Papers - KATAYAMA Tetsuro
-
Test cases redundant elimination on code coverage uses distance and correlation measurement method Reviewed
Saputra M.C., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 2020 755 - 758 2020
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Proceedings of International Conference on Artificial Life and Robotics
The Euclidean distance and correlation measured by comparing the line executed by the test case to find the similarity of the test cases. The test cases have the lowest value of distance means highly similar and possible executing a similar line or path. The research tries to eliminate redundant test cases based on that similarity. Several redundant test cases are eliminated to get the best test cases. By Euclidean distance, the research can eliminate a similar test case on the test suite.
-
Shigyo Y., Katayama T., Kita Y., Yamaba H., Aburada K., Okazaki N.
Proceedings of International Conference on Artificial Life and Robotics 2020 763 - 766 2020
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Proceedings of International Conference on Artificial Life and Robotics
The natural language includes ambiguous expressions. VDM is one of methodology on the formal methods to write the specification without ambiguity. Because VDM++ is written by strict grammar, it is difficult to write a VDM++ specification. This research attempts to generate a VDM++ specification automatically from a natural language specification by machine learning. To generate a VDM++ specification, it is necessary to extract words which consist of predicate corresponding to the function and nouns corresponding to variable from the natural language specification. This paper proposes an approach to generate a VDM++ specification from the extracted words list. Identifiers are generated from the extracted words list, and then the VDM++ specification can be generated by converting them into VDM++ grammar.
-
On a user authentication method to realise an authentication system using s-EMG Reviewed
Yamaba H., Usuzaki S., Takatsuka K., Aburada K., Katayama T., Park M., Okazaki N.
International Journal of Grid and Utility Computing 11 ( 5 ) 725 - 734 2020
Language:English Publishing type:Research paper (scientific journal) Publisher:International Journal of Grid and Utility Computing
© 2020 Inderscience Enterprises Ltd. To prevent shoulder-surfing attacks, we proposed a user authentication method using surface electromyogram (s-EMG) signals, which can be used to identify who generated the signals and which gestures were made. Our method uses a technique called 'pass-gesture', which refers to a series of hand gestures, to achieve s-EMG-based authentication. However, it is necessary to introduce computer programs that can recognise gestures from the s-EMG signals. In this paper, we propose two methods that can be used to compare s-EMG signals and determine whether they were made by the same gesture. One uses support vector machines (SVMs), and the other uses dynamic time warping. We also introduced an appropriate method for selecting the validation data used to train SVMs using correlation coefficients and cross-correlation functions. A series of experiments was carried out to confirm the performance of those proposed methods, and the effectiveness of the two methods was confirmed.
-
State transition tuple coverage criterion for extended place/transition net-based testing Reviewed
Takagi T., Kurozumi R., Katayama T.
Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2019-December 29 - 30 2019.12
Language:English Publishing type:Research paper (international conference proceedings) Publisher:Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC
© 2019 IEEE. This paper shows a STT (State Transition Tuple) coverage criterion for extended place/transition net-based testing. A STT as a measuring object consists of state transitions whose execution may trigger a target failure. The test efficiency is evaluated based on the ratio of STTs executed by test cases.
-
Implementation of CAPTCHA suitable for mobile devices Reviewed
Aburada Kentaro, Usuzaki Shotaro, Yamaba Hisaaki, Katayama Tetsuro, Mukunoki Masayuki, Park Mirang, Okazaki Naonobu
IEICE Communications Express 8 ( 12 ) 601 - 605 2019.12
Language:English Publishing type:Research paper (scientific journal) Publisher:一般社団法人 電子情報通信学会
CAPTCHA is a technology designed to prevent automated programs (known as bots) from acquiring access to on-line accounts to send spam mail, manipulate vote numbers in on-line polls, or take other malicious actions. In addition, access to Web services has been incorporated into mobile devices, such as smartphones. However, because most CAPTCHAs are not designed for mobile devices, user-friendly CAPTCHA for mobile devices is required. Thus, we implemented CAPTCHA on mobile devices and evaluated its resistance to bots. Our CAPTCHA showed robustness against bots, with good usability.
-
An evaluation of the interactive video CAPTCHA method against automated attack Reviewed
Aburada Kentaro, Usuzaki Shotaro, Yamaba Hisaaki, Katayama Tetsuro, Mukunoki Masayuki, Park Mirang, Okazaki Naonobu
IEICE Communications Express 8 ( 12 ) 453 - 457 2019.12
Language:English Publishing type:Research paper (scientific journal) Publisher:一般社団法人 電子情報通信学会
CAPTCHA is designed to detect automated programs (called bots) by requiring them to perform tasks that are easy for humans but difficult for automations. CAPTCHAs are vulnerable to relay attacks in which the challenges are relayed to remote human-solvers. In our previous paper, we proposed an interactive video type CAPTCHA that is strongly resistant to relay attacks. However, a quantitative evaluation of resistance to automated attacks still has not been carried out. Herein, we implement an automated attack for applying to our CAPTCHA and evaluate its resistance to automated attacks. Our results show the robustness of our proposed method against mean shift algorithm.
-
Application of Pairwise Testing into BWDM which is a Test Case Generation Tool for the VDM++ Specification Reviewed
Katayama Tetsuro, Futa Hirakoba, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
JOURNAL OF ROBOTICS NETWORKING AND ARTIFICIAL LIFE 6 ( 3 ) 143 - 147 2019.12
Language:English Publishing type:Research paper (scientific journal)
-
回路上の電圧値可視化による回路設計支援ツールADVISの開発 Reviewed
西田 龍登, 片山 徹郎
組込みシステムシンポジウム2019論文集 1 - 4 2019.9
Language:Japanese Publishing type:Research paper (conference, symposium, etc.)
-
Implementation of Tamias to Check Production Rules for Parsing Expression Grammar Reviewed
Katayama Tetsuro, Miyaji Toshihiro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
JOURNAL OF ROBOTICS NETWORKING AND ARTIFICIAL LIFE 6 ( 2 ) 123 - 127 2019.9
Language:English Publishing type:Research paper (scientific journal)
-
Arduino Simulator ADVIS Visualizing the Value of Voltage on the Circuit Reviewed
( 2019 ) 1 - 4 2019.8
Language:English Publishing type:Research paper (scientific journal)
-
平木場 風太, 片山 徹郎
ソフトウェアエンジニアリングシンポジウム2019論文集 ( 2019 ) 126 - 134 2019.8
Language:Japanese Publishing type:Research paper (conference, symposium, etc.)
-
Investigation on Blockchain‐based Malware Information Sharing Method in Malware Detection System
藤竜成, 臼崎翔太郎, 油田健太郎, 山場久昭, 片山徹郎, PARK Mirang, 白鳥則郎, 岡崎直宣
電子情報通信学会技術研究報告 119 ( 140(ISEC2019 12-61) ) 293‐298 2019.7
-
VDM++仕様を対象としたテストケース自動生成ツールBWDMへのPICTの適用
平木場風太, 片山徹郎
宮崎大学工学部紀要 2019.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
回路設計支援を目的としたArduinoシミュレータADVISの現状と課題
西田龍登, 片山徹郎
宮崎大学工学部紀要 2019.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
解析表現文法を対象とした構文ファイルのチェックツールTamiasの開発
宮地俊宏, 片山徹郎
宮崎大学工学部紀要 2019.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Introduction of Fingerspelling for Realizing a User Authentication Method Using s-EMG Reviewed
Hisaaki Yamaba, Shimpei Inotani, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Advances in Intelligent Systems and Computing 927 693 - 701 2019.3
Language:English Publishing type:Research paper (international conference proceedings) Publisher:Advances in Intelligent Systems and Computing
© 2019, Springer Nature Switzerland AG. At the present time, mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives. Therefore, an authentication method that prevents shoulder surfing is needed. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are detected over the skin surface, are generated by the electrical activity of muscle fibers during contraction. Muscle movement can be differentiated by analyzing the s-EMG. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In order to realize this method, we have to prepare many gestures that are used to compose passwords. In this paper, we adopted fingerspelling as candidates of such gestures. We measured s-EMG signals of manual kana of The Japanese Sign Language syllabary and examined their ability for the use of passwords of the authentication method.
