IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 114, Number 489

Information and Communication System Security

Workshop Date : 2015-03-03 - 2015-03-04 / Issue Date : 2015-02-24

[PREV] [NEXT]

[TOP] | [2011] | [2012] | [2013] | [2014] | [2015] | [2016] | [2017] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ICSS2014-63
A detection system which uses DNS traffic features to detect domains which are related to botnets
Wataru Tsuda, Youki Kadobayashi, Takeshi Okuda, Hiroaki Hazeyama (NAIST)
pp. 1 - 6

ICSS2014-64
Anomaly Detection Based on Clustering of Network Traffic Characteristics Considering Results of Signature Based IDS Evaluation
Kohei Imai, Shigeki Aoki, Takao Miyamoto (Osaka Prefecture Univ.)
pp. 7 - 12

ICSS2014-65
Measures to Prevent Cyber-Attack Using Multi-Layer-Binding (MLB) Router -- A Proposal of Dropping Request Protocol, and its Implementation and Evaluation Using OpenFlow --
Ken Eguchi, Shota Nagatomo, Yuji Yokoyama, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno (Tokyo Denki Univ.), Hiroshi Kobayashi (Tokyo Denki Univ)
pp. 13 - 18

ICSS2014-66
Implementation and Evaluation of Botnet Detection System with Temporal Locality of DGA
Teppei Fukuda, Tomohiro Ishihara (UTokyo), Akira Kato (Keio Univ.)
pp. 19 - 24

ICSS2014-67
A trial of network security tests over federated testbeds
Masatoshi Enomoto, Hiroaki Hazeyama (NAIST), Kazumasa Kobayashi (KUSA), Suguru Yamaguchi (NAIST)
pp. 25 - 29

ICSS2014-68
A Pluggable and Programmable Flamework for Analyzing Security Logs
Yu Tsuda, Takashi Tomine, Masaki Kamizono, Masashi Eto, Daisuke Inoue (NICT)
pp. 31 - 36

ICSS2014-69
A Study on the Effectiveness of Correlation Analysis of Cyber Attack Information by means of Tagging Technique
Taichi Hata (JDC/Nissin), Manabu Inuma (Josai Univ.), Junji Shikata (Yokohama National Univ.), Shin Takeuchi (JDC/Nissin), Koji Nakao (NICT)
pp. 37 - 42

ICSS2014-70
Link Structural Analysis of Drive-by-Download Attacks
Yuji Dairiki (Kobe Univ.), Masaki Kamizono (SecureBrain), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.)
pp. 43 - 48

ICSS2014-71
Implementation and evaluation of Drive by Download Attack detection using the features of the obfuscation
Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama (NAIST), Takuji Iimura (UT), Youki Kadobayashi (NAIST)
pp. 49 - 54

ICSS2014-72
A Study on CAPTCHA System Using Differential Awkwardness-Objects
Michitomo Yamguchi (Meiji Univ.), Takeshi Okamoto (Tsukuba Univ. of Tech.), Hiroaki Kikuchi (Meiji Univ.)
pp. 55 - 60

ICSS2014-73
Novel USB Hub against the Malicious USB Devices
Tatsuya Takehisa (NICT/Nissin), Makoto Iwamura (NICT/NTT), Hayato Ushimaru (NICT/CDI), Daisuke Inoue (NICT)
pp. 61 - 66

ICSS2014-74
Yet Another Electrical Forgery Attack on CAN using Strong Recessive
Takeshi Sugawara, Minoru Saeki, Manabu Misawa (Mitsubishi Electric Corp.)
pp. 67 - 72

ICSS2014-75
A study on the safety of the pseudo-random number generator in RFID
Hiroyuki Sato (JAIST), Atsuko Miyaji (JAIST/JST CREST), Chunhua Su (JAIST)
pp. 73 - 78

ICSS2014-76
A New Explicit Relation Between Trace, Definition Field, and Embedding Degree
Atsuko Miyaji, Satoru Tanaka (JAIST)
pp. 79 - 84

ICSS2014-77
Scalar Multiplication Algorithm with Resistance for Side-channel Attacks
Keisuke Kito (JAIST), Atsuko Miyaji (JAIST/JST CREST), Ryota Takahashi (JAIST)
pp. 85 - 90

ICSS2014-78
An Estimation of Signature Schemes for Multiple Signers
Kenta Muranaka, Naoto Yanai (Osaka Univ.), Shingo Okamura (NITNC), Toru Fujiwara (Osaka Univ.)
pp. 91 - 96

