論文




表示件数: 10 / 112

202510月

Evaluation of A Cybersecurity System Applied to Small Satellite Missions


学会・研究会76th International Astronautical Congress (IAC 2025)

著者Isai Fajardo-Tapia, Yuta Nakagawa, Rafael Rodriguez-Leon, Yusuke Yamamoto, Takuya Watanabe, Hiroshi Kumagai, Masaki Kamizono (DTCY)

概要The rapid rise of small satellites has transformed the space industry, offering cost-effective solutions for communication, earth observation, technology demonstration, and scientific research. However, these satellites often lack strong cybersecurity measures, making them susceptible to cyber threats that can disrupt operations, compromise data, and manipulate onboard functions. To address these risks, this study proposes a hardware architecture that integrates encryption, authentication, and monitoring functions using commercial off-the-shelf (COTS) components. Although COTS parts improve adaptability, updatability, and cost-effectiveness, their performance and reliability must be assessed for space missions. The paper analyses the selection of devices for security requirements, reliability, and resource demands to guide informed selection of components. Space environment analysis, simulations, and operation tests are conducted on the candidate devices to ensure reliability in performance. Based on these findings, a hardware architecture was proposed to prove the concept of a system that addresses threat vectors while maintaining performance and CubeSat-class platform constraints. Adopting the proposed architecture, a system is being developed for deployment on a 6U CubeSat in a Sun-synchronous orbit, and some system operation considerations are discussed. The ultimate goal is to establish a scalable security solution to protect small satellites in an increasingly contested space environment

https://www.iac2025.org/(外部サイト)

 

20259月

Multi-Query Verifiable PIR and Its Application


学会・研究会IEICE TRANSACTIONS on Fundamentals, Vol. E108-A, No.9

著者Ryuya Hayashi (AIST), Junichiro Hayata, Keisuke Hara, Kenta Nomura, Masaki Kamizono (DTCY), Goichiro Hanaoka (AIST)

概要Private information retrieval (PIR) allows a client to obtain records from a database without revealing the retrieved index to the server. In the single-server model, it has been known that (plain) PIR is vulnerable to selective failure attacks, where a (malicious) server intends to learn information of an index by getting a client’s decoded result. Recently, as one solution for this problem, Ben-David et al. (TCC 2022) proposed verifiable PIR (vPIR) that allows a client to verify that the queried database satisfies certain properties. However, the existing vPIR scheme is not practically efficient, especially when we consider the multi-query setting. We introduce a new formalization of multi-query vPIR and provide an efficient scheme based on authenticated PIR (APIR) and succinct non-interactive arguments of knowledge (SNARKs). Communication cost is O(n|a| + |π|) with only one SNARK proof for n queries. We also present an OCSP application and show that adding SNARK proofs does not significantly increase communication.

https://globals.ieice.org/.../10.1587/transfun.2024DMP0006/_f(外部サイト)

 

20258月

Adversarial Fog: Exploiting the Vulnerabilities of LiDAR Point Cloud Preprocessing Filters

受賞Best Paper Award


学会・研究会ACM AsiaCCS 2025

著者Yuna Tanaka , Kazuki Nomoto (Waseda University/DTCY), Ryunosuke Kobayashi , Go Tsuruoka (Waseda University), Tatsuya Mori (Waseda University/NICT/RIKEN AIP)

概要We propose Adversarial Fog Attack (AFA), a framework that injects strategically configured artificial fog layers to disrupt both ML-based and density-based LiDAR object detection. By modeling LiDAR–fog interaction and analyzing preprocessing filters, AFA achieves 100% success with a six-layer configuration; simulations show collisions at 37.1 km/h average without deceleration. Physical experiments confirm invisibility at 30 m. We discuss countermeasures (noise removal rate heuristics, thermal fusion).

https://asiaccs2025.hust.edu.vn/(外部サイト)

 

20258月

Invisible but Detected: Physical Adversarial Shadow Attack and Defense on LiDAR Object Detection


学会・研究会USENIX Security 2025

著者Ryunosuke Kobayashi (Waseda University), Kazuki Nomoto, Yuna Tanaka (Waseda University/DTCY), Go Tsuruoka (Waseda University), Tatsuya Mori (Waseda University/NICT/RIKEN AIP)

概要“Shadow Hack” manipulates naturally occurring object shadows using LiDAR-reflective/absorptive materials to induce misclassification. Optimized adversarial shadows yield up to 100% success (11–21 m) in simulation; physical tests reach 100% (PointPillars) / 98% (SECOND-IoU). We also introduce BB-Validator achieving 100% defense while preserving accuracy.

https://www.usenix.org/.../usenixsecurity25(外部サイト)

 

20258月

WIP: Evaluating the End-to-End Impact of False Localization Attacks on vSLAM-Based Autonomous Drones


学会・研究会VehicleSec2025

著者Yuga Ebine (Waseda University), Kazuki Nomoto, Yuna Tanaka (Waseda University/DTCY), Ryunosuke Kobayashi, Go Tsuruoka (Waseda University), Tatsuya Mori (Waseda University/NICT/RIKEN AIP)

概要Phantom Path Attack projects dynamic adversarial visual stimuli to mislead ORB-SLAM3, producing localization errors up to 252 m and altitude deviation of 70 m in end-to-end drone simulations, risking crashes. Highlights need for LiDAR/IMU fusion and dynamic moving-object filtering.

https://www.usenix.org/conference/vehiclesec25(外部サイト)

 

20258月

Poster: A Security Evaluation Framework for V2X Communication in Autonomous Driving System


学会・研究会VehicleSec2025

著者Kodai Hirai (Waseda University), Yuna Tanaka, Kazuki Nomoto (Waseda University/DTCY), Ryunosuke Kobayashi, Go Tsuruoka (Waseda University), Tatsuya Mori (Waseda University/NICT/RIKEN AIP)

概要-

https://www.usenix.org/conference/vehiclesec25(外部サイト)

 

20258月

WIP: Evaluation of Threats and Impacts of HD Map Tampering Attacks in Autonomous Driving


学会・研究会VehicleSec2025

著者Miyu Sato, Ryunosuke Kobayashi (Waseda University), Kazuki Nomoto, Yuna Tanaka (Waseda University/DTCY), Go Tsuruoka (Waseda University), Tatsuya Mori (Waseda University/NICT/RIKEN AIP)

概要High-definition (HD) maps are essential for autonomous vehicle (AV) navigation, providing detailed road and lane structure information. However, their static nature makes them vulnerable to tampering, posing significant security risks. This study systematically categorizes HD map tampering threats and evaluates their impact through an end-to-end autonomous driving simulation using Autoware and AWSIM. By modifying lane widths in HD maps, we demonstrate how small modifications can cause AVs to deviate from safe trajectories, affecting both planning and control. Our findings demonstrate the need for robust HD map verification, cryptographic validation of map updates, and a balance between HD map reliance and real-time perception. The study demonstrates the importance of securing HD maps to ensure safe and reliable AV operations.

https://www.usenix.org/conference/vehiclesec25(外部サイト)

 

20258月

WIP: Understanding the Mechanisms Behind NDT-Based Localization Vulnerabilities in Autonomous Driving


学会・研究会VehicleSec2025

著者Yuna Tanaka, Kazuki Nomoto (Waseda University/DTCY), Ryunosuke Kobayashi, Go Tsuruoka (Waseda University), Tatsuya Mori (Waseda University/NICT/RIKEN AIP)

概要Accurate localization is critical for autonomous driving (AD), yet its security risks remain insufficiently explored, particularly in driving scenarios involving sensor fusion. This study investigates the vulnerabilities of Normal Distributions Transform (NDT) scan matching, a widely used localization method, and analyzes the conditions under which localization errors occur. We reveal that NDT relies primarily on nearby LiDAR point cloud structures from the pre-built map, making it susceptible to gradual manipulations that accumulate over time. To evaluate the impact of such manipulations, we conduct experiments simulating real-world scenarios, incorporating sensor fusion with an Extended Kalman Filter (EKF). Our findings identify key factors influencing localization errors, including target object selection and movement patterns, and confirm that these manipulations can induce errors of up to 23 m. End-to-end evaluation demonstrates that these errors can lead to hazardous driving behaviors, such as lane departures, missed traffic signals, and unintended sidewalk encroachments. By systematically analyzing the vulnerability of NDT-based localization, this study highlights the need for more robust localization mechanisms in AD.

https://www.usenix.org/conference/vehiclesec25(外部サイト)

 

20258月

Demo: A Practical Guide to Building a White-Box End-to-End Autonomous Driving Testbed with Open-Source AD and CAN-Based Drive-By-Wire Vehicle

受賞Best Demo Award


学会・研究会VehicleSec2025

著者Go Tsuruoka (Waseda University), Kazuki Nomoto, Yuna Tanaka (Waseda University/DTCY), Ryunosuke Kobayashi (Waseda University), Tatsuya Mori (Waseda University/NICT/RIKEN AIP)

概要Autonomous driving (AD) systems face various security threats, including attacks on sensors and machine learning modules. End-to-end (E2E) security evaluations are essential for understanding how component-level attacks translate into control-level consequences, and they are primarily conducted in simulation environments because of cost efficiency and safety concerns. However, recent studies demonstrate gaps between simulations and physical environments, underscoring the need for physical testing. Although commercial vehicles provide a potential test platform in physical experiments, their closed-source nature limits explainability and reproducibility, and integrating open-source alternatives can be challenging due to a lack of documentation. To address these challenges, we present systematic documentation of integration challenges and practical solutions encountered when implementing open-source AD systems on hardware platforms. As a concrete implementation, we demonstrate the integration of Autoware with a CAN-based drive-by-wire system for E2E evaluation environment. This demo shows videos of our recent efforts to build a white-box testbed that integrates Autoware with a CAN-based drive-by-wire vehicle for security research as a concrete implementation of our practical integration guideline. The demo includes AD capabilities and E2E security evaluations of emergency stopping functions and adversarial attacks on pedestrian detection. Implementation details, source code, and additional documentation are available at

https://www.usenix.org/conference/vehiclesec25(外部サイト)

 

20257月

バイナリファジングを用いた正常なプログラムとの挙動比較によるIoT機器のトロイ化検出手法

受賞CSEC優秀研究賞, CSEC優秀学生研究賞, 推薦論文


学会・研究会セキュリティサマーサミット2025

著者金城 豪志 (岡山大学), 高田 雄太, 熊谷 裕志, 神薗 雅紀 (DTCY), 山内 利宏 (岡山大学)

概要近年,IoT 機器の普及に伴い,IoT 機器を標的とした攻撃が増加しており,特に外部ネットワークやサプライチェーン攻撃を通じて不正なコードが組み込まれるトロイ化は検出が困難である.先行研究ROSAはファジングとメタモルフィックテストを組み合わせシステムコール種類差異から検出するが,入力分類誤差や微細差分による誤検知と詳細調査工数増が課題である.本研究は正常機器と検査対象機器双方に同一テストデータでバイナリファジングを実施し,取得システムコール発行順序の差分比較でトロイ化を検出する手法を提案する.これにより誤検知抑制と調査工数削減を両立できることを ROSARUM を用いた比較評価で示す.

https://ken.ieice.org/ken/program/...IPSJ-CSEC(外部サイト)

 

112件中21 - 30