The 5th International Workshop on Cybersecurity
We have held “The 5th International Workshop on Cybersecurity” at Kyushu University (Ito Campus) on July 14th.
||Morning(1) Keynotes Chair: Koji INOUE(KYUSHU University)
||Opening Speech: Koji OKAMURA(KYUSHU University)
||Guidance for JST SICORP “Collaboration Hubs for International Research Program (CHIRP)” :
Yoshimori Honkura-Principal Fellow, Department of International Affairs,JST; Japan Science and Technology Agency
||Introduction of Secure IoT with IITD supported by JST：Koji OKAMURA(KYUSHU University)
||Cyber-Physical Security for Secure and Resilient Cyber-Physical Systems
Yoshio Tanaka (National Institute of Advanced Industrial Science and Technology)
|Cyber-Physical Security for Secure and Resilient Cyber-Physical Systems by Yoshio Tanaka
|| A cyber-physical system that links cyberspace with the physical world through a network of interrelated elements is expected to advance innovations in social systems and industries such as manufacturing,
agriculture, distribution services, livelihood support, and urban infrastructure grids.
However, the exponential growth of edge devices such as sensors and robots in cyber-physical systems introduces new security vulnerabilities and risks,
which may have a more significant impact than those in traditional cyber-security.
Cyber-Physical Security protects entire cyber-physical systems to make them secure and resilient.
Some problems are specific to or have a greater significance in Cyber-Physical Systems,including(1) the number of edge devices are huge,
(2) the available sensors and provided services are dynamically changing,
(3) the life cycle is long and manual maintenance is difficult,
(4) edge devices have strict constraints on power use,
(5) connecting legacy systems to the Internet will cause severe security vulnerabilities,
(6) any risks have a high possibility of affecting physical spaces such as people’s homes and public infrastructure,
(7) attacks on hardware are possible.In this talk, an overview of Cyber-Physical Security is presented, followed by the introduction of some ongoing research such as Cyber-Physical Software Engineering for connected cars and factories,
design of near future IoT network architecture, and micro OS for highly resilient microcomputers.
||Afternoon (1) Company and Security Chair : Koji OKAMURA
||Speech from Executive Vice President (CIO and CISO) of Kyushu University:
Hiroto Yasuura(KYUSHU University)
||The Essentials of Security Innovation- FUJITSU’s Security Research Strategy: Tetsuya Izu (FUJITSU Laboratories Ltd.)
Focusing on FUJITSU’s latest security R&D activities in cyber security,biometric uthentication, data security including privacy protection and IoT security.
||Cyber security regulation for electric power systems in Japan: Akeo Kuwahata (Central Research Institute of Electric Power Industry)
This talk introduces Cybersecurity measurement situation for electric power management system of government and company in Japan and Japanese guideline for power management system and smart meter system.
The case studies of Cybersecurity incident and Cyber attack information and the activities of Central Research Institute of Electric Power Industry for those incidents are also shown.
||New synergy between cloud Learning and On-premise LMS(Moodle):Yoshikazu Sasaki (Nanaroq)
・Federation for Access to Cloud-based Learning Tool through campus information networks
・Utilization of learning data accumulated on Cloud-based Learning Tools for moodle
||Security of Yahoo!Japan: Kaoru Toda (Yahoo!Japan Corporation)
Yahoo! JAPAN service is used by a lot of people.
Yahoo! JAPAN have introduced various security measure to protect our user data.
In this talk, “Yahoo! JAPAN ID” and service related to IoT are presnted from the standpoint of User company.
||Afternoon (2) IoT Chair: Yoshihiro OKADA
||Truss-worthy Computing: Sanjiva Prasad (IITD; Indian Institute of Technology Delhi)
Truss(verb) means to tie securely.
A Truss(noun) in engineering is a support structure consisting of struts, beams etc, that strengthens structures such as bridges, roofs, etc.
In the recent past, we have seen instances of systems built from hardware and software components that have resulted in weakening rather than strengthening the systems, making them more vulnerable to attacks because of an increase in the attack surfaces.
I will propose the concept of “truss-worthiness”, namely modular combination that are safe, secure and trustworthy, and outline some simple principles for “truss-worthy computing”.
||Ubiquitous mass surveillance and narrative fallacy under the rise of IoT: Ruo Ando (NII:National Institute of Informatics)
With the rise of Internet of Things, we face serious problems of data privacy under ubiquitous mass surveillance.
In this talk, new technologies leveraging ubiquitous mass surveillance is illustrated.
Also, misuse of data mining in information security which is called as “narrative fallacy” is discussed.
||Recent Trends in White-box Cryptography and its Application to IoT:Yuto Nakano (KDDI Lab)
A white-box cryptography is the cryptographic primitive that is secure in the white-box model where the adversary has full access
and control over the implementation and its execution platform.
There are two directions to realise white-box cryptography: one is converting existing ciphers (i.e. AES) into white-box secure,
another is designing a new primitive to achieve white-box security.
This talk introduces some research results of white-box cryptography.
The first proposal of white-box cryptography was converting AES implementation into white-box secure by Chow et al.
We first introduce their work and cryptanalysis against Chow et al.’s implementation.
Recent years, proposals of white-box security in design are getting more attentions.
We also introduce some of these proposals.
||Security for IoT: Ranjan Bose (IITD; Indian Institute of Technology Delhi)
||Dinner (Ten-Ten, Inamori Center)
Venue and Host
Venue: Inamori Center Host：Cybersecurity Center of Kyushu university
Indian Institute of Technology Delhi CoE in Cyber Systems and Information Assurance