{"title":"Demonstration Experiment of a System that Helps Users Select Educational Content Using Terms in Basic/advanced Relationships","authors":"Shoko Fujii, Shinya Abe, Satoshi Fujitsu, Kinji Matsumura, Hiroshi Fujisawa","doi":"10.2197/ipsjjip.31.766","DOIUrl":"https://doi.org/10.2197/ipsjjip.31.766","url":null,"abstract":"With a range of learning platforms available on the Internet and the increasing use of video content in education, there have been many studies on using ontologies to support education and learning. However, in many cases, the connections among content systematized in this way are confined within a subject, and there is no learning across subjects or expansion of learners' interests beyond individual subjects. We aimed to connect all educational content in a way that goes beyond school subjects and curricula. In this study, we re-examined the learning sequence of subject matter terms over the course of the learning process, redefined it as a set of basic/advanced relationships among the terms, and proposed a method of estimating the appropriate ordering of content for learning by structuring and utilizing this terminological attribute. We also prototyped a system incorporating our proposed method to help users select educational content and tested it in a proof-of-concept experiment. By comparing the textbook-based presentation of related content with our proposed cross-subject presentation, we identified each method's characteristics and confirmed the proposed method's effectiveness at expanding learners' interests.","PeriodicalId":16243,"journal":{"name":"Journal of Information Processing","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135703751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Container-native Managed Data Sharing","authors":"Koichi Onoue, Masaru Ueno, Yui Noma","doi":"10.2197/ipsjjip.31.689","DOIUrl":"https://doi.org/10.2197/ipsjjip.31.689","url":null,"abstract":"Cross-industrial collaboration can yield disruptive innovations. However, there are fears regarding data sharing across different organizations. Even if data providers make contracts covering the data shared with their consumers, they will not be able to delete the shared data in accordance with the expiration dates and modify them after they were delivered to the consumers. Data consumers need to be extremely careful about management of shared data since huge penalties are imposed against violations of data protection laws. To allay these fears, we propose a system to handle external data management instead of data providers and consumers. In our system, containerized lifetime controllers delete expired shared data in accordance with contracts for shared data called life cycle policies. To allow only service programs stipulated in the policies to manipulate shared data, containerized volume controllers enforce the access control on the basis of the FUSE interceptions and the /proc file system. The proposed system is transparent to service programs because the containerized controllers run in execution environments that are separate from service programs. The proposed system can be applied to multiple container orchestration clusters in which a provider and consumer independently administer Kubernetes container orchestrators, as well as a single container orchestration cluster. We built a prototype system on Kubernetes container orchestrators presented by the Kubernetes community and public cloud service providers. Experimental results demonstrate that the proposed system achieves data sharing between a provider and consumer with moderate overheads for disk consumption of the containerized controllers, the extensions of the volume drivers, and execution time of the FUSE access control.","PeriodicalId":16243,"journal":{"name":"Journal of Information Processing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135442524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and Consideration of Detection Methods to Prevent Fraudulent Access by Utilizing Attribute Information and the Access Log History","authors":"Michio Kunimoto, Takao Okubo","doi":"10.2197/ipsjjip.31.602","DOIUrl":"https://doi.org/10.2197/ipsjjip.31.602","url":null,"abstract":"Fraudulent access by way of nInternet banking, credit cards and e-commerce are a serious problem. Fraudsters intend to steal credentials and log in to these websites in many ways such as phishing, malware infection, list based attack etc. There are products and services to prevent fraudulent access like fraud detection software and multi-factor authentication, however these have issues such as installation costs, detection accuracy and operation cost. Some security vendors provide client-side software to prevent fraud, but it is usually difficult for the companies to compel their end-users to install additional software because it may cause trouble and decrease usability. Regarding these issues we are researching an effective fraud detection method using server-side log information. In this paper, we show results from analyzing the attacker device attribute information and the environmental differences between genuine users and fraudsters based on the access log history from actual services and found that the attacker's environment changes year by year. We also discuss the effectiveness of the fraud detection methods described in previous research and effective detection methods utilizing real-world data.","PeriodicalId":16243,"journal":{"name":"Journal of Information Processing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135442744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Deeper Look into Deep Learning-based Output Prediction Attacks Using Weak SPN Block Ciphers","authors":"Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito, Kazuto Ogawa, Toshihiro Ohigashi","doi":"10.2197/ipsjjip.31.550","DOIUrl":"https://doi.org/10.2197/ipsjjip.31.550","url":null,"abstract":"Cryptanalysis in a blackbox setting using deep learning is powerful because it does not require the attacker to have knowledge about the internal structure of the cryptographic algorithm. Thus, it is necessary to design a symmetric key cipher that is secure against cryptanalysis using deep learning. Kimura et al. (AIoTS 2022) investigated deep learning-based attacks on the small PRESENT-[4] block cipher with limited component changes, identifying characteristics specific to these attacks which remain unaffected by linear/differential cryptanalysis. Finding such characteristics is important because exploiting such characteristics can make the target cipher vulnerable to deep learning-based attacks. Thus, this paper extends a previous method to explore clues for designing symmetric-key cryptographic algorithms that are secure against deep learning-based attacks. We employ small PRESENT-[4] with two weak S-boxes, which are known to be weak against differential/linear attacks, to clarify the relationship between classical and deep learning-based attacks. As a result, we demonstrated the success probability of our deep learning-based whitebox analysis tends to be affected by the success probability of classical cryptanalysis methods. And we showed our whitebox analysis achieved the same attack capability as traditional methods even when the S-box of the target cipher was changed to a weak one.","PeriodicalId":16243,"journal":{"name":"Journal of Information Processing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135443098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Editor's Message to Special Issue of Computer Security Technologies for Secure Cyberspace","authors":"Toshihiro Ohigashi","doi":"10.2197/ipsjjip.31.522","DOIUrl":"https://doi.org/10.2197/ipsjjip.31.522","url":null,"abstract":"","PeriodicalId":16243,"journal":{"name":"Journal of Information Processing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135442532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analysis of Susceptibility to Phishing via Business Chat through Online Survey","authors":"Rei Yamagishi, Shota Fujii","doi":"10.2197/ipsjjip.31.609","DOIUrl":"https://doi.org/10.2197/ipsjjip.31.609","url":null,"abstract":"Phishing via email has been spreading not only to individuals but also to companies, and various studies have been conducted on it. In addition, the use of chat has been increasing, and phishing via chat is assumed to be occurring, but the risk and susceptibility to phishing via chat have not been clarified. In this study, we conducted a questionnaire survey of 304 participants. In the survey, we divided the participants into two groups, designed similar phishing scenarios using email and chat, and conducted a role play susceptibility study. The results of the study indicated that the susceptibility of chat was as high as or higher than that of email, suggesting that phishing via chat is risky. On the basis of the results, we also summarized methods for reducing the risk of phishing in chat and recommendations for future research.","PeriodicalId":16243,"journal":{"name":"Journal of Information Processing","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135442735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MathTOUCH Editor: Rich-text Editor for Math E-learning Using an Intelligent Math Input Interface","authors":"Shizuka Shirai, Takahiro Nakahara, Tetsuo Fukui","doi":"10.2197/ipsjjip.31.775","DOIUrl":"https://doi.org/10.2197/ipsjjip.31.775","url":null,"abstract":"In this study, we presented MathTOUCH, a rich-text editor, to create mathematical documents. In mathematics e-learning with learning management systems, existing math input methods have heavy workloads; therefore, math notations are a long-standing challenge. Furthermore, when creating mathematical documents, such as writing reports and posting questions on the forum, users must enter both texts in a natural language input manner and mathematical expressions in a math input manner. Hence, users' workload increases. To address this issue, we developed the MathTOUCH editor to implement an intelligent math input interface that enables users to enter equations through predictive conversion from the colloquial-style text. A user study was conducted with 71 participants to evaluate the effectiveness of the proposed editor. The results indicate that users could enter equations with the MathTOUCH editor approximately 1.5 times faster than with a standard interface, and the participants also reported greater subjective satisfaction.","PeriodicalId":16243,"journal":{"name":"Journal of Information Processing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135703765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Type Checking Data Structures More Complex than Trees","authors":"Jin Sano, Naoki Yamamoto, Kazunori Ueda","doi":"10.2197/ipsjjip.31.112","DOIUrl":"https://doi.org/10.2197/ipsjjip.31.112","url":null,"abstract":"Graphs are a generalized concept that encompasses more complex data structures than trees, such as difference lists, doubly-linked lists, skip lists, and leaf-linked trees. Normally, these structures are handled with destructive assignments to heaps, which is opposed to a purely functional programming style and makes verification difficult. We propose a new purely functional language, λGT, that handles graphs as immutable, first-class data structures with a pattern matching mechanism based on Graph Transformation and developed a new type system, FGT, for the language. Our approach is in contrast with the analysis of pointer manipulation programs using separation logic, shape analysis, etc. in that (i) we do not consider destructive operations but pattern matchings over graphs provided by the new higher-level language that abstract pointers and heaps away and that (ii) we pursue what properties can be established automatically using a rather simple typing framework.","PeriodicalId":16243,"journal":{"name":"Journal of Information Processing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135534582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kazuki Nomoto, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori
{"title":"Understanding the Inconsistencies in the Permissions Mechanism of Web Browsers","authors":"Kazuki Nomoto, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori","doi":"10.2197/ipsjjip.31.620","DOIUrl":"https://doi.org/10.2197/ipsjjip.31.620","url":null,"abstract":"Modern Web services provide advanced features by utilizing hardware resources on the user's device. Web browsers implement a user consent-based permission model to protect user privacy. In this study, we developed PERMIUM, a web browser analysis framework that automatically analyzes the behavior of permission mechanisms implemented by various browsers. We systematically studied the behavior of permission mechanisms for 22 major browser implementations running on five different operating systems. We found fragmented implementations. Implementations between browsers running on different operating systems are not always identical. We determined that implementation inconsistencies could lead to privacy risks. We identified gaps between browser permission implementations and user perceptions from the user study corresponding to the analyses using PERMIUM. Based on the implementation inconsistencies, we developed two proof-of-concept attacks and evaluated their feasibility. The first attack uses permission information to secretly track the user. The second attack aims to create a situation in which the user cannot correctly determine the origin of the permission request and the user mistakenly grants permission. Finally, we clarify the technical issues that must be standardized in privacy mechanisms and provide recommendations to OS/browser vendors to mitigate the threats identified in this study.","PeriodicalId":16243,"journal":{"name":"Journal of Information Processing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135442730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis on End-to-End Encryption Schemes of Communication Tools and Its Research Trend","authors":"Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu","doi":"10.2197/ipsjjip.31.523","DOIUrl":"https://doi.org/10.2197/ipsjjip.31.523","url":null,"abstract":"This paper summarizes our cryptanalysis results on real-world End-to-End Encryption (E2EE) schemes published in recent years. Our targets are LINE (a major messaging application), SFrame (an E2EE protocol adopted by major video/audio applications), and Zoom (a major video communication application). For LINE, we show several attacks against the message integrity of Letter Sealing, the E2EE protocol of LINE, that allow forgery and impersonation. For SFrame, we reveal a critical issue that leads to an impersonation (forgery) attack by a malicious group member with a practical complexity. For Zoom, we discover several attacks more powerful than those expected by Zoom according to their whitepaper. Specifically, if insiders collude with meeting participants, they can impersonate any Zoom user in target meetings, whereas Zoom indicates that they can impersonate only the current meeting participants. We also describe several important works in the area of E2EE security research.","PeriodicalId":16243,"journal":{"name":"Journal of Information Processing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135442895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}