{"id":333,"date":"2025-10-28T14:00:00","date_gmt":"2025-10-28T05:00:00","guid":{"rendered":"https:\/\/www.icss-rt.org\/en\/?page_id=333"},"modified":"2025-10-28T15:16:39","modified_gmt":"2025-10-28T06:16:39","slug":"ic-system-security-user-fourmicss-uf","status":"publish","type":"page","link":"https:\/\/www.icss-rt.org\/en\/activity\/ic-system-security-user-fourmicss-uf\/","title":{"rendered":"IC System Security - User Fourm(ICSS-UF)"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"229\" src=\"https:\/\/www.icss-rt.org\/en\/wp-content\/uploads\/sites\/2\/2025\/10\/ICSS_UF-logo_4c-1024x229.png\" alt=\"\" class=\"wp-image-332\" style=\"width:338px;height:auto\" srcset=\"https:\/\/www.icss-rt.org\/en\/wp-content\/uploads\/sites\/2\/2025\/10\/ICSS_UF-logo_4c-1024x229.png 1024w, https:\/\/www.icss-rt.org\/en\/wp-content\/uploads\/sites\/2\/2025\/10\/ICSS_UF-logo_4c-300x67.png 300w, https:\/\/www.icss-rt.org\/en\/wp-content\/uploads\/sites\/2\/2025\/10\/ICSS_UF-logo_4c-768x172.png 768w, https:\/\/www.icss-rt.org\/en\/wp-content\/uploads\/sites\/2\/2025\/10\/ICSS_UF-logo_4c-1536x343.png 1536w, https:\/\/www.icss-rt.org\/en\/wp-content\/uploads\/sites\/2\/2025\/10\/ICSS_UF-logo_4c-2048x458.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<p><\/p>\n\n\n\n<p>IC System Security - Round Table (ICSS-RT) established \"IC System Security - User Forum\" (ICSS-UF) in July 2025, and holding its inaugural meeting on October 2025. It is our intention to consider for appropriate countermeasures and mechanism (Assurance schemes for security evaluation and certification) that provides security for the use of ICs embedded in IoT devices.<\/p>\n\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-vk-blocks-border-box vk_borderBox vk_borderBox-background-transparent has-text-color is-style-vk_borderBox-style-solid-round-tit-tab\" style=\"color:#009143\"><div class=\"vk_borderBox_title_container has-background\" style=\"background-color:#009143\"><i class=\"\"><\/i><h4 class=\"vk_borderBox_title\">Conditions for Participation<\/h4><\/div><div class=\"vk_borderBox_body\">\n<ul class=\"wp-block-list\">\n<li>In addition to membership in ICSS-RT, membership in IC System Security - User Forum (ICSS-UF) is required.<\/li>\n\n\n\n<li>Upon joining ICSS-UF, payment of the annual membership fee set by ICSS-RT and a pledge to the ICSS-UF Information Management Rules are required. (Please feel free to contact the secretariat for details.)<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<p class=\"is-style-vk_borderBox-style-solid-round-tit-tab\"><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Activity Themes<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Background (Social Issues)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>In ensuring the security of IoT devices, the IC chip (embedded within the device) can serve as \u201dRoot of Trust\u201d.<\/li>\n\n\n\n<li>The appropriate use of IC chips in IoT device is essential. This is particularly true when SMEs enterprises with limited experience in the security field manufacture IoT devices.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Objectives of the Activity<\/h3>\n\n\n\n<p>It is our intention to consider for appropriate countermeasures and mechanism (Assurance schemes for security evaluation and certification) that provides security for the use of ICs embedded in IoT devices.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Participate members of ICSS-UF<\/h3>\n\n\n\n<p>(as of 17th October 2025, 7members, Alphabetical order)<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Dai Nippon Printing Co., Ltd.<\/li>\n\n\n\n<li>ECSEC Laboratory Inc.<\/li>\n\n\n\n<li>hd Lab, Inc.<\/li>\n\n\n\n<li>National Institute of Advanced Industrial Science and Technology<\/li>\n\n\n\n<li>SCU Co., Ltd<\/li>\n\n\n\n<li>SECOM CO., LTD.<\/li>\n\n\n\n<li>ZenmuTech, Inc<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>IC System Security - Round Table (ICSS-RT) established \"IC System Security - User Forum\" (ICSS-UF) in July 2025, and holding its inaugural meeting on October 2025. It is our intention to consider for appropriate countermeasures and mechanism (Assurance schemes for security evaluation and certification) that provides security for the use of ICs embedded in IoT devices.<\/p>\n","protected":false},"author":1,"featured_media":331,"parent":43,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"vkexunit_cta_each_option":"","footnotes":""},"class_list":["post-333","page","type-page","status-publish","has-post-thumbnail","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/pages\/333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/comments?post=333"}],"version-history":[{"count":12,"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/pages\/333\/revisions"}],"predecessor-version":[{"id":357,"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/pages\/333\/revisions\/357"}],"up":[{"embeddable":true,"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/pages\/43"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/media\/331"}],"wp:attachment":[{"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/media?parent=333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}