IWSEC 2017

August 30 (Web)- September 1 (Fri), 2017
Hiroshima, Japan

List of Posters

Best Poster Awards


Implementation Results of Privacy-Preserving and Public Verifiable Data Aggregation Protocols
Tatsuya Suzuki (Tokai University), Keita Emura (NICT), Hayato Kimura (Tokai University) and Toshihiro Ohigashi (Tokai University)

An Evaluation of Ineffective Fault Analysis on AES using Single-Bit Bit-Set/Reset Faults
Natsu Shoji, Ryuga Matsumura, Takeshi Sugawara and Kazuo Sakiyama (The University of Electro-Communications Department of Informatics)

Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data
Mitsuhiro Hattori (Mitsubishi Electric Corporation), Takato Hirano (Mitsubishi Electric Corporation), Nori Matsuda (Mitsubishi Electric Corporation), Rina Shimizu (Mitsubishi Electric Corporation), Ye Wang (Mitsubishi Electric Research Laboratories)

 

IWSEC 2017 List of Posters

  1. A Practical Finding Method of Network Incident with Open Security Information
    Hiroki Kuzuno (SECOM Co., Ltd.) and Shintaro Otsuka (LAC Co., Ltd.)
  2. High-speed Forensic Technology against Targeted Cyber Attacks
    Takanori Oikawa, Kazuyoshi Furukawa, Tetsuya Izu, Masanobu Morinaga, Masahiko Takenaka and Yuki Unno (Fujitsu Laboratories Ltd.)
  3. Input Password with Just Only One Key
    Mayu Kuroda and Manabu Okamoto (Kanagawa Institute of Technology)
  4. Semi-Honest Secure Multiparty Computation Can Be Insecure with Use of Even Almost Uniformly Random Number Generators
    Koji Nuida (AIST / JST PRESTO)
  5. Improving Inference Attacks on Order-Preserving Encrypted Databases
    Sota Onozawa (The University of Tokyo), Noboru Kunihiro (The University of Tokyo), Masayuki Yoshino (Hitachi, Ltd.) and Ken Naganuma (Hitachi, Ltd.)
  6. Imperceptible Watermarking Scheme with Large Capacity Considering the Internal Structure of PDF File
    Takuya Fukushima, Minoru Kuribayashi and Nobuo Funabiki (Okayama University)
  7. Automatic Exchange-type Attack Simulator
    Hiroki Nishikawa, Takumi Yamamoto, Keisuke Kito and Kiyoto Kawauchi (Mitsubishi Electric Corporation)
  8. An Evaluation of Ineffective Fault Analysis on AES using Single-Bit Bit-Set/Reset Faults
    Natsu Shoji, Ryuga Matsumura, Takeshi Sugawara and Kazuo Sakiyama (The University of Electro-Communications Department of Informatics)
  9. Fingerprinting System for Secure Manegement of Sensitive Data
    Takahiro Ueda, Minoru Kuribayashi and Nobuo Funabiki (Okayama University)
  10. A Study of Cryptographic Protocol Database toward Automated Cryptography Support for Developers (work-in-progress)
    Akira Kanaoka (Toho University)
  11. Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data
    Mitsuhiro Hattori (Mitsubishi Electric Corporation), Takato Hirano (Mitsubishi Electric Corporation), Nori Matsuda (Mitsubishi Electric Corporation), Rina Shimizu (Mitsubishi Electric Corporation), Ye Wang (Mitsubishi Electric Research Laboratories)
  12. Recovering CRT-RSA Secret Keys from Noisy Secret Exponents
    Kento Oonishi and Noboru Kunihiro (The University of Tokyo)
  13. Implementation Results of Privacy-Preserving and Public Verifiable Data Aggregation Protocols
    Tatsuya Suzuki (Tokai University), Keita Emura (NICT), Hayato Kimura (Tokai University) and Toshihiro Ohigashi (Tokai University)
  14. How to Provide MQTT with Security, and Its Application
    SeongHan Shin (AIST, Japan), Kazukuni Kobara (AIST, Japan), Chia-Chuan Chuang (NCHC, Taiwan) and Weicheng Huang (NCHC, Taiwan)
  15. Data Exfiltration from Air-Gapped computers based on ARM CPU
    Kenta Yamamoto, Taiichi Saito and Miyuki Hirose (Tokyo Denki University)
  16. Simulation and Evaluation of Whitelisting Intrusion Detection Systems according to Life cycle in Industrial Control Systems models
    Tsunato Nakai (Mitsubishi Electric Corporation), Teruyoshi Yamaguchi (Mitsubishi Electric Corporation), Sachihiro Ichikawa (Mitsubishi Electric Corporation), Nobuhiro Kobayashi (Mitsubishi Electric Corporation), Kosuke Hata (The University of Electro-Communications) and Kenji Sawada (The University of Electro-Communications)
  17. How to Improve AEAD-{2a, 4a} and DAEAD-2a
    Kazuya Imamura and Tetsu Iwata (Nagoya University)
  18. Implementation Results of an Adaptive Secure Secure-Channel Free Searchable Encryption Scheme with Multiple Keywords
    Katsuhiko Ito (Tokai University), Keita Emura (NICT) and Toshihiro Ohigashi (Tokai University)
  19. Side channel-resistant masking with linear congruential generator
