IIS Open House 2015

Japanese version is here.
Introduction
Welcome to the Matsuura Laboratory IIS Open House 2015 Web page.
In 2015, IIS Open House will again be held on June 5 (Fri.), and June 6 (Sat.) at Komaba Research Campus, Institute of Industrial Science, the University of Tokyo.
In Matsuura Laboratory, we will present our researches related to information security and cryptography.

Date and Time
2015/6/5(Fri.) 10:00 - 17:00
2015/6/6(Sat.) 10:00 - 17:00
Research Topics
Cryptography
Cryptographic Obfuscation and Proxy Re-encryption
Cryptographic obfuscation has received much attention these days. This time, we introduce how to construct a proxy re-encryption scheme via an indistinguishability obfuscation.
About Insider(Outsider)-Security of Attribute-based Signcryption
Attribute-based Signcrypiton is a primitive which simultaneously performs the functions of both attribute-based encryption and attribute-based signature efficiently. We will introduce attribute-based signcryption, its insider(outsider)-security, and some related topics.
Anti-Malware
Malware Classification and Detection Robust Against Compiler Difference
Even among malware of the same family, their similarity greatly drops down depending on the difference of the compiler and the optimization level utilized to produce. This problem causes negative effects on the accuracy of malware classification and detection. In this research we propose a method of improving the accuracy by mitigating the negative effects based on compiler estimation.
Information Security and Economics
Empirical Analysis on Japanese Loyalty Program Security Incidents
Partnership between loyalty program(LP) is popular in Japan. If LPi has a partnership with LPj, we can redeem points of LPi to those of LPj. In one hand, this system makes value for customers, but on the other hand, many incidents abusing this system occur these days. We empirically study these incidents in order to propose a better design of LP.
Digital Forensics
Evaluation on the Applicability of Live Digital Forensics for Industrial Control Systems
The cyber threats to industrial control systems have been expanded recently. The digital forensic methods to minimize the latency time against tasks of the systems are proposed.
Network Security
Mitigation of Low-rate DoS Attack Exploiting TCP Retransmission Timer
The mechanism of TCP retransmission timeout is essential to the Internet congestion control, but existing research pointed out that this mechanism allows DoS attack with low-rate mean traffic. We introduce our mitigation measurement against this low-rate DoS attack and its evaluation results.
Privacy
A Proposal of Wolf Website on Tor Anonymity System
Anonymous communication system Tor protects unlinkability of sender and recipient. Website fingerprinting attacks, however, allow a local, passive eavesdropper to identify a Tor user's web activity. We propose 'wolf' website for defense against this attack.
Stronger Bridge Mechanisms of Tor Considering Exhaustive Adversarial Models
Tor, which is the implementation of the second generation onion routing, is the most popular low-latency anonymity network in use nowadays. However, it is possible for an adversary to restrict access to the Tor network by blocking all the publicly listed relays. In response, Tor utilizes bridges, which are unlisted relays, as alternative entry points. Unfortunately, effective attacks to block or attack the bridge mechanism are being found in existing works, and also have been conducted in the wild. In this research, we exhaustively summarize possible adversarial models and thoroughly investigate the vulnerabilities of the current design under these models. We propose two alternative designs of bridge mechanism, and compare them with the current design through simulations.

IIS Open House 2015, Matsuura Lab.