The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Cu(4258hit)

461-480hit(4258hit)

  • An ATM Security Measure for Smart Card Transactions to Prevent Unauthorized Cash Withdrawal Open Access

    Hisao OGATA  Tomoyoshi ISHIKAWA  Norichika MIYAMOTO  Tsutomu MATSUMOTO  

     
    PAPER-Dependable Computing

      Pubricized:
    2018/12/06
      Vol:
    E102-D No:3
      Page(s):
    559-567

    Recently, criminals frequently utilize logical attacks to install malware in the PC of Automated Teller Machines (ATMs) for the sake of unauthorized cash withdrawal from ATMs. Malware in the PC sends unauthorized cash dispensing commands to the dispenser to withdraw cash without generating a transaction. Existing security measures primarily try to protect information property in the PC so as not to be compromised by malware. Such security measures are not so effective or efficient because the PC contains too many protected items to tightly control them in present ATM operational environments. This paper proposes a new ATM security measure based on secure peripheral devices; the secure dispenser in an ATM verifies the authenticity of a received dispensing command with the withdrawal transaction evidence, which is securely transferred from the secure card reader of an ATM. The card reader can capture the transaction evidence since all transaction data flows through the card reader in a smart card transaction. Even though the PC is compromised, unauthorized dispensing commands are not accepted by the secure dispenser. As a result, the new security measure does not impose heavy burden of tighter security managements for the PCs on financial institutes while achieving stringent security for the logical attacks to ATMs.

  • Generation of Efficient Obfuscated Code through Just-in-Time Compilation

    Muhammad HATABA  Ahmed EL-MAHDY  Kazunori UEDA  

     
    LETTER-Dependable Computing

      Pubricized:
    2018/11/22
      Vol:
    E102-D No:3
      Page(s):
    645-649

    Nowadays the computing technology is going through a major paradigm shift. Local processing platforms are being replaced by physically out of reach yet more powerful and scalable environments such as the cloud computing platforms. Previously, we introduced the OJIT system as a novel approach for obfuscating remotely executed programs, making them difficult for adversaries to reverse-engineer. The system exploited the JIT compilation technology to randomly and dynamically transform the code, making it constantly changing, thereby complicating the execution state. This work aims to propose the new design iOJIT, as an enhanced approach that patches the old systems shortcomings, and potentially provides more effective obfuscation. Here, we present an analytic study of the obfuscation techniques on the generated code and the cost of applying such transformations in terms of execution time and performance overhead. Based upon this profiling study, we implemented a new algorithm to choose which obfuscation techniques would be better chosen for “efficient” obfuscation according to our metrics, i.e., less prone to security attacks. Another goal was to study the system performance with different applications. Therefore, we applied our system on a cloud platform running different standard benchmarks from SPEC suite.

  • Recognition of Collocation Frames from Sentences

    Xiaoxia LIU  Degen HUANG  Zhangzhi YIN  Fuji REN  

     
    PAPER-Natural Language Processing

      Pubricized:
    2018/12/14
      Vol:
    E102-D No:3
      Page(s):
    620-627

    Collocation is a ubiquitous phenomenon in languages and accurate collocation recognition and extraction is of great significance to many natural language processing tasks. Collocations can be differentiated from simple bigram collocations to collocation frames (referring to distant multi-gram collocations). So far little focus is put on collocation frames. Oriented to translation and parsing, this study aims to recognize and extract the longest possible collocation frames from given sentences. We first extract bigram collocations with distributional semantics based method by introducing collocation patterns and integrating some state-of-the-art association measures. Based on bigram collocations extracted by the proposed method, we get the longest collocation frames according to recursive nature and linguistic rules of collocations. Compared with the baseline systems, the proposed method performs significantly better in bigram collocation extraction both in precision and recall. And in extracting collocation frames, the proposed method performs even better with the precision similar to its bigram collocation extraction results.

  • Comprehensive Damage Assessment of Cyberattacks on Defense Mission Systems

    Seung Keun YOO  Doo-Kwon BAIK  

     
    LETTER-Dependable Computing

      Pubricized:
    2018/11/06
      Vol:
    E102-D No:2
      Page(s):
    402-405

    This letter proposes a comprehensive assessment of the mission-level damage caused by cyberattacks on an entire defense mission system. We experimentally prove that our method produces swift and accurate assessment results and that it can be applied to actual defense applications. This study contributes to the enhancement of cyber damage assessment with a faster and more accurate method.

