Posters
Best Poster Awards
IWSEC2019 List of Posters
- The Impact of Cyber Security Vulnerability Accident on the Stock Prices of Taiwan's Electronics Companies
Bi-Huei Tsai (National Chiao Tung University) - Security analysis of Signal database protection mechanisms
Michał Glet, Kamil Kaczyński (Wojskowa Akademia Techniczna) - Improved Identification of Supersingular Elliptic Curves
Yuji Hashimoto (The University of Tokyo / AIST), Katsuyuki Takashima (Mitsubishi Electric) - Improvement of Integer Factorization with Elliptic Curve and Complex Multiplication Method
Yuan Mei, Koji Nuida (The University of Tokyo) - Cache-22: A Highly Deployable Encrypted Cache System
Keita Emura (NICT) , Shiho Moriai (NICT), Takuma Nakajima (TIS Inc.), Masato Yoshimi (TIS Inc.) - Secure Key-management Technology for Blockchain using Biometrics Information
Ken Naganuma (Hitachi, Ltd / the University of Tokyo), Suzuki Takayuki (Hitachi, Ltd), Kenta Takahashi (Hitachi, Ltd), Yousuke Kaga (Hitachi, Ltd), Masayuki Yoshino (Hitachi, Ltd), Noboru Kunihiro (University of Tsukuba) - How to Construct CSIDH on Edwards Curves
Tomoki Moriya (The University of Tokyo), Hiroshi Onuki (The University of Tokyo), and Tsuyoshi Takagi (The University of Tokyo) - Threat Analysis of Fake Virus Alerts by Using Web Access Monitoring Mechanism for Android WebView
Rintaro Orito, Koki Riho, Yuta Imamura, Masaya Sato, Toshihiro Yamauchi (Okayama University) - A secure cross-chain platform for business blockchain applications
Takuma TAKEUCHI, Yoshiki HIGASHIKADO, Shingo FUJIMOTO (FUJITSU Laboratories) - Privacy-preserving Naive Bayes Classification using Homomorphic Encryption and Garbled Circuits
Sangwook Kim (Kobe University), Lihua Wang (NICT), Toshiaki Omori, Seiichi Ozawa (Kobe University) - Verification of malware dynamic analysis method using real and virtual IoT devices
Satoshi Hara, Jia Xiong, Tatsuya Tamai, Kazuki Tamiya, Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National University) - Android Malware Event Trigger Trained By Reinforcement Learning
Haeun Cho, Souhwan Jung (Soongsil University) - A Practical Leakage-Resilient Scheme using Big-key Encryptions
Yuji Koike (University of Hyogo), Takuya Hayashi (NICT), Takanori Isobe (NICT / University of Hyogo) - Malicious JavaScript Detection Using Doc2Vec Feature Learning - Improvement in Detection of Obfuscated Parts through Simplification and Decoding
Samuel Ndichu, Sangwook Kim, Seiichi Ozawa (Kobe University) - Random Rewards in Proof-of-Stake Protocols
Dominik Harz (Imperial College London), Ryuya Nakamura (The University of Tokyo / LayerX) - Study on secure protocol for route optimization in DMM based smart home networks
Daemin Shin, Keon Yun, Hoonyong Park, Philip Virgil Astillo, Jiyoon Kim, Ilsun You (Soonchunhyang University) - A Privacy-Preserving Anomaly Detection Outsourcing Scheme Using Predicate Encryption
Mitsuhiro Hattori, Takashi Ito, Nori Matsuda, Yoichi Shibata (Mitsubishi Electric Corporation) - Understanding Malware's Actual Behaviors from Dynamic System Call Tracer's Log
Kota Morimoto, Junjun Zheng, Eiji Takimoto (Ritsumeikan University), Shoichi Saito (Nagoya Institute of Technology), Mouri Koichi (Ritsumeikan University) - A Study on Malicious Behavior Detection of Android Apps Using SMS
Hojin Chun, Jaehyeon Yoon, Souhwan Jung (Soongsil University Seoul) - Proposal and Evaluation of a Novel Network Forensic Method for Cyber Incident Response
Maki Inui, Yuki Unno, Takanori Oikawa, Kazuyoshi Furukawa, Satoru Torii, Tetsuya Izu (Fujitsu Laboratories), Nobuyuki Kanaya, Yu Tsuda, Daisuke Inoue (NICT) - Toward an efficient FPGA implementation of CSIDH
Kenta Kodera, Chen-mou Cheng, Atsuko Miyaji (Osaka University) - The Convergence of Artificial Intelligence and Blockchain: Improvements From a Security Perspective
Siwan Noh, Kyung-Hyune Rhee (Pukyong National University) - A Simple and Inexpensive tool for Deauthentication Attacks Detection Using M5Stack and IFTTT
Haruki Kobayashi, Yuya Oaku, Kotaro Hoshina, Satoshi Kouya, Taiichi Saito (Tokyo Denki University) - How to improve the private PEZ protocol for general functions
Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta (The University of Electro-Communications) - Bundled NP languages and Lattice-Based Zero-Knowledge Arguments
Hiroaki Anada (University of Nagasaki)
* Underlined authors are presenters.
Remarks
Posters were not rigorously refereed, and no proceedings were published regarding the posters, and hence the copyrights of any content for the poster presentations are retained by the authors; there is no restriction for the authors of the posters to submit the contents to other journals/conferences in the future.
Ken Naganuma (Hitachi, Ltd / the University of Tokyo), Suzuki Takayuki (Hitachi, Ltd), Kenta Takahashi (Hitachi, Ltd), Yousuke Kaga (Hitachi, Ltd), Masayuki Yoshino (Hitachi, Ltd), Noboru Kunihiro (University of Tsukuba)
Tomoki Moriya (The University of Tokyo), Hiroshi Onuki (The University of Tokyo), and Tsuyoshi Takagi (The University of Tokyo)
Yuji Koike (University of Hyogo), Takuya Hayashi (NICT), Takanori Isobe (NICT / University of Hyogo)
Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta (The University of Electro-Communications)