IEICE Technical Report

Online edition: ISSN 2432-6380

Volume 119, Number 437

Information and Communication System Security

Workshop Date : 2020-03-02 - 2020-03-03 / Issue Date : 2020-02-24

[PREV] [NEXT]

[TOP] | [2016] | [2017] | [2018] | [2019] | [2020] | [2021] | [2022] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ICSS2019-68
Improvement of the Backup Method Dealing with 2 Types of Damages
Taiga Hasuike, Masahiro Mambo (Kanazawa Univ.)
pp. 1 - 6

ICSS2019-69
Estimation method of information asset security attributes using design mode
Takeshi Ueda, Koichi Shimizu, Shun Hinatsu, Fumio Omatsu (Mitsubishi Electric Corp.)
pp. 7 - 12

ICSS2019-70
Information Rates for Multiple Assignment Schemes on Five Participants
Yutaro Shimma, Kouya Tochikubo (Nihon Univ.)
pp. 13 - 18

ICSS2019-71
A Verification Method of Infrastructure as Code using Alloy Analyzer
Ryo Hase, Yohei Matsuura (Mitsubishi Electric)
pp. 19 - 24

ICSS2019-72
Effect of Environmental Temperature Change in LED Fingerprinting
Ayaka Tsuchiya, Akiko Toh, Yang Li, Kazuo Sakiyama, Takeshi Sugawara (UEC)
pp. 25 - 29

ICSS2019-73
Log Storing System Using Blockchain
Takashi Ikeda, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.)
pp. 31 - 36

ICSS2019-74
(See Japanese page.)
pp. 37 - 42

ICSS2019-75
Search for Similar Binary Code in Cross-Architecture Using Neural Machine Translation Model
Moritoshi Aoyanagi, Hidenori Tsuji, Masaki Hashimoto (IISEC)
pp. 43 - 48

ICSS2019-76
A Study on Fuzzing for Device Drivers with AddressSanitizer
Kentaro Ishii (Kove Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kove Univ.)
pp. 49 - 53

ICSS2019-77
Development of a recovery tool for a ransomware infected PC
Ryosuke Kokado (Kobe Univ.), Masato Ikegami, Tomohisa Hasegawa, Takafumi Harada, Hiroshi Kitani (Canon MJ), Masakatu Morii (Kobe Univ.)
pp. 55 - 60

ICSS2019-78
Backdoor Detection Based On Network Functions For IoT Devices
Minami Yoda, Shuji Sakuraba, Junichi Yamamoto (UEC), Yuichi Sei (UEC/JST PRESTO), Yasuyuki Tahara, Akihiko Ohsuga (UEC)
pp. 61 - 65

ICSS2019-79
Evaluating Effectiveness of a Timing Attack on Android Devices in JavaScript
Keisuke Sugita (Kobe Univ.), Ryoichi Isawa (NICT), Masakatsu Morii (Kobe Univ.)
pp. 67 - 71

ICSS2019-80
Proposing Criteria for Detecting Internet-Wide Scanners for Darknet Monitoring
Yukiko Endo, Yoshiki Mori (NICT), Jumpei Shimamura (Clwit), Masaki Kubo (NICT)
pp. 73 - 78

ICSS2019-81
An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation
Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
pp. 79 - 84

ICSS2019-82
Mirai may detect that you talk to smart speaker -- On privacy violation by attackers who compromised home router --
Shoya Okuda, Tatsuya Tamai, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 85 - 90

ICSS2019-83
A research of HTTP request and an identification method of fake User-Agent values
Masato Inoue, Masaki Hashimoto (IISEC)
pp. 91 - 96

ICSS2019-84
Preliminary Study of WAF Signature Generation by Utilizing Real-time Information on the Web
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.)
pp. 97 - 102

ICSS2019-85
Analysis of Cyber-attacks Observed by a Simple TLS Honeypot Listening on All Ports
Daisuke Makita (NICT), Jumpei Shimamura (clwit), Masaki Kubo, Daisuke Inoue (NICT)
pp. 103 - 108