ICSS2014-79
Estimation of Vulnerability Score based on Annual Analysis with Supervised Latent Dirichlet Allocation
Yasuhiro Yamamoto, Daisuke Miyamoto, Masaya Nakayama (Tokyo Univ.)
pp. 97 - 102

ICSS2014-80
Prediction of Malware Activities based on Loopback Address from DNS
Masaki Kamizono (NICT/SecureBrain), Takashi Tomine, Yu Tsuda, Masashi Eto (NICT), Yuji Hoshizawa (Securebrain Corporation), Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (ynu)
pp. 103 - 108

ICSS2014-81
A Cyber Attack Information Gathering Method That Adopts Integrated Malware Detection Service and Dynamic Analysis
Shuta Morishima, Takuya Tsutsumi, Rui Tanabe, Yusuke Takahashi, Masaaki Kobayashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
pp. 109 - 114

ICSS2014-82
Internet Alive Monitoring Method around Disaster Areas Using Large-scale Darknet, Autonomous System Information, and Geographical Information
Mio Suzuki (NICT), Jumpei Shimamura (Clwit), Junji Nakazato, Daisuke Inoue, Masashi Eto, Koji Nakao (NICT)
pp. 115 - 120

ICSS2014-83
Finding Network Address Blocks Intensively Used for Cyber Attacks
Takuya Tsutsumi, Shuta Morishima, Shogo Suzuki, Kenichi Shibahara, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 121 - 126

ICSS2014-84
Improving certificate validation function in SSL/TLS implementations of web browser
Satoshi Kamekawa (JAIST), Atsuko Miyaji (JAIST/JST CREST), Yuichi Futa (JAIST)
pp. 127 - 132

ICSS2014-85
New Linear Correlations and Analysis Method for Key Recovery Attack of RC4 in WPA
Daiki Michihiro (JAIST), Atsuko Miyaji (JAIST/JST CREST), Ryoma Ito (JAIST)
pp. 133 - 138

ICSS2014-86
A Multi-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme For Line Topology
Hitoshi Miyazaki (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.)
pp. 139 - 144

ICSS2014-87
Consideration for Path Authentication for VANET with Group One-Way Cross-Networks
Shoma Kitayama, Masakazu Soshi (Hiroshima City Univ.)
pp. 145 - 150

ICSS2014-88
The Geographical Origin Estimation of Malware Using Language Information
Masaru Kawakita, Shigeyoshi Shima (NEC)
pp. 151 - 156

ICSS2014-89
Targeted Malware Detection Focused on Dummy Document Display
Yusuke Takahashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 157 - 161

ICSS2014-90
Visualization of Various DoS Attacks Observed by Malware Sandbox Analysis
Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
pp. 163 - 168

ICSS2014-91
Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking
Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.)
pp. 169 - 174

ICSS2014-92
A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function
Koji Tomida (Nagoya Inst. of Tech.), Hiroshi Doi (IISEC), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.)
pp. 175 - 179

ICSS2014-93
Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data
Takeru Naruse (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.)
pp. 181 - 186

ICSS2014-94
Understanding Android apps that are similar to legitimate ones
Yuta Ishii, Takuya Watanabe (Waseda Univ.), Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.)
pp. 187 - 192

ICSS2014-95
A Study on Risk Quantification Techniques for Android Applications with Category Information
Takeshi Takahashi (NICT), Takao Mimura, Masata Nishida (SecureBrain), Koji Nakao (NICT)
pp. 193 - 197

ICSS2014-96
Evaluation on Malware Classification by Combining Traffic Analysis and Fuzzy Hashing of Malware Binary
Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.)
pp. 199 - 204

ICSS2014-97
A Message authentication scheme with variable-length MAC
Yumiko Murakami, Nobuhiro Kobayashi (MELCO)
pp. 205 - 210

ICSS2014-98
Flexible Constructions of Hash Chains and Their Key Generation
Shouki Nishiyama, Masakazu Soshi (Hiroshima City Univ.)
pp. 211 - 216

ICSS2014-99
An Experimental Implementation of Self Destructive Tamper Resistant Software and Its Evaluation
Kazuomi Oishi (SIST), Naoki Yoshida, Naoki Watanabe, Jun'ichi Sakamoto, Tsutomu Matsumoto (YNU)
pp. 217 - 222

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan