コロキアムB発表

日時: 9月21日(金)4限(15:10~16:40)


会場: L2

司会: 垣内 正年
米岡 尚樹 M, 2回目発表 ユビキタスコンピューティングシステム 安本 慶一, 林 優一, 荒川 豊, 藤本 まなと
title: Localizing people in a room via a smart speaker with multiple microphones
abstract: Nowadays, smart speakers like Amazon echo and Google Home become widespread. They support residents’ life through appliance control, shopping, etc via voice interface. However, an important security threat - remote control from other devices in the home - of smart speakers has been reported. To cope with this threat, identifying location of residents in the home is necessary. In this study, we develop a system consisting of a smart speaker and multiple microphones to identify direction of people through sound reflection like sonar. In this presentation, I will show the details of the background, proposed method, the result of preliminary experiment.
language of the presentation: Japanese
 
仁科 泉美 M, 2回目発表 情報セキュリティ工学 林 優一, 安本 慶一, 藤川 和利, 藤本 大介
title: Study on sound EM information leakage from information communication devices
abstract: A threat of information leakage via electromagnetic waves requires countermeasures because no trace of attack is left. In particular, information leakage from the input-output device is likely to leak confidential information. So, threat confirmation and countermeasures are important. In this study, I focus on the "sound" which is used for many devices as an input-output means of information because its leakage has not been sufficiently discussed. I will investigate the threat of sound information leakage, its mechanism, and measures to prevent the leakage from smart devices which have become popular in recent years.
language of the presentation: Japanese

 
硲 マーティン M, 2回目発表 情報セキュリティ工学 林 優一, 藤川 和利, 安本 慶一, 藤本 大介
title: Study on induction of compromising emanation using unintentional Hardware-Trojan inside devices
abstract: Security degradation using Hardware-Trojan(HT) is caused by malicious circuits implemented by attacker intendedly. Some HT has simple circuits structure, and such circuits may be unintentionally implemented at the design stage of the device. In this study, we examine the possibility of such threats and make suggestions on countermeasures. In this experiment, we will target microcomputers used for general purpose. By irradiating electromagnetic waves to HT unintentionally implemented into a device, it shows that the communication signal exchanged between the microcomputers can be observed from the outside of the device at an arbitrary timing. To counter these threats, we also discuss ways to suppress electric fluctuations to activate HT.
language of the presentation: Japanese
 
DELMOTTE ARNAUD JEAN D, 中間発表 光メディアインタフェース 向川 康博, 林 優一, 舩冨 卓哉, 久保 尋之, 田中 賢一郎
title: Watermarking for 3d printed objects
abstract: The development of 3d printing and scanning technology brings new opportunities, but also new challenges to the fabrication industries. One of the biggest challenges consists of protecting 3d objects against counterfeit, or at least identifying a copy, proving the authenticity of an object. Watermarking methods can provides some solutions for these problems, allowing to covertly embed some identification data in the 3d object and resist to the printing and scanning process. We will concentrate on "blind" watermarking, in which the original, non-watermarked model, is not required to extract the embedded data, making it more suitable for a lot of copyright related scenarios.
language of the presentation: English