IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 117, Number 481

Information and Communication System Security

Workshop Date : 2018-03-07 - 2018-03-08 / Issue Date : 2018-02-28

[PREV] [NEXT]

[TOP] | [2014] | [2015] | [2016] | [2017] | [2018] | [2019] | [2020] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ICSS2017-51
A Study on Malware Activity Detection Based on Real-time Analysis of Darknet Data Using Graphical Lasso
Chansu Han (Kyushu Univ.), Jumpei Shimamura (Clwit Inc.), Takeshi Takahashi, Daisuke Inoue (NICT), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT)
pp. 1 - 6

ICSS2017-52
Combining Local and Global Graph-based Features for Stealth Scan Detection on LAN
Hiroki Nagayama, Bo HU, Kazunori Kamiya, Masaki Tanikawa (NTT)
pp. 7 - 12

ICSS2017-53
Malware Detection by Anomaly of Traffic Data for IoT Devices
Kana Sakano, Tetsutaro Uehara (Ritsumeikan Univ.)
pp. 13 - 18

ICSS2017-54
Modeling Worm Propagation using Dynamic Patching
Sugitani Yuki, Francois Bonnet, Miyaji Atsuko (Osaka Univ.)
pp. 19 - 24

ICSS2017-55
On the effectiveness of solving ECDLP using Characteristic set methods
Tomoya Nishiguchi, Chen Mou, Kenta kodera, Atuko Miyaji (Osaka Univ.)
pp. 25 - 30

ICSS2017-56
Application of Multi-Party Private Set-Intersection
Motoi Hayashi, Katsunari Shishido, Atsuko Miyaji (Osaka Univ.)
pp. 31 - 36

ICSS2017-57
An analysis of the Guo-Johansson-Stankovski attack against QC-MDPC codes
Yohei Maezawa, Tung Chou, Atsuko Miyaji (Osaka Univ,)
pp. 37 - 42

ICSS2017-58
A study of decentralized IoT Security Controller
Iifan Tyou, Hiroki Nagayama, Takuya Saeki, Yukio Nagafuchi, Masaki Tanikawa (NTT)
pp. 43 - 48

ICSS2017-59
A study of security requirements and function implementation for home networks in a period of IoT expansion
Shingo Kashima, Tsuyoshi Kondoh, Tetsuhiko Murata, Masami Ueno (NTT)
pp. 49 - 54

ICSS2017-60
A Preliminary Study on Defining Malignant Activity by Linking in-System Elements
Takuya Koike (IISEC), Miyuu Okubo (IRI), Hidenori Tsuji, Masaki Hashimoto (IISEC)
pp. 55 - 60

ICSS2017-61
The spread and the containment of virus in random network model
Taichi Nishino, Francois Bonnet, Atsuko Miyaji (Osaka Univ.)
pp. 61 - 66

ICSS2017-62
Safety evaluation of stream cipher, Salsa20/ChaCha20 by redesign of diffusion
Yusuke Matsuoka, Atsuko Miyaji (Osaka Univ.)
pp. 67 - 72

ICSS2017-63
Evaluation of HIBE based on Universal Sampler
Shunsuke Otsuka, Akinori Kawachi, Atsuko Miyaji (Osaka Univ.)
pp. 73 - 78

ICSS2017-64
(See Japanese page.)
pp. 79 - 84

ICSS2017-65
Estimate of Malicious Web Sites Based on Users' Web Access Behavior and Destination AS Numbers
Kosuke Murakami, Jumpei Urakawa, Akira Yamada, Ayumu Kubota (KDDI Research)
pp. 85 - 90

ICSS2017-66
Automatically Collecting User-initiated Web-based Attacks
Takashi Koide, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT)
pp. 91 - 96

ICSS2017-67
An Empirical Analysis of Online Advertising Fraud by analyzing User Activities Observed in the Ad Network
Fumihiro Kanei, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT)
pp. 97 - 102

ICSS2017-68
Darkweb Analysis System by Combining HSDir's Snooping and Active Scanning
Akito Ono (Ritsumeikan Univ.), Masaki Kamizono (PwC Cyber Services), Takahiro Kasama (NICT), Tetsutaro Uehara (Ritsumeikan Univ.)
pp. 103 - 108

ICSS2017-69
Considering Opcode-based Similarity between IoT Malware Samples
Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT)
pp. 109 - 114

ICSS2017-70
Research on an Evaluation Method for Memory Forensics Tools
Makoto Ashitsu, Ikuo Tanaka, Hidenori Tsuji, Masaki Hashimoto (IISEC)
pp. 115 - 120

ICSS2017-71
A Malware Detection Method by Machine Learning Focused on Malignant Activity
Tadashi Shimomura, Nobuki Suetsugu, Hidenori Tsuji, Masaki Hashimoto (IISEC)
pp. 121 - 126

ICSS2017-72
Classification for Important Decoy Documents Based on Supervised Learning
Yao Xiao, Shuta Morishima (Yokohama National Univ.), Tsuyufumi Watanabe (Yokohama National Univ./Fujisoft), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 127 - 132

ICSS2017-73
Predicting Website Abuse Using Update Histories
Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT), Shigeki Goto (Waseda Univ.)
pp. 133 - 138

ICSS2017-74
Analyzing web application vulnerability reports by machine learning
Takaaki Nagumo, Yuusuke Kubo, Yasuhiro Kobayashi, Wataru Hasegawa, Takahiro Hamada (NTT Com)
pp. 139 - 144

ICSS2017-75
(See Japanese page.)
pp. 145 - 150

ICSS2017-76
(See Japanese page.)
pp. 151 - 156

ICSS2017-77
Response Signature Generation method for Detecting Malicious Destinations
Kazuma Shinomiya, Iifan Tyou, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT)
pp. 157 - 160

ICSS2017-78
Investigation of Inferability of IP addresses for Clients in Organizations
Miori Saito, Wataru Ueno, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 161 - 166

ICSS2017-79
Subspace Clustering Method with Semantic Interpretability for Bot Behavior Classification
Shohei Araki, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT)
pp. 167 - 172

ICSS2017-80
A Survey of Factors Influencing Progress of HTTPS Adoption
Tetsuya Okuda, Naoko Chiba, Mitsuaki Akiyama, Yuki Okano (NTT)
pp. 187 - 192

ICSS2017-81
A countermeasure against camrip using the phase modulation
Toshiki Sasazaki, Tatsuya Mori (Waseda Univ.)
pp. 193 - 198

ICSS2017-82
Empirical Analysis of Reflectors in DRDoS attacks based on Large-Scale Network Data
Jumpei Urakawa, Kosuke Murakami, Akira Yamada, Ayumu Kubota (KDDI Research)
pp. 199 - 204

ICSS2017-83
Analyzing Victims of DRDoS Attacks Observed by Honeypots
Kazuya Watanabe (Yokohama National Univ.), Tomomi Nishizoe (NTT Com), Daisuke Makita (NICT), Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 205 - 210

ICSS2017-84
On a Method to Implement White-box Cryptography (No Presentation)
Tomonari Ozeki, Masakazu Soshi (Hiroshima City Univ.)
pp. 211 - 213

ICSS2017-85
On the Ring Signature Scheme Using LDPC Codes
Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.)
pp. 215 - 220

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan