Accepted Papers
Filtering Malicious JavaScript Code with Doc2Vec on an Imbalanced Dataset
Mamoru Mimura (National Defense Academy), Yuya Suga (National Defense Academy)
Detecting Unknown Malware from ASCII Strings with Natural Language Processing Techniques
Ryo Ito (National Defense Academy), Mamoru Mimura (National Defense Academy )
Signcryption from NTRU Lattices Without Random Oracles
Zi-Yuan Liu (Nation Chengchi University), Raylin Tso (Nation Chengchi University ), Yi-Fan Tseng (Nation Chengchi University ), Masahiro Mambo (Kanazawa University )
Learnable Audio Encryption for Untrusted Outsourcing Machine Learning Services
Po-Wen Chi (National Taiwan Normal University), Pin-Hsin Hsiao (National Taiwan Normal University )
Watermarking Technique Based on Harris-Laplace Feature Point Detector Capable of Resisting Geometric Attacks
Kuo-Lung Hung (Chao-Yang University of Technology ), Chih-Yu Yen (Chao-Yang University of Technology )
Malware Classification using Early Stage Behavioral Analysis
Nitesh Kumar (Indian Institute of Technology), Subhasis Mukhopadhyay (Indian Institute of Technology), Mugdha Gupta (Indian Institute of Technology), Anand Handa (Indian Institute of Technology), Sandeep K. Shukla (Indian Institute of Technology)
String commitment schemes with low output locality
Hideaki Miyaji (Osaka University), Akinori Kawachi (Mie University), Atsuko Miyaji (Osaka University / JAIST)
Secure Online-Efficient Interval Test based on Empty-Set Check
Katsunari Shishido (Osaka University), Atsuko Miyaji (Osaka University / JAIST)
Subliminal Channels in the Code-based Ring Signature Scheme
Bingsen Wang (Sun Yat-sen University ), Zhuoran Zhang (Sun Yat-sen University ), Fangguo Zhang (Sun Yat-sen University )
Prevention of Data Leakage due to Implicit Information Flows in Android Applications
Hiroki Inayoshi (Nagoya Institute of Technology), Shohei Kakei (Nagoya Institute of Technology), Eiji Takimoto (Ritsumeikan University), Koichi Mouri (Ritsumeikan University), Shoichi Saito (Nagoya Institute of Technology)
Designing Authentication and Authorization System with Blockchain
Yuki Ezawa (Kobe University), Makoto Takita (University of Hyogo), Yoshiaki Shiraishi (Kobe University), Shohei Kakei (Nagoya Institute of Technology), Masanori Hirotomo (Saga University), Youji Fukuta (Kindai University), Masami Mohri (Gifu University), Masakatu Morii (Kobe University )
A Signature Scheme Based on the Syndrome Decoding Problem Using LDPC Codes
Toshiki Tsuchida (Kobe University), Masanori Hirotomo (Saga University), Haruka Ito (Saga University ), Makoto Takita (University of Hyogo), Yoshiaki Shiraishi (Kobe University), Kenta Nomura (PwC Cyber Services LLC / Kobe University), Masami Mohri (Gifu University), Youji Fuukta (Kindai University), Masakatu Morii (Kobe University )
Password Strength Measurement without Password Disclosure
Taku Sugai (Toho University ), Toshihiro Ohigashi (Tokai University ), Yoshio Kakizaki (Tokyo Denki University ), Akira Kanaoka (Toho University)
Privacy and Integrity Protection of Metering Data in Smart Grid
Yong Ding (Peng Cheng Laboratory ), Bingyao Wang (Guilin University of Electronic Technology ), Yujue Wang (Guilin University of Electronic Technology), Kun Zhang (National Information Center ), Huiyong Wang (Guilin University of Electronic Technology)
Analysis of Division Property using MILP method for Lightweight Blockcipher Piccolo
Hiroki Sato (National Defense Academy), Mamoru Mimura (National Defense Academy), Hidema Tanaka (National Defense Academy)
Boosting Fuzzing Performance with Differential Seed Scheduling
Chung-Yi Lin (National Chiao Tung University ), Chia-Wei Tien (Institute for Information Industry ), Chun-Ying Huang (National Chiao Tung University)
Platform Design and Implementation for Flexible Data Processing and Building ML models of IDS Alerts
Iksoo Shin (University of Science & Technology ), Yunsoo Choi (Korea Institute of Science & Technology ), Taewoong Kwon (Korea Institute of Science & Technology ), Hyeakro Lee (Korea Institute of Science & Technology ), Jungsuk Song (Korea Institute of Science & Technology)
Counter Attack against the Bus-Off Attack on CAN
Masaru Takada (Kobe University ), Yuki Osada (Kobe University ), Masakatu Morii (Kobe University)
Privacy Risk Evaluation of Re-identification of Pseudonyms
Yuma Takeuchi (Kanazawa university), Shogo Kitajima (Kanazawa university), Kazuya Fukushima (Kanazawa university), Masahiro Mambo (Kanazawa university)
Identification Scheme Based on the Binary Syndrome Decoding Problem Using High-Density Parity-Check Matrices
Masanori Hirotomo (Saga University), Haruka Ito (Saga University), Youji Fukuta (Kindai University), Masami Mohri (Gifu University), Yoshiaki Shiraishi (Kobe University)
Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices
Bing-Kai Hong (National Taiwan University of Science and Technology), Jr-Wei Huang (National Taiwan University of Science and Technology), Tao Ban (National Institute of Information and Communications Technology), Ryoichi Isawa (National Institute of Information and Communications Technology), Shin-Ming Cheng (National Taiwan University of Science and Technology), Daisuke Inoue (National Institute of Information and Communications Technology), Koji Nakao (National Institute of Information and Communications Technology)
Prediction of Crime Occurrence using Information Propagation Model and Gaussian Process
Shusuke Morimoto (Carnegie Mellon University), Kilho Shin (University of Hyogo), Hajime Kawamukai (University of Hyogo)
Enabling Cybersecurity Incident Reporting and Coordinated Handling for Maritime Sector
Bilhanan Silverajan (Tampere University), Petteri Vistiaho (Tampere University)