Information Security Engineering

Research Staff

  • Prof. Yuichi Hayashi

    Prof.
    Yuichi Hayashi

  • Assist.Prof. Daisuke Fujimotoi

    Assist.Prof.
    Daisuke Fujimoto

E-mail { yu-ichi, fujimoto } [at] is.naist.jp

Research Area

Electromagnetic information leakage

We are conducting research on the risk assessment (Fig. 1) of security degradation due to information leakage using electromagnetic signals generated from information terminals; we are also conducting research on a technology for countering this phenomenon (Fig. 2).

Intentional electromagnetic interference (IEMI)

We are conducting research on the risk assessment of security degradation due to electromagnetic disturbance in hardware and also on a technology for countering this phenomenon (Fig. 3).

Intentional modification of internal circuits

We are conducting research on risk assessment of security degradation due to malware implemented by intentionally changing the internal circuits of information equipment, and also on a technology for countering this occurrence.

Developing secret key-sharing frameworks and protocols based on information theory

We are conducting research on a cryptographic protocol, which is secure in terms of information theory. This stream of research is different from that on cryptosystems that base security on the difficulty of performing calculations, such as RSA public key and AES block cryptosystems.

Large-scale electromagnetic field simulation

We are conducting research on large-scale electromagnetic field simulation necessary for clarifying information security degradation mechanisms due to leakage or interfering electromagnetic waves, and for risk assessment at the design stages of equipment (Figs. 4 and 5).

Reliability of information communication systems

We are conducting research on approaches for designing information communication system equipment, which has little electromagnetic signal leakage from the viewpoints of environmental electromagnetic engineering (EMC) and electromechanical devices (EMD), and which is tolerant even to electromagnetic disturbance (Fig. 6).

Key Features

In the Information Security Engineering Laboratory, we conduct research on methods to ensure hardware safety, which is the bedrock of system information security. We also conduct research to ensure the security of the entire system, including the upper layers.

Fig.1 Remote Visualization of Screen Images Using EM Emanation

Fig.1 Remote Visualization of Screen Images Using EM Emanation

Fig.2  Development of countermeasure to prevent EM display stealing from tablet PCs

Fig.2 Development of countermeasure to prevent EM display stealing from tablet PCs

Fig.3 Visualization of information leakage due to intentional electromagnetic interference

Fig.3 Visualization of information leakage due to intentional electromagnetic interference

Fig.4 Visualization of information leakage path based on large-scale EM field simulation

Fig.4 Visualization of information leakage path based on large-scale EM field simulation

Fig.5 Visualization of near fields disturbed during attack against a cryptographic module

Fig.5 Visualization of near fields disturbed during attack against a cryptographic module

Fig.6 Development of cost-effective countermeasures based on information leakage map

Fig.6 Development of cost-effective countermeasures based on information leakage map