IWSEC 2016

September 12 (Mon)-14 (Wed), 2016
Akihabara-Ochanomizu District, Tokyo, Japan

List of Posters

Best Poster Awards


FHE over the Integers and Modular Arithmetic Circuits
Eunkyung Kim and Mehdi Tibouchi

Malware for Protocol Misidentification
Yudai Nagamine, Naoto Yanai, Shingo Okamura, and Toru Fujiwara

 

IWSEC 2016 List of Posters

  1. Identification of Cryptographic Functions in Malware Binaries
    Takumi Yamamoto (Mitsubishi Electric Corporation, Japan / UC Berkeley, USA), J.D. Tygar (UC Berkeley, USA)
  2. A Toolset for Usable Security with ICT Service Networks
    Sven Wohlgemuth, Kazuo Takaragi (National Institute of Advanced Industrial Science and Technology (AIST), Japan)
  3. FHE over the Integers and Modular Arithmetic Circuits
    Eunkyung Kim (Ewha Womans University, Republic of Korea), Mehdi Tibouchi (NTT Secure Platform Laboratories, Japan)
  4. NEMU: Automated Extraction of Command-Dependent Bahaviors from Malware Binaries
    Yuma Kurogome, Keiji Takeda (Keio University, Japan)
  5. Using a dummy node to protect Tor Hidden Service from the threat of a link classifier
    Akira Takenouchi, Kanta Matsuura (The University of Tokyo, Japan)
  6. Efficient Update of Gram-Schmidt Vectors in the LLL Algorithm with Deep Insertions
    Junpei Yamaguchi, Masaya Yasuda (Kyushu University, Japan)
  7. Evaluation Tool for Utility and Anonymity of Anonymized Data
    Shogo Masaki, Satoshi Hasegawa, Rina Okada, Koji Chida (NTT Secure Platform Laboratories, Japan)
  8. Privacy preserving Fisher's exact test for GWAS
    Kazuharu Misawa (Tohoku Medical Megabank Organization, Tohoku University, Japan), Satoshi Hasegawa, Koki Hamada, Koji Chida (NTT Secure Platform Laboratories, Japan), Soichi Ogishima, Masao Nagasaki(Tohoku Medical Megabank Organization, Tohoku University, Japan)
  9. A study on the infected traffic detection method focused on the similarity between malware samples
    Ayaka Samejima (The University of Electro-Communications, Japan), Mitsuhiro Hatada (NTT Communications, Japan), Hiroshi Yoshiura, Masatsugu Ichino(The University of Electro-Communications, Japan)
  10. Combining two sequential algorithms for classification of intrusion detection system dataset
    Phetlasy Sornxayya, Satoshi Ohzahata, Celimuge Wu, Toshihiko Kato (The University of Electro-Communications, Japan)
  11. Garbling Scheme for Formulas with Constant Size of Garbled Gates
    Carmen Kempka, Ryo Kikuchi, Susumu Kiyoshima, Koutarou Suzuki (NTT Secure Platform Laboratories, Japan)
  12. Secure Communication Protocol Using an Advanced Human-cognitive-processing Ability for Preventing Man-in-the-Browser Attacks
    Takashi Tsuchiya, Masahiro Fujita (Shizuoka University, Japan), Kenta Takahashi (Hitachi, Ltd., Japan), Takehisa Kato (Toshiba Corporation Industrial ICT Solutions Company, Japan), Fumihiko Magata(NTT Secure Platform Laboratories, Japan), Yoshimi Teshigawara(Tokyo Denki University, Japan), Ryoichi Sasaki (Tokyo Denki University, Japan), Masakatsu Nishigaki(Shizuoka University, Japan)
  13. Defamation Caused By Anonymization
    Hiroshi Nakagawa (The University of Tokyo, Japan)
  14. A proposal of a biometric authentication system using human minute patterns
    Hiroaki Muramatsu, Masahiro Fujita, Yuto Mano (Shizuoka University, Japan), Kenta Takahashi (Hitachi, Ltd., Japan), Masakatsu Nishigaki(Shizuoka University)
  15. Investigating Universal Metrics of Vulnerability Regarding Cross-Site Scripting Attacks
    Shogo Hayashi (Institute of Industrial Science, The University of Tokyo, Japan), Yu Asabe, Keiichi Ishikawa, Yuka Takahashi, Masashi Ikarashi (The University of Tokyo, Japan), Kanta Matsuura (Institute of Industrial Science, The University of Tokyo, Japan)
  16. Application of Joux-Lucks Search Algorithm for Multi-Collisions to MicroMint
    Yuuichi Kamoshida, Mitsugu Iwamoto, Kazuo Ohta (The University of Electro-Communications, Japan)
  17. Metallic-Foil Artifact-Metrics for Smart Card Security Enhancement
    Naoki Yoshida, Tsutomu Matsumoto (YOKOHAMA National University, Japan)
  18. Malware for Protocol Misidentification
    Yudai Nagamine, Naoto Yanai, Shingo Okamura, Toru Fujiwara (Osaka University, Japan)

Remarks:

Posters were not rigorously refereed, and no proceedings were published regarding the posters, and hence the copyrights of any content for the poster presentations are retained by the authors; there is no restriction for the authors of the posters to submit the contents to other journals/conferences in the future.