  • Optimizing Slot Utilization and Network Topology for Communication Pattern on Circuit-Switched Parallel Computing Systems

    Yao HU  Michihiro KOIBUCHI  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2018/11/16
      Vol:
    E102-D No:2
      Page(s):
    247-260

    In parallel computing systems, the interconnection network forms the critical infrastructure which enables robust and scalable communication between hundreds of thousands of nodes. The traditional packet-switched network tends to suffer from long communication time when network congestion occurs. In this context, we explore the use of circuit switching (CS) to replace packet switches with custom hardware that supports circuit-based switching efficiently with low latency. In our target CS network, a certain amount of bandwidth is guaranteed for each communication pair so that the network latency can be predictable when a limited number of node pairs exchange messages. The number of allocated time slots in every switch is a direct factor to affect the end-to-end latency, we thereby improve the slot utilization and develop a network topology generator to minimize the number of time slots optimized to target applications whose communication patterns are predictable. By a quantitative discrete-event simulation, we illustrate that the minimum necessary number of slots can be reduced to a small number in a generated topology by our design methodology while maintaining network cost 50% less than that in standard tori topologies.

  • Hardware-Accelerated Secured Naïve Bayesian Filter Based on Partially Homomorphic Encryption

    Song BIAN  Masayuki HIROMOTO  Takashi SATO  

     
    PAPER-Cryptography and Information Security

      Vol:
    E102-A No:2
      Page(s):
    430-439

    In this work, we provide the first practical secure email filtering scheme based on homomorphic encryption. Specifically, we construct a secure naïve Bayesian filter (SNBF) using the Paillier scheme, a partially homomorphic encryption (PHE) scheme. We first show that SNBF can be implemented with only the additive homomorphism, thus eliminating the need to employ expensive fully homomorphic schemes. In addition, the design space for specialized hardware architecture realizing SNBF is explored. We utilize a recursive Karatsuba Montgomery structure to accelerate the homomorphic operations, where multiplication of 2048-bit integers are carried out. Through the experiment, both software and hardware versions of the SNBF are implemented. On software, 104-105x runtime and 103x storage reduction are achieved by SNBF, when compared to existing fully homomorphic approaches. By instantiating the designed hardware for SNBF, a further 33x runtime and 1919x power reduction are achieved. The proposed hardware implementation classifies an average-length email in under 0.5s, which is much more practical than existing solutions.

  • A Coil-Shaped Near-Field Probe Design for EMI Applications

    Chi-Yuan YAO  Wen-Jiao LIAO  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Pubricized:
    2018/08/20
      Vol:
    E102-B No:2
      Page(s):
    337-344

    Coil-shaped structures are proposed to enhance sensitivity and spatial resolution for EMI near-field probe. This design yields a high sensitivity and a good spatial resolution to find the EMI source in near-field region. Both characteristics are crucial to diagnosis of emissions from electrical and electronic devices. The new design yields a superior sensitivity, which is in general 15 dB greater than conventional probes. This new probe helps practitioners to quickly and correctly locate noise emission source areas on printed circuit boards and devices. Two prototypes of different sizes were fabricated. The larger one provides a high sensitivity while the smaller one can pinpoint emission source locations. The new probe design also has an orientation invariance feature. Its noise response levels are similar for all probe directions. This characteristic can help reduced the probability at miss-detection since sensitivity is largely invariant to its orientation. Extensive measurements were performed to verify the operation mechanism and to assess probe characteristics. It suits well to the electromagnetic interference problem diagnosis.

  • Influence of Polarity of Polarization Charge Induced by Spontaneous Orientation of Polar Molecules on Electron Injection in Organic Semiconductor Devices

    Yuya TANAKA  Takahiro MAKINO  Hisao ISHII  

     
    BRIEF PAPER

      Vol:
    E102-C No:2
      Page(s):
    172-175

    On surfaces of tris-(8-hydroxyquinolate) aluminum (Alq) and tris(7-propyl-8-hydroxyquinolinato) aluminum (Al7p) thin-films, positive and negative polarization charges appear, respectively, owing to spontaneous orientation of these polar molecules. Alq is a typical electron transport material where electrons are injected from cathode. Because the polarization charge exists at the Alq/cathode interface, it is likely that it affects the electron injection process because of Coulomb interaction. In order to evaluate an impact of polarization charge on electron injection from cathode, electron only devices (EODs) composed of Alq or Al7p were prepared and evaluated by displacement current measurement. We found that Alq-EOD has lower resistance than Al7p-EOD, indicating that the positive polarization charge at Alq/cathode interface enhances the electron injection due to Coulomb attraction, while the electron injection is suppressed by the negative polarization charge at the Al7p/Al interface. These results clearly suggest that it is necessary to design organic semiconductor devices by taking polarization charge into account.

