IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 115, Number 488

Information and Communication System Security

Workshop Date : 2016-03-03 - 2016-03-04 / Issue Date : 2016-02-25

[PREV] [NEXT]

[TOP] | [2012] | [2013] | [2014] | [2015] | [2016] | [2017] | [2018] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ICSS2015-47
Improving IoTPOT for Observing Various Attacks Targeting Embedded Devices
Shogo Suzuki, YinMin Papa, Yuta Ezawa, Ying Tie, Sou Nakayama, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 1 - 6

ICSS2015-48
Observing Cyber Attacks on Building Control System by Honeypot
Ying Tie (YNU), Koichi Shimizu (Mitsubishi Electric Corporation), Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
pp. 7 - 12

ICSS2015-49
Storage-Efficient and Low-Power Packet Classification for Internet of Things
Yuta Kitamura (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.)
pp. 13 - 18

ICSS2015-50
Malicious-Spam-Mail Detection System with Autonomous Learning Ability
Shogo Osaka, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit)
pp. 19 - 24

ICSS2015-51
An Actual Survey on Web Scanning by URI Co-occurrence Detection
Yang Zhong, Shingo Orihara, Masaki Tanikawa (NTT), Hajime Shimada, Tutomu Murase (Nagoya Univ), Hiroki Takakura (NII), Yoshihito Oshima (NTT)
pp. 25 - 30

ICSS2015-52
[Invited Talk] Looking Back on My Research
Yuko Murayama (Iwate Prefectural Univ.)
pp. 31 - 34

ICSS2015-53
Issue analysis toward forensics gathering infrastructure that supports the more efficient incident handling
Daichi Hasumi, Shigeyoshi Shima, Takahiro Kakumaru (NEC)
pp. 35 - 40

ICSS2015-54
Privacy-preserving Log Analysis with Deterministic Encryption
Yuji Furuta, Naoto Yanai (Osaka Univ.), Masashi Karasaki (NTT-neomeit), Katsuhiko Eguchi (NTT Neomeit), Yasunori Ishihara, Toru Fujiwara (Osaka Univ.)
pp. 41 - 46

ICSS2015-55
Detection of Vulnerability Scanning Using Features of Collective Accesses Collected from Several Honeypots
Naomi Kuze, Shu Ishikura (Osaka Univ.), Takeshi Yagi, Daiki Chiba (NTT), Masayuki Murata (Osaka Univ.)
pp. 47 - 52

ICSS2015-56
Evaluation of the attack detection method based on duration of continuous packet arrival
Yuhei Hayashi, Satoshi Nishiyama, Akinori Suzuki, Katsuhiko Sakai, Ichiro Kudo, Kazunori Kamiya (NTT)
pp. 53 - 58

ICSS2015-57
Investigation of cyber incident prediction method based on a technical analysis
Masaru Kawakita, Shigeyoshi Shima (NEC)
pp. 59 - 64

ICSS2015-58
A fast detecting method for obfuscated malicious JavaScript based on text pattern analysis
Jiawei Su, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (YNU)
pp. 65 - 70

ICSS2015-59
Static Detection of ROP Chain Based on Hidden Markov Model
Toshinori Usui, Tomonori Ikuse, Makoto Iwamura, Takeshi Yada (NTT)
pp. 71 - 76

ICSS2015-60
A Suspicious Processes Detection Scheme using Process Frequency and Network State
Junji Nakazato, Yu Tsuda, Eto Masashi, Daisuke Inoue, Koji Nakao (NICT)
pp. 77 - 82

ICSS2015-61
Preliminary Studies of Linkage Analysis among Process Behavior for Intrusion Prevention
Yudai Tomaru, Masaki Hashimoto, Hidehiko Tanaka (iisec)
pp. 83 - 88

ICSS2015-62
A Study of Security of an Authentication Method Using Public and Private Keys with Relaying Plural Key Pairs
Yusuke Ogata, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT)
pp. 89 - 94

ICSS2015-63
Selection of authentication methods with game theory in VANET
Hiroaki Hiroaki, Masakazu Soshi (Hiroshima City Univ.)
pp. 95 - 100

ICSS2015-64
Towards Non-Encryption-Based RFID Private Tag Authentication
Kazuya Sakai (TMU)
pp. 101 - 104

ICSS2015-65
A New Key Correlation in the Stream Cipher RC4
Daiki Michihiro (JAIST), Atsuko Miyaji (Osaka Univ./JAIST/CREST)
pp. 111 - 116

ICSS2015-66
Discrimination of communication traffic generated by malware-infected hosts
Sho Mizuno, Mitsuhiro Hatada, Tatsuya Mori, Shigeki Goto (Waseda University)
pp. 117 - 122

ICSS2015-67
An Autonomous DDoS Backscatter Detection System from Darknet Traffic
Yuki Ukawa, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit)
pp. 123 - 128

ICSS2015-68
Privacy-enhanced Similarity Search Scheme for Cloud Image Databases
Hao Liu, Hideaki Goto (Tohoku Univ.)
pp. 129 - 133

ICSS2015-69
Instantly Self-Verifiable Pre-Shared Key Exchange for Cyber-Physical Systems
Kohei Isobe (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.)
pp. 135 - 140

ICSS2015-70
Cooperative Secure Network Coding
Sumiyo Ishige (JAIST), Atsuko Miyaji (JAIST/Osaka Univ./JST CREST)
pp. 141 - 146

ICSS2015-71
Improvement and implementation of scalar multiplication algorithms with side-channel protection
Keisuke Kito (JAIST), Atsuko Miyaji (Osaka Univ./JAIST/JST CREST)
pp. 147 - 152

ICSS2015-72
Verification of Division Property and High-Order Differential Characteristic of Lightweight Blockcipher Piccolo
Takuya Kubo, Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ of Science)
pp. 153 - 158

ICSS2015-73
Higher-order differential attack on the round-reduced variants of the block cipher
Yusuke Takahashi, Yasutaka Igarashi, Toshinobu Kaneko (TUS)
pp. 159 - 164

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan