IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 110, Number 79

Information and Communication System Security

Workshop Date : 2010-06-17 - 2010-06-18 / Issue Date : 2010-06-10

[PREV] [NEXT]

[TOP] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [2013] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ICSS2010-1
Visualizing Gumblar infected machines by Analysis of Network Traffic
Hirokazu Kaneko, Takahiro Matsuki, Yuu Arai (LAC)
pp. 1 - 6

ICSS2010-2
A data screening technique for network log data by frequent sequential pattern mining
Hisashi Tsuruta, Takayoshi Shoudai, Jun'ichi Takeuchi (Kyushu Univ./ISIT)
pp. 7 - 12

ICSS2010-3
Automatic OEP Finding Method for Malware Unpacking
Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT)
pp. 13 - 18

ICSS2010-4
How to Identify Code Region after Detecting Entry Point of Malware
Makoto Iwamura, Mitsutaka Itoh (NTT/Waseda Univ.), Yoichi Muraoka (Waseda Univ.)
pp. 19 - 24

ICSS2010-5
Anonymous Communication Protocol for Encouraging to Report Problems in Social Groups and Its Evaluation using Game Theory
Kohei Sugiyama, Masaki Fukushima, Teruyuki Hasegawa (KDDI Labs.)
pp. 25 - 30

ICSS2010-6
Proposal and Consideration for An Anonymity Method for Widespred High-Speed Incident Analysis System(II)
Ryoichi Isawa (CRYPTO), Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO), Koji Nakao (NICT)
pp. 31 - 36

ICSS2010-7
Implementation and its Evaluation of A Secure One-Time Passoword Method against the Stolen-Verifier Attack
Tatsuya Takehisa (JDC), Ryoichi Isawa (Crypto), Masakatu Morii (Kobe Univ.)
pp. 37 - 42

ICSS2010-8
iAuth: Yet Another HTTP Authentication Framework Integrated into HTML Forms
Takeru Inoue, Yohei Katayama, Hiroshi Sato, Noriyuki Takahashi (NTT)
pp. 43 - 48

ICSS2010-9
Scalable and User-friendly Access Control Mechanism for Distirubted File System
Jumpei Arakawa, Koichi Sasada (Univ. of Tokyo.), Ikuo Takeuchi
pp. 49 - 54

ICSS2010-10
A Vision of the Open Mobile Communication System with All Stratum Virtualization
Nao Kawanishi (ATR), Ahmad Kamil Abdul Hamid (The Univ. of Tokyo), Yoshimasa Miyamori, Atsushi Kusuda (ATR), Yoshihiro Kawahara (The Univ. of Tokyo), Masayoshi Ohashi (ATR), Tohru Asami (The Univ. of Tokyo)
pp. 55 - 59

ICSS2010-11
A study on security threats to Android devices
Ei Shimamura, Masaya Yamagata (NEC)
pp. 61 - 66

ICSS2010-12
[Invited Talk] *
Itsuro Nishimoto (LAC)
p. 67

ICSS2010-13
An Empirical Investigation of Gumblar Evolution
Mitsuaki Akiyama, Kazumichi Sato, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.)
pp. 69 - 74

ICSS2010-14
A Life-cycle Monitoring Method of Malware Download Sites for Websites
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.)
pp. 75 - 80

ICSS2010-15
Hard-wired Shellcode Detection Algorithm -- trial implementations on FPGA and ASIC --
Hiroki Nogawa, Fuminori Adachi, Yasumitsu Tsujino, Seiji Moriya, Kazunori Saito (Secureware)
pp. 81 - 86

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan