{"id":3246,"date":"2017-07-14T12:05:32","date_gmt":"2017-07-14T03:05:32","guid":{"rendered":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/?p=3246"},"modified":"2020-12-25T09:32:53","modified_gmt":"2020-12-25T00:32:53","slug":"workshop-5th","status":"publish","type":"post","link":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/2017\/07\/14\/workshop-5th\/","title":{"rendered":"The 5th International Workshop on Cybersecurity"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"alignnone wp-image-84 size-large\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/08\/top2017-7.14-1024x724.jpg\" alt=\"\" width=\"1024\" height=\"724\" srcset=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/08\/top2017-7.14-1024x724.jpg 1024w, https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/08\/top2017-7.14-300x212.jpg 300w, https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/08\/top2017-7.14-768x543.jpg 768w, https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/08\/top2017-7.14-1536x1087.jpg 1536w, https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/08\/top2017-7.14-2048x1449.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\">We have held &#8220;The 5th International Workshop on Cybersecurity&#8221; at Kyushu University (Ito Campus) on July 14th.<\/span><\/p>\n<h2><span style=\"color: #0000ff; font-family: times new roman,times,serif; font-size: 14pt;\">Program<\/span><\/h2>\n<table style=\"width: 628.06px;\">\n<tbody>\n<tr>\n<td style=\"width: 40px;\"><span style=\"font-size: 10pt;\"><strong><span style=\"color: #000000; font-family: times new roman,times,serif;\">10:00-<\/span><\/strong><\/span><\/td>\n<td style=\"width: 299.06px;\"><span style=\"color: #800080; font-family: times new roman,times,serif; font-size: 10pt;\">Morning(1) Keynotes\u00a0\u00a0Chair: <a href=\"http:\/\/hyoka.ofc.kyushu-u.ac.jp\/search\/details\/K002613\/english.html\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Koji INOUE<\/strong><\/a>(KYUSHU University)<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 40px;\"><span style=\"font-size: 10pt;\"><strong><span style=\"color: #000000; font-family: times new roman,times,serif;\">\u00a0<\/span><\/strong><\/span><\/td>\n<td style=\"width: 299.06px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\">Opening Speech: <a href=\"http:\/\/okaweb.ec.kyushu-u.ac.jp\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Koji OKAMURA<\/strong><\/a>(KYUSHU University)<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 40px;\"><span style=\"font-size: 10pt;\"><strong><span style=\"color: #000000; font-family: times new roman,times,serif;\">\u00a0<\/span><\/strong><\/span><\/td>\n<td style=\"width: 299.06px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\">Guidance for JST SICORP &#8220;Collaboration Hubs for International Research Program (CHIRP)&#8221;\u00a0 :<\/span><\/p>\n<p><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\"><a href=\"http:\/\/www.jst.go.jp\/inter\/english\/sicorp\/country\/jck-intro.html\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Yoshimori Honkura<\/strong><\/a>-Principal Fellow, Department of International Affairs,JST; Japan Science and Technology Agency<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 40px;\"><span style=\"font-size: 10pt;\"><strong><span style=\"color: #000000; font-family: times new roman,times,serif;\">\u00a0<\/span><\/strong><\/span><\/td>\n<td style=\"width: 299.06px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\">Introduction of Secure IoT with IITD supported by JST\uff1a<strong>Koji OKAMURA<\/strong>(KYUSHU University)<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 40px;\"><span style=\"font-size: 10pt;\"><strong><span style=\"color: #000000; font-family: times new roman,times,serif;\">\u00a0<\/span><\/strong><\/span><\/td>\n<td style=\"width: 299.06px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\">Cyber-Physical Security for Secure and Resilient Cyber-Physical Systems \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<\/span><\/p>\n<p><span style=\"font-size: 10pt;\"><a href=\"http:\/\/www.itri.aist.go.jp\/en\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #000000; font-family: times new roman,times,serif;\"><strong>Yoshio Tanaka<\/strong> (National Institute of Advanced Industrial Science and Technology)<\/span><\/a><\/span><\/p>\n<table style=\"width: 432.59px;\">\n<tbody>\n<tr>\n<td style=\"width: 86px;\"><span style=\"color: #33cccc; font-size: 10pt;\"><em><span style=\"font-family: times new roman,times,serif;\">Cyber-Physical Security for Secure and Resilient Cyber-Physical Systems by Yoshio Tanaka<\/span><\/em><\/span><\/td>\n<td style=\"width: 297.59px;\"><span style=\"font-size: 10pt;\"><em><span style=\"color: #000000; font-family: times new roman,times,serif;\">\u00a0A cyber-physical system that links cyberspace with the physical world through a network of interrelated elements is expected to advance innovations in social systems and industries such as manufacturing,<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">agriculture, distribution services, livelihood support, and urban infrastructure grids.