Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2009] | [2010] | [2011] | [2012] | [2013] | [2014] | [2015] | [Japanese] / [English]
ICSS2012-57
A Method to Identify the Writer's Birthday on a Blog article
Masataka Kawahara, Atsushi Kanai (Hosei Univ.)
pp. 1 - 6
ICSS2012-58
A STUDY ON QUANTIFYING THE DEGREE OF PERSONAL INFORMATION DISCLOSURE USING STATISTICAL DATA
Maya Takizawa, Daiki Matsunaga, Atsushi Kanai (Hosei Univ.)
pp. 7 - 12
ICSS2012-59
Design and Implementation of Application Framework for Pairing-based Cryptography
Takuya Ban (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.)
pp. 13 - 18
ICSS2012-60
Partially Doubly-Encrypted ID-based Encryption and its Security
Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Nagoya Inst. of Tech.)
pp. 19 - 24
ICSS2012-61
Finding Malicious Authoritative DNS Servers
Yin Minn Pa Pa, Daisuke Makita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 25 - 30
ICSS2012-62
Observing DNS Communication of Android Malware using Sandbox Analysis
Fumihiro Kanei, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 31 - 36
ICSS2012-63
Packer Identification Based on Difference Execution Traces Between Input and Output Programs
Pham Anh Phong, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 37 - 42
ICSS2012-64
Possibility of Remote Exploits by Android Phones
Hiroshi Mori, Fumihiro Kanei, Yuki Shoda, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 43 - 48
ICSS2012-65
Network-based classification of remote exploit attacks focusing on UUID
Yusuke Takahashi (Yokohama National Univ.), Masaki Kamizono, Yuji Hoshizawa (Securebrain), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 49 - 54
ICSS2012-66
[Invited Talk]
PRACTICE - Proactive Response Against Cyber-attacks Through International Collaborative Exchange
Katsunari Yoshioka (Yokohama National Univ.)
p. 55
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.