Sitemap       English   Japanese

 

We are going to hold "The 5th International Workshop on Cybersecurity" at Kyushu University (Ito Campus) on July 14th.
Please refer to the information below for details regarding this event.

workshop
    

    

Date: 14th July 2017

    

Time: 10:00am - 5:00pm

    

Venue: Inamori Center, Ito Campus, Kyushu University

    
  ・Location:http://www.inamori-center.kyushu-u.ac.jp/access/index.html



ご参加希望の方は、こちらよりお申し込みください     

応募フォーム

    
https://docs.google.com/forms/d/e/1FAIpQLSfcpubix5yEEi0kGWmuscwYr7ItR3V8Iveobz6nZGKmmdmx0A/viewform


 
                                 

10:00- Morning (1) Keynotes  Chair; Koji INOUE

Opening Speech Koji OKAMURA
(KYUSHU University)
Guidance for JST SICORP "Collaboration Hubs for International Research Program (CHIRP)"
  • Yoshimori Honkura

  • (JST; Japan Science and Technology Agency)
    Introduction of Secure IoT with IITD supported by JST
  • Koji OKAMURA

  • (KYUSHU University)
    Cyber-Physical Security for Secure and Resilient Cyber-Physical Systems


    A cyber-physical system that links cyberspace with the physical world through a network of interrelated elements is expected to advance innovations in social systems and industries such as manufacturing,
    agriculture, distribution services, livelihood support, and urban infrastructure grids.
    However, the exponential growth of edge devices such as sensors and robots in cyber-physical systems introduces new security vulnerabilities and risks,
    which may have a more significant impact than those in traditional cyber-security.
    Cyber-Physical Security protects entire cyber-physical systems to make them secure and resilient.
    Some problems are specific to or have a greater significance in Cyber-Physical Systems,including
    (1) the number of edge devices are huge,
    (2) the available sensors and provided services are dynamically changing,
    (3) the life cycle is long and manual maintenance is difficult,
    (4) edge devices have strict constraints on power use,
    (5) connecting legacy systems to the Internet will cause severe security vulnerabilities,
    (6) any risks have a high possibility of affecting physical spaces such as people’s homes and public infrastructure,
    (7) attacks on hardware are possible.
    In this talk, an overview of Cyber-Physical Security is presented, followed by the introduction of some ongoing research such as Cyber-Physical Software Engineering for connected cars and factories,
    design of near future IoT network architecture, and micro OS for highly resilient microcomputers.
  • Yoshio Tanaka

  • (National Institute of Advanced Industrial Science and Technology)

    12:00-13:00 Lunch

    13:00- Afternoon (1) Company and Security  Chair;Koji OKAMURA

    Speech from Executive Vice President (CIO and CISO) of Kyushu UniversityHiroto Yasuura
    (KYUSHU University)
    The Essentials of Security Innovation- FUJITSU's Security Research Strategy


    Focusing on FUJITSU's latest security R&D activities in cyber security,
    biometric authentication, data security including privacy protection and IoT security.
  • Tetsuya Izu

  • (FUJITSU Laboratories Ltd.)
    Cyber security regulation for electric power systems in Japan

    This talk introduces Cybersecurity measurement situation for electric power management system of government and company in Japan and Japanese guideline for power management system and smart meter system.
    The case studies of Cybersecurity incident and Cyber attack information and the activities of Central Research Institute of Electric Power Industry for those incidents are also shown.
  • Akeo Kuwahata

  • (Central Research Institute of Electric Power Industry)
    New synergy between cloud Learning and On-premise LMS(Moodle)

    Description:
    ・Federation for Access to Cloud-based Learning Tool through campus information networks
    ・Utilization of learning data accumulated on Cloud-based Learning Tools for moodle

  • Yoshikazu Sasaki

  • (Nanaroq)
    Security of Yahoo!Japan

    Yahoo! JAPAN service is used by a lot of people.
    Yahoo! JAPAN have introduced various security measure to protect our user data.
    In this talk, "Yahoo! JAPAN ID" and service related to IoT are presnted from the standpoint of User company.
  • Kaoru Toda

  • (Yahoo!Japan Corporation)

    Coffee break

    15:00- Afternoon (2) IoT  Chair;Yoshihiro OKADA

    Truss-worthy Computing


    Truss(verb) means to tie securely.
    A Truss(noun) in engineering is a support structure consisting of struts, beams etc, that strengthens structures such as bridges, roofs, etc.
    In the recent past, we have seen instances of systems built from hardware and software components that have resulted in weakening rather than strengthening the systems, making them more vulnerable to attacks because of an increase in the attack surfaces.
    I will propose the concept of "truss-worthiness”, namely modular combination that are safe, secure and trustworthy, and outline some simple principles for "truss-worthy computing".
  • Sanjiva Prasad

  • (IITD; Indian Institute of Technology Delhi)
    Ubiquitous mass surveillance and narrative fallacy under the rise of IoT


    With the rise of Internet of Things, we face serious problems of data privacy under ubiquitous mass surveillance.
    In this talk, new technologies leveraging ubiquitous mass surveillance is illustrated.
    Also, misuse of data mining in information security which is called as "narrative fallacy" is discussed.
  • Ruo Ando

  • (NII:National Institute of Informatics)
    Recent Trends in White-box Cryptography and its Application to IoT


    A white-box cryptography is the cryptographic primitive that is secure in the white-box model where the adversary has full access
    and control over the implementation and its execution platform.
    There are two directions to realise white-box cryptography: one is converting existing ciphers (i.e. AES) into white-box secure,
    another is designing a new primitive to achieve white-box security.
    This talk introduces some research results of white-box cryptography.
    The first proposal of white-box cryptography was converting AES implementation into white-box secure by Chow et al.
    We first introduce their work and cryptanalysis against Chow et al.'s implementation.
    Recent years, proposals of white-box security in design are getting more attentions.
    We also introduce some of these proposals.
  • Yuto Nakano

  • (KDDI Lab)
    Security for IoT
  • Ranjan Bose

  • (IITD; Indian Institute of Technology Delhi)

    17:30- Dinner (Ten-Ten, Inamori Center)





    Cybersecurity Center of Kyushu university

    Indian Institute of Technology Delhi CoE in Cyber Systems and Information Assurance

    KYUSHU University (KU)

    Indian Institute of Technology Delhi (IITD)