• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Study on tamper-resistant software technology with theoretic security evaluation

Research Project

Project/Area Number 15K00183
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Information security
Research InstitutionTokyo University of Technology (2016-2018)
Japan Advanced Institute of Science and Technology (2015)

Principal Investigator

FUTA Yuichi  東京工科大学, コンピュータサイエンス学部, 准教授 (50706223)

Co-Investigator(Kenkyū-buntansha) 宮地 充子  大阪大学, 工学研究科, 教授 (10313701)
CHEN Jiageng  北陸先端科学技術大学院大学, 情報科学研究科, 助教 (90640748)
Research Collaborator OKAZAKI Hiroyuki  
Project Period (FY) 2015-04-01 – 2019-03-31
Project Status Completed (Fiscal Year 2018)
Budget Amount *help
¥4,420,000 (Direct Cost: ¥3,400,000、Indirect Cost: ¥1,020,000)
Fiscal Year 2018: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Fiscal Year 2017: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2016: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Fiscal Year 2015: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
KeywordsWhite-Box Cryptography / 耐タンパー技術 / 形式検証 / ProVerif / 難読化技術 / 非線形変換
Outline of Final Research Achievements

White-Box Cryptography(WBC) techniques, that achieve security under harsh security conditions, are important.
In this research, we have found the necessity to remove bijective characteristic of input-output relation of tables, and have proposed a scheme model. For security evaluation and estimation of computation amount of WBC techniques, we have developed formalized verification techniques using computers.

Academic Significance and Societal Importance of the Research Achievements

プログラムや実行中のデータに攻撃者がアクセス可能という条件下において、安全な本研究のWBC技術を用いることで、ハードウェアによるセキュリティの補助がなくても、ソフトウェアのみで高いセキュリティレベルを維持できる。そのため、携帯端末におけるアプリケーションを安全に実行することが可能になり、携帯端末を用いたインターネットバンキングやスマート家電の操作が安全に実現できる。
また、WBC技術の形式検証技術により、システムに組み込む際の安全性や計算量評価の補助が可能となる。

Report

(5 results)
  • 2018 Annual Research Report   Final Research Report ( PDF )
  • 2017 Research-status Report
  • 2016 Research-status Report
  • 2015 Research-status Report
  • Research Products

    (27 results)

All 2019 2018 2017 2016 2015

All Journal Article (12 results) (of which Int'l Joint Research: 3 results,  Peer Reviewed: 12 results,  Open Access: 5 results,  Acknowledgement Compliant: 7 results) Presentation (15 results) (of which Int'l Joint Research: 9 results)

  • [Journal Article] Maximum Number of Steps Taken by Modular Exponentiation and Euclidean Algorithm2019

    • Author(s)
      Hiroyuki Okazaki, Koh-ichi Nagao and Yuichi Futa
    • Journal Title

      Formalized Mathematics

      Volume: 27 Issue: 1 Pages: 87-91

    • DOI

      10.2478/forma-2019-0009

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] OTP-IoT: An ownership transfer protocol for the Internet of Things2018

    • Author(s)
      Mamun Mohammad Saiful Islam、Su Chunhua、Yang Anjia、Miyaji Atsuko、Ghorbani Ali
    • Journal Title

      Journal of Information Security and Applications

      Volume: 43 Pages: 73-82

    • DOI

      10.1016/j.jisa.2018.10.009

    • Related Report
      2018 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Dual Lattice of Z-module Lattice2017

    • Author(s)
      Yuichi Futa and Yasunari Shidama
    • Journal Title

      Formalized Mathematics

      Volume: 25 Issue: 2 Pages: 157-169

    • DOI

      10.1515/forma-2017-0015

    • Related Report
      2017 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Isomorphism Theorem on Vector Spaces over a Ring2017

    • Author(s)
      Yuichi Futa and Yasunari Shidama
    • Journal Title

      Formalized Mathematics

      Volume: 25 Issue: 3 Pages: 171-178

    • DOI

      10.1515/forma-2017-0016

    • Related Report
      2017 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices2017

    • Author(s)
      Steven Gordon, Xinyi Huang, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin and Komwut Wipusitwarakun
    • Journal Title

      IEEE Trans. Information Forensics and Security

      Volume: 12 Pages: 3024-3038

    • NAID

      120006469242

    • Related Report
      2017 Research-status Report
    • Peer Reviewed
  • [Journal Article] Embedded Lattice and Properties of Gram Matrix2017

    • Author(s)
      Yuichi Futa and Yasunari Shidama
    • Journal Title

      Formalized Mathematics

      Volume: 25 Issue: 1 Pages: 73-86

    • DOI

      10.1515/forma-2017-0007

    • Related Report
      2016 Research-status Report
    • Peer Reviewed / Open Access / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Privacy-Preserving Integration of Medical Data A Practical Multiparty Private Set Intersection2017

    • Author(s)
      Atsuko Miyaji, Kazuhisa Nakasho and Shohei Nishida
    • Journal Title

      Journal of Medical Systems

      Volume: 41 Issue: 3 Pages: 1-10

    • DOI

      10.1007/s10916-016-0657-4

    • Related Report
      2016 Research-status Report
    • Peer Reviewed / Open Access / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Construction of RC4 Key Setting in WPA2017

    • Author(s)
      Ryoma Ito and Atsuko Miyaji
    • Journal Title

      IEICE Trans., Fundamental

      Volume: E100-A Pages: 138-148

    • Related Report
      2016 Research-status Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Refined RC4 key correlations of internal states in WPA2017

    • Author(s)
      Ryoma Ito and Atsuko Miyaji
    • Journal Title

      IEICE Trans., Fundamental

      Volume: E99-A Pages: 1132-1144

    • NAID

      130005154235

    • Related Report
      2016 Research-status Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] A New Scheme of Blockcipher Hash2016

    • Author(s)
      Mazumder Rashed and Atsuko Miyaji
    • Journal Title

      IEICE Trans., Information and Systems

      Volume: E99-D Pages: 796-804

    • NAID

      130005141349

    • Related Report
      2015 Research-status Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-2562016

    • Author(s)
      Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado and Atsuko Miyaji
    • Journal Title

      IEICE Trans., Fundamentals

      Volume: E99-A Pages: 14-21

    • NAID

      130005115228

    • Related Report
      2015 Research-status Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Refined Glimpse correlations of RC42016

    • Author(s)
      Ryoma Ito and Atsuko Miyaji
    • Journal Title

      IEICE Trans., Fundamentals

      Volume: E99-A Pages: 3-13

    • NAID

      130005115256

    • Related Report
      2015 Research-status Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Presentation] BGP経路における不正な経路情報の検知2019

    • Author(s)
      高橋 幸宏, 鈴木 智道, 布田 裕一, 田中 覚
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2019)
    • Related Report
      2018 Annual Research Report
  • [Presentation] ProVerifを用いたCT及びブロックチェーンの形式化2019

    • Author(s)
      荒井 研一, 岡崎 裕之, 布田 裕一
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2019)
    • Related Report
      2018 Annual Research Report
  • [Presentation] New Iterated RC4 Key Correlations2018

    • Author(s)
      Ryoma Ito and Atsuko Miyaji
    • Organizer
      The 23rd Australasian Conference on Information Security and Privacy(ACISP 2018)
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Efficient and quasi-Accurate Private Multiset Unions2018

    • Author(s)
      Atsuko Miyaji and Katsunari Shishido
    • Organizer
      The 2nd IEEE International Workshop on Big Data and IoT Security in Smart Computing (SMARTCOMP 2018 BITS WORKSHOP)
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research
  • [Presentation] A Closer Look at the Guo-Johansson-Stankovski Attack Against QC-MDPC Codes2018

