Tatsuya Takehisa

ORCID: 0000-0001-9350-6091
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Speech and Audio Processing
  • User Authentication and Security Systems
  • Speech Recognition and Synthesis
  • Image and Video Quality Assessment
  • Surface Modification and Superhydrophobicity
  • Smart Grid Security and Resilience
  • Materials Engineering and Processing
  • Hearing Loss and Rehabilitation
  • Ultrasonics and Acoustic Wave Propagation
  • VLSI and Analog Circuit Testing
  • Multimedia Communication and Technology
  • Spam and Phishing Detection
  • Network Security and Intrusion Detection
  • Material Properties and Applications
  • Emotion and Mood Recognition
  • Silicone and Siloxane Chemistry
  • Internet Traffic Analysis and Secure E-voting
  • Digital Media Forensic Detection
  • Software Testing and Debugging Techniques
  • Engineering Applied Research
  • Biometric Identification and Security
  • Radiation Effects in Electronics

National Institute of Information and Communications Technology
2018-2024

Nissin Kogyo (Japan)
2009-2022

Takara (Japan)
2012

We propose a novel attack, called an “Audio Hotspot Attack,” which performs inaudible malicious voice command by targeting assistance systems, e.g., smart speakers or in-car navigation systems. The key idea of the approach is to leverage directional sound beams generated from parametric loudspeakers, emit amplitude-modulated ultrasounds that will be self-demodulated in air. Our work goes beyond previous studies attack following three aspects: (1) can succeed on long distance (3.5 meters...

10.1109/tetc.2019.2953041 article EN cc-by IEEE Transactions on Emerging Topics in Computing 2019-11-19

We propose a novel attack named "Audio Hotspot Attack'', which performs an inaudible malicious voice command attack, targeting assistance systems, e.g., smart speakers or in-car navigation systems. This leverages directional sound beams generated from parametric loudspeakers, emit AM-modulated ultrasounds that will be self-demodulated in the air. It can succeed on long distance (2--4 meters small room and 10+ meter hallway). To evaluate feasibility of we performed extensive in-lab...

10.1145/3243734.3278497 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2018-10-15

Impersonation attack is one of the major security issues biometric authentication systems. Wolf attacks use a sample such that similarities between this and number templates are resulting in high false matches with these templates. In conventional evaluation wolf probability (WAP), took advantage vulnerabilities on specific matching algorithms, thereby WAPs were achieved. However, actual systems, their algorithm will be black boxes, artificial samples refused by someones's observation or...

10.1109/icarcv.2012.6485155 article EN 2012-12-01

This work developed a new security framework named Cyber-Physical Firewall (CPFW), which provides generic and flexible access control mechanism for regulating the malicious analog signals that target cyber-physical system (CPS) devices. enables defeat of various attacks make use against CPS devices; e.g., stealth voice command injection attack using ultrasonic waves or adversarial examples, to crash drones in flight sound waves.

10.1145/3528416.3530997 article EN 2022-05-04

When debugging a DUT (Device Under Test) written in HDL (Hardware Description Language) code simulation, coverage is one of the most important evaluation metrics because it indicates how many unchecked statements remain where bugs could be hidden. A typical random test-pattern generator can used very easily for debugging; however, fail to obtain enough DUTs does not provide effective strategies coverage. In this paper, we propose an simulator improve branch up 100%. key idea behind our...

10.1109/asiajcis57030.2022.00018 article EN 2022-07-01
Coming Soon ...