Papers - KATAYAMA Tetsuro
-
平木場 風太, 片山 徹郎
ソフトウェアエンジニアリングシンポジウム2019論文集 ( 2019 ) 126 - 134 2019.8
Language:Japanese Publishing type:Research paper (conference, symposium, etc.)
-
Investigation on Blockchain‐based Malware Information Sharing Method in Malware Detection System
藤竜成, 臼崎翔太郎, 油田健太郎, 山場久昭, 片山徹郎, PARK Mirang, 白鳥則郎, 岡崎直宣
電子情報通信学会技術研究報告 119 ( 140(ISEC2019 12-61) ) 293‐298 2019.7
-
VDM++仕様を対象としたテストケース自動生成ツールBWDMへのPICTの適用
平木場風太, 片山徹郎
宮崎大学工学部紀要 2019.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
回路設計支援を目的としたArduinoシミュレータADVISの現状と課題
西田龍登, 片山徹郎
宮崎大学工学部紀要 2019.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
解析表現文法を対象とした構文ファイルのチェックツールTamiasの開発
宮地俊宏, 片山徹郎
宮崎大学工学部紀要 2019.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Introduction of Fingerspelling for Realizing a User Authentication Method Using s-EMG Reviewed
Hisaaki Yamaba, Shimpei Inotani, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Advances in Intelligent Systems and Computing 927 693 - 701 2019.3
Language:English Publishing type:Research paper (international conference proceedings) Publisher:Advances in Intelligent Systems and Computing
© 2019, Springer Nature Switzerland AG. At the present time, mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives. Therefore, an authentication method that prevents shoulder surfing is needed. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are detected over the skin surface, are generated by the electrical activity of muscle fibers during contraction. Muscle movement can be differentiated by analyzing the s-EMG. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In order to realize this method, we have to prepare many gestures that are used to compose passwords. In this paper, we adopted fingerspelling as candidates of such gestures. We measured s-EMG signals of manual kana of The Japanese Sign Language syllabary and examined their ability for the use of passwords of the authentication method.
-
Investigation on sharing signatures of suspected malware files using blockchain technology Reviewed
Fuji R., Usuzaki S., Aburada K., Yamaba H., Katayama T., Park M., Shiratori N., Okazaki N.
Lecture Notes in Engineering and Computer Science 2239 94 - 99 2019.3
Language:English Publishing type:Research paper (international conference proceedings) Publisher:Lecture Notes in Engineering and Computer Science
© 2019 Turkiye Klinikleri Journal of Medical Sciences. All rights reserved. In recent years, the amount of new malware has been rapidly increasing. Because malware has an adverse effect on the Internet, upon which modern society is increasingly dependent, its detection is very important. In addition, blockchain technology has attracted the attention of many people in recent years due to its four main characteristics of decentralization, persistency, anonymity, and auditability. In this paper, we propose a system for sharing the signatures of suspected malware files using blockchain technology. The proposed system can share the signatures of suspected files between users, allowing them to rapidly respond to increasing malware threats. Further, it improves the accuracy of detection and removal of malware by utilizing signatures recorded by the blockchain. In the evaluation experiment, we created a prototype of the proposed system and investigated its effect on the accuracy of detection and removal of malware. Compared with heuristic methods or behavior-based methods only, the proposed system which uses these methods plus signature-based method using shared signatures on the blockchain improved the false negative rate by about 4% and the false positive rate by about 2.5%.
-
CHAMSIN: CaptcHA by caMouflaged StrINg Reviewed
Mukunoki Masayuki, Yamaba Hisaaki, Usuzaki Shotaro, Aburada Kentaro, Katayama Tetsuro, Park Mirang, Okazaki Naonobu
IEICE COMMUNICATIONS EXPRESS 8 ( 3 ) 55 - 60 2019.3
Language:English Publishing type:Research paper (scientific journal)
-
Implementation of Arduino Simulator ADVIS Visualizing the Value of Voltage on the Circuit Reviewed
Katayama Tetsuro, Nishida Tatsumi, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
JOURNAL OF ROBOTICS NETWORKING AND ARTIFICIAL LIFE 5 ( 4 ) 249 - 252 2019.3
Language:English Publishing type:Research paper (scientific journal)
-
Interactive Video CAPTCHA for Better Resistance to Automated Attack Reviewed
Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki
2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network 2019.2
Language:English Publishing type:Research paper (international conference proceedings) Publisher:2018 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018
© 2018 IPSJ. A 'Completely Automated Public Turing Test to Tell Computers and Humans Apart' (CAPTCHA) widely used online services so that prevents bots from automatic getting a large of accounts. Interactive video type CAPTCHAs that attempt to detect this attack by using delay time due to communication relays have been proposed. However, these approaches remain insufficiently resistant to bots. We propose a CAPTCHA that combines resistant to automated and relay attacks. In our CAPTCHA, the users recognize a moving object (target object) from among a number of randomly appearing decoy objects and tracks the target with mouse cursor. The users pass the test when they were able to track the target for a certain time. Since the target object moves quickly, the delay makes it difficult for a remote solver to break the CAPTCHA during a relay attack. It is also difficult for a bot to track the target using image processing because it has same looks of the decoys. We evaluated our CAPTCHA's resistance to relay and automated attacks. Our results show that, if our CAPTHCA's parameters are set suitable value, a relay attack cannot be established economically and false acceptance rate with bot could be reduced to 0.01% without affecting human success rate.
-
Tamias: a Syntax File Checker for Parsing Expression Grammar Reviewed
Miyaji Toshihiro, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
ICAROB 2019: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS 169 - 172 2019.2
Language:English Publishing type:Research paper (international conference proceedings)
-
Implementation of an Arduino Simulator to Support Circuit Design Reviewed
Nishida Tatsumi, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
ICAROB 2019: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS 173 - 176 2019.2
Language:English Publishing type:Research paper (international conference proceedings)
-
Development of Library Fescue Extracting Elements of Attributes and Operations of Class Diagram in UML Reviewed
Mori Keisuke, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
ICAROB 2019: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS 165 - 168 2019.2
Language:English Publishing type:Research paper (international conference proceedings)
-
Application of Pairwise Testing to Test Cases by Boundary Value Analysis in BWDM Reviewed
Hirakoba Futa, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
ICAROB 2019: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS 161 - 164 2019.2
Language:English Publishing type:Research paper (international conference proceedings)
-
Use of access characteristics to distinguish legitimate user traffic from DDoS attack traffic Reviewed
Kentaro Aburada, Yuki Arikawa, Shotaro Usuzaki, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Artificial Life and Robotics 2019.1
Language:English Publishing type:Research paper (scientific journal) Publisher:Artificial Life and Robotics
© 2019, International Society of Artificial Life and Robotics (ISAROB). Distributed denial of service attacks are a serious threat in the current information society, where the Internet plays an important role as infrastructure. We have been studying ways to mitigate these attacks using a method that distinguishes between legitimate users and attacks. Our previous method was not sufficient because it only analyzed access logs after the attack. In this study, we propose a new method that can distinguish between legitimate users and attacks while the services are running. When the IDS detects an attack, a quarantine server distinguishes legitimate users using access characteristics. The access characteristics are: (1) user follows links, (2) sender accessed a popular page, and (3) the sender’s current average transmission interval. Our experiments confirmed that the proposed method can distinguish between legitimate users and attacks.
-
RETUSS: Ensuring Traceability System between Class Diagram in UML and Java Source Code in Real Time Reviewed
Katayama Tetsuro, Mori Keisuke, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
JOURNAL OF ROBOTICS NETWORKING AND ARTIFICIAL LIFE 5 ( 2 ) 114 - 117 2018.9
Language:English Publishing type:Research paper (scientific journal)
-
Evaluation of User Identification Methods for Realizing an Authentication System Using s-EMG Reviewed
Yamaba Hisaaki, Aburada Kentaro, Katayama Tetsuro, Park Mirang, Okazaki Naonobu
ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2018 22 733 - 742 2018.9
Language:English Publishing type:Research paper (international conference proceedings)
-
UMLとソースコードの間でトレーサビリティをリアルタイムに維持するツールRETUSSの現状と課題
森敬介, 片山徹郎
宮崎大学工学部紀要 2018.7
Language:Japanese Publishing type:Research paper (bulletin of university, research institution)
-
Development of TFVIS (Transitions and Flow VISalization) for Java Programs Reviewed
佐藤 拓弥, 片山 徹郎, 喜多 義弘, 山場 久昭, 油田 健太郎, 岡崎 直宣
情報処理学会論文誌 59 ( 4 ) 1137 - 1149 2018.4
Language:Japanese Publishing type:Research paper (scientific journal)
ソフトウェア開発におけるデバッグは,手間のかかる工程である.プログラムの欠陥を効率良く特定するためには,プログラム実行時の挙動を把握することが重要である.しかし,プログラム実行時の挙動は一般的に不可視であり,その挙動がどこまで正しかったのかを把握することは困難である.そこで,本研究では,Javaプログラムのデバッグの効率化を目的として,プログラムの欠陥特定を支援するデータ遷移可視化ツールTFVIS(Transitions and Flow VISualization)を開発した.TFVISは,プログラム実行時のデータ遷移と実行フローの可視化を行う.評価実験では,TFVISを活用することで欠陥特定に要する時間を約35%削減できることを確認した.このことから,TFVISによる可視化がデバッグ効率の向上に効果的であるといえる.It takes much time in debugging process. To find bugs effectively, it's important to understand the dynamic behavior of programs. But it's difficult since the dynamic behavior of the program is generally invisible. To support understanding the dynamic behavior, we have developed TFVIS (Transitions and Flow VISualization). It provides visualization of data transitions and data flow of Java programs. In the evaluation experiment, we confirmed that by using TFVIS we can reduce the time required to identify defects by about 35%. Hence, it can be said that visualization by TFVIS is effective to improve debugging efficiency.
-
An examination of the interactive video CAPTCHA method to resist relay attack Reviewed
Tatsuda Ryohei, Aburada Kentaro, Yamaba Hisaaki, Katayama Tetsuro, Mukunoki Masayuki, Park Mirang, Okazaki Naonobu
IEICE Communications Express 7 ( 4 ) 136 - 141 2018.4
Language:English Publishing type:Research paper (scientific journal) Publisher:一般社団法人 電子情報通信学会
CAPTCHA is a kind of challenge response test, which is used to distinguish human users from malicious computer program such as bots. However, the attack technique called relay attack as a method to avoid the CAPTCHA has been devised. This attack relays the CAPTCHA challenges to remote human-solvers, let them to decode CAPTCHA challenges. We used delay time that is caused by communications needed in relay attack. Our new CAPTCHA uses this delay time between communications to prevent relay attacks. We constructed an experimental environment in which relay attack can be simulated, made a series of experiments in order to evaluate the performance of the proposed method.