    • Author(s)
      Tung Chou, Yohei Maezawa and Atsuko Miyaji
    • Organizer
      Information Security and Cryptology(ICISC 2018)
    • Related Report
      2018 Annual Research Report
    • Int'l Joint Research
  • [Presentation] ProVerifを用いたCTの形式化2018

    • Author(s)
      荒井 研一, 岡崎 裕之, 布田 裕一
    • Organizer
      2018年 暗号と情報セキュリティシンポジウム (SCIS2018)
    • Related Report
      2017 Research-status Report
  • [Presentation] 共通鍵暗号方式におけるLinear Obfuscationを用いた効果的な難読化手法2017

    • Author(s)
      ステュワート ギャビンレン,布田 裕一,宮地 充子
    • Organizer
      IEICE Japan Tech. Rep. ISEC2017 (2017-03)
    • Place of Presentation
      東海大学(東京都港区)
    • Year and Date
      2017-03-10
    • Related Report
      2016 Research-status Report
  • [Presentation] ProVerifにおけるphaseについて2017

    • Author(s)
      荒井 研一、岡崎 裕之、布田 裕一
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS)
    • Place of Presentation
      ロワジールホテル那覇(沖縄県那覇市)
    • Year and Date
      2017-01-25
    • Related Report
      2016 Research-status Report
  • [Presentation] Evaluation and Improvement of Pseudo-Random Number Generator for EPC Gen22017

    • Author(s)
      Hiroshi Nomaguchi, Atsuko Miyaji and Chunhua Su
    • Organizer
      The 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-17)
    • Related Report
      2017 Research-status Report
    • Int'l Joint Research
  • [Presentation] (p, N)-identifiability: Anonymity under Practical Adversaries2017

    • Author(s)
      Tomoaki Mimoto, Shinsaku Kiyomoto, Katsuya Tanaka and Atsuko Miyaji
    • Organizer
      The 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-17)
    • Related Report
      2017 Research-status Report
    • Int'l Joint Research
  • [Presentation] A Blockcipher based Authentication Encryption2016

    • Author(s)
      Rashed Mazumder, Atsuko Miyaji and Chunhua Su
    • Organizer
      International Cross-Domain Conference on Availability, Reliability and Security in Information Systems(CD-ARES 2016)
    • Place of Presentation
      ザルツブルク(オーストリア)
    • Year and Date
      2016-08-31
    • Related Report
      2016 Research-status Report
    • Int'l Joint Research
  • [Presentation] An Efficient Construction of a Compression Function for Cryptographic Hash2016

    • Author(s)
      Rashed Mazumder, Atsuko Miyaji, and Chunhua Su
    • Organizer
      International Cross-Domain Conference on Availability, Reliability and Security in Information Systems (CD-ARES 2016)
    • Place of Presentation
      ザルツブルク(オーストリア)
    • Year and Date
      2016-08-31
    • Related Report
      2016 Research-status Report
    • Int'l Joint Research
  • [Presentation] Improved Differential Characteristic Searching Methods2015

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, Chunhua Su and Je Sen Teh
    • Organizer
      The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015)
    • Place of Presentation
      ニューヨーク(アメリカ)
    • Year and Date
      2015-11-05
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] A New Statistical Approach for Integral Attack2015

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, Chunhua Su and Liang Zhao
    • Organizer
      The 9th International Conference on Network and System Security (NSS 2015)
    • Place of Presentation
      ニューヨーク(アメリカ)
    • Year and Date
      2015-11-04
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] Symbolic Execution に対する難読化の評価2015

    • Author(s)
      ステュワート ギャヴィン, 宮地 充子, 布田 裕一
    • Organizer
      コンピュータセキュリティシンポジウム
    • Place of Presentation
      長崎ブリックホール(長崎県長崎市)
    • Year and Date
      2015-10-22
    • Related Report
      2015 Research-status Report

URL: 

Published: 2015-04-16   Modified: 2020-03-30  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi