IWSEC 2021

September 8 (Wed) -- 10 (Fri), 2021
ONLINE

Program

September 8th, 2021

Time (JST) Session Content
17:00 Opening Remarks & Award Ceremony  
17:15 Keynote Talk 1

Session Chair: Ryo Nojima (NICT, Japan)

Toward Accurate Data Analysis under Local Privacy
Dr. Takao Murakami
18:15 Break  
18:25 Session 1: Lattice-based Cryptography

Session Chair: Atsushi Takayasu (NICT, Japan)

A trace map attack against special ring-LWE samples
Yasuhiko Ikematsu, Satoshi Nakamura and Masaya Yasuda

Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem
Shusaku Uemura, Kazuhide Fukushima, Shinsaku Kiyomoto, Momonari Kudo and Tsuyoshi Takagi

19:15 Break  
19:30 Session 2: System Security

Session Chair: Akira Yamada (KDDI Research, Inc., Japan)

KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption
Hiroki Kuzuno and Toshihiro Yamauchi

(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring
Toru Nakamura, Hiroshi Ito, Shinsaku Kiyomoto and Toshihiro Yamauchi

20:20 Session 3: Multiparty Computation

Session Chair: Chen-Mou Cheng (Kanazawa University, Japan)

Evolving Homomorphic Secret Sharing for Hierarchical Access Structures
Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung and Kanta Matsuura

20:45
--
21:30
Social Hour  

September 9th, 2021

Time (JST) Session Content
17:00 Keynote Talk 2

Session Chair: Toru Nakanishi (Hiroshima University, Japan)

A journey in vector commitments
Prof. Dario Fiore
18:00 Break  
18:10 Session 4: Machine Learning and Security

Session Chair: Yuji Suga (Internet Initiative Japan Inc., Japan)

Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions
Yun Fan, Toshiki Shibahara, Yuichi Ohsita, Daiki Chiba, Mitsuaki Akiyama and Masayuki Murata

Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language
Hisaaki Yamaba, Ahmad Saiful Aqmal Bin Ahmad Sohaimi, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Mirang Park and Naonobu Okazaki

19:00 Break  
19:15 Session 5: Post-quantum Cryptography (1)

Session Chair: Katsuyuki Takashima (Waseda University, Japan)

Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices
Yasufumi Hashimoto

FFT Program Generation for Ring LWE-based Cryptography
Masahiro Masuda and Yukiyoshi Kameyama

20:05 Session 6: Symmetric-key Cryptography

Session Chair: Kazuhiko Minematsu (NEC, Japan)

Optimum Attack on 3-Round Feistel-2 Structure
Takanori Daiza and Kaoru Kurosawa

20:30 Break  
20:40
--
21:30
Poster Session  

September 10th, 2021

Time (JST) Session Content
9:00 Session 7: Post-quantum Cryptography (2)

Session Chair: Yuichi Komano (Toshiba Corporation, Japan)

An Intermediate Secret-Guessing Attack on Hash-Based Signatures
Roland Booth, Yanhong Xu, Sabyasachi Karati and Reihaneh Safavi-Naini

(Short Paper) Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH
Jason T. LeGrow and Aaron Huchinson

(Short Paper) Simple Matrix Signature Scheme
Changze Yin, Yacheng Wang and Tsuyoshi Takagi

10:15 Break  
10:25 Session 8: Game Theory and Security

Session Chair:Koki Hamada (NTT, Japan)

Moving Target Defense for Cloud Control Game
Koji Hamasaki and Hitoshi Hohjo

10:50 Break  
11:00 SCIS/CSS Session (Presentation Only)

Session Chair: Noboru Kunihiro (University of Tsukuba, Japan) and Masaya Yasuda (Rikkyo University, Japan)

Fundamental Study on Forcible EM Information Leakage Caused by Continuous Waves Injection into Electronic Devices
Shugo Kaji, Daisuke Fujimoto, Masahiro Kinugawa and Yuichi Hayashi

Design and Implementation of a Post-Quantum Authenticated Key Exchange Protocol for Signal
Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski and Thomas Prest

On Non-interactive Secure Multi-party Computation: New Constructions and Analysis
Reo Eriguchi, Kazuma Ohara, Shota Yamada and Koji Nuida

A Study on ASPATH Validation Protocol Based on Aggregate Signatures and Its Experimental Evaluations
Tatsuya Takemura, Naoto Yanai, Naoki Umeda, Masayuki Okada, Shingo Okamura

Proof of Work based Preimage Problem of Variants of SHA-3 with ASIC Resistance
Takaki Asanuma, Takanori Isobe

Large-scale Survey on Secure Development of IoT Devices by Software Analysis and Vendor Interview
Shugo Shiraishi, Akifumi Fukumoto, Ryota Yoshimoto, Eitaro Shioji, Mitsuaki Akiyama, Toshihiro Yamauchi

13:00
--
13:05
Closing  

Accepted Papers

Track A

  • #1 "A cryptanalysis of ring-LWE via the trace map"
    Yasuhiko Ikematsu, Satoshi Nakamura and Masaya Yasuda
  • #2 "Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices"
    Yasufumi Hashimoto
  • #8 (Short Paper) "Simple Matrix Signature Scheme"
    Changze Yin, Yacheng Wang and Tsuyoshi Takagi
  • #10 "Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem"
    Shusaku Uemura, Kazuhide Fukushima, Shinsaku Kiyomoto, Momonari Kudo and Tsuyoshi Takagi
  • #16 "Optimum Attack on 3-Round Feistel-2 Structure"
    Takanori Daiza and Kaoru Kurosawa
  • #20 (Short Paper) "Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH"
    Jason LeGrow and Aaron Huchinson
  • #22 "Evolving Homomorphic Secret Sharing for Hierarchical Access Structures"
    Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung and Kanta Matsuura
  • #23 "FFT Program Generation for Ring LWE-based Cryptography"
    Masahiro Masuda and Yukiyoshi Kameyama
  • #35 "An Intermediate Secret-Guessing Attack on Hash-Based Signatures"
    Roland Booth, Yanhong Xu, Sabyasachi Karati and Reihaneh Safavi-Naini

Track B

  • #14 (Short Paper) "Evidence Collection and Preservation System with Virtual Machine Monitoring"
    Toru Nakamura, Hiroshi Ito, Shinsaku Kiyomoto and Toshihiro Yamauchi
  • #17 "Moving Target Defense for Cloud Control Game"
    Koji Hamasaki and Hitoshi Hohjo
  • #24 "Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions"
    Yun Fan, Toshiki Shibahara, Yuichi Ohsita, Daiki Chiba, Mitsuaki Akiyama and Masayuki Murata
  • #27 "KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption"
    Hiroki Kuzuno and Toshihiro Yamauchi
  • #28 "Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language"
    Hisaaki Yamaba, Ahmad Saiful Aqmal Bin Ahmad Sohaimi, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Mirang Park and Naonobu Okazaki

Accepted Posters

  • "Security Risk of Malicious Sites Direction Caused by Misinterpretation of Special Characters in URL"
    Satoki Tsuji, Hajime Shimada, Yukiko Yamaguchi and Hirokazu Hasegawa
  • "Selection of primes in the KLPT algorithm for construction of fast isogeny"
    Yasushi Takahashi, Yuta Kambe, Masaya Yasuda and Kazuhiro Yokoyama
  • "Efficient Verifiable Dynamic Searchable Symmetric Encryption with a Tree-based Index"
    Kyohei Ozawa, Ryuji Miyoshi and Hiroaki Yamamoto
  • "Unsupervised Anomaly Detection for KDD-Cup99 Data Using Self-Organizing Map and Convolutional Encoder"
    Hiroshi Dozono and Koki Yoshioka
  • "Towards Estimating Radio Resources Wasted by IoT Botnet Attacks"
    Xuping Huang, Shunsuke Mochizuki and Katsunari Yoshioka