Support Center for Advanced Telecommunications Technology Research, Foundation (SCAT)
Hitachi Incident Response Team
IWSEC 2017
August 30 (Web)- September 1 (Fri), 2017
Hiroshima, Japan
List of Posters
Best Poster Awards
Implementation Results of Privacy-Preserving and Public Verifiable Data Aggregation Protocols
Tatsuya Suzuki (Tokai University), Keita Emura (NICT), Hayato Kimura (Tokai University) and Toshihiro Ohigashi (Tokai University)
An Evaluation of Ineffective Fault Analysis on AES using Single-Bit Bit-Set/Reset Faults
Natsu Shoji, Ryuga Matsumura, Takeshi Sugawara and Kazuo Sakiyama (The University of Electro-Communications Department of Informatics)
Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data
Mitsuhiro Hattori (Mitsubishi Electric Corporation), Takato Hirano (Mitsubishi Electric Corporation), Nori Matsuda (Mitsubishi Electric Corporation), Rina Shimizu (Mitsubishi Electric Corporation), Ye Wang (Mitsubishi Electric Research Laboratories)
IWSEC 2017 List of Posters
A Practical Finding Method of Network Incident with Open Security Information Hiroki Kuzuno (SECOM Co., Ltd.) and Shintaro Otsuka (LAC Co., Ltd.)
Input Password with Just Only One Key Mayu Kuroda and Manabu Okamoto (Kanagawa Institute of Technology)
Semi-Honest Secure Multiparty Computation Can Be Insecure with Use of Even Almost Uniformly Random Number Generators Koji Nuida (AIST / JST PRESTO)
Improving Inference Attacks on Order-Preserving Encrypted Databases Sota Onozawa (The University of Tokyo), Noboru Kunihiro (The University of Tokyo), Masayuki Yoshino (Hitachi, Ltd.) and Ken Naganuma (Hitachi, Ltd.)
Imperceptible Watermarking Scheme with Large Capacity Considering the Internal Structure of PDF File Takuya Fukushima, Minoru Kuribayashi and Nobuo Funabiki (Okayama University)
Automatic Exchange-type Attack Simulator Hiroki Nishikawa, Takumi Yamamoto, Keisuke Kito and Kiyoto Kawauchi (Mitsubishi Electric Corporation)
An Evaluation of Ineffective Fault Analysis on AES using Single-Bit Bit-Set/Reset Faults Natsu Shoji, Ryuga Matsumura, Takeshi Sugawara and Kazuo Sakiyama (The University of Electro-Communications Department of Informatics)
Fingerprinting System for Secure Manegement of Sensitive Data Takahiro Ueda, Minoru Kuribayashi and Nobuo Funabiki (Okayama University)
A Study of Cryptographic Protocol Database toward Automated Cryptography Support for Developers (work-in-progress) Akira Kanaoka (Toho University)
Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data Mitsuhiro Hattori (Mitsubishi Electric Corporation), Takato Hirano (Mitsubishi Electric Corporation), Nori Matsuda (Mitsubishi Electric Corporation), Rina Shimizu (Mitsubishi Electric Corporation), Ye Wang (Mitsubishi Electric Research Laboratories)
Recovering CRT-RSA Secret Keys from Noisy Secret Exponents Kento Oonishi and Noboru Kunihiro (The University of Tokyo)
Implementation Results of Privacy-Preserving and Public Verifiable Data Aggregation Protocols Tatsuya Suzuki (Tokai University), Keita Emura (NICT), Hayato Kimura (Tokai University) and Toshihiro Ohigashi (Tokai University)
How to Provide MQTT with Security, and Its Application SeongHan Shin (AIST, Japan), Kazukuni Kobara (AIST, Japan), Chia-Chuan Chuang (NCHC, Taiwan) and Weicheng Huang (NCHC, Taiwan)
Data Exfiltration from Air-Gapped computers based on ARM CPU Kenta Yamamoto, Taiichi Saito and Miyuki Hirose (Tokyo Denki University)
Simulation and Evaluation of Whitelisting Intrusion Detection Systems according to Life cycle in Industrial Control Systems models Tsunato Nakai (Mitsubishi Electric Corporation), Teruyoshi Yamaguchi (Mitsubishi Electric Corporation), Sachihiro Ichikawa (Mitsubishi Electric Corporation), Nobuhiro Kobayashi (Mitsubishi Electric Corporation), Kosuke Hata (The University of Electro-Communications) and Kenji Sawada (The University of Electro-Communications)
How to Improve AEAD-{2a, 4a} and DAEAD-2a Kazuya Imamura and Tetsu Iwata (Nagoya University)
Implementation Results of an Adaptive Secure Secure-Channel Free Searchable Encryption Scheme with Multiple Keywords Katsuhiko Ito (Tokai University), Keita Emura (NICT) and Toshihiro Ohigashi (Tokai University)
Side channel-resistant masking with linear congruential generator Shih-Chun You (National Taiwan University, Taiwan) and Chen-Mou Cheng (National Taiwan University, Taiwan / Osaka University, Japan)
A Study on Construction and Security of Computer-Aided Security Schemes Yasuyoshi Jinno (Shizuoka University, Japan), Takashi Tsuchiya (Shizuoka University, Japan), Kenta Takahashi (Hitachi, Ltd., Japan), Wakaha Ogata (Tokyo Institute of Technology, Japan) and Masakatsu Nishigaki (Shizuoka University, Japan)
Directcha-maze: A Study of CAPTCHA Configuration with Machine Learning Attack Defensibility and User Convenience Consideration Ayane Sano, Masahiro Fujita and Masakatsu Nishigaki (Shizuoka University, Japan)
A Study on Human Reflex Based Biometric Authentication Using Eye-Head Coordination Yosuke Takahashi, Masashi Endo, Hiroaki Matsuno, Hiroaki Muramatsu and Masakatsu Nishigaki (Shizuoka University, Japan)
Short Merkle One-Time Signatures Hiroaki Anada (University of Nagasaki), Shunsuke Tsumori (Kyushu University), Samiran Bag (Kyushu University), Masakazu Soshi (Hiroshima City University), Atsushi Waseda (NICT) and Kouichi Sakurai (Kyushu University)
Investigation of Real-Time Denial-of-Service Attacks Detection Method Using Data Mining Technique Shotaro Usuzaki (University of Miyazaki), Ryusei Fuji (University of Miyazaki), Hisaaki Yamaba (University of Miyazaki), Kentaro Aburada (University of Miyazaki), Sin-Ichiro Kubota (Kumamoto University), Mirang Park (Kanagawa Institute of Technology) and Naonobu Okazaki (University of Miyazaki)
On indistinguishability obfuscation of probabilistic circuits for worst-case-input subexponentially indistinguishable samplers Akinori Kawachi (Osaka University) and Yoshiki Tabata (Tokushima University)
Light-weight IOT malware detection Jiawei Su (Faculty of Information Science and Electrical Engineering, Kyushu University, Japan), Danilo Vasconcellos Vargas (Faculty of Information Science and Electrical Engineering, Kyushu University, Japan), Anupan Joshi (Department of Computer Science and Electronic Engineering, University of Maryland Baltimore County, USA), Sanjiva Prasad(Department of Computer Science and Engineering , Indian Institute of Technology Delhi, Indian), Daniele Sgandurra (ISG Smart Card and IoT Security Centre, Royal Holloway University of London, UK), Yaokai Feng (Faculty of Information Science and Electrical Engineering, Kyushu University, Japan) and Kouichi Sakurai (Faculty of Information Science and Electrical Engineering, Kyushu University, Japan)
A Study on Ransomware Detection Considering User's Document Editing Operation Toshiki Honda, Kohei Mukaiyama, Takeharu Shirai and Masakatsu Nishigaki (Shizuoka University, Japan)
Risk of Web IDE's OS information leakage Kousei Tanaka, Kenta Yamamoto and Taiichi Saito (Tokyo Denki University)
K-anonymous techniques for high-dimensional datasets based on microaggregation Yoko Kamidoi, Chisa Tanaka and Shin'ichi Wakabayashi (Hiroshima City University)
An Examination of CAPTCHA Scheme which can Resist Relay Attack Tatsuda Ryohei (University of Miyazaki), Hisaaki Yamaba (University of Miyazaki), Kentaro Aburada (University of Miyazaki), Tetsuro Katayama (University of Miyazaki), Mirang Park (Kanagawa Institute of Technology) and Naonobu Okazaki (University of Miyazaki)
Towards Visual Steganography Maki Yoshida (NICT)
Proposal of selection method for cyber cybersecurity measures Takeshi Asai, Kiyoto Kawauchi and Ryosuke Shimabe (Mitsubishi Electric Corporation)
Application of Edge Computing for Trust Establishment Favian Dewanta and Masahiro Mambo (Kanazawa University)
* Underlined authors are presenters.
