IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 115, Number 81

Information and Communication System Security

Workshop Date : 2015-06-11 - 2015-06-12 / Issue Date : 2015-06-04

[PREV] [NEXT]

[TOP] | [2012] | [2013] | [2014] | [2015] | [2016] | [2017] | [2018] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ICSS2015-1
[Invited Talk] Recent trends in multivariate cryptography
Takanori Yasuda (ISIT)
pp. 1 - 2

ICSS2015-2
[Invited Talk] Establishment of Cybersecurity Education by Industry-Academia Collaboration
Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.)
pp. 3 - 8

ICSS2015-3
An Efficient Rainbow Table Compression
Yuki Tabata, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA)
pp. 9 - 14

ICSS2015-4
An Empirical Evaluation of Locating Cryptographic Functions on the Memory
Ryoya Furukawa (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT)
pp. 15 - 20

ICSS2015-5
Implementation of a Pairing Library Using BN Elliptic Curve
Yusuke Kanbara, Naoki Kanayama, Takashi Nishide, Eiji Okamoto (Univ. of Tsukuba)
pp. 21 - 26

ICSS2015-6
The Analysis of the CREAM vulnerability against OpenSSL
Jun Hasegawa, Yuhei Watanabe, Masakatu Morii (Kobe Univ.)
pp. 27 - 32

ICSS2015-7
Traffic Data Analysis for Multiple Darknet and its Applications
Kensho Murai, Keisuke Furumoto (Kobe Univ.), Kosuke Murakami (KDDI), Koji Nakao (KDDI/NICT), Masakatu Morii (Kobe Univ.)
pp. 33 - 38

ICSS2015-8
Report on the 23rd USENIX Security Symposium
Shinichi Matsumoto (ISIT), Kazuomi Oishi (SIST), Kuniyasu Suzaki (AIST)
pp. 39 - 44

ICSS2015-9
Experimental Results on an Attack Detection System for Advanced Persistent Threats
Kenichiro Muto, Yasuhiro Okumura, Shinya Kuramoto, Hidemori Ikeda, Mitsuhiro Hatada, Takayuki Watanabe (NTT Communications), Tohru Sato, Kazufumi Aoki (NTT), Junichi Murakami, Kazuyuki Iso, Yasuhiro Kunda (FFRI), Toshio Nawa, Mai Kiuchi (CDI)
pp. 45 - 50

ICSS2015-10
Detecting Malicious Domain Names based on the Time-series Analysis of Attackers Network Resources
Daiki Chiba (NTT/Waseda Univ.), Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeshi Yada, Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.)
pp. 51 - 56

ICSS2015-11
Knapsack Cryptosystems with Random Secret Sequences using Logical And Operation
Yasuyuki Murakami, Shinsuke Hamasho (OECU), Masao Kasahara (WU/CU)
pp. 57 - 62

ICSS2015-12
A Report on International Conference NDSS2015
Hiroaki Anada (ISIT), Yuhei Kawakoya (NTTi3), Kuniyasu Suzaki (AIST)
pp. 63 - 68

ICSS2015-13
[Invited Talk] Hardware Security for Mobile Devices in Public Spaces
Yu-ichi Hayashi (Tohoku Gakuin Univ.), Naofumi Homma, Takafumi Aoki, Hideaki Sone (Tohoku Univ.)
pp. 69 - 74

ICSS2015-14
Camera Based Data Recognition for Enbedding Invisible Information in Images -- New Type for Two-Dimensional Barcode and Its Application --
Tomoe Hatanaka, Yuki Saji, Makoto Takita, Masakatu Morii (Kobe Univ.)
pp. 75 - 80

ICSS2015-15
Can internet measurement be a noise for analysis of darknet?
Yumehisa Haga, Akira Saso, Tatsuya Mori, Shigeki Goto (Waseda Univ.)
pp. 81 - 86

ICSS2015-16
A detect method for an undesirable use of e-mail server using cardinality analysis
Akira Sato, Yuki Kato, Kenichi Yoshida, Yasushi Shinjo (Univ. of Tsukuba)
pp. 87 - 92

ICSS2015-17
Droid Dowser: an APK information gathering system using headless WebKit scriptable with a JavaScript API
Ruo Ando (NICT)
pp. 93 - 97

ICSS2015-18
A study on a Tool for Automated Vulnerability Monitoring and Alerting on Software Assets inside Organizations
Takeshi Takahashi, Daisuke Miyamoto, Bhola Panta, Koji Nakao (NICT)
pp. 99 - 104

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan