Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS |
2023-04-14 13:20 |
Oita |
(Primary: On-site, Secondary: Online) |
Exploration of hardware Trojan detection through power supply current simulation Takafumi Oki, Kazuki Monta, Takuji Miki, Makoto Nagata (Kobe Univ.) HWS2023-1 |
The recent development of information and communication technology has increased the demand for integrated circuit (IC) ... [more] |
HWS2023-1 pp.1-5 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2022-11-30 17:05 |
Kumamoto |
(Primary: On-site, Secondary: Online) |
Error detection and countermeasures caused by hardware trojan inserted computers Takuro Kasai, Masashi Imai (Hirosaki Univ.) VLD2022-55 ICD2022-72 DC2022-71 RECONF2022-78 |
In recent years, the threat of hardware Trojans has become a serious problem. However, due to the nature of hardware Tro... [more] |
VLD2022-55 ICD2022-72 DC2022-71 RECONF2022-78 pp.206-211 |
VLD, HWS [detail] |
2022-03-08 16:10 |
Online |
Online |
Fundamental Evaluation Method for EM Information Leakage Caused by Hardware Trojans on Signal Cables
-- Impact of Modulation Factor and Emission Intensity -- Taiga Yukawa, Shugo Kaji, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2021-103 HWS2021-80 |
The threats of electromagnetic (EM) information leakage caused by hardware Trojans (HTs) implemented on signal cables ha... [more] |
VLD2021-103 HWS2021-80 pp.153-157 |
CAS, CS |
2022-03-04 13:45 |
Online |
Online |
Evaluation of Trojan Detector for AI Hardware Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-94 CS2021-96 |
In recent years, AI edge computing has been expanding to realize real-time inference by implementing AI models on edge d... [more] |
CAS2021-94 CS2021-96 pp.106-111 |
VLD, DC, RECONF, ICD, IPSJ-SLDM (Joint) [detail] |
2020-11-18 14:25 |
Online |
Online |
On-chip power supply noise monitoring for evaluation of multi-chip board power delivery networks Daichi Nakagawa, Kazuki Yasuda, Masaru Mashiba, Kazuki Monta, Takaaki Okidono, Takuji Miki, Makoto Nagata (Kobe Univ) VLD2020-31 ICD2020-51 DC2020-51 RECONF2020-50 |
In these days, information and communication technology has been evolving more and more, and hardware security has been ... [more] |
VLD2020-31 ICD2020-51 DC2020-51 RECONF2020-50 pp.115-117 |
HWS, ICD [detail] |
2019-11-01 16:00 |
Osaka |
DNP Namba SS Bld. |
A Study of Hardware Trojan Detection Method using Deep Learning in Asynchronous Circuits Hikaru Inafune, Masashi Imai (Hirosaki Univ.) HWS2019-63 ICD2019-24 |
There are typically two timing methods in VLSI designs known as
synchronous circuits which use a global clock and async... [more] |
HWS2019-63 ICD2019-24 pp.35-40 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 13:10 |
Kochi |
Kochi University of Technology |
A Formal Approach to Verifying Trojan-freeness of Cryptographic Circuits Based on Galois-Field Arithmetic Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2019-26 SITE2019-20 BioX2019-18 HWS2019-21 ICSS2019-24 EMM2019-29 |
This paper proposes a formal method for verifying whether Hardware Trojan (HT) exists or not (i.e., HT-freeness) in cryp... [more] |
ISEC2019-26 SITE2019-20 BioX2019-18 HWS2019-21 ICSS2019-24 EMM2019-29 pp.133-138 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 09:55 |
Kochi |
Kochi University of Technology |
Fundamental Study on an Estimation Method of Irradiate Frequencies to Forcibly Cause Electromagnetic Information Leakage Shugo Kaji (NAIST), Masahiro Kinugawa (NIT), Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) ISEC2019-40 SITE2019-34 BioX2019-32 HWS2019-35 ICSS2019-38 EMM2019-43 |
The threats of electromagnetic (EM) information leakage from the input/output (I/O) signal of an IC mounted on a de-vice... [more] |
ISEC2019-40 SITE2019-34 BioX2019-32 HWS2019-35 ICSS2019-38 EMM2019-43 pp.235-238 |
EMCJ |
2018-07-27 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Fundamental Study on Data Injection Attacks Using a Hardware Trojan against ICT Devices Shugo Kaji (NAIST), Masahiro Kinugawa (NIT), Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) EMCJ2018-30 |
Intentional electromagnetic interference (IEMI) is a threat to destroy integrated circuits (ICs) or elements by using hi... [more] |
EMCJ2018-30 pp.49-54 |
MSS, CAS, IPSJ-AL [detail] |
2016-11-24 10:00 |
Hyogo |
Kobe Institute of Computing |
Hardware Trojan with Sensor Trigger Takato Iwase, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2016-58 MSS2016-38 |
Recently, in-vehicle system technology has been rapidly developed. However, in-vehicle system is vulnerable because of s... [more] |
CAS2016-58 MSS2016-38 pp.1-6 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2015-12-03 09:45 |
Nagasaki |
Nagasaki Kinro Fukushi Kaikan |
Hardware Trojan Identification based on Netlist Features using SVM Kento Hasegawa, Oya Masaru, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2015-58 DC2015-54 |
Recently, third-party IC vendors are very often used due to
globalization and cost-reduction in the IC market but malic... [more] |
VLD2015-58 DC2015-54 pp.135-140 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2015-12-03 10:10 |
Nagasaki |
Nagasaki Kinro Fukushi Kaikan |
A Quantitative Criterion of Gate-Level Netlist Vulnerability Masaru Oya, Youhua Shi (Waseda Univ.), Noritaka Yamashita, Toshihiko Okamura, Yukiyasu Tsunoo (NEC), Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2015-59 DC2015-55 |
Recently, digital ICs are designed by outside vendors to reduce costs in semiconductor industry.
This circumstance intr... [more] |
VLD2015-59 DC2015-55 pp.141-146 |
VLD |
2015-03-04 13:25 |
Okinawa |
Okinawa Seinen Kaikan |
A Score-Based Hardware-Trojan Identification Method for Gate-Level Netlists Masaru Oya, Youhua Shi, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2014-182 |
Recently, digital ICs are designed by outside vendors to reduce costs
in semiconductor industry. This circumstance intr... [more] |
VLD2014-182 pp.165-170 |
RECONF, CPSY, VLD, IPSJ-SLDM [detail] |
2015-01-30 10:50 |
Kanagawa |
Hiyoshi Campus, Keio University |
A Hardware Trojan Detection Method based on Trojan net features Masaru Oya, Youhua Shi, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2014-137 CPSY2014-146 RECONF2014-70 |
Recently, digital ICs are designed by outside vendors to reduce costs
in semiconductor industry. This circumstance intr... [more] |
VLD2014-137 CPSY2014-146 RECONF2014-70 pp.157-162 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2014-11-26 17:30 |
Oita |
B-ConPlaza |
A Hardware Trojans Detection Method focusing on Nets in Hardware Trojans in Gate-Level Netlists Masaru Oya, Youhua Shi, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2014-91 DC2014-45 |
Recently, digital ICs are designed by outside vendors to reduce design costs in semiconductor industry.
This circumstan... [more] |
VLD2014-91 DC2014-45 pp.135-140 |
CAS, SIP, MSS, VLD, SIS [detail] |
2014-07-11 14:50 |
Hokkaido |
Hokkaido University |
Study of subversive operations by Trojan virus in vehicle system Kohei Nohara, Masaya Yoshikawa (Meijo Univ.) CAS2014-43 VLD2014-52 SIP2014-64 MSS2014-43 SIS2014-43 |
The number of ECUs mounted onto an automobile has increased, because various control systems in automobiles have been co... [more] |
CAS2014-43 VLD2014-52 SIP2014-64 MSS2014-43 SIS2014-43 pp.231-236 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2013-11-28 17:00 |
Kagoshima |
|
[Keynote Address]
The age of Space Discovery Opened by World's First Solar Sail "IKAROS" Osamu Mori (JAXA) VLD2013-86 CPM2013-121 ICD2013-98 CPSY2013-62 DC2013-52 RECONF2013-45 |
A solar power sail is a Japanese original concept that gets electricity from thin film solar cells on the solar sail in ... [more] |
VLD2013-86 CPM2013-121 ICD2013-98 CPSY2013-62 DC2013-52 RECONF2013-45 pp.177-181(VLD), pp.75-79(CPM), pp.75-79(ICD), pp.21-25(CPSY), pp.177-181(DC), pp.33-37(RECONF) |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2013-11-28 13:20 |
Kagoshima |
|
Study of the Hardware Trojan for Embedded Processor Yasushi Tsukada, Shuhei Itaya, Takeshi Kumaki (Ritsumeikan Univ.), Masaya Yoshikawa (Meijou Univ), Takeshi Fujino (Ritsumeikan Univ.) CPSY2013-64 |
In recent years, much attention is paid to the threat and measure of LSI Hardware Trojan.
Hardware Trojan is the circui... [more] |
CPSY2013-64 pp.29-34 |