IWSEC 2019

August 28 (Wed) - 30 (Fri), 2019
Tokyo Institute of Technology, Tokyo, Japan

Posters

Best Poster Awards

  • Secure Key-management Technology for Blockchain using Biometrics Information
    Ken Naganuma (Hitachi, Ltd / the University of Tokyo), Suzuki Takayuki (Hitachi, Ltd), Kenta Takahashi (Hitachi, Ltd), Yousuke Kaga (Hitachi, Ltd), Masayuki Yoshino (Hitachi, Ltd), Noboru Kunihiro (University of Tsukuba)
  • How to Construct CSIDH on Edwards Curves
    Tomoki Moriya (The University of Tokyo), Hiroshi Onuki (The University of Tokyo), and Tsuyoshi Takagi (The University of Tokyo)
  • A Practical Leakage-Resilient Scheme using Big-key Encryptions
    Yuji Koike (University of Hyogo), Takuya Hayashi (NICT), Takanori Isobe (NICT / University of Hyogo)
  • How to improve the private PEZ protocol for general functions
    Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta (The University of Electro-Communications)

IWSEC2019 List of Posters

  1. The Impact of Cyber Security Vulnerability Accident on the Stock Prices of Taiwan's Electronics Companies
    Bi-Huei Tsai (National Chiao Tung University)
  2. Security analysis of Signal database protection mechanisms
    Michał Glet, Kamil Kaczyński (Wojskowa Akademia Techniczna)
  3. Improved Identification of Supersingular Elliptic Curves
    Yuji Hashimoto (The University of Tokyo / AIST), Katsuyuki Takashima (Mitsubishi Electric)
  4. Improvement of Integer Factorization with Elliptic Curve and Complex Multiplication Method
    Yuan Mei, Koji Nuida (The University of Tokyo)
  5. Cache-22: A Highly Deployable Encrypted Cache System
    Keita Emura (NICT) , Shiho Moriai (NICT), Takuma Nakajima (TIS Inc.), Masato Yoshimi (TIS Inc.)
  6. Secure Key-management Technology for Blockchain using Biometrics Information
    Ken Naganuma (Hitachi, Ltd / the University of Tokyo), Suzuki Takayuki (Hitachi, Ltd), Kenta Takahashi (Hitachi, Ltd), Yousuke Kaga (Hitachi, Ltd), Masayuki Yoshino (Hitachi, Ltd), Noboru Kunihiro (University of Tsukuba)
  7. How to Construct CSIDH on Edwards Curves
    Tomoki Moriya (The University of Tokyo), Hiroshi Onuki (The University of Tokyo), and Tsuyoshi Takagi (The University of Tokyo)
  8. Threat Analysis of Fake Virus Alerts by Using Web Access Monitoring Mechanism for Android WebView
    Rintaro Orito, Koki Riho, Yuta Imamura, Masaya Sato, Toshihiro Yamauchi (Okayama University)
  9. A secure cross-chain platform for business blockchain applications
    Takuma TAKEUCHI, Yoshiki HIGASHIKADO, Shingo FUJIMOTO (FUJITSU Laboratories)
  10. Privacy-preserving Naive Bayes Classification using Homomorphic Encryption and Garbled Circuits
    Sangwook Kim (Kobe University), Lihua Wang (NICT), Toshiaki Omori, Seiichi Ozawa (Kobe University)
  11. Verification of malware dynamic analysis method using real and virtual IoT devices
    Satoshi Hara, Jia Xiong, Tatsuya Tamai, Kazuki Tamiya, Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National University)
  12. Android Malware Event Trigger Trained By Reinforcement Learning
    Haeun Cho, Souhwan Jung (Soongsil University)
  13. A Practical Leakage-Resilient Scheme using Big-key Encryptions
    Yuji Koike (University of Hyogo), Takuya Hayashi (NICT), Takanori Isobe (NICT / University of Hyogo)
  14. Malicious JavaScript Detection Using Doc2Vec Feature Learning - Improvement in Detection of Obfuscated Parts through Simplification and Decoding
    Samuel Ndichu, Sangwook Kim, Seiichi Ozawa (Kobe University)
  15. Random Rewards in Proof-of-Stake Protocols
    Dominik Harz (Imperial College London), Ryuya Nakamura (The University of Tokyo / LayerX)
  16. Study on secure protocol for route optimization in DMM based smart home networks
    Daemin Shin, Keon Yun, Hoonyong Park, Philip Virgil Astillo, Jiyoon Kim, Ilsun You (Soonchunhyang University)
  17. A Privacy-Preserving Anomaly Detection Outsourcing Scheme Using Predicate Encryption
    Mitsuhiro Hattori, Takashi Ito, Nori Matsuda, Yoichi Shibata (Mitsubishi Electric Corporation)
  18. Understanding Malware's Actual Behaviors from Dynamic System Call Tracer's Log
    Kota Morimoto, Junjun Zheng, Eiji Takimoto (Ritsumeikan University), Shoichi Saito (Nagoya Institute of Technology), Mouri Koichi (Ritsumeikan University)
  19. A Study on Malicious Behavior Detection of Android Apps Using SMS
    Hojin Chun, Jaehyeon Yoon, Souhwan Jung (Soongsil University Seoul)
  20. Proposal and Evaluation of a Novel Network Forensic Method for Cyber Incident Response
    Maki Inui, Yuki Unno, Takanori Oikawa, Kazuyoshi Furukawa, Satoru Torii, Tetsuya Izu (Fujitsu Laboratories), Nobuyuki Kanaya, Yu Tsuda, Daisuke Inoue (NICT)
  21. Toward an efficient FPGA implementation of CSIDH
    Kenta Kodera, Chen-mou Cheng, Atsuko Miyaji (Osaka University)
  22. The Convergence of Artificial Intelligence and Blockchain: Improvements From a Security Perspective
    Siwan Noh, Kyung-Hyune Rhee (Pukyong National University)
  23. A Simple and Inexpensive tool for Deauthentication Attacks Detection Using M5Stack and IFTTT
    Haruki Kobayashi, Yuya Oaku, Kotaro Hoshina, Satoshi Kouya, Taiichi Saito (Tokyo Denki University)
  24. How to improve the private PEZ protocol for general functions
    Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta (The University of Electro-Communications)
  25. Bundled NP languages and Lattice-Based Zero-Knowledge Arguments
    Hiroaki Anada (University of Nagasaki)

* Underlined authors are presenters.

Remarks

Posters were not rigorously refereed, and no proceedings were published regarding the posters, and hence the copyrights of any content for the poster presentations are retained by the authors; there is no restriction for the authors of the posters to submit the contents to other journals/conferences in the future.