ICSS2019-86
Local survey on transitioning of TLS version and EV Certificates Usage (FY2019 4Q)
Yuji Suga (IIJ)
pp. 109 - 111

ICSS2019-87
Development of an expert system for automatic classification of illegal and harmful information on the dark web
Hanae Kobayashi, Masaki Hashimoto (IISEC)
pp. 113 - 118

ICSS2019-88
Model checking RNNs with modal μ-calculus
Tatsuhiro Aoshima, Toshinori Usui (NTT)
pp. 119 - 124

ICSS2019-89
Adversarial Attack against Neural Machine Translation Systems
Takeshi Sakamoto, Tatsuya Mori (Waseda Univ.)
pp. 125 - 130

ICSS2019-90
Adversarial Attacks against Electrocardiograms
Taiga Ono (Waseda Univ.), Takeshi Sugawara (UEC), Tatsuya Mori (Waseda Univ.)
pp. 131 - 136

ICSS2019-91
Effective single-sided RAMBleed
Hiroki Nagahama (Kobe Univ), Makoto Takita (Univ of Hyogo), Masanori Hirotomo (Saga Univ), Masakatsu Morii (Kobe Univ)
pp. 145 - 150

ICSS2019-92
(See Japanese page.)
pp. 151 - 155

ICSS2019-93
A Technique for Issuing Security Alerts and Filtering Traffic based on Vulnerability Information Monitoring
Takeshi Takahashi, Ryutaro Ushigome, Mio Suzuki, Daisuke Inoue (NICT)
pp. 189 - 194

ICSS2019-94
An Evaluation of Contact Points for Security Notifications
Miori Saito, Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 195 - 200

ICSS2019-95
Generating Adversarial Videos that Bypass Content Filtering
Norihito Omori, Tatsuya Mori (Waseda Univ.)
pp. 201 - 206

ICSS2019-96
Implementation of aggregate message authentication and its evaluation
Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takehisa, Hidekazu Nishiura, Zoa Jiafa (NISSIN), Yu Imamura (JDC), Junji Sikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC)
pp. 207 - 212

ICSS2019-97
Extension of authentication method using hash chain aggregation
Hirai Shinta, Soshi Masakazu (Hiroshima City Univ.)
pp. 213 - 218

ICSS2019-98
Securty Analysis of Salsa20 and ChaCha Using Inverse Function's Properties
Yusuke Matsuoka, Atsuko Miyaji (Osaka Univ.)
pp. 219 - 224

ICSS2019-99
The efficient and high level of commitment scheme with low output locality
Hideaki Miyaji, Atsuko Miyaji (OU)
pp. 225 - 230

ICSS2019-100
(See Japanese page.)
pp. 283 - 288

ICSS2019-101
A Secure Second-price Sealed-Bid Auction using smart contract
Yuki Sugitani, Atsuko Miyaji (Osaka Univ.)
pp. 289 - 294

ICSS2019-102
Performance Evaluation of an Access Control Mechanism with Session Types
Tomoya Nishiguchi, Yuuki Takano, Atsuko Miyaji (Osaka Univ.)
pp. 295 - 300

ICSS2019-103
Realization of Privacy Policy with Attribute-Based Encryption and Its Applications
Motoi Hayashi, Atsuko Miyaji (Osaka Univ.)
pp. 301 - 306

ICSS2019-104
(See Japanese page.)
pp. 307 - 312

ICSS2019-105
Secure and Compact Elliptic Curve Scalar Multiplication based on Affine
Jin Yaoan, Atsuko Miyaji (Osaka Univ.)
pp. 321 - 333

ICSS2019-106
(See Japanese page.)
pp. 335 - 340

ICSS2019-107
Study on Implementation of Anonymous Public-Key Certificates based on Elliptic Curve
Kazuomi Oishi (SIST)
pp. 341 - 344

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan