IEICE Technical Report

Online edition: ISSN 2432-6380

Volume 120, Number 384

Information and Communication System Security

Workshop Date : 2021-03-01 - 2021-03-02 / Issue Date : 2021-02-22

[PREV] [NEXT]

[TOP] | [2017] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ICSS2020-26
Developing and Characterizing a New Approach to Extracting Communication Sessions Associated with NIDS Alerts
Ryosuke Ishibashi, Hiroki Goto (Kyushu Univ.), Chansu Han, Tao Ban, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.)
pp. 1 - 6

ICSS2020-27
Detection of Infected Device Using DNS Traffic
Soichiro Kogo, Atsushi Kanai (Hosei Univ.)
pp. 7 - 12

ICSS2020-28
Understanding the Adoption and Operation of DNS Cookie: Current State and Future Prospects
Masanori Yajima (Waseda Univ.), Daiki Chiba (NTT), Yoshiro Yoneya (JPRS), Tatsuya Mori (Waseda Univ./NICT)
pp. 13 - 18

ICSS2020-29
Construction of Vulnerability Evaluation System with Machine Learning Methods
Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota (KDDIR), Junpei Urakawa (KDS/KDDIR)
pp. 19 - 24

ICSS2020-30
A proposal of model for scale and frequency of cyber incidents based on organizational attributes
Kazuki Ikegami, Hiroaki Kikuchi (Meiji Univ.)
pp. 25 - 30

ICSS2020-31
Method of Similarity Evaluation among Incidents for Multi-Located Network
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII)
pp. 31 - 36

ICSS2020-32
Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures
Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII)
pp. 37 - 42

ICSS2020-33
A path authentication framework based on One-way cross networks
Kosuke Ishibashi, Masakazu Soshi (Hiroshima City Univ.)
pp. 43 - 48

ICSS2020-34
On the Privacy Risk of Exposure Notification Framework: Assessment and Countermeasures
Kazuki Nomoto (Waseda Univ.), Mitsuaki Akiyama (NTT), Masashi Eto (NICT), Atsuo Inomata (Osaka Univ.), Tatsuya Mori (Waseda Univ./NICT)
pp. 49 - 54

ICSS2020-35
A Method for Reconstructing Hidden Background Image in Tele-conference with Virtual Background
Satoki Tsuji, Ryusei Ishikawa (Ritsumeikan Univ.), Masashi Eto (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Hiroshima City Univ.)
pp. 55 - 60

ICSS2020-36
Implementation and Evaluation of a Plagiarism Detection Method for Source Code on Programming Contest
Ryusei Ishikawa (Ritsumeikan Univ.), Yuichi Hattori (Secure Cycle), Hiroyuki Inoue (Hiroshima City Univ.), Atsuo Inomata (Osaka Univ.)
pp. 61 - 65

ICSS2020-37
Design and implementation of a cyber security exercise rewinding mechanism
Yuma Kodera, Chinen Kenichi (JAIST)
pp. 66 - 71

ICSS2020-38
An Evaluation of Scalable Clustering in Fast Construction Algorithm of Phylogenetic Tree
Tianxiang He (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Shuji Kijima, Jun'ichi Takeuchi (Kyushu Univ.)
pp. 72 - 77

ICSS2020-39
Improvement of Functional Difference Investigation Method and Analyzing for Clusters of IoT Malware
Reo Kawasoe (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.)
pp. 78 - 83

ICSS2020-40
Analyzing the Transition of Vulnerabilities Targeted by IoT Malware
Kaichi Sameshima, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU)
pp. 84 - 89

ICSS2020-41
Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox
Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU)
pp. 90 - 95

ICSS2020-42
Proposal for Chameleon Hash with a Revocation Function
Koki Matsubara (Osaka Univ.), Atsuko Miyaji (Osaka Univ./ JAIST), Tian Yangguang (Osaka Univ.)
pp. 96 - 101

ICSS2020-43
Authentication and authorization of IoT devices using blockchain and fog nodes
Takahiro Igarashi, Yuichi Futa (TUT)
pp. 102 - 107

ICSS2020-44
Consideration on the mechanism of identifying and tracking Bitcoin users
Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR)
pp. 108 - 113

ICSS2020-45
Study on analyzing Memcached DRDoS attacks and their infrastructures
Mizuki Kondo, Natsuo Shintani (YNU), Daisuke Makita (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
pp. 114 - 119

ICSS2020-46
Distributed Slow HTTP DoS Attack Detection by Combining Multiple Schemes
Koki Tamura, Yuichi Futa (TUT)
pp. 120 - 125

ICSS2020-47
Security Evaluation of End-to-End Encryption of LINE Version 2
Kotaro Kita, Takanori Isobe (UH)
pp. 126 - 131

ICSS2020-48
Developing an Interactive Analysis System for Voice Assistant Apps
Atsuko Natatsuka (Waseda Univ.), Ryo Iijima (Waseda Univ./NICT), Takuya Watanabe, Mitsuaki Akiyama (NTT), Tetsuya Sakai (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT)
pp. 132 - 137

ICSS2020-49
(See Japanese page.)
pp. 138 - 143

ICSS2020-50
Research on the vulnerability of homoglyph attacks to online machine translation system
Takeshi Sakamoto, Tatsuya Mori (Waseda Univ)
pp. 144 - 149

ICSS2020-51
The linear probability of the stream cipher Salsa
Junru Li (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST)
pp. 150 - 153

ICSS2020-52
Evaluation of resonance-induced attacks on inertial measