Online edition: ISSN 2432-6380
[TOP] | [2016] | [2017] | [2018] | [2019] | [2020] | [2021] | [2022] | [Japanese] / [English]
ICSS2019-68
Improvement of the Backup Method Dealing with 2 Types of Damages
Taiga Hasuike, Masahiro Mambo (Kanazawa Univ.)
pp. 1 - 6
ICSS2019-69
Estimation method of information asset security attributes using design mode
Takeshi Ueda, Koichi Shimizu, Shun Hinatsu, Fumio Omatsu (Mitsubishi Electric Corp.)
pp. 7 - 12
ICSS2019-70
Information Rates for Multiple Assignment Schemes on Five Participants
Yutaro Shimma, Kouya Tochikubo (Nihon Univ.)
pp. 13 - 18
ICSS2019-71
A Verification Method of Infrastructure as Code using Alloy Analyzer
Ryo Hase, Yohei Matsuura (Mitsubishi Electric)
pp. 19 - 24
ICSS2019-72
Effect of Environmental Temperature Change in LED Fingerprinting
Ayaka Tsuchiya, Akiko Toh, Yang Li, Kazuo Sakiyama, Takeshi Sugawara (UEC)
pp. 25 - 29
ICSS2019-73
Log Storing System Using Blockchain
Takashi Ikeda, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.)
pp. 31 - 36
ICSS2019-74
(See Japanese page.)
pp. 37 - 42
ICSS2019-75
Search for Similar Binary Code in Cross-Architecture Using Neural Machine Translation Model
Moritoshi Aoyanagi, Hidenori Tsuji, Masaki Hashimoto (IISEC)
pp. 43 - 48
ICSS2019-76
A Study on Fuzzing for Device Drivers with AddressSanitizer
Kentaro Ishii (Kove Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kove Univ.)
pp. 49 - 53
ICSS2019-77
Development of a recovery tool for a ransomware infected PC
Ryosuke Kokado (Kobe Univ.), Masato Ikegami, Tomohisa Hasegawa, Takafumi Harada, Hiroshi Kitani (Canon MJ), Masakatu Morii (Kobe Univ.)
pp. 55 - 60
ICSS2019-78
Backdoor Detection Based On Network Functions For IoT Devices
Minami Yoda, Shuji Sakuraba, Junichi Yamamoto (UEC), Yuichi Sei (UEC/JST PRESTO), Yasuyuki Tahara, Akihiko Ohsuga (UEC)
pp. 61 - 65
ICSS2019-79
Evaluating Effectiveness of a Timing Attack on Android Devices in JavaScript
Keisuke Sugita (Kobe Univ.), Ryoichi Isawa (NICT), Masakatsu Morii (Kobe Univ.)
pp. 67 - 71
ICSS2019-80
Proposing Criteria for Detecting Internet-Wide Scanners for Darknet Monitoring
Yukiko Endo, Yoshiki Mori (NICT), Jumpei Shimamura (Clwit), Masaki Kubo (NICT)
pp. 73 - 78
ICSS2019-81
An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation
Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
pp. 79 - 84
ICSS2019-82
Mirai may detect that you talk to smart speaker
-- On privacy violation by attackers who compromised home router --
Shoya Okuda, Tatsuya Tamai, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 85 - 90
ICSS2019-83
A research of HTTP request and an identification method of fake User-Agent values
Masato Inoue, Masaki Hashimoto (IISEC)
pp. 91 - 96
ICSS2019-84
Preliminary Study of WAF Signature Generation by Utilizing Real-time Information on the Web
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.)
pp. 97 - 102
ICSS2019-85
Analysis of Cyber-attacks Observed by a Simple TLS Honeypot Listening on All Ports
Daisuke Makita (NICT), Jumpei Shimamura (clwit), Masaki Kubo, Daisuke Inoue (NICT)
pp. 103 - 108
ICSS2019-86
Local survey on transitioning of TLS version and EV Certificates Usage (FY2019 4Q)
Yuji Suga (IIJ)
pp. 109 - 111
ICSS2019-87
Development of an expert system for automatic classification of illegal and harmful information on the dark web
Hanae Kobayashi, Masaki Hashimoto (IISEC)
pp. 113 - 118
ICSS2019-88
Model checking RNNs with modal μ-calculus
Tatsuhiro Aoshima, Toshinori Usui (NTT)
pp. 119 - 124
ICSS2019-89
Adversarial Attack against Neural Machine Translation Systems
Takeshi Sakamoto, Tatsuya Mori (Waseda Univ.)
pp. 125 - 130
ICSS2019-90
Adversarial Attacks against Electrocardiograms
Taiga Ono (Waseda Univ.), Takeshi Sugawara (UEC), Tatsuya Mori (Waseda Univ.)
pp. 131 - 136
ICSS2019-91
Effective single-sided RAMBleed
Hiroki Nagahama (Kobe Univ), Makoto Takita (Univ of Hyogo), Masanori Hirotomo (Saga Univ), Masakatsu Morii (Kobe Univ)
pp. 145 - 150
ICSS2019-92
(See Japanese page.)
pp. 151 - 155
ICSS2019-93
A Technique for Issuing Security Alerts and Filtering Traffic based on Vulnerability Information Monitoring
Takeshi Takahashi, Ryutaro Ushigome, Mio Suzuki, Daisuke Inoue (NICT)
pp. 189 - 194
ICSS2019-94
An Evaluation of Contact Points for Security Notifications
Miori Saito, Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 195 - 200
ICSS2019-95
Generating Adversarial Videos that Bypass Content Filtering
Norihito Omori, Tatsuya Mori (Waseda Univ.)
pp. 201 - 206
ICSS2019-96
Implementation of aggregate message authentication and its evaluation
Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takehisa, Hidekazu Nishiura, Zoa Jiafa (NISSIN), Yu Imamura (JDC), Junji Sikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC)
pp. 207 - 212
ICSS2019-97
Extension of authentication method using hash chain aggregation
Hirai Shinta, Soshi Masakazu (Hiroshima City Univ.)
pp. 213 - 218
ICSS2019-98
Securty Analysis of Salsa20 and ChaCha Using Inverse Function's Properties
Yusuke Matsuoka, Atsuko Miyaji (Osaka Univ.)
pp. 219 - 224
ICSS2019-99
The efficient and high level of commitment scheme with low output locality
Hideaki Miyaji, Atsuko Miyaji (OU)
pp. 225 - 230
ICSS2019-100
(See Japanese page.)
pp. 283 - 288
ICSS2019-101
A Secure Second-price Sealed-Bid Auction using smart contract
Yuki Sugitani, Atsuko Miyaji (Osaka Univ.)
pp. 289 - 294
ICSS2019-102
Performance Evaluation of an Access Control Mechanism with Session Types
Tomoya Nishiguchi, Yuuki Takano, Atsuko Miyaji (Osaka Univ.)
pp. 295 - 300
ICSS2019-103
Realization of Privacy Policy with Attribute-Based Encryption and Its Applications
Motoi Hayashi, Atsuko Miyaji (Osaka Univ.)
pp. 301 - 306
ICSS2019-104
(See Japanese page.)
pp. 307 - 312
ICSS2019-105
Secure and Compact Elliptic Curve Scalar Multiplication based on Affine
Jin Yaoan, Atsuko Miyaji (Osaka Univ.)
pp. 321 - 333
ICSS2019-106
(See Japanese page.)
pp. 335 - 340
ICSS2019-107
Study on Implementation of Anonymous Public-Key Certificates based on Elliptic Curve
Kazuomi Oishi (SIST)
pp. 341 - 344
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.