<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">However, the exponential growth of edge devices such as sensors and robots in cyber-physical systems introduces new security vulnerabilities and risks,<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">which may have a more significant impact than those in traditional cyber-security.<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">Cyber-Physical Security protects entire cyber-physical systems to make them secure and resilient.<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">\u00a0Some problems are specific to or have a greater significance in Cyber-Physical Systems,including(1) the number of edge devices are huge,<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">(2) the available sensors and provided services are dynamically changing,<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">(3) the life cycle is long and manual maintenance is difficult,<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">(4) edge devices have strict constraints on power use,<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">(5) connecting legacy systems to the Internet will cause severe security vulnerabilities,<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">(6) any risks have a high possibility of affecting physical spaces such as people\u2019s homes and public infrastructure,<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">(7) attacks on hardware are possible.In this talk, an overview of Cyber-Physical Security is presented, followed by the introduction of some ongoing research such as Cyber-Physical Software Engineering for connected cars and factories,<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">design of near future IoT network architecture, and micro OS for highly resilient microcomputers.<\/span><\/em><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 40px;\"><span style=\"font-size: 10pt;\"><strong><span style=\"color: #000000; font-family: times new roman,times,serif;\">12:00-<\/span><\/strong><\/span><\/td>\n<td style=\"width: 299.06px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\">Lunch<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 40px;\"><span style=\"font-size: 10pt;\"><strong><span style=\"color: #000000; font-family: times new roman,times,serif;\">13:00-<\/span><\/strong><\/span><\/td>\n<td style=\"width: 299.06px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\">Afternoon (1) Company and Security\u00a0\u00a0Chair : <strong>Koji OKAMURA<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 40px;\"><span style=\"font-size: 10pt;\"><strong><span style=\"color: #000000; font-family: times new roman,times,serif;\">\u00a0<\/span><\/strong><\/span><\/td>\n<td style=\"width: 299.06px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\">Speech from Executive Vice President (CIO and CISO) of Kyushu University:<\/span><br \/>\n<span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\"><a href=\"http:\/\/hyoka.ofc.kyushu-u.ac.jp\/search\/details\/K000217\/english.html\" target=\"_blank\" rel=\"noopener noreferrer\"> <strong>Hiroto Yasuura<\/strong><\/a>(KYUSHU University)<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 40px;\"><span style=\"font-size: 10pt;\"><strong><span style=\"color: #000000; font-family: times new roman,times,serif;\">\u00a0<\/span><\/strong><\/span><\/td>\n<td style=\"width: 299.06px;\"><span style=\"font-size: 10pt;\"><span style=\"color: #000000; font-family: times new roman,times,serif;\">The Essentials of Security Innovation- FUJITSU&#8217;s Security Research Strategy:\u00a0<\/span><span style=\"color: #000000; font-family: times new roman,times,serif;\"><a href=\"http:\/\/researchmap.jp\/izu_tetsuya\/?lang=english\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Tetsuya Izu<\/strong> <\/a>(FUJITSU Laboratories Ltd.) <\/span><\/span><\/p>\n<p><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\"><em>Focusing on FUJITSU&#8217;s latest security R&amp;D activities in cyber security,biometric uthentication, data security including privacy protection and IoT security.\u00a0<\/em> <\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 40px;\"><span style=\"font-size: 10pt;\"><strong><span style=\"color: #000000; font-family: times new roman,times,serif;\">\u00a0<\/span><\/strong><\/span><\/td>\n<td style=\"width: 299.06px;\"><span style=\"font-size: 10pt;\"><span style=\"color: #000000; font-family: times new roman,times,serif;\">Cyber security regulation for electric power systems in Japan:\u00a0<\/span><span style=\"color: #000000; font-family: times new roman,times,serif;\"><a href=\"http:\/\/web.cs.kyushu-u.ac.jp\/data\/event\/2017\/04\/ak.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Akeo Kuwahata<\/strong><\/a> (Central Research Institute of Electric Power Industry) \u00a0<\/span><\/span><\/p>\n<p><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\">\u00a0<em>This talk introduces Cybersecurity measurement situation for electric power management system of government and company in Japan and Japanese guideline for power management system and smart meter system.<\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">The case studies of Cybersecurity incident and Cyber attack information and the activities of Central Research Institute of Electric Power Industry for those incidents are also shown.<\/span><\/em><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 40px;\"><span style=\"font-size: 10pt;\"><strong><span style=\"color: #000000; font-family: times new roman,times,serif;\">\u00a0<\/span><\/strong><\/span><\/td>\n<td style=\"width: 299.06px;\"><span style=\"font-size: 10pt;\"><span style=\"color: #000000; font-family: times new roman,times,serif;\">New synergy between cloud Learning and On-premise LMS(Moodle):<\/span><span style=\"color: #000000; font-family: times new roman,times,serif;\"><a href=\"http:\/\/www.nanaroq.com\/en\/corporate-profile\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Yoshikazu Sasaki<\/strong> <\/a>(Nanaroq)<\/span><\/span><\/p>\n<p><span style=\"font-size: 10pt;\"><em><span style=\"color: #000000; font-family: times new roman,times,serif;\">Description:<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">\u30fbFederation for Access to Cloud-based Learning Tool through campus information networks<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">\u30fbUtilization of learning data accumulated on Cloud-based Learning Tools for moodle<\/span><\/em><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 40px;\"><span style=\"font-size: 10pt;\"><strong><span style=\"color: #000000; font-family: times new roman,times,serif;\">\u00a0<\/span><\/strong><\/span><\/td>\n<td style=\"width: 299.06px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\">Security of Yahoo!Japan:\u00a0<a href=\"https:\/\/about.yahoo.co.jp\/hr\/en\/engineers\/wp_person12\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Kaoru Toda<\/strong><\/a> (Yahoo!Japan Corporation)<\/span><\/p>\n<p><span style=\"font-size: 10pt;\"><em><span style=\"color: #000000; font-family: times new roman,times,serif;\">Yahoo! JAPAN service is used by a lot of people.<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">Yahoo! JAPAN have introduced various security measure to protect our user data.<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">In this talk, &#8220;Yahoo! JAPAN ID&#8221; and service related to IoT are presnted from the standpoint of User company.<\/span><\/em><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 40px;\"><span style=\"font-size: 10pt;\"><strong><span style=\"color: #000000; font-family: times new roman,times,serif;\">15:10-<\/span><\/strong><\/span><\/td>\n<td style=\"width: 299.06px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\">Coffee break<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 40px;\"><span style=\"font-size: 10pt;\"><strong><span style=\"color: #000000; font-family: times new roman,times,serif;\">15:30-<\/span><\/strong><\/span><\/td>\n<td style=\"width: 299.06px;\"><span style=\"color: #800080; font-family: times new roman,times,serif; font-size: 10pt;\">Afternoon (2) IoT\u00a0\u00a0Chair: <a href=\"http:\/\/www.i.kyushu-u.ac.jp\/~okada\/indexe.html\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Yoshihiro OKADA<\/strong><\/a><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 40px;\"><span style=\"font-size: 10pt;\"><strong><span style=\"font-family: times new roman,times,serif;\">\u00a0<\/span><\/strong><\/span><\/td>\n<td style=\"width: 299.06px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\">Truss-worthy Computing: <a href=\"http:\/\/www.cse.iitd.ernet.in\/~sanjiva\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Sanjiva Prasad<\/strong> <\/a>(IITD; Indian Institute of Technology Delhi)<\/span><\/p>\n<p><span style=\"font-size: 10pt;\"><em><span style=\"color: #000000; font-family: times new roman,times,serif;\">Truss(verb) means to tie securely.<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">A Truss(noun) in engineering is a support structure consisting of struts, beams etc, that strengthens structures such as bridges, roofs, etc.<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">In the recent past, we have seen instances of systems built from hardware and software components that have resulted in weakening rather than strengthening the systems, making them more vulnerable to attacks because of an increase in the attack surfaces.