論文 - 片山 徹郎
-
CHAMSIN: CaptcHA by caMouflaged StrINg 査読あり
Mukunoki Masayuki, Yamaba Hisaaki, Usuzaki Shotaro, Aburada Kentaro, Katayama Tetsuro, Park Mirang, Okazaki Naonobu
IEICE COMMUNICATIONS EXPRESS 8 ( 3 ) 55 - 60 2019年3月
-
Implementation of Arduino Simulator ADVIS Visualizing the Value of Voltage on the Circuit 査読あり
Tetsuro Katayama, Tatsumi Nishida, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki
Journal of Robotics, Networks and Artificial Life 5 ( 4 ) 249 - 252 2019年3月
-
Interactive Video CAPTCHA for Better Resistance to Automated Attack 査読あり
Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki
2018 Eleventh International Conference on Mobile Computing and Ubiquitous Network 2019年2月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス) 出版者・発行元:2018 11th International Conference on Mobile Computing and Ubiquitous Network, ICMU 2018
© 2018 IPSJ. A 'Completely Automated Public Turing Test to Tell Computers and Humans Apart' (CAPTCHA) widely used online services so that prevents bots from automatic getting a large of accounts. Interactive video type CAPTCHAs that attempt to detect this attack by using delay time due to communication relays have been proposed. However, these approaches remain insufficiently resistant to bots. We propose a CAPTCHA that combines resistant to automated and relay attacks. In our CAPTCHA, the users recognize a moving object (target object) from among a number of randomly appearing decoy objects and tracks the target with mouse cursor. The users pass the test when they were able to track the target for a certain time. Since the target object moves quickly, the delay makes it difficult for a remote solver to break the CAPTCHA during a relay attack. It is also difficult for a bot to track the target using image processing because it has same looks of the decoys. We evaluated our CAPTCHA's resistance to relay and automated attacks. Our results show that, if our CAPTHCA's parameters are set suitable value, a relay attack cannot be established economically and false acceptance rate with bot could be reduced to 0.01% without affecting human success rate.
-
Tamias: a Syntax File Checker for Parsing Expression Grammar 査読あり
Miyaji Toshihiro, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Proceedings of International Conference on Artificial Life and Robotics (ICAROB2019) 169 - 172 2019年2月
-
Implementation of an Arduino Simulator to Support Circuit Design 査読あり
Nishida Tatsumi, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Proceedings of International Conference on Artificial Life and Robotics (ICAROB2019) 173 - 176 2019年2月
-
Development of Library Fescue Extracting Elements of Attributes and Operations of Class Diagram in UML 査読あり
Mori Keisuke, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Proceedings of International Conference on Artificial Life and Robotics (ICAROB2019) 165 - 168 2019年2月
-
Application of Pairwise Testing to Test Cases by Boundary Value Analysis in BWDM 査読あり
Hirakoba Futa, Katayama Tetsuro, Kita Yoshihiro, Yamaba Hisaaki, Aburada Kentaro, Okazaki Naonobu
Proceedings of International Conference on Artificial Life and Robotics (ICAROB2019) 161 - 164 2019年2月
-
Use of access characteristics to distinguish legitimate user traffic from DDoS attack traffic 査読あり
Kentaro Aburada, Yuki Arikawa, Shotaro Usuzaki, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
Artificial Life and Robotics 2019年1月
記述言語:英語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Artificial Life and Robotics
© 2019, International Society of Artificial Life and Robotics (ISAROB). Distributed denial of service attacks are a serious threat in the current information society, where the Internet plays an important role as infrastructure. We have been studying ways to mitigate these attacks using a method that distinguishes between legitimate users and attacks. Our previous method was not sufficient because it only analyzed access logs after the attack. In this study, we propose a new method that can distinguish between legitimate users and attacks while the services are running. When the IDS detects an attack, a quarantine server distinguishes legitimate users using access characteristics. The access characteristics are: (1) user follows links, (2) sender accessed a popular page, and (3) the sender’s current average transmission interval. Our experiments confirmed that the proposed method can distinguish between legitimate users and attacks.
-
RETUSS: Ensuring Traceability System between Class Diagram in UML and Java Source Code in Real Time 査読あり
Tetsuro Katayama, Keisuke Mori, Yoshihiro Kita, Hisaaki Yamaba, Kentaro Aburada and Naonobu Okazaki
Journal of Robotics, Networks and Artificial Life, Atlantis Press 5 ( 2 ) 114 - 117 2018年9月
-
Evaluation of User Identification Methods for Realizing an Authentication System Using s-EMG 査読あり
Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Mirang Park, and Naonobu Okazaki
Advances in Network-Based Information Systems, Lecture Notes on Data Engineering and Communications Technologies, Springer 22 733 - 742 2018年9月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス) 出版者・発行元:Lecture Notes on Data Engineering and Communications Technologies
© 2019, Springer Nature Switzerland AG. At the present time, mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives. Therefore, an authentication method that prevents shoulder surfing is needed. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are detected over the skin surface, are generated by the electrical activity of muscle fibers during contraction. Muscle movement can be differentiated by analyzing the s-EMG. Taking advantage of the caracteristics, we proposed a method that uses a list of gestures as a password in the previous study. In this paper, we employed support vector machines and attempted to improve the gesture recognition method by introducing correlation coefficient and cross-correlation. A series of experiments was carried out in order to evaluate the performance of the method.
-
UMLとソースコードの間でトレーサビリティをリアルタイムに維持するツールRETUSSの現状と課題
森敬介, 片山徹郎
宮崎大学工学部紀要 2018年7月
記述言語:日本語 掲載種別:研究論文(大学,研究機関等紀要)
-
Java プログラムのデータ遷移可視化ツール TFVIS の開発 査読あり
佐藤 拓弥、片山徹郎、喜多 義弘、山場久昭、油田健太郎、岡崎 直宣
情報処理学会論文誌 59 ( 4 ) 1137 - 1149 2018年4月
記述言語:日本語 掲載種別:研究論文(学術雑誌)
ソフトウェア開発におけるデバッグは,手間のかかる工程である.プログラムの欠陥を効率良く特定するためには,プログラム実行時の挙動を把握することが重要である.しかし,プログラム実行時の挙動は一般的に不可視であり,その挙動がどこまで正しかったのかを把握することは困難である.そこで,本研究では,Javaプログラムのデバッグの効率化を目的として,プログラムの欠陥特定を支援するデータ遷移可視化ツールTFVIS(Transitions and Flow VISualization)を開発した.TFVISは,プログラム実行時のデータ遷移と実行フローの可視化を行う.評価実験では,TFVISを活用することで欠陥特定に要する時間を約35%削減できることを確認した.このことから,TFVISによる可視化がデバッグ効率の向上に効果的であるといえる.It takes much time in debugging process. To find bugs effectively, it's important to understand the dynamic behavior of programs. But it's difficult since the dynamic behavior of the program is generally invisible. To support understanding the dynamic behavior, we have developed TFVIS (Transitions and Flow VISualization). It provides visualization of data transitions and data flow of Java programs. In the evaluation experiment, we confirmed that by using TFVIS we can reduce the time required to identify defects by about 35%. Hence, it can be said that visualization by TFVIS is effective to improve debugging efficiency.
-
An examination of the interactive video CAPTCHA method to resist relay attack 査読あり
Tatsuda Ryohei, Aburada Kentaro, Yamaba Hisaaki, Katayama Tetsuro, Mukunoki Masayuki, Park Mirang, Okazaki Naonobu
IEICE Communications Express 7 ( 4 ) 136 - 141 2018年4月
記述言語:英語 掲載種別:研究論文(学術雑誌) 出版者・発行元:一般社団法人 電子情報通信学会
CAPTCHA is a kind of challenge response test, which is used to distinguish human users from malicious computer program such as bots. However, the attack technique called relay attack as a method to avoid the CAPTCHA has been devised. This attack relays the CAPTCHA challenges to remote human-solvers, let them to decode CAPTCHA challenges. We used delay time that is caused by communications needed in relay attack. Our new CAPTCHA uses this delay time between communications to prevent relay attacks. We constructed an experimental environment in which relay attack can be simulated, made a series of experiments in order to evaluate the performance of the proposed method.
-
Yamaba H., Kurogi T., Aburada K., Kubota S., Katayama T., Park M., Okazaki N.
Artificial Life and Robotics 23 ( 1 ) 87 - 93 2018年3月
記述言語:英語 掲載種別:研究論文(学術雑誌) 出版者・発行元:Artificial Life and Robotics
© 2017, ISAROB. At present, mobile devices such as tablet-type PCs and smart phones have widely penetrated into our daily lives. Therefore, an authentication method that prevents shoulder surfing is needed. We are investigating a new user authentication method for mobile devices that uses surface electromyogram (s-EMG) signals, not screen touching. The s-EMG signals, which are detected over the skin surface, are generated by the electrical activity of muscle fibers during contraction. Muscle movement can be differentiated by analyzing the s-EMG. Taking advantage of the characteristics, we proposed a method that uses a list of gestures as a password in the previous study. In this paper, we introduced support vector machines (SVM) for improvement of the method of identifying gestures. A series of experiments was carried out to evaluate the performance of the SVM based method as a gesture classifier and we also discussed its security.
-
A Study on a User Identification Method Using Dynamic Time Warping to Realize an Authentication System by s-EMG 査読あり
Tokiyoshi Kurogi, Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki
The 6th International Conference on Emerging Internet, Data & Web Technologies 17 889 - 900 2018年3月
-
An Examination of CAPTCHA for Tolerance of Relay Attacks and Automated Attacks 査読あり
Ryohei Tatsuda, Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Norio Shiratori, Naonobu Okazaki
The 6th International Conference on Emerging Internet, Data & Web Technologies 17 870 - 879 2018年3月
-
Implementation of RETUSS to Ensure Traceability between Class Diagram in UML and Java Source Code in Real Time 査読あり
K. Mori, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB2018) 522 - 525 2018年2月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Prototype of a Tool to Defect Specific Comments 査読あり
S. Tanoue, T. Katayama, Y. Kita, H. Yamaba, K. Aburada, and N. Okazaki
Proceedings of International Conference on Artificial Life and Robotics (ICAROB2018) 526 - 529 2018年2月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
Negative Test Case Generation from an Extended Place/Transition Net-Based Mutants 査読あり
T. Takagi and T. Katayama
Proc. 2018 Int’l Conf. on Artifical Life and Robotics (ICAROB2018) 513 - 516 2018年2月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)
-
A study on user identification method using cross-correlation and SVM to realize an authentication system by s-EMG 査読あり
T. Kurogi, H.Yamaba, K.Aburada, T.Katayama, M. Park, N.Okazak
International Symposium on Artificial Life and Robotics 462 - 467 2018年1月
記述言語:英語 掲載種別:研究論文(国際会議プロシーディングス)