論文 - 油田 健太郎
-
Test Cases Redundant Elimination on Code Coverage Uses Distance and Correlation Measurement Method 査読あり
Mochamad Chandra Saputra, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Nanoubu Okazaki
Proc. 2020 Int’l Conf. on Artificial Life and Robotics (ICAROB 2020) 2020年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
スマートウォッチにおけるジェスチャを用いた個人認証方式の提案と評価
長友 誠,小関 朋奈,渡辺 一樹,油田 健太郎,岡崎 直宣,朴 美娘
2020 Symposium on Cryptography and Information Security(SCIS2020) 2020年1月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
Evaluation of Color-Based CAPTCHA Using Color Constancy 査読あり
Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki
Proc. 25th Int'l Sympo. on Artificial Life and Robotics 2020 (AROB 25th 2020) 2020年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Vote-Based Unknown Malware Detection System Using Consortium Blockchain 査読あり
Ryusei Fuji, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Norio Shiratori, Naonobu Okazaki
Proc. 25th Int'l Sympo. on Artificial Life and Robotics 2020 (AROB 25th 2020) 2020年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
An evaluation of the interactive video CAPTCHA method against automated attack 査読あり
Aburada Kentaro, Usuzaki Shotaro, Yamaba Hisaaki, Katayama Tetsuro, Mukunoki Masayuki, Park Mirang, Okazaki Naonobu
IEICE Communications Express 8 ( 12 ) 453 - 457 2019年12月
記述言語:英語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人 電子情報通信学会
CAPTCHA is designed to detect automated programs (called bots) by requiring them to perform tasks that are easy for humans but difficult for automations. CAPTCHAs are vulnerable to relay attacks in which the challenges are relayed to remote human-solvers. In our previous paper, we proposed an interactive video type CAPTCHA that is strongly resistant to relay attacks. However, a quantitative evaluation of resistance to automated attacks still has not been carried out. Herein, we implement an automated attack for applying to our CAPTCHA and evaluate its resistance to automated attacks. Our results show the robustness of our proposed method against mean shift algorithm.
-
Nagatomo Makoto, Watanabe Kazuki, Aburada Kentaro, Okazaki Naonobu, Park Mirang
IEICE Communications Express 8 ( 12 ) 495 - 500 2019年12月
記述言語:英語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人 電子情報通信学会
Recently, mobile terminals having small touchscreen such as smartwatches are increasing. PIN or pattern lock are used for personal authentication for smartwatches, but it is possible to leak authentication information by peeking the screen because the information is displayed directly. Therefore, in this paper, we propose Personal Identification with Any Shift (PIAS), which user taps different icon from registered icon on 3 × 3 icons. In addition, we implemented PIAS and evaluated it by confirming the usability and shoulder-surfing resistance. As a result, authentication time and success rate was 13.8 s and 89.4%, and the rate of successful shoulder-surfing attack was 0.0%.
-
Implementation of CAPTCHA suitable for mobile devices 査読あり
Aburada Kentaro, Usuzaki Shotaro, Yamaba Hisaaki, Katayama Tetsuro, Mukunoki Masayuki, Park Mirang, Okazaki Naonobu
IEICE Communications Express 8 ( 12 ) 601 - 605 2019年12月
記述言語:英語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人 電子情報通信学会
CAPTCHA is a technology designed to prevent automated programs (known as bots) from acquiring access to on-line accounts to send spam mail, manipulate vote numbers in on-line polls, or take other malicious actions. In addition, access to Web services has been incorporated into mobile devices, such as smartphones. However, because most CAPTCHAs are not designed for mobile devices, user-friendly CAPTCHA for mobile devices is required. Thus, we implemented CAPTCHA on mobile devices and evaluated its resistance to bots. Our CAPTCHA showed robustness against bots, with good usability.
-
Application of Pairwise Testing into BWDM which is a Test Case Generation Tool for the VDM++ Specification. 査読あり
Tetsuro Katayama, Futa Hirakoba, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Journal of Robotics, Networks and Artificial Life, Atlantis Press 6 ( 3 ) 143 - 147 2019年12月
記述言語:英語 掲載種別:研究論文(学術雑誌)
-
ブロックチェーンを用いた分散機械学習におけるパラメータ異常検知システムの提案
長友誠, 油田健太郎, 岡崎直宣, 朴美娘
CSS2019 1343 - 1348 2019年10月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
ブロックチェーンを用いた不正ログイン対策の検討
藤竜成, 臼崎翔太郎, 油田健太郎, 朴美娘, 白鳥則郎, 岡崎直宣
CSS2019 1336 - 1342 2019年10月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
Implementation of Tamias to Check Production Rules for Parsing Expression Grammar 査読あり
Tetsuro Katayama, Toshihiro Miyaji, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Journal of Robotics, Networks and Artificial Life, Atlantis Press 6 ( 2 ) 123 - 127 2019年9月
記述言語:英語 掲載種別:研究論文(学術雑誌)
-
Blockchain-based malware detection method using shared signatures of suspected malware files 査読あり
Fuji R., Usuzaki S., Aburada K., Yamaba H., Katayama T., Park M., Shiratori N., Okazaki N.
Advances in Intelligent Systems and Computing 1036 305 - 316 2019年8月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Advances in Intelligent Systems and Computing
© Springer Nature Switzerland AG 2020. Although rapid malware detection is very important, the detection is difficult due to the increase of new malware. In recent years, blockchain technology has attracted the attention of many people due to its four main characteristics of decentralization, persistency, anonymity, and auditability. In this paper, we propose a blockchain-based malware detection method that uses shared signatures of suspected malware files. The proposed method can share the signatures of suspected files between users, allowing them to rapidly respond to increasing malware threats. Further, it can improve the malware detection by utilizing signatures on the blockchain. In the evaluation experiment, we perform a more real simulation compared with our previous work to evaluate the detection accuracy. Compared with heuristic methods or behavior-based methods only, the proposed system which uses these methods plus signature-based method using shared signatures on the blockchain improved the false negative rate and the false positive rate.
-
Nagatomo M., Watanabe K., Aburada K., Okazaki N., Park M.
Advances in Intelligent Systems and Computing 1036 560 - 569 2019年8月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Advances in Intelligent Systems and Computing
© Springer Nature Switzerland AG 2020. Recently, mobile devices having small touchscreen such as smartwatches has been increasing due to miniaturization of electronic devices. Currently, PIN and pattern lock are used for personal authentication of these devices, but there is possibility of leakage of authentication information by shoulder-surfing attack. Many authentication methods having shoulder-surfing resistance are proposed until now. However, these methods are for smartphones or tablets having middle-size screen. Hence, when these authentication methods apply for smartwatches, the usability reduces because a user cannot touch the screen accurately. Therefore, in this paper, we propose personal authentication method having shoulder-surfing resistance for smartwatches. In this method, the user selects alternative icon to registered icon on 3 × 3 matrix using shift rule. In addition, we implemented the proposed method on smartwatch, and performed two experiments to confirm usability and shoulder-surfing resistance. As a result, average authentication time and authentication success rate was 13.8 s and 89.4%, and touch success rate was 96.2% when using shift rule. Also, the leakage rate of authentication information was 0.0%.
-
Gait-based authentication for smart locks using accelerometers in two devices 査読あり
Watanabe K., Nagatomo M., Aburada K., Okazaki N., Park M.
Advances in Intelligent Systems and Computing 1036 281 - 291 2019年8月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Advances in Intelligent Systems and Computing
© Springer Nature Switzerland AG 2020. Smart locks can be opened and closed electronically. Fingerprint or face authentication is inconvenient for smart locks because it requires the user to stop for several seconds in front of the door and remove certain accessories (e.g., gloves, sunglasses). This study proposes a user authentication method based on gait features. Conventional gait-based authentication methods have low identification accuracy. The proposed gait-based authentication method uses accelerometers in a smartphone and a wearable device (i.e., smartwatch). We extracted 31 features from the acquired acceleration data and calculated identification accuracy for various machine-learning algorithms. The highest accuracy was 95.3%, obtained using random forest. We found that the maximum interval, minimum interval, and minimum value had the highest contributions to identification accuracy, and variance, median, and standard deviation had the lowest contributions.
-
Gait-Based Authentication Using Anomaly Detection with Acceleration of Two Devices in Smart Lock 査読あり
Watanabe K., Nagatomo M., Aburada K., Okazaki N., Park M.
Lecture Notes in Networks and Systems 97 352 - 362 2019年8月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Lecture Notes in Networks and Systems
© Springer Nature Switzerland AG 2020. Currently, authentication in Smart locks is performed by fingerprint or face authentication. However, these authentications are inconvenient for smart locks because they require the user to stop for several seconds in front of the door and remove certain accessories (e.g., gloves, sunglasses). In this paper, we propose a user authentication method based on gait features. We propose a system model of gait-based authentication method using accelerometers in a smartphone and a wearable device (i.e., smartwatch), that is robust for unknown data using anomaly detection by machine learning. In addition, we conduct experiment to confirm the authentication rate of the proposed gait-based authentication. As a result, when using Isolation Forest as the anomaly detection algorithm, the average FAR (False Acceptance Rate) was 8.3%, the average FRR (False Rejection Rate) was 9.5%. Furthermore, we found that the better algorithm of anomaly detection of FAR and FRR is different depending on the subjects.
-
Evaluation of manual alphabets based gestures for a user authentication method using s-emg 査読あり
Yamaba H., Usuzaki S., Takatsuka K., Aburada K., Katayama T., Park M., Okazaki N.
Advances in Intelligent Systems and Computing 1036 570 - 580 2019年8月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Advances in Intelligent Systems and Computing
© Springer Nature Switzerland AG 2020. At the present time, since mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives, an authentication method that prevents shoulder surfing attacks comes to be important. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are generated by the electrical activity of muscle fibers during contraction, can be detected over the skin surface, and muscle movement can be differentiated by analyzing the s-EMG signals. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In order to realize this method, we have to prepare a sufficient number of gestures that are used to compose passwords. In this paper, we adopted fingerspelling as candidates of such gestures. We measured s-EMG signals of manual kana of The Japanese Sign Language syllabary and evaluated their potential as the important element of the user authentication method.
-
Evaluation of Ad-hoc Secure Device Pairing Method with Accelerometer and Camera Using Marker 査読あり
Nagatomo Makoto, Aburada Kentaro, Okazaki Naonobu, Park Mirang
International Journal of Networking and Computing 9 ( 2 ) 318 - 338 2019年7月
記述言語:日本語 掲載種別:研究論文(学術雑誌) 出版者・発行元:IJNC編集委員会
Currently, devices with wireless technologies often communicate each other ad hoc. For example, a presenter wirelessly distributes ad-hoc meeting materials from a PC to mobile device in a meeting room. However, there is a problem of spoofing by an impersonator outside the room. Hence, devices must conduct secure pairing, which is exchange of key necessary for encrypting communication contents, before the communication. As a pairing method between devices, there are pairing methods using RSS from access point as features. However, RSS changes significantly due to environmental factors. On the other hand, there are the pairing methods which compare acceleration data from devices with displacement data of devices from camera of a server. However, these methods have problems that it is necessary to use infrared camera and difficult to recognize inclination of devices. Thus, these methods cannot perform accurate device pairing. Therefore, in this paper, we propose a method that perform pairing using devices' accelerometers and markers displayed on devices, and a camera of authentication server. This method performs pairing by calculating similarity between velocity data from acceleration data from devices and displacement data of the marker from camera after comparing marker sequence displayed on the device. This method has advantage that can detect devices' inclination by recognizing markers' inclination. We performed three types of experiments to confirm the similarity of displacement data and acceleration data, whether an impersonator outside camera range can perform pairing, and possibility of several devices pairing together. As a result, we founded that the larger the device's display is, the higher the similarity, the proposed method can distinguish legitimate user from impersonator outside camera range by average similarity, and three devices succeeded pairing at rate of 71.8%.
-
スマートロックにおける異常検知を用いた二つの端末の加速度による歩行認証の提案 査読あり
臼崎翔太郎, 油田健太郎, 山場久昭, 朴美娘, 岡崎直宣
情報処理 学会マルチメディア,分散,協調とモバイルシンポジウム(DICOMO2019)論文集 1155 - 1160 2019年7月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
複数ウィンドウサイズの効率的監視によるバースト形態に依らないDDoS 攻撃検出手法の検討 査読あり
臼崎翔太郎, 油田健太郎, 山場久昭, 朴美娘, 岡崎直宣
情報処理 学会マルチメディア,分散,協調とモバイルシンポジウム(DICOMO2019)論文集 495 - 504 2019年7月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)
-
マルウェア検知システムにおけるブロックチェーンベースのマルウェア 情報共有手法の検討
藤竜成,臼崎翔太郎,油田健太郎,山場久昭,片山徹郎,朴美娘,白鳥則郎,岡崎直宣
信学技報 119 ( 144 ) 293 - 298 2019年7月
記述言語:日本語 掲載種別:研究論文(研究会,シンポジウム資料等)