<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">I will propose the concept of &#8220;truss-worthiness\u201d, namely modular combination that are safe, secure and trustworthy, and outline some simple principles for &#8220;truss-worthy computing&#8221;.<\/span><\/em><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 40px;\"><span style=\"font-size: 10pt;\"><strong><span style=\"color: #000000; font-family: times new roman,times,serif;\">\u00a0<\/span><\/strong><\/span><\/td>\n<td style=\"width: 299.06px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\">Ubiquitous mass surveillance and narrative fallacy under the rise of IoT: <a href=\"https:\/\/sites.google.com\/site\/andoruo\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Ruo Ando<\/strong><\/a>\u00a0(NII:National Institute of Informatics)<\/span><\/p>\n<p><span style=\"font-size: 10pt;\"><em><span style=\"color: #000000; font-family: times new roman,times,serif;\">With the rise of Internet of Things, we face serious problems of data privacy under ubiquitous mass surveillance.<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">In this talk, new technologies leveraging ubiquitous mass surveillance is illustrated.<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">Also, misuse of data mining in information security which is called as &#8220;narrative fallacy&#8221; is discussed.<\/span><\/em><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 40px;\"><span style=\"font-size: 10pt;\"><strong><span style=\"font-family: times new roman,times,serif;\">\u00a0<\/span><\/strong><\/span><\/td>\n<td style=\"width: 299.06px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\">Recent Trends in White-box Cryptography and its Application to IoT:<strong>Yuto Nakano<\/strong> (KDDI Lab)<\/span><\/p>\n<p><span style=\"font-size: 10pt;\"><em><span style=\"color: #000000; font-family: times new roman,times,serif;\">A white-box cryptography is the cryptographic primitive that is secure in the white-box model where the adversary has full access<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">and control over the implementation and its execution platform.<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">There are two directions to realise white-box cryptography: one is converting existing ciphers (i.e. AES) into white-box secure,<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">another is designing a new primitive to achieve white-box security.<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">This talk introduces some research results of white-box cryptography.<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">The first proposal of white-box cryptography was converting AES implementation into white-box secure by Chow et al.<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">We first introduce their work and cryptanalysis against Chow et al.&#8217;s implementation.<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">Recent years, proposals of white-box security in design are getting more attentions.<\/span><\/em><\/span><br \/>\n<span style=\"font-size: 10pt;\"> <em><span style=\"color: #000000; font-family: times new roman,times,serif;\">We also introduce some of these proposals.<\/span><\/em><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 40px;\"><span style=\"font-size: 10pt;\"><strong><span style=\"font-family: times new roman,times,serif;\">\u00a0<\/span><\/strong><\/span><\/td>\n<td style=\"width: 299.06px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\">Security for IoT: <a href=\"http:\/\/web.iitd.ac.in\/~rbose\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Ranjan Bose<\/strong><\/a> (IITD; Indian Institute of Technology Delhi)<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 40px;\"><span style=\"font-size: 10pt;\"><strong><span style=\"color: #000000; font-family: times new roman,times,serif;\">17:30-<\/span><\/strong><\/span><\/td>\n<td style=\"width: 299.06px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\">Dinner (<a href=\"http:\/\/suisin.jimu.kyushu-u.ac.jp\/ito_info\/img\/menu3.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Ten-Ten<\/a>, Inamori Center)<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><span style=\"color: #0000ff; font-family: times new roman,times,serif; font-size: 14pt;\">Venue and Host<\/span><\/h2>\n<p><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\">Venue: <a href=\"http:\/\/www.inamori-center.kyushu-u.ac.jp\/access\/index.html\">Inamori Center<\/a> <span style=\"font-family: verdana,geneva,sans-serif;\">\u3000<\/span><\/span><span style=\"font-size: 10pt;\"><span style=\"color: #000000; font-family: times new roman,times,serif;\">Host\uff1a<\/span><span style=\"color: #000000; font-family: times new roman,times,serif;\">Cybersecurity Center of Kyushu university<\/span><\/span><br \/>\n<span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\"> Indian Institute of Technology Delhi CoE in Cyber Systems and Information Assurance\u00a0<\/span><\/p>\n<p><span style=\"color: #800080; font-family: times new roman,times,serif;\">Gallery:<\/span><\/p>\n\n\t\t<style type=\"text\/css\">\n\t\t\t#gallery-1 {\n\t\t\t\tmargin: auto;\n\t\t\t}\n\t\t\t#gallery-1 .gallery-item {\n\t\t\t\tfloat: left;\n\t\t\t\tmargin-top: 10px;\n\t\t\t\ttext-align: center;\n\t\t\t\twidth: 33%;\n\t\t\t}\n\t\t\t#gallery-1 img {\n\t\t\t\tborder: 2px solid #cfcfcf;\n\t\t\t}\n\t\t\t#gallery-1 .gallery-caption {\n\t\t\t\tmargin-left: 0;\n\t\t\t}\n\t\t\t\/* see gallery_shortcode() in wp-includes\/media.php *\/\n\t\t<\/style>\n\t\t<div id='gallery-1' class='gallery galleryid-3246 gallery-columns-3 gallery-size-thumbnail'><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/ja\/2017\/07\/14\/workshop-5th\/cimg0627\/'><img width=\"150\" height=\"150\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/10\/CIMG0627-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/ja\/2017\/07\/14\/workshop-5th\/cimg0630-4\/'><img width=\"150\" height=\"150\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/10\/CIMG0630-4-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/ja\/2017\/07\/14\/workshop-5th\/cimg0632-2\/'><img width=\"150\" height=\"150\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/10\/CIMG0632-2-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/dt><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/ja\/2017\/07\/14\/workshop-5th\/cimg0633\/'><img width=\"150\" height=\"150\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/10\/CIMG0633-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/ja\/2017\/07\/14\/workshop-5th\/cimg0634\/'><img width=\"150\" height=\"150\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/10\/CIMG0634-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/ja\/2017\/07\/14\/workshop-5th\/cimg0637-3\/'><img width=\"150\" height=\"150\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/10\/CIMG0637-3-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/dt><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/ja\/2017\/07\/14\/workshop-5th\/cimg0638-4\/'><img width=\"150\" height=\"150\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/10\/CIMG0638-4-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/ja\/2017\/07\/14\/workshop-5th\/cimg0643\/'><img width=\"150\" height=\"150\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/10\/CIMG0643-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/ja\/2017\/07\/14\/workshop-5th\/cimg0644-2\/'><img width=\"150\" height=\"150\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/10\/CIMG0644-2-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/dt><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/ja\/2017\/07\/14\/workshop-5th\/cimg0651-3\/'><img width=\"150\" height=\"150\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/10\/CIMG0651-3-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/ja\/2017\/07\/14\/workshop-5th\/cimg0654-2\/'><img width=\"150\" height=\"150\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/10\/CIMG0654-2-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/ja\/2017\/07\/14\/workshop-5th\/cimg0655-4\/'><img width=\"150\" height=\"150\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/10\/CIMG0655-4-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/dt><\/dl><br style=\"clear: both\" \/>\n\t\t<\/div>\n\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have held &#8220;The 5th International Workshop on Cybersecurity&#8221; at Kyushu University (Ito Campus) on July 14th. Program 10:00- Morning(1) Keynotes\u00a0\u00a0Chair: Koji INOUE(KYUSHU University) \u00a0 Opening Speech: Koji OKAMURA(KYUSHU University) \u00a0 Guidance for JST SICORP &#8220;Collaboration Hubs for International Research Program (CHIRP)&#8221;\u00a0 : Yoshimori Honkura-Principal Fellow, Department of International Affairs,JST; Japan Science and Technology Agency [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_locale":"en_US","_original_post":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/?p=3086"},"categories":[12,13],"tags":[],"_links":{"self":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/posts\/3246"}],"collection":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/comments?post=3246"}],"version-history":[{"count":2,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/posts\/3246\/revisions"}],"predecessor-version":[{"id":3248,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/posts\/3246\/revisions\/3248"}],"wp:attachment":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/media?parent=3246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/categories?post=3246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/tags?post=3246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}