  • A Small Printed Inverted-F Antenna for Circular Polarization

    Takafumi FUJIMOTO  Keigo SHIMIZU  

     
    PAPER-Antennas

      Pubricized:
    2018/08/21
      Vol:
    E102-B No:2
      Page(s):
    197-204

    In this paper, a printed inverted-F antenna for radiating circularly polarized wave around its resonant frequency is proposed. To get good axial ratio at the frequency band with 10dB-return loss, a rectangular element is loaded at the feeding line perpendicularly. The axial ratio and the frequency giving the minimum axial ratio can be adjusted by the ratio of the length to the width of the whole antenna and by the dimension of the loaded rectangular element. The operational principle for circular polarization is explained using the electric current distributions. Moreover, the approach of the enhancement for the bandwidth is discussed. The simulated and measured bandwidths of the 10dB-return loss with a 3dB-axial ratio are 2.375GHz-2.591GHz (216MHz) and 2.350-2.534GHz (184MHz), respectively. The proposed antenna's dimension is 0.067λ2c (λc is the wavelength at the center frequency). The proposed antenna is compact and planar, and is therefore useful for circular polarization in the ISM band.

  • Coaxially Fed Antenna Composed of Monopole and Choke Structure Using Two Different Configurations of Composite Right/Left-Handed Coaxial Lines

    Takatsugu FUKUSHIMA  Naobumi MICHISHITA  Hisashi MORISHITA  Naoya FUJIMOTO  

     
    PAPER-Antennas

      Pubricized:
    2018/08/21
      Vol:
    E102-B No:2
      Page(s):
    205-215

    Two kinds of composite right/left-handed coaxial lines (CRLH CLs) are designed for an antenna element. The dispersion relations of the infinite periodic CRLH CLs are designed to occur -1st resonance at around 700 MHz, respectively. The designed CRLH CLs comprise a monopole and a choke structure for antenna elements. To verify the resonant modes and frequencies, the monopole structure, the choke structure, and the antenna element which is combined the monopole and the choke structures are simulated by eigenmode analysis. The resonant frequencies correspond to the dispersion relations. The monopole and the choke structures are applied to the coaxially fed antenna. The proposed antenna matches at 710 MHz and radiates. At the resonant frequency, the total length of the proposed antenna which is the length of the monopole structure plus the choke structure is 0.12 wavelength. The characteristics of the proposed antenna has been compared with that of the conventional coaxially fed monopole antenna without the choke structure and the sleeve antenna with the quarter-wavelength choke structure. The radiation pattern of the proposed antenna is omnidirectional, the total antenna efficiency is 0.73 at resonant frequencies, and leakage current is suppressed lesser than -10 dB at resonant frequency. The propose antenna is fabricated and measured. The measured |S11| characteristics, radiation patterns, and the total antenna efficiency are in good agreement with the simulated results.

  • Biodegradable Neural Cell Culture Sheet Made of Polyanhydride thin Film with Micro-Trench Structures

    Yuki NAKAMURA  Satomitsu IMAI  

     
    BRIEF PAPER

      Vol:
    E102-C No:2
      Page(s):
    164-167

    Technological developments in direction control of axonal outgrowth are a must for advances in regenerative medicine of the nervous system. In order to solve the problem, we fabricate a new neural cell culture sheet by applying the soft lithography technique to micro-patterning of the extracellular matrix and using thin-film biodegradable polymer for the scaffold. Micro-trenches were coated with Dulbecco's phosphate-buffered saline (-) containing laminin, using micro-molding in capillaries (MIMIC), a soft lithography technique. Biodegradable thin films with micro-trenches were fabricated by UV-curing a polyanhydride solution covering the negative SU-8 mold through thiol-ene polymerization. Both approaches were performed conveniently, rapidly, and accurately. It is thought that these techniques are excellent in terms of convenience and high speed, and can contribute greatly to regenerative medicine.

  • An Empirical Study of README contents for JavaScript Packages

    Shohei IKEDA  Akinori IHARA  Raula Gaikovina KULA  Kenichi MATSUMOTO  

     
    PAPER-Software Engineering

      Pubricized:
    2018/10/24
      Vol:
    E102-D No:2
      Page(s):
    280-288

    Contemporary software projects often utilize a README.md to share crucial information such as installation and usage examples related to their software. Furthermore, these files serve as an important source of updated and useful documentation for developers and prospective users of the software. Nonetheless, both novice and seasoned developers are sometimes unsure of what is required for a good README file. To understand the contents of README, we investigate the contents of 43,900 JavaScript packages. Results show that these packages contain common content themes (i.e., ‘usage’, ‘install’ and ‘license’). Furthermore, we find that application-specific packages more frequently included content themes such as ‘options’, while library-based packages more frequently included other specific content themes (i.e., ‘install’ and ‘license’).

  • Introduction to Electromagnetic Information Security Open Access

    Yu-ichi HAYASHI  Naofumi HOMMA  

     
    INVITED SURVEY PAPER-Fundamental Theories for Communications

      Pubricized:
    2018/08/17
      Vol:
    E102-B No:1
      Page(s):
    40-50

    With the rising importance of information security, the necessity of implementing better security measures in the physical layer as well as the upper layers is becoming increasing apparent. Given the development of more accurate and less expensive measurement devices, high-performance computers, and larger storage devices, the threat of advanced attacks at the physical level has expanded from the military and governmental spheres to commercial products. In this paper, we review the issue of information security degradation through electromagnetic (EM)-based compromising of security measures in the physical layer (i.e., EM information security). Owing to the invisibility of EM radiation, such attacks can be serious threats. We first introduce the mechanism of information leakage through EM radiation and interference and then present possible countermeasures. Finally, we explain the latest research and standardization trends related to EM information security.

  • Perpendicular-Corporate Feed in a Four-Layer Circularly-Polarized Parallel-Plate Slot Array

    Hisanori IRIE  Takashi TOMURA  Jiro HIROKAWA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2018/07/10
      Vol:
    E102-B No:1
      Page(s):
    137-146

    This paper presents a design for the perpendicular-corporate feed in a four-layer circularly-polarized parallel-plate slot array antenna. We place a dielectric layer with adequate permittivity in the region between the coupling-aperture and the radiating-slot layers to remove x-shaped cavity walls completely in the radiating part of a conventional planar corporate-feed waveguide slot array antenna. To address fabrication constraints, the dielectric layer consists of PTFE and air. It excites a strong standing wave in the region and so provides 2×2-element subarrays with uniform excitation. None of the slot layers are in electrical contact due to air gaps between the slot layers. The four-layer structure with apertures for circular polarization contributes to wideband design for axial ratios because of the eigenmodes in the desired band. We realize an 11.9% bandwidth for axial ratios of less than 3.0dB as confirmed by measurements in the 60GHz band. At the design frequency, the measured realized gain is 32.7dBi with an antenna efficiency of 75.5%.

  • Robust and Secure Data Hiding for PDF Text Document

    Minoru KURIBAYASHI  Takuya FUKUSHIMA  Nobuo FUNABIKI  

     
    PAPER

      Pubricized:
    2018/10/19
      Vol:
    E102-D No:1
      Page(s):
    41-47

    The spaces between words and paragraphs are popular places for embedding data in data hiding techniques for text documents. Due to the low redundancy in text documents, the payload is limited to be small. As each bit of data is independently inserted into specific spaces in conventional methods, a malicious party may be able to modify the data without causing serious visible distortions. In this paper, we regard a collection of space lengths as a one-dimensional feature vector and embed watermark into its frequency components. To keep the secrecy of the embedded information, a random permutation and dither modulation are introduced in the operation. Furthermore, robustness against additive noise is enhanced by controlling the payload. In the proposed method, through experiments, we evaluated the trade-off among payload, distortion, and robustness.

  • Elliptic Curve Method Using Complex Multiplication Method Open Access

    Yusuke AIKAWA  Koji NUIDA  Masaaki SHIRASE  

     
    PAPER

      Vol:
    E102-A No:1
      Page(s):
    74-80

    In 2017, Shirase proposed a variant of Elliptic Curve Method combined with Complex Multiplication method for generating certain special kinds of elliptic curves. His algorithm can efficiently factorize a given composite integer when it has a prime factor p of the form 4p=1+Dv2 for some integer v, where -D is an auxiliary input integer called a discriminant. However, there is a disadvantage that the previous method works only for restricted cases where the class polynomial associated to -D has degree at most two. In this paper, we propose a generalization of the previous algorithm to the cases of class polynomials having arbitrary degrees, which enlarges the class of composite integers factorizable by our algorithm. We also extend the algorithm to more various cases where we have 4p=t2+Dv2 and p+1-t is a smooth integer.

  • New Distinguisher on Reduced-Round Keccak Sponge Function

    Senyang HUANG  Xiaoyun WANG  Guangwu XU  Meiqin WANG  Jingyuan ZHAO  

     
    PAPER-Cryptography and Information Security

      Vol:
    E102-A No:1
      Page(s):
    242-250

    The security analysis of Keccak, the winner of SHA-3, has attracted considerable interest. Recently, some attention has been paid to distinguishing Keccak sponge function from random permutation. In EUROCRYPT'17, Huang et al. proposed conditional cube tester to recover the key of Keccak-MAC and Keyak and to construct practical distinguishing attacks on Keccak sponge function up to 7 rounds. In this paper, we improve the conditional cube tester model by refining the formulation of cube variables. By classifying cube variables into three different types and working the candidates of these types of cube variable carefully, we are able to establish a new theoretical distinguisher on 8-round Keccak sponge function. Our result is more efficient and greatly improves the existing results. Finally we remark that our distinguishing attack on the the reduced-round Keccak will not threat the security margin of the Keccak sponge function.

  • Automated Detection of Children at Risk of Chinese Handwriting Difficulties Using Handwriting Process Information: An Exploratory Study

    Zhiming WU  Tao LIN  Ming LI  

     
    PAPER-Educational Technology

      Pubricized:
    2018/10/22
      Vol:
    E102-D No:1
      Page(s):
    147-155

    Handwriting difficulties (HWDs) in children have adverse effects on their confidence and academic progress. Detecting HWDs is the first crucial step toward clinical or teaching intervention for children with HWDs. To date, how to automatically detect HWDs is still a challenge, although digitizing tablets have provided an opportunity to automatically collect handwriting process information. Especially, to our best knowledge, there is no exploration into the potential of combining machine learning algorithms and the handwriting process information to automatically detect Chinese HWDs in children. To bridge the gap, we first conducted an experiment to collect sample data and then compared the performance of five commonly used classification algorithms (Decision tree, Support Vector Machine (SVM), Artificial Neural Network, Naïve Bayesian and k-Nearest Neighbor) in detecting HWDs. The results showed that: (1) only a small proportion (13%) of children had Chinese HWDs and each classification model on the imbalanced dataset (39 children at risk of HWDs versus 261 typical children) produced the results that were better than random guesses, indicating the possibility of using classification algorithms to detect Chinese HWDs; (2) the SVM model had the best performance in detecting Chinese HWDs among the five classification models; and (3) the performance of the SVM model, especially its sensitivity, could be significantly improved by employing the Synthetic Minority Oversampling Technique to handle the class-imbalanced data. This study gains new insights into which handwriting features are predictive of Chinese HWDs in children and proposes a method that can help the clinical and educational professionals to automatically detect children at risk of Chinese HWDs.

  • Post-Quantum Security of IGE Mode Encryption in Telegram

    Jeeun LEE  Sungsook KIM  Seunghyun LEE  Kwangjo KIM  

     
    LETTER

      Vol:
    E102-A No:1
      Page(s):
    148-151

    IGE mode used in Telegram's customized protocol has not been fully investigated in terms of post-quantum security. In this letter, we show that IGE mode is IND-qCPA insecure by Simon's algorithm, assuming that the underlying block cipher is a standard-secure pseudorandom function (sPRF). Under a stronger assumption that the block cipher is a quantum-secure pseudorandom function (qPRF), IND-qCPA security of IGE mode is proved using one-way to hiding lemma.

  • Token Model and Interpretation Function for Blockchain-Based FinTech Applications Open Access

    Kanta MATSUURA  

     
    INVITED PAPER

      Vol:
    E102-A No:1
      Page(s):
    3-10

    Financial Technology (FinTech) is considered a taxonomy that describes a wide range of ICT (information and communications technology) associated with financial transactions and related operations. Improvement of service quality is the main issue addressed in this taxonomy, and there are a large number of emerging technologies including blockchain-based cryptocurrencies and smart contracts. Due to its innovative nature in accounting, blockchain can also be used in lots of other FinTech contexts where token models play an important role for financial engineering. This paper revisits some of the key concepts accumulated behind this trend, and shows a generalized understanding of the technology using an adapted stochastic process. With a focus on financial instruments using blockchain, research directions toward stable applications are identified with the help of a newly proposed stabilizer: interpretation function of token valuation. The idea of adapted stochastic process is essential for the stabilizer, too.

461-480hit(4258hit)