Some poster presenters published their poster document on their will at this page. The documents are only available one week before and after the workshop date.
Every uploaded document regarding the posters is POSTER AUTHORS RESPONSIBILITY. IWSEC2017 accept no responsibility and no liability for any loss resulting from the published documents. IWSEC2017 does not endorses documents that violates any law or infringes the rights
Remarks
Posters were not rigorously refereed, and no proceedings were published regarding the posters, and hence the copyrights of any content for the poster presentations are retained by the authors; there is no restriction for the authors of the posters to submit the contents to other journals/conferences in the future.
Best Poster Awards
Tatsuya Suzuki (Tokai University), Keita Emura (NICT), Hayato Kimura (Tokai University) and Toshihiro Ohigashi (Tokai University)
An Evaluation of Ineffective Fault Analysis on AES using Single-Bit Bit-Set/Reset Faults
Natsu Shoji, Ryuga Matsumura, Takeshi Sugawara and Kazuo Sakiyama (The University of Electro-Communications Department of Informatics)
Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data
Mitsuhiro Hattori (Mitsubishi Electric Corporation), Takato Hirano (Mitsubishi Electric Corporation), Nori Matsuda (Mitsubishi Electric Corporation), Rina Shimizu (Mitsubishi Electric Corporation), Ye Wang (Mitsubishi Electric Research Laboratories)
IWSEC 2017 List of Posters
Hiroki Kuzuno (SECOM Co., Ltd.) and Shintaro Otsuka (LAC Co., Ltd.)
Takanori Oikawa, Kazuyoshi Furukawa, Tetsuya Izu, Masanobu Morinaga, Masahiko Takenaka and Yuki Unno (Fujitsu Laboratories Ltd.)
Mayu Kuroda and Manabu Okamoto (Kanagawa Institute of Technology)
Koji Nuida (AIST / JST PRESTO)
Sota Onozawa (The University of Tokyo), Noboru Kunihiro (The University of Tokyo), Masayuki Yoshino (Hitachi, Ltd.) and Ken Naganuma (Hitachi, Ltd.)
