IIS Open House 2017

Japanese version is here.
Welcome to the Matsuura Laboratory IIS Open House 2017 Web page.
In 2017, IIS Open House will again be held on June 2nd (Fri.), and June 3rd (Sat.) at Komaba Research Campus, Institute of Industrial Science, the University of Tokyo.
In Matsuura Laboratory, we will present our researches related to information security and cryptography.

Date and Time
2017/6/2(Fri.) 10:00 - 17:00
2017/6/3(Sat.) 10:00 - 17:00
Research Topics
Fully secure identity-based encryption resilient to continual auxiliary leakage
Leakage-resilient cryptography is practically meaningful since it guarantees that the security remains even if secret information such as private keys partially leaked. The most desirable security model among the models proposed so far is called the continual auxiliary leakage model. We proposed the first identity-based encryption scheme resilient to continual auxiliary leakage.
Machine Learning
Detection of adversarial images
The accuracy of machine image recognition is very increased by Deep learning. However, existence of images that human can recognize but machine can't do is reported. It's called adversarial image, and sometimes we can regard it as attack. In this research, we proposed detection technique of it.
A Survey on Blockchain Electronic Voting Systems
Classical paper ballots are used in many elections today. But electronic voting systems have attracted attention because of its tamper-resistance, accuracy of vote-tallying and low personnel cost. I introduce and review existing blockchain electronic voting systems.
Security of blockchain technology and its applications
Blockchain is a distributed ledger technology, which has a potential to construct multiparty protocols without a trusted third party. This technology is spreading to apply such as cryptocurrencies like Bitcoin and others, and we introduce current researches on its security.
Web Security
Static Analysis and Evaluation Metrics of Cross-site Scripting Attacks
XSS attacks is a major attack. However, There is no method which is decisive as a countermeasure techniques, especially script language implemented with object oriented programing. Also the criteria of judgement is often ambiguous. This research disucusses how to handle and implement those problems.
A Fallback-Authentication Method Using Music
In this paper, conventional and newly proposed prevalent fallback authentication approaches focusing on web services have been reviewed. Furthermore, according to the unsolved problems - tradeoff between usability and memorability, left from the existing fallback authentication methods and the unique properties fallback authentication preserves, a new fallback authentication method MusiAuth based on those principles on web services has been proposed and explained. Experiments has been conducted as an individual interview for several times on different dates on 32 participants to evaluate the usability and security of the proposal. Besides, the duration of the experiments last from one day to three months in order to give a better memorability evaluation of the proposal.
Dummy Hidden Service to Protect Tor Hidden Service
Tor hidden service protocol enables web servers to hide their addresses. Kwon and his colleagues said their passive attack against Tor hidden service, which is called Circuit Fingerprinting Attack, is able to identify hidden services.We propose Dummy Hidden Service, which generates traffic data to cheat the classifier.

IIS Open House 2017, Matsuura Lab.