The 5th International Workshop on Cybersecurity
We are going to hold "The 5th International Workshop on Cybersecurity" at Kyushu University (Ito Campus) on July 14th.
Please refer to the information below for details regarding this event.
Date: 14th July 2017
Time: 10:00am - 5:00pm
Venue: Inamori Center, Ito Campus, Kyushu University
|Opening Speech||Koji OKAMURA
|Guidance for JST SICORP "Collaboration Hubs for International Research Program (CHIRP)"||
(JST; Japan Science and Technology Agency)
|Introduction of Secure IoT with IITD supported by JST||
|Cyber-Physical Security for Secure and Resilient Cyber-Physical Systems
A cyber-physical system that links cyberspace with the physical world through a network of interrelated elements is expected to advance innovations in social systems and industries such as manufacturing,
agriculture, distribution services, livelihood support, and urban infrastructure grids.
However, the exponential growth of edge devices such as sensors and robots in cyber-physical systems introduces new security vulnerabilities and risks,
which may have a more significant impact than those in traditional cyber-security.
Cyber-Physical Security protects entire cyber-physical systems to make them secure and resilient.
Some problems are specific to or have a greater significance in Cyber-Physical Systems,including
(1) the number of edge devices are huge,
(2) the available sensors and provided services are dynamically changing,
(3) the life cycle is long and manual maintenance is difficult,
(4) edge devices have strict constraints on power use,
(5) connecting legacy systems to the Internet will cause severe security vulnerabilities,
(6) any risks have a high possibility of affecting physical spaces such as people’s homes and public infrastructure,
(7) attacks on hardware are possible.
In this talk, an overview of Cyber-Physical Security is presented, followed by the introduction of some ongoing research such as Cyber-Physical Software Engineering for connected cars and factories,
design of near future IoT network architecture, and micro OS for highly resilient microcomputers.
(National Institute of Advanced Industrial Science and Technology)
|Speech from Executive Vice President (CIO and CISO) of Kyushu University||Hiroto Yasuura
|The Essentials of Security Innovation- FUJITSU's Security Research Strategy
Focusing on FUJITSU's latest security R&D activities in cyber security,
biometric authentication, data security including privacy protection and IoT security.
(FUJITSU Laboratories Ltd.)
|Cyber security regulation for electric power systems in Japan
This talk introduces Cybersecurity measurement situation for electric power management system of government and company in Japan and Japanese guideline for power management system and smart meter system.
The case studies of Cybersecurity incident and Cyber attack information and the activities of Central Research Institute of Electric Power Industry for those incidents are also shown.
(Central Research Institute of Electric Power Industry)
|New synergy between cloud Learning and On-premise LMS(Moodle)
・Federation for Access to Cloud-based Learning Tool through campus information networks
・Utilization of learning data accumulated on Cloud-based Learning Tools for moodle
|Security of Yahoo!Japan
Yahoo! JAPAN service is used by a lot of people.
Yahoo! JAPAN have introduced various security measure to protect our user data.
In this talk, "Yahoo! JAPAN ID" and service related to IoT are presnted from the standpoint of User company.
Truss(verb) means to tie securely.
A Truss(noun) in engineering is a support structure consisting of struts, beams etc, that strengthens structures such as bridges, roofs, etc.
In the recent past, we have seen instances of systems built from hardware and software components that have resulted in weakening rather than strengthening the systems, making them more vulnerable to attacks because of an increase in the attack surfaces.
I will propose the concept of "truss-worthiness”, namely modular combination that are safe, secure and trustworthy, and outline some simple principles for "truss-worthy computing".
(IITD; Indian Institute of Technology Delhi)
|Ubiquitous mass surveillance and narrative fallacy under the rise of IoT
With the rise of Internet of Things, we face serious problems of data privacy under ubiquitous mass surveillance.
In this talk, new technologies leveraging ubiquitous mass surveillance is illustrated.
Also, misuse of data mining in information security which is called as "narrative fallacy" is discussed.
(NII:National Institute of Informatics)
|Recent Trends in White-box Cryptography and its Application to IoT
A white-box cryptography is the cryptographic primitive that is secure in the white-box model where the adversary has full access
and control over the implementation and its execution platform.
There are two directions to realise white-box cryptography: one is converting existing ciphers (i.e. AES) into white-box secure,
another is designing a new primitive to achieve white-box security.
This talk introduces some research results of white-box cryptography.
The first proposal of white-box cryptography was converting AES implementation into white-box secure by Chow et al.
We first introduce their work and cryptanalysis against Chow et al.'s implementation.
Recent years, proposals of white-box security in design are getting more attentions.
We also introduce some of these proposals.
|Security for IoT||
(IITD; Indian Institute of Technology Delhi)