Takuya Fukushima, Minoru Kuribayashi and Nobuo Funabiki (Okayama University)
Hiroki Nishikawa, Takumi Yamamoto, Keisuke Kito and Kiyoto Kawauchi (Mitsubishi Electric Corporation)
Natsu Shoji, Ryuga Matsumura, Takeshi Sugawara and Kazuo Sakiyama (The University of Electro-Communications Department of Informatics)
Takahiro Ueda, Minoru Kuribayashi and Nobuo Funabiki (Okayama University)
Akira Kanaoka (Toho University)
Mitsuhiro Hattori (Mitsubishi Electric Corporation), Takato Hirano (Mitsubishi Electric Corporation), Nori Matsuda (Mitsubishi Electric Corporation), Rina Shimizu (Mitsubishi Electric Corporation), Ye Wang (Mitsubishi Electric Research Laboratories)
Kento Oonishi and Noboru Kunihiro (The University of Tokyo)
Tatsuya Suzuki (Tokai University), Keita Emura (NICT), Hayato Kimura (Tokai University) and Toshihiro Ohigashi (Tokai University)
SeongHan Shin (AIST, Japan), Kazukuni Kobara (AIST, Japan), Chia-Chuan Chuang (NCHC, Taiwan) and Weicheng Huang (NCHC, Taiwan)
Kenta Yamamoto, Taiichi Saito and Miyuki Hirose (Tokyo Denki University)
Tsunato Nakai (Mitsubishi Electric Corporation), Teruyoshi Yamaguchi (Mitsubishi Electric Corporation), Sachihiro Ichikawa (Mitsubishi Electric Corporation), Nobuhiro Kobayashi (Mitsubishi Electric Corporation), Kosuke Hata (The University of Electro-Communications) and Kenji Sawada (The University of Electro-Communications)
Kazuya Imamura and Tetsu Iwata (Nagoya University)
Katsuhiko Ito (Tokai University), Keita Emura (NICT) and Toshihiro Ohigashi (Tokai University)
Shih-Chun You (National Taiwan University, Taiwan) and Chen-Mou Cheng (National Taiwan University, Taiwan / Osaka University, Japan)
Yasuyoshi Jinno (Shizuoka University, Japan), Takashi Tsuchiya (Shizuoka University, Japan), Kenta Takahashi (Hitachi, Ltd., Japan), Wakaha Ogata (Tokyo Institute of Technology, Japan) and Masakatsu Nishigaki (Shizuoka University, Japan)
Ayane Sano, Masahiro Fujita and Masakatsu Nishigaki (Shizuoka University, Japan)
Yosuke Takahashi, Masashi Endo, Hiroaki Matsuno, Hiroaki Muramatsu and Masakatsu Nishigaki (Shizuoka University, Japan)
Hiroaki Anada (University of Nagasaki), Shunsuke Tsumori (Kyushu University), Samiran Bag (Kyushu University), Masakazu Soshi (Hiroshima City University), Atsushi Waseda (NICT) and Kouichi Sakurai (Kyushu University)
Shotaro Usuzaki (University of Miyazaki), Ryusei Fuji (University of Miyazaki), Hisaaki Yamaba (University of Miyazaki), Kentaro Aburada (University of Miyazaki), Sin-Ichiro Kubota (Kumamoto University), Mirang Park (Kanagawa Institute of Technology) and Naonobu Okazaki (University of Miyazaki)
Akinori Kawachi (Osaka University) and Yoshiki Tabata (Tokushima University)
Jiawei Su (Faculty of Information Science and Electrical Engineering, Kyushu University, Japan), Danilo Vasconcellos Vargas (Faculty of Information Science and Electrical Engineering, Kyushu University, Japan), Anupan Joshi (Department of Computer Science and Electronic Engineering, University of Maryland Baltimore County, USA), Sanjiva Prasad(Department of Computer Science and Engineering , Indian Institute of Technology Delhi, Indian), Daniele Sgandurra (ISG Smart Card and IoT Security Centre, Royal Holloway University of London, UK), Yaokai Feng (Faculty of Information Science and Electrical Engineering, Kyushu University, Japan) and Kouichi Sakurai (Faculty of Information Science and Electrical Engineering, Kyushu University, Japan)
Toshiki Honda, Kohei Mukaiyama, Takeharu Shirai and Masakatsu Nishigaki (Shizuoka University, Japan)
Kousei Tanaka, Kenta Yamamoto and Taiichi Saito (Tokyo Denki University)
Yoko Kamidoi, Chisa Tanaka and Shin'ichi Wakabayashi (Hiroshima City University)
Tatsuda Ryohei (University of Miyazaki), Hisaaki Yamaba (University of Miyazaki), Kentaro Aburada (University of Miyazaki), Tetsuro Katayama (University of Miyazaki), Mirang Park (Kanagawa Institute of Technology) and Naonobu Okazaki (University of Miyazaki)
Maki Yoshida (NICT)
Takeshi Asai, Kiyoto Kawauchi and Ryosuke Shimabe (Mitsubishi Electric Corporation)
Favian Dewanta and Masahiro Mambo (Kanazawa University)
* Underlined authors are presenters.
Remarks