-
Investigation on sharing signatures of suspected malware files using blockchain technology Reviewed
Fuji R., Usuzaki S., Aburada K., Yamaba H., Katayama T., Park M., Shiratori N., Okazaki N.
Lecture Notes in Engineering and Computer Science 2239 94 - 99 2019.3
Language:English Publishing type:Research paper (international conference proceedings) Publisher:Lecture Notes in Engineering and Computer Science
© 2019 Turkiye Klinikleri Journal of Medical Sciences. All rights reserved. In recent years, the amount of new malware has been rapidly increasing. Because malware has an adverse effect on the Internet, upon which modern society is increasingly dependent, its detection is very important. In addition, blockchain technology has attracted the attention of many people in recent years due to its four main characteristics of decentralization, persistency, anonymity, and auditability. In this paper, we propose a system for sharing the signatures of suspected malware files using blockchain technology. The proposed system can share the signatures of suspected files between users, allowing them to rapidly respond to increasing malware threats. Further, it improves the accuracy of detection and removal of malware by utilizing signatures recorded by the blockchain. In the evaluation experiment, we created a prototype of the proposed system and investigated its effect on the accuracy of detection and removal of malware. Compared with heuristic methods or behavior-based methods only, the proposed system which uses these methods plus signature-based method using shared signatures on the blockchain improved the false negative rate by about 4% and the false positive rate by about 2.5%.
-
CHAMSIN: CaptcHA by caMouflaged StrINg Reviewed
Mukunoki Masayuki, Yamaba Hisaaki, Usuzaki Shotaro, Aburada Kentaro, Katayama Tetsuro, Park Mirang, Okazaki Naonobu
IEICE COMMUNICATIONS EXPRESS 8 ( 3 ) 55 - 60 2019.3
Language:English Publishing type:Research paper (scientific journal)
-
Implementation of Arduino Simulator ADVIS Visualizing the Value of Voltage on the Circuit Reviewed
Katayama Tetsuro, Nishida Tatsumi, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
JOURNAL OF ROBOTICS NETWORKING AND ARTIFICIAL LIFE 5 ( 4 ) 249 - 252 2019.3
Language:English Publishing type:Research paper (scientific journal)
-
Interactive Video CAPTCHA for Better Resistance to Automated Attack Reviewed
Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki
2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network 2019.2
Language:English Publishing type:Research paper (international conference proceedings) Publisher:2018 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018
© 2018 IPSJ. A 'Completely Automated Public Turing Test to Tell Computers and Humans Apart' (CAPTCHA) widely used online services so that prevents bots from automatic getting a large of accounts. Interactive video type CAPTCHAs that attempt to detect this attack by using delay time due to communication relays have been proposed. However, these approaches remain insufficiently resistant to bots. We propose a CAPTCHA that combines resistant to automated and relay attacks. In our CAPTCHA, the users recognize a moving object (target object) from among a number of randomly appearing decoy objects and tracks the target with mouse cursor. The users pass the test when they were able to track the target for a certain time. Since the target object moves quickly, the delay makes it difficult for a remote solver to break the CAPTCHA during a relay attack. It is also difficult for a bot to track the target using image processing because it has same looks of the decoys. We evaluated our CAPTCHA's resistance to relay and automated attacks. Our results show that, if our CAPTHCA's parameters are set suitable value, a relay attack cannot be established economically and false acceptance rate with bot could be reduced to 0.01% without affecting human success rate.