Here are PR Videos to introduce our research achievements:
Privacy-Preserving Chemical Compound Database Search
In AIST, Research Institute for Secure Systems is researching technologies to promote use of valuable databases in society and industry while resolving security and privacy issues.
Here we introduce our privacy-preserving database search system, developed in collaboration with Computational Biology Research Center(CBRC) of AIST, for chemical compound databases used for drug discovery. Our system allows a client to search a database without revealing the search query to the database provider, while, at the same time, ensuring that the client can learn nothing about the content of the database besides the search result.
Searching Common Friends on Smartphones TOMOSAGA
With the increased use of information technologies such as social networking services (SNS), communication of personal information is becoming widespread. This requires careful handling of the communicated information to address privacy concerns.
In AIST, Research Institute for Secure Systems, in collaboration with Computational Biology Research Center(CBRC), developed a smartphone app "Tomosaga" to securely search for common contacts in two smartphones. To address privacy issue, each smartphone does not learn any information regarding contacts which the phones do not have in common. The underlying technologies used to implement the app are similar to those developed for our privacy-preserving database search for chemical compound databases.
Research on Side-Channel Attacks - Development of a Standard Evaluation Environment -
Side-channel Attacks, which attempt to compromise crypto chips by analyzing measurable physical quantities such as power consumption and electromagnetic emanation, have become an important issue in information security.
Research Institute for Secure Systems (RISEC) of AIST conducts research to advance the development of countermeasures against side-channel attacks and to develop a standard evaluation environment.
Physical Unclonable Functions (PUFs) - Stop Counterfeiting -
Counterfeit products, which have been increasing in all areas today, not only cause monetary losses and brand image deterioration, but also increase risks to national defense and human lives. Manufacturers and supply chains have used some anti-counterfeiting measures such as unique ID numbering for each product and hard-to-clone markings.
Research Institute for Secure Systems (RISEC) of AIST conducts research and development of Physical Unclonable Functions (PUFs), which exploit intrinsic subtle variations in physical parameters of integrated circuits as a fingerprint to generate unique unclonable ID numbers. We plan to develop an advanced anti-counterfeiting scheme using the PUF technology.
We also created videos as below:
Building Resilience against Cyber Attacks
Coverage of highly elaborate Cyber Attacks has been increasing recently in newspapers and on television. The attackers launch malicious acts against information systems of large organizations and/or mission-critical systems such as a utility grid. This footage illustrates how Cyber Attacks are conducted and how our White List Control and Security Barrier Device defend against them.
Security Evaluation for Biometric Products Research toward Enhancememt of Biometric Security
The threat of Identity Theft is increasing rapidly because of making to have forced memorizing unmanageable large number of passwords. Biometrics that can authenticate people by human characteristics is expected to realize secure and usable way for proof of identity.
Research Institute for Secure Systems (RISEC) of AIST conducts research and development of “wolf attack," one of the most potent impersonation attack to the biometric systems, which can impersonate to many users using only one fake biometric data.
These 2 videos are unavailable to be to the public, however, available only for viewing within AIST as the aim of our official public demonstrations.
Please make contact us about our videos if you have any inquires.