Papers - YAMABA Hisaaki
-
Nagatomo M., Aburada K., Yamaba H., Okazaki N., Park M.
Advances in Intelligent Systems and Computing 927 683 - 692 2019.3
Language:English Publishing type:Research paper (international conference proceedings) Publisher:Advances in Intelligent Systems and Computing
© 2019, Springer Nature Switzerland AG. Currently, IoT devices often use wireless technologies to communicate with each other. An example is ad-hoc device pairing such as wireless distribution of meeting materials from a PC to mobile device. The problem in this case is spoofing by an impersonator. In order to solve this problem, we proposed secure device pairing method using similarity between displacement data of a marker displayed on devices and acceleration data obtained from devices. We performed experiments to confirm similarity and whether impersonator can pair with the server. As a result, we found that similarity was low and unstable. Therefore, in this paper, we propose an extended method that marker changes at an interval. These sequence of markers displayed on the device is used to recognize the device by a camera in addition to calculation of the similarity. We performed 3 experiments to confirm the similarity displacement data and examined whether an eavesdropper outside the camera range can perform pairing. Also, we performed pairing of some device together. As a result, average similarity was higher than that of previous method and pairing of three devices succeeded at rate of about 70%.
-
Interactive Video CAPTCHA for Better Resistance to Automated Attack Reviewed
Usuzaki S., Aburada K., Yamaba H., Katayama T., Mukunoki M., Park M., Okazaki N.
2018 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018 1 - 2 2019.2
Language:English Publishing type:Research paper (international conference proceedings) Publisher:2018 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018
© 2018 IPSJ. A 'Completely Automated Public Turing Test to Tell Computers and Humans Apart' (CAPTCHA) widely used online services so that prevents bots from automatic getting a large of accounts. Interactive video type CAPTCHAs that attempt to detect this attack by using delay time due to communication relays have been proposed. However, these approaches remain insufficiently resistant to bots. We propose a CAPTCHA that combines resistant to automated and relay attacks. In our CAPTCHA, the users recognize a moving object (target object) from among a number of randomly appearing decoy objects and tracks the target with mouse cursor. The users pass the test when they were able to track the target for a certain time. Since the target object moves quickly, the delay makes it difficult for a remote solver to break the CAPTCHA during a relay attack. It is also difficult for a bot to track the target using image processing because it has same looks of the decoys. We evaluated our CAPTCHA's resistance to relay and automated attacks. Our results show that, if our CAPTHCA's parameters are set suitable value, a relay attack cannot be established economically and false acceptance rate with bot could be reduced to 0.01% without affecting human success rate.
-
Tamias: a Syntax File Checker for Parsing Expression Grammar
Toshihiro Miyaji, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Proc. 2019 Int’l Conf. on Artificial Life and Robotics (ICAROB 2019) 169 - 172 2019.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Development of Library Fescue Extracting Elements of Attributes and Operations of Class Diagram in UML
Keisuke Mori, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Proc. 2019 Int’l Conf. on Artificial Life and Robotics (ICAROB 2019) 165 - 168 2019.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Application of Pairwise Testing to Test Cases by Boundary Value Analysis in BWDM
Futa Hirakoba, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Proc. 2019 Int’l Conf. on Artificial Life and Robotics (ICAROB 2019) 161 - 164 2019.1
Language:English Publishing type:Research paper (international conference proceedings)
-
Implementation of an Arduino Simulator to Support Circuit Design
Tatsumi Nishida, Tetsuro Katayama, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Proc. 2019 Int’l Conf. on Artificial Life and Robotics (ICAROB 2019) 173 - 176 2019.1
Language:English Publishing type:Research paper (international conference proceedings)
-
CHAMSIN: CaptcHA by caMouflaged StrINg Reviewed
Mukunoki Masayuki, Yamaba Hisaaki, Usuzaki Shotaro, Aburada Kentaro, Katayama Tetsuro, Park Mirang, Okazaki Naonobu
IEICE Communications Express 8 ( 3 ) 55 - 60 2019
Language:English Publishing type:Research paper (scientific journal) Publisher:一般社団法人 電子情報通信学会
We propose a new CAPTCHA scheme that uses random dot patterns (RDPs) to prevent highly-developed bots attacks. Human beings can recognize a moving figure filled by a RDP from a background that is filled by another RDP; however, it is impossible to find such figures when they are stationary. Since image recognition by bots is usually carried out frame by frame, it is hard for bots to recognize such moving figures. The proposed CAPTCHA scheme exploits this characteristic. Several experiments were carried out to confirm that the proposed CAPTCHA scheme is usable enough and has enough resistance against bot attacks.
-
HMD-based Cover Test System for the Diagnosis of Ocular Malalignment Reviewed
Noriyuki Uchida, Kayoko Takatuka, Atsusi Nakazawa, Masayuki Mukunoki, Hisaaki Yamaba, Naonobu Okazaki
Journal of Artificial Life and Robotics, Springer 2019
Language:English Publishing type:Research paper (scientific journal)
-
Implementation of Arduino Simulator ADVIS Visualizing the Value of Voltage on the Circuit Reviewed
Tetsuro Katayama, Tatsumi Nishida, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Journal of Robotics, Networks and Artificial Life 2019
Language:English Publishing type:Research paper (scientific journal)
-
Use of access characteristics to distinguish legitimate user traffic from DDoS attack traffic
Aburada K., Arikawa Y., Usuzaki S., Yamaba H., Katayama T., Park M., Okazaki N.
Artificial Life and Robotics 2019
Language:English Publishing type:Research paper (scientific journal) Publisher:Artificial Life and Robotics
© 2019, International Society of Artificial Life and Robotics (ISAROB). Distributed denial of service attacks are a serious threat in the current information society, where the Internet plays an important role as infrastructure. We have been studying ways to mitigate these attacks using a method that distinguishes between legitimate users and attacks. Our previous method was not sufficient because it only analyzed access logs after the attack. In this study, we propose a new method that can distinguish between legitimate users and attacks while the services are running. When the IDS detects an attack, a quarantine server distinguishes legitimate users using access characteristics. The access characteristics are: (1) user follows links, (2) sender accessed a popular page, and (3) the sender’s current average transmission interval. Our experiments confirmed that the proposed method can distinguish between legitimate users and attacks.
-
Investigation on sharing signatures of suspected malware files using blockchain technology Reviewed
Fuji R., Usuzaki S., Aburada K., Yamaba H., Katayama T., Park M., Shiratori N., Okazaki N.
Lecture Notes in Engineering and Computer Science 2239 94 - 99 2019
Language:English Publishing type:Research paper (international conference proceedings) Publisher:Lecture Notes in Engineering and Computer Science
© 2019 Turkiye Klinikleri Journal of Medical Sciences. All rights reserved. In recent years, the amount of new malware has been rapidly increasing. Because malware has an adverse effect on the Internet, upon which modern society is increasingly dependent, its detection is very important. In addition, blockchain technology has attracted the attention of many people in recent years due to its four main characteristics of decentralization, persistency, anonymity, and auditability. In this paper, we propose a system for sharing the signatures of suspected malware files using blockchain technology. The proposed system can share the signatures of suspected files between users, allowing them to rapidly respond to increasing malware threats. Further, it improves the accuracy of detection and removal of malware by utilizing signatures recorded by the blockchain. In the evaluation experiment, we created a prototype of the proposed system and investigated its effect on the accuracy of detection and removal of malware. Compared with heuristic methods or behavior-based methods only, the proposed system which uses these methods plus signature-based method using shared signatures on the blockchain improved the false negative rate by about 4% and the false positive rate by about 2.5%.
-
A Proposal of New Reading Text CAPTCHA using Random Dot Patterns Reviewed
Yamaba H., Usuzaki S., Aburada K., Mukunoki M., Park M., Okazaki N.
Proceedings - 2018 6th International Symposium on Computing and Networking, CANDAR 2018 207 - 212 2018.12
Language:English Publishing type:Research paper (international conference proceedings) Publisher:Proceedings - 2018 6th International Symposium on Computing and Networking, CANDAR 2018
© 2018 IEEE. According to the growth of troubles caused by malicious programs called bots, CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) comes to be an important role in the current information society. CAPTCHA identifies bots from legitimate human users by requiring some questions that are easy for humans to solve but difficult for bots. However, the progress of computing technology such as Optical Character Recognition (OCR) function. bots come to be able to solve present CAPTCHAs. In order to outcome such troublesome bots, more sophisticated CAPTCHA that requires the high cognitive ability of human beings is desired. In this paper, we propose a new CAPTCHA scheme that uses random dot patterns. Human beings can recognize a moving figure filled by a random dot pattern from a background that is filled by another random dot pattern; however, they lose the figure in the background when the figure pauses. Since image recognition by computer programs is usually carried out frame by frame, it is hard for bots to recognize such a moving figure filled by a random dot pattern from another random dot pattern background. The proposed CAPTCHA scheme exploits this characteristic of random dot patterns. This CAPTCHA requires users to answer a text filled by a random dot pattern that is moving on a background also filled by another random dot pattern. Several experiments were carried out to confirm that the proposed CAPTCHA scheme has enough resistance against bot attacks using representative image recognition methods. Results of the experiments showed that the image recognition methods cannot find out the answer text. Other experiments were also carried out to evaluate the usability of the proposed CAPTCHA scheme. The system usability scheme was adopted in the experiments. The obtained score was 89 that means this CAPTCHA scheme has high usability. These results showed that the CAPTCHA scheme is usable enough and has enough resistance against bot attacks.
-
Evaluation of User Identification Methods for Realizing an Authentication System Using s-EMG
Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Mirang Park, and Naonobu Okazaki
Ad- vances in Network-Based Information Systems, Lecture Notes on Data Engineering and Communications Technologies 732 - 742 2018.9
Language:English Publishing type:Research paper (scientific journal)
-
Selection of Features for User Authentication System Using Surface Electromyogram Signals
Konomi HIRATA, Minami YOKOYAMA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 315 - 319 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Proposal of a PIN Authentication Method Using User's Sight Line Path
Konomi HIRATA, Syota YAMAGUCHI, Kayoko TAKATUKA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 311 - 314 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Development of the Automated Cover-uncover Test System for Ocular Malalignment Detection
Konomi HIRATA, Koki HINOKUMA, Kayoko TAKATUKA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 305 - 309 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Research on the Qualitative Automated Cover-uncover Test System for the Ocular Malalignment Detection
Konomi HIRATA, Koki HINOKUMA, Kayoko TAKATUKA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 291 - 303 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Development of Decision Support System for Prevention of Foot-and-mouth Disease
Konomi HIRATA, Kaito IWAMITSU, Kayoko TAKATUKA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 285 - 289 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Consideration of CAPTCHA System Suitable for Use of Mobile Device
Meguru TOMITA, Tsubomi HATSU, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 279 - 283 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
A Consideration of Interactive Motion Picture CAPTCHA System Aiming at Compatibility between Relay Attack Tolerance and BOT Tolerance
Meguru TOMITA, Ryohei TATSUDA, Hisaaki YAMABA, Kentaro ABURADA, Naonobu OKAZAKI
MEMOIRS OF THE FACULTY OF ENGINEERING UNIVERSITY OF MIYAZAKI ( 47 ) 255 - 277 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)