embedded flash memory is d... [more] |
SDM2019-39 ICD2019-4 pp.15-19 |
LOIS |
2018-03-02 15:15 |
Okinawa |
Naha-City IT Souzoukan(Okinawa) |
Confidentiality Assurances of Memory Augmentation System using Biometric Authentication and Secure Chip Asahi Sakuma, Hiroyuki Suzuki (Tokyo Tech), Koji Osugi, Hiroyasu Murayama (NEC), Takashi Obi, Nagaaki Ohyama (Tokyo Tech) LOIS2017-91 |
Memory augmentation system, which is expected to help us to solve communication failures because of memory loss, is not ... [more] |
LOIS2017-91 pp.117-122 |
SDM |
2017-10-26 13:00 |
Miyagi |
Niche, Tohoku Univ. |
[Invited Lecture]
High-temperature stable Physical Unclonable Functions with error-free readout scheme based on 28nm SG-MONOS flash memory for security applications Takahiro Shimoi, Tomoya Saito, Hirokazu Nagase, Masayuki Izuna, Akihiko Kanda, Takashi Ito, Takashi Kono (Renesas Electronics) SDM2017-58 |
Highly reliable Physical Unclonable Functions (PUF) based on 28nm Split-Gate MONOS (SG-MONOS) embedded flash memory is d... [more] |
SDM2017-58 pp.45-49 |
CPSY, IPSJ-ARC |
2016-10-06 10:00 |
Chiba |
Makuhari-messe |
[Technology Exhibit]
Security technologies for non-volatile memory in IoT devices
-- Mechanisms for on-chip MCU and off-chip memory system -- Mikio Hashimoto, Yoshiyuki Amanuma, Kentaro Umesawa, Ryuichi Koike, Jun Kanai, Naoko Yamada (Toshiba) CPSY2016-51 |
Non-volatile memory content modification is serious issues on IoT appliances, since evil effects continue over power cyc... [more] |
CPSY2016-51 pp.37-42 |
RECONF |
2016-05-19 17:30 |
Kanagawa |
FUJITSU LAB. |
[Invited Talk]
Overviews on key technologies to substantialize 'IoT society' Toshihiro Matsui, Hisashi Sekine, Hideki Hayashi, Hiroaki Ohkubo, Hirotaka Sunaguchi, Naoyuki Matsuo, Yoshitatsu Sato (NEDO TSC) RECONF2016-16 |
Regarding non-volatile memories, sensors, embedded software, and cyber security as the key components in the coming IoT ... [more] |
RECONF2016-16 pp.77-82 |
ICSS, IPSJ-SPT |
2014-03-27 13:05 |
Okinawa |
Meio Univiersity |
The countermeasures against extraction of AES keys from memory dumping. Michiyoshi Satoh (TSH) ICSS2013-62 |
The cipher AES extends a 128 bits (or 192 bits, 256 bits) secret key to 1408 bits (or 1664 bits, 1920 bits). Since the e... [more] |
ICSS2013-62 pp.1-6 |
DC, CPSY, IPSJ-SLDM, IPSJ-EMB |
2008-03-27 16:30 |
Kagoshima |
|
Development of Protection Mechanism for Embedded Component System Shimpei Yamada, Yukikazu Nakamoto (UOH), Takuya Azumi, Hiroaki Takada (Nagoya Univ.), Hiroshi Oyama (OKUMA) DC2007-99 CPSY2007-95 |
Recently, embedded systems connected to network have increased; therefore it is needed to strengthen security. In additi... [more] |
DC2007-99 CPSY2007-95 pp.91-96 |
RCS, NS (Joint) |
2006-07-21 14:00 |
Hokkaido |
Hokkaido Univ. |
Optimum Memory Allocation in Identifying Flow Hogs Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara (NTT) NS2006-68 |
Hosts infected by worm generate huge amount of flows during a short time, so it is important to identify these flow hogs... [more] |
NS2006-68 pp.97-100 |
LOIS |
2005-05-13 09:00 |
Kagawa |
Sunport Hall Takamatsu |
Design and implementation of the system for supporting computer virus analysis Sachihiro Ichikawa (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (Kobe Univ.) |
This paper presents a design and implementation of automatic virus analysis support system. Shortening of virus analysis... [more] |
OIS2005-7 pp.1-6 |
LOIS |
2005-05-13 10:40 |
Kagawa |
Sunport Hall Takamatsu |
Proposal for Memorycard Secure FileSystem SAS Jun Kawashima, Nobuo Funabiki, Toru Nakanishi (Okayama Univ.), Junichi Takeuchi, Masayuki Ishizaki, Andre Caldas de Souza (Ba-Z Communication) |
Memorycard has weakness in assuring the safety of stored data when it is stolen or missing. Therefore, a secure filesyst... [more] |
OIS2005-10 pp.19-24 |