Information and Systems-Software Science(Date:2023/11/16)

Presentation
Formal Verification of an Edge Computing Platform based on Modular Architecture using Intel SGX

Yuma Nishihira(Tokai Univ.),  Hayato Kimura(Univ. of Hyogo),  Toshihiro Ohigashi(Tokai Univ.),  

[Date]2023-11-16
[Paper #]ICSS2023-54
Attack Verification and Evaluation of Incremental Fault Analysis against AES Encryption Processing Device

Miran Tamagawa(TUT),  Yuichi Futa(TUT),  Takehiko Mieno(AVASYS),  Hiroyuki Okazaki(Shinshu University),  

[Date]2023-11-16
[Paper #]ICSS2023-56
Implementation of Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities, and A Study on Its Large-scale Demonstration

Masaru Takeuchi(JDC),  Toshiaki Saisho(JDC),  Junji Shikata(JDC),  Toshio Sato(WU),  Kazue Sako(WU),  Jiro Katto(WU),  Takuro Sato(WU),  

[Date]2023-11-16
[Paper #]ICSS2023-51
Real time detection for replay-attack communication in control system

Koushi Nishi(TUT),  Yuichi Futa(TUT),  Hiroyuki Okazaki(Shinshu University),  

[Date]2023-11-16
[Paper #]ICSS2023-52
Device identification and attribute values consideration with browser fingerprint

Takashi Tsukazaki(TUT),  Yuichi Futa(TUT),  Hiroyuki Okazaki(Shinshu Univ.),  Hikofumi Suzuki(NII),  

[Date]2023-11-16
[Paper #]ICSS2023-53
A Study on Self Destructive Tamper Resistant Software utilizing Return-Oriented Programming (Part 3)

Kazuomi Oishi(SIST),  

[Date]2023-11-16
[Paper #]ICSS2023-55
Security Analysis of MP-LWE using Weighted Lattice Reduction

Yudai Tagawa(Osaka Univ.),  Shinya Okumura(Osaka Univ.),  Atsuko Miyaji(Osaka Univ.),  

[Date]2023-11-16
[Paper #]ICSS2023-57
Redefinition of pair-PNB and application to ChaCha differential linear analysis

Kai Izumi(Osaka Univ.),  Atsuko Miyaji(Osaka Univ.),  

[Date]2023-11-16
[Paper #]ICSS2023-58
Improved Secret Key Transport mechanism using CSIDH

Kodai Hayashida(Osaka Univ.),  Atsuko Miyaji(Osaka Univ.),  

[Date]2023-11-16
[Paper #]ICSS2023-59
Proposal for a Test Tool Enabling Programmatic Description of Test Scenarios in OpenID Connect

Junki Yuasa(NAIST),  Taisho Sasada(NAIST),  Yuzo Taenaka(NAIST),  Youki Kadobayashi(NAIST),  

[Date]2023-11-17
[Paper #]ICSS2023-66
Implementation and Evaluation of Lattice-based IBE with Security against the Key Generation Center

Shuntaro Ema(Tokai Univ.),  Keita Emura(Kanazawa Univ.),  Toshihiro Ohigashi(Tokai Univ.),  

[Date]2023-11-17
[Paper #]ICSS2023-60
Proposal of secure session management system using FIDO

Hikaru Ishida(Chiba Univ.),  Takashi Imaizumi(Chiba Univ.),  

[Date]2023-11-17
[Paper #]ICSS2023-67
Exploring the Feasibility of Guessing Default Wi-Fi Passwords for Consumer Routers

Takahiro Kasama(NICT),  Ryo Kamino(00One),  Yuichi Hagiwara(00One),  Daisuke Inoue(NICT),  

[Date]2023-11-17
[Paper #]ICSS2023-62
Investigation of Technical Support Scams Targeting Japan

Hiroyuki Ito(NICT),  Kosuke Kajimoto(JC3),  Tetsuya Kageyama(JC3),  Taichi Aoki(JC3),  Takahiro Kasama(NICT),  Daisuke Inoue(NICT),  

[Date]2023-11-17
[Paper #]ICSS2023-63
Analysis of the influence of DDoS attacks on Snort and legitimate users

Yuki Kano(TUT),  Yuichi Futa(TUT),  Hikofumi Suzuki(NII),  Hiroyuki Okazaki(Shinshu University),  

[Date]2023-11-17
[Paper #]ICSS2023-65
Simulation of DNS cache poisoning attack detection method using DNS logs

Kenshiro Tanaka(TUT),  Yuichi Futa(TUT),  Hiroyui Okazaki(Shinshu Univ.),  Hikofumi Suzuki(NII),  

[Date]2023-11-17
[Paper #]ICSS2023-64
Chameleon Hash Function with Forward-Security

Pengxuan Wei(Osaka Univ.),  Atsuko Miyaji(Osaka Univ.),  Yangguang Tian(University Of Surrey),  

[Date]2023-11-17
[Paper #]ICSS2023-61
Secure Iris Recognition with Linear Hashing

Mitsuhide Tenryaku(Chiba Univ.),  

[Date]2023-11-17
[Paper #]ICSS2023-68