    Shih-Chun You (National Taiwan University, Taiwan) and Chen-Mou Cheng (National Taiwan University, Taiwan / Osaka University, Japan)
  20. A Study on Construction and Security of Computer-Aided Security Schemes
    Yasuyoshi Jinno (Shizuoka University, Japan), Takashi Tsuchiya (Shizuoka University, Japan), Kenta Takahashi (Hitachi, Ltd., Japan), Wakaha Ogata (Tokyo Institute of Technology, Japan) and Masakatsu Nishigaki (Shizuoka University, Japan)
  21. Directcha-maze: A Study of CAPTCHA Configuration with Machine Learning Attack Defensibility and User Convenience Consideration
    Ayane Sano, Masahiro Fujita and Masakatsu Nishigaki (Shizuoka University, Japan)
  22. A Study on Human Reflex Based Biometric Authentication Using Eye-Head Coordination
    Yosuke Takahashi, Masashi Endo, Hiroaki Matsuno, Hiroaki Muramatsu and Masakatsu Nishigaki (Shizuoka University, Japan)
  23. Short Merkle One-Time Signatures
    Hiroaki Anada (University of Nagasaki), Shunsuke Tsumori (Kyushu University), Samiran Bag (Kyushu University), Masakazu Soshi (Hiroshima City University), Atsushi Waseda (NICT) and Kouichi Sakurai (Kyushu University)
  24. Investigation of Real-Time Denial-of-Service Attacks Detection Method Using Data Mining Technique
    Shotaro Usuzaki (University of Miyazaki), Ryusei Fuji (University of Miyazaki), Hisaaki Yamaba (University of Miyazaki), Kentaro Aburada (University of Miyazaki), Sin-Ichiro Kubota (Kumamoto University), Mirang Park (Kanagawa Institute of Technology) and Naonobu Okazaki (University of Miyazaki)
  25. On indistinguishability obfuscation of probabilistic circuits for worst-case-input subexponentially indistinguishable samplers
    Akinori Kawachi (Osaka University) and Yoshiki Tabata (Tokushima University)
  26. Light-weight IOT malware detection
    Jiawei Su (Faculty of Information Science and Electrical Engineering, Kyushu University, Japan), Danilo Vasconcellos Vargas (Faculty of Information Science and Electrical Engineering, Kyushu University, Japan), Anupan Joshi (Department of Computer Science and Electronic Engineering, University of Maryland Baltimore County, USA), Sanjiva Prasad(Department of Computer Science and Engineering , Indian Institute of Technology Delhi, Indian), Daniele Sgandurra (ISG Smart Card and IoT Security Centre, Royal Holloway University of London, UK), Yaokai Feng (Faculty of Information Science and Electrical Engineering, Kyushu University, Japan) and Kouichi Sakurai (Faculty of Information Science and Electrical Engineering, Kyushu University, Japan)
  27. A Study on Ransomware Detection Considering User's Document Editing Operation
    Toshiki Honda, Kohei Mukaiyama, Takeharu Shirai and Masakatsu Nishigaki (Shizuoka University, Japan)
  28. Risk of Web IDE's OS information leakage
    Kousei Tanaka, Kenta Yamamoto and Taiichi Saito (Tokyo Denki University)
  29. K-anonymous techniques for high-dimensional datasets based on microaggregation
    Yoko Kamidoi, Chisa Tanaka and Shin'ichi Wakabayashi (Hiroshima City University)
  30. An Examination of CAPTCHA Scheme which can Resist Relay Attack
    Tatsuda Ryohei (University of Miyazaki), Hisaaki Yamaba (University of Miyazaki), Kentaro Aburada (University of Miyazaki), Tetsuro Katayama (University of Miyazaki), Mirang Park (Kanagawa Institute of Technology) and Naonobu Okazaki (University of Miyazaki)
  31. Towards Visual Steganography
    Maki Yoshida (NICT)
  32. Proposal of selection method for cyber cybersecurity measures
    Takeshi Asai, Kiyoto Kawauchi and Ryosuke Shimabe (Mitsubishi Electric Corporation)
  33. Application of Edge Computing for Trust Establishment
    Favian Dewanta and Masahiro Mambo (Kanazawa University)

* Underlined authors are presenters.

Some poster presenters published their poster document on their will at this page. The documents are only available one week before and after the workshop date.
Every uploaded document regarding the posters is POSTER AUTHORS RESPONSIBILITY. IWSEC2017 accept no responsibility and no liability for any loss resulting from the published documents. IWSEC2017 does not endorses documents that violates any law or infringes the rights

Remarks

Posters were not rigorously refereed, and no proceedings were published regarding the posters, and hence the copyrights of any content for the poster presentations are retained by the authors; there is no restriction for the authors of the posters to submit the contents to other journals/conferences in the future.