IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 114, Number 340

Information and Communication System Security

Workshop Date : 2014-11-27 - 2014-11-28 / Issue Date : 2014-11-20

[PREV] [NEXT]

[TOP] | [2011] | [2012] | [2013] | [2014] | [2015] | [2016] | [2017] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ICSS2014-51
[Invited Talk] Introduction to Japan's Control System Security Center
Hideaki Kobayashi (CSSC)
pp. 1 - 6

ICSS2014-52
Dynamic Zoning of the Industrial Control System for Security improvement
Wataru Machii, Isao Kato, Masahito Koike, Masafumi Matta, Tomomi Aoyama, Ichiro Koshijima, Yoshihiro Hashimoto (NIT)
pp. 7 - 12

ICSS2014-53
Industrial Control System Monitoring based on Communication Profile
Masafumi Matta, Masahito Koike, Wataru Machii, Tomomi Aoyama, Hidemasa Naruoka, Ichiro Koshijima, Yoshihiro Hashimoto (Nagoya Inst. of Tech.)
pp. 13 - 18

ICSS2014-54
Studying Resilient Cyber Incident Management From Large-scale Cyber Security Training
Tomomi Aoyama, Ichiro Koshijima, Kohei Seki, Masafumi Matta (Nagoya Inst. of Tech.)
pp. 19 - 23

ICSS2014-55
On the status of techniques and standardization regarding lightweight cryptography -- ISO/IEC JTC1/SC27/WG2 status report --
Hirotaka Yoshida, Dai Watanabe (Hitachi), Nicky Mouha (KU Leuven)
pp. 25 - 30

ICSS2014-56
Efficient Computation of Weil Pairing over Supersingular Elliptic Curve and Its Evaluation
Kazuma Tanaka (Univ. of Tsukuba), Tadanori Teruya (AIST), Naoki Kanayama, Takashi Nishide, Eiji Okamoto (Univ. of Tsukuba)
pp. 31 - 36

ICSS2014-57
Expansion of a Proposal of Short Proxy Signature into an Aggregate Signature Scheme and Adaptation of it to Content Editing System
Keiji Ogura (TUS), Masaki Inamura (TDU/AIST), Keiichi Iwamura (TUS)
pp. 37 - 41

ICSS2014-58
security evaluation of content editing system that previous control allow about editing operation
Katsuma Koga (Tokyo Univ of Science), Keiichi Iwamura (Tokyo Denki Unive), Masaki Inamura (Tokyo Univ of Science)
pp. 43 - 48

ICSS2014-59
Detecting Backscatter of DDoS Attacks from Darknet Traffic
Nobuaki Furutani (Kobe Univ), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit), Jun Kitazono, Seiichi Ozawa (Kobe Univ)
pp. 49 - 53

ICSS2014-60
A Study of Drive by Download Attack detection using the features of the obfuscation
Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama, Youki Kadobayashi (NAIST)
pp. 55 - 60

ICSS2014-61
searching malicious URL from vast webspace
Bo Sun (Waseda Univ.), Mitsuaki Akiyama, Takeshi Yagi (NTT), Tatsuya Mori (Waseda Univ.)
pp. 61 - 66

ICSS2014-62
Detecting infected hosts with machine learning analysis of DNS responses
Wataru Tsuda, Youki Kadobayashi, Hirotaka Fujiwara, Suguru Yamaguchi (NAIST)
pp. 67 - 72

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan