Mitsuru SHIOZAKI Takeshi SUGAWARA Takeshi FUJINO
We study a new transistor-level side-channel leakage caused by charges trapped in between stacked transistors namely residual electric charges (RECs). Building leakage models is important in designing countermeasures against side-channel attacks (SCAs). The conventional work showed that even a transistor-level leakage is measurable with a local electromagnetic measurement. One example is the current-path leak [1], [2]: an attacker can distinguish the number of transistors in the current path activated during a signal transition. Addressing this issue, Sugawara et al. proposed to use a mirror circuit that has the same number of transistors on its possible current paths. We show that this countermeasure is insufficient by showing a new transistor-level leakage, caused by RECs, not covered in the previous work. RECs can carry the history of the gate's state over multiple clock cycles and changes the gate's electrical behavior. We experimentally verify that RECs cause exploitable side-channel leakage. We also propose a countermeasure against REC leaks and designed advanced encryption standard-128 (AES-128) circuits using IO-masked dual-rail read-only memory with a 180-nm complementary metal-oxide-semiconductor (CMOS) process. We compared the resilience of our AES-128 circuits against EMA attacks with and without our countermeasure and investigated an RECs' effect on physically unclonable functions (PUFs). We further extend RECs to physically unclonable function. We demonstrate that RECs affect the performance of arbiter and ring-oscillator PUFs through experiments using our custom chips fabricated with 180- and 40-nm CMOS processes*.
Ryoto OMACHI Yasuyuki MURAKAMI
The damage cost caused by malware has been increasing in the world. Usually, malwares are packed so that it is not detected. It is a hard task even for professional malware analysts to identify the packers especially when the malwares are multi-layer packed. In this letter, we propose a method to identify the packers for multi-layer packed malwares by using k-nearest neighbor algorithm with entropy-analysis for the malwares.
We propose a biometric identification system where the chosen- and generated-secret keys are used simultaneously, and investigate its fundamental limits from information theoretic perspectives. The system consists of two phases: enrollment and identification phases. In the enrollment phase, for each user, the encoder uses a secret key, which is chosen independently, and the biometric identifier to generate another secret key and a helper data. In the identification phase, observing the biometric sequence of the identified user, the decoder estimates index, chosen- and generated-secret keys of the identified user based on the helper data stored in the system database. In this study, the capacity region of such system is characterized. In the problem settings, we allow chosen- and generated-secret keys to be correlated. As a result, by permitting the correlation of the two secret keys, the sum rate of the identification, chosen- and generated-secret key rates can achieve a larger value compared to the case where the keys do not correlate. Moreover, the minimum amount of the storage rate changes in accordance with both the identification and chosen-secret key rates, but that of the privacy-leakage rate depends only on the identification rate.
Yohei WATANABE Takenobu SEITO Junji SHIKATA
An authentication code (A-code) is a two-party message authentication code in the information-theoretic security setting. One of the variants of A-codes is a multi-receiver authentication code (MRA-code), where there are a single sender and multiple receivers and the sender can create a single authenticator so that all receivers accepts it unless it is maliciously modified. In this paper, we introduce a multi-designated receiver authentication code (MDRA-code) with information-theoretic security as an extension of MRA-codes. The purpose of MDRA-codes is to securely transmit a message via a broadcast channel from a single sender to an arbitrary subset of multiple receivers that have been designated by the sender, and only the receivers in the subset (i.e., not all receivers) should accept the message if an adversary is absent. This paper proposes a model and security formalization of MDRA-codes, and provides constructions of MDRA-codes.
Goki YASUDA Tota SUKO Manabu KOBAYASHI Toshiyasu MATSUSHIMA
In a practical classification problem, there are cases where incorrect labels are included in training data due to label noise. We introduce a classification method in the presence of label noise that idealizes a classification method based on the expectation-maximization (EM) algorithm, and evaluate its performance theoretically. Its performance is asymptotically evaluated by assessing the risk function defined as the Kullback-Leibler divergence between predictive distribution and true distribution. The result of this performance evaluation enables a theoretical evaluation of the most successful performance that the EM-based classification method may achieve.
Kotaro NAGANO Masahiro KAWANO Yuhei NAGAO Hiroshi OCHI
Cancellation of self interference (SI) is an important technology in order for wireless communication system devices to perform full-duplex communication. In this paper, we propose a novel self-interference cancellation using null beamforming to be applied entire IEEE 802.11 frame including the legacy part for full-duplex wireless communication on Cooperative MIMO (Multiple Input Multiple Output). We evaluate the SI cancellation amount by the proposed method using a field programmable gate array (FPGA) and software defined radio (SDR), and show the experimental results. In the experiment, it is confirmed that the amount of SI cancellation by the proposed method was at least 18dB. The SI cancellation amount can be further potentiated with more accurate CSI (channel state information) by increasing the transmission power. It is shown that SI can be suppressed whole frame which includes legacy preamble part. The proposed method can be applied to next generation wireless communication standards as well.
Tomoya IWASAKI Osamu TOKUMASU Jin MITSUGI
Backscatter communication is an emerging wireless access technology to realize ultra-low power terminals exploiting the modulated reflection of incident radio wave. This paper proposes a method to measure the phase angle of backscatter link using principal component analysis (PCA). The phase angle measurement of backscatter link at the receiver is essential to maximize the signal quality for subsequent demodulation and to measure the distance and the angle of arrival. The drawback of popular phase angle measurement with naive phase averaging and linear regression analysis is to produce erroneous phase angle, where the phase angle is close to $pmrac{pi}{2}$ radian and the signal quality is poor. The advantage of the proposal is quantified with a computer simulation, a conducted experiment and radio propagation experiments.
In this paper, we propose a real-time vibration extraction system, which extracts vibration component within a given frequency range from videos in real time, for realizing tremor suppression used in microsurgery assistance systems. To overcome the problems in our previous system based on the mean Lucas-Kanade (LK) optical flow of the whole frame, we have introduced a new architecture combining dense optical flow calculated with simple feature matching and block-based band-pass filtering using band-limited multiple Fourier linear combiner (BMFLC). As a feature of optical flow calculation, we use the simplified rotation-invariant histogram of oriented gradients (RIHOG) based on a gradient angle quantized to 1, 2, or 3 bits, which greatly reduces the usage of memory resources for a frame buffer. An obtained optical flow map is then divided into multiple blocks, and BMFLC is applied to the mean optical flow of each block independently. By using the L1-norm of adaptive weight vectors in BMFLC as a criterion, blocks belonging to vibrating objects can be isolated from background at low cost, leading to better extraction accuracy compared to the previous system. The whole system for 480p and 720p resolutions can be implemented on a single Xilinx Zynq-7000 XC7Z020 FPGA without any external memory, and can process a video stream supplied directly from a camera at 60fps.
Yutaka MASUDA Yusei HONDA Tohru ISHIHARA
Approximate computing (AC) has recently emerged as a promising approach to the energy-efficient design of digital systems. For realizing the practical AC design, we need to verify whether the designed circuit can operate correctly under various operating conditions. Namely, the verification needs to efficiently find fatal logic errors or timing errors that violate the constraint of computational quality. This work focuses on the verification where the computational results can be observed, the computational quality can be calculated from computational results, and the constraint of computational quality is given and defined as the constraint which is set to the computational quality of designed AC circuit with given workloads. Then, this paper proposes a novel dynamic verification framework of the AC circuit. The key idea of the proposed framework is to incorporate a quality assessment capability into the Coverage-based Grey-box Fuzzing (CGF). CGF is one of the most promising techniques in the research field of software security testing. By repeating (1) mutation of test patterns, (2) execution of the program under test (PUT), and (3) aggregation of coverage information and feedback to the next test pattern generation, CGF can explore the verification space quickly and automatically. On the other hand, CGF originally cannot consider the computational quality by itself. For overcoming this quality unawareness in CGF, the proposed framework additionally embeds the Design Under Verification (DUV) component into the calculation part of computational quality. Thanks to the DUV integration, the proposed framework realizes the quality-aware feedback loop in CGF and thus quickly enhances the verification coverage for test patterns that violate the quality constraint. In this work, we quantitatively compared the verification coverage of the approximate arithmetic circuits between the proposed framework and the random test. In a case study of an approximate multiply-accumulate (MAC) unit, we experimentally confirmed that the proposed framework achieved 3.85 to 10.36 times higher coverage than the random test.
Morihiro KUGA Qian ZHAO Yuya NAKAZATO Motoki AMAGASAKI Masahiro IIDA
From edge devices to cloud servers, providing optimized hardware acceleration for specific applications has become a key approach to improve the efficiency of computer systems. Traditionally, many systems employ commercial field-programmable gate arrays (FPGAs) to implement dedicated hardware accelerator as the CPU's co-processor. However, commercial FPGAs are designed in generic architectures and are provided in the form of discrete chips, which makes it difficult to meet increasingly diversified market needs, such as balancing reconfigurable hardware resources for a specific application, or to be integrated into a customer's system-on-a-chip (SoC) in the form of embedded FPGA (eFPGA). In this paper, we propose an eFPGA generation suite with customizable architecture and integrated development environment (IDE), which covers the entire eFPGA design generation, testing, and utilization stages. For the eFPGA design generation, our intellectual property (IP) generation flow can explore the optimal logic cell, routing, and array structures for given target applications. For the testability, we employ a previously proposed shipping test method that is 100% accurate at detecting all stuck-at faults in the entire FPGA-IP. In addition, we propose a user-friendly and customizable Web-based IDE framework for the generated eFPGA based on the NODE-RED development framework. In the case study, we show an eFPGA architecture exploration example for a differential privacy encryption application using the proposed suite. Then we show the implementation and evaluation of the eFPGA prototype with a 55nm test element group chip design.
Conggai LI Qian GAN Feng LIU Yanli XU
Compared with the unicast scenario, X channels with multicast messaging can support richer transmission scenarios. The transmission efficiency of the wireless multicast X channel is an important and open problem. This article studies the degrees of freedom of a propagation-delay based multicast X channel with two transmitters and arbitrary receivers, where each transmitter sends K different messages and each receiver desires K - 1 of them from each transmitter. The cyclic polynomial approach is adopted for modeling and analysis. The DoF upper bound is analyzed and shown to be unreachable. Then a suboptimal scheme with one extra time-slot cycle is proposed, which uses the cyclic interference alignment method and achieves a DoF of K - 1. Finally, the feasibility conditions in the Euclidean space are derived and the potential applications are demonstrated for underwater acoustic and terrestrial radio communications.
Yanyan LUO Jingzhao AN Jingyuan SU Zhaopan ZHANG Yaxin DUAN
Aiming at the problem of the deterioration of the contact performance caused by the wear debris generated during the fretting wear of the electrical connector, low-frequency fretting wear experiments were carried out on the contacts of electrical connectors, the accumulation and distribution of the wear debris were detected by the electrical capacitance tomography technology; the influence of fretting cycles, vibration direction, vibration frequency and vibration amplitude on the accumulation and distribution of wear debris were analyzed; the correlation between characteristic value of wear debris and contact resistance value was studied, and a performance degradation model based on the accumulation and distribution of wear debris was built. The results show that fretting wear and performance degradation are the most serious in axial vibration; the characteristic value of wear debris and contact resistance are positively correlated with the fretting cycles, vibration frequency and vibration amplitude; there is a strong correlation between the sum of characteristic value of wear debris and the contact resistance value; the prediction error of ABC-SVR model of fretting wear performance degradation of electrical connectors constructed by the characteristic value of wear debris is less than 6%. Therefore, the characteristic value of wear debris in contact subareas can quantitatively describe the degree of fretting wear and the process of performance degradation.
Yoshihiro NAKA Masahiko NISHIMOTO Mitsuhiro YOKOTA
An efficient bent waveguide and an optical power splitter with a resonator constructed by a metal-dielectric-metal plasmonic waveguide have been analyzed. The method of solution is the finite difference time domain (FD-TD) method with the piecewise linear recursive convolution (PLRC) method. The resonator can be realized by utilizing impedance mismatch at the connection between a narrow waveguide and an input/output waveguide. Numerical results for the bent waveguide show that transmission bands can be controlled by adjusting the length of the narrow waveguide. We have also shown that the optical power of the power splitter is entirely distributed into the output waveguide at the resonant wavelength and its distribution ratio can be controlled.
Takashi YASUI Jun-ichiro SUGISAKA Koichi HIRAYAMA
In this study, the bending losses of chalcogenide glass channel optical waveguides consisting of an As2Se3 core and an As2S3 lower cladding layer were numerically evaluated across the astronomical N-band, which is the mid-infrared spectral range between the 8 µm and 12 µm wavelengths. The results reveal the design rules for bent waveguides in mid-infrared astrophotonic devices.
Tao ZHENG Han ZHANG Baohang ZHANG Zonghui CAI Kaiyu WANG Yuki TODO Shangce GAO
Many optimisation algorithms improve the algorithm from the perspective of population structure. However, most improvement methods simply add hierarchical structure to the original population structure, which fails to fundamentally change its structure. In this paper, we propose an umbrellalike hierarchical artificial bee colony algorithm (UHABC). For the first time, a historical information layer is added to the artificial bee colony algorithm (ABC), and this information layer is allowed to interact with other layers to generate information. To verify the effectiveness of the proposed algorithm, we compare it with the original artificial bee colony algorithm and five representative meta-heuristic algorithms on the IEEE CEC2017. The experimental results and statistical analysis show that the umbrellalike mechanism effectively improves the performance of ABC.
A new method for hiding information in digital images is proposed. Our method differs from existing techniques in that the information is hidden in a mixture of colors carefully tuned on a specific device according to the device's signal-to-luminance (gamma) characteristics. Because these reproduction characteristics differ in general from device to device and even from model to model, the hidden information appears when the cover image is viewed on a different device, and hence the hiding property is device-dependent. To realize this, we modulated a cover image using two identically-looking checkerboard patterns and switched them locally depending on the hidden information. Reproducing these two patterns equally on a different device is difficult. A possible application of our method would be secure printing where an image is allowed to be viewed only on a screen but a warning message appears when it is printed.
Ayano OHNISHI Michio MIYAMOTO Yoshio TAKEUCHI Toshiyuki MAEYAMA Akio HASEGAWA Hiroyuki YOKOYAMA
Multiple wireless communication systems are often operated together in the same area in such manufacturing sites as factories where wideband noise may be emitted from industrial equipment over channels for wireless communication systems. To perform highly reliable wireless communication in such environments, radio wave environments must be monitored that are specific to each manufacturing site to find channels and timing that enable stable communication. The authors studied technologies using machine learning to efficiently analyze a large amount of monitoring data, including signals whose spectrum shape is undefined, such as electromagnetic noise over a wideband. In this paper, we generated common supervised data for multiple sensors by conjointly clustering features after normalizing those calculated in each sensor to recognize the signal reception timing from identical sources and eliminate the complexity of supervised data management. We confirmed our method's effectiveness through signal models and actual data sampled by sensors that we developed.
Kohei YAMAGUCHI Yusuke HAYASHI Tsukasa HIRASHIMA
This study focuses on creating arithmetical stories as a sub-task of problem posing and proposes a game named “Tri-prop scrabble” as a learning environment based on a fusion method of learning and game. The problem-posing ability has a positive relationship with mathematics achievement and understanding the mathematical structure of problems. In the proposed game, learners are expected to experience creating and concatenating various arithmetical stories by integrating simple sentences. The result of a preliminary feasibility study shows that the participants were able to pose and concatenate a variety of types of arithmetic stories and accept this game is helpful for learning arithmetic word problems.
Yuto KIHIRA Yusuke KODA Koji YAMAMOTO Takayuki NISHIO
Broadcast services for wireless local area networks (WLANs) are being standardized in the IEEE 802.11 task group bc. Envisaging the upcoming coexistence of broadcast access points (APs) with densely-deployed legacy APs, this paper addresses a learning-based spatial reuse with only partial receiver-awareness. This partial awareness means that the broadcast APs can leverage few acknowledgment frames (ACKs) from recipient stations (STAs). This is in view of the specific concerns of broadcast communications. In broadcast communications for a very large number of STAs, ACK implosions occur unless some STAs are stopped from responding with ACKs. Given this, the main contribution of this paper is to demonstrate the feasibility to improve the robustness of learning-based spatial reuse to hidden interferers only with the partial receiver-awareness while discarding any re-training of broadcast APs. The core idea is to leverage robust adversarial reinforcement learning (RARL), where before a hidden interferer is installed, a broadcast AP learns a rate adaptation policy in a competition with a proxy interferer that provides jamming signals intelligently. Therein, the recipient STAs experience interference and the partial STAs provide a feedback overestimating the effect of interference, allowing the broadcast AP to select a data rate to avoid frame losses in a broad range of recipient STAs. Simulations demonstrate the suppression of the throughput degradation under a sudden installation of a hidden interferer, indicating the feasibility of acquiring robustness to the hidden interferer.
Sheng ZHANG Pengfei DU Helin YANG Ran ZHANG Chen CHEN Arokiaswami ALPHONES
In this paper, we report the recent progress in visible light positioning and communication systems using light-emitting diodes (LEDs). Due to the wide deployment of LEDs for indoor illumination, visible light positioning (VLP) and visible light communication (VLC) using existing LEDs fixtures have attracted great attention in recent years. Here, we review our recent works on visible light positioning and communication, including image sensor-based VLP, photodetector-based VLP, integrated VLC and VLP (VLCP) systems, and heterogeneous radio frequency (RF) and VLC (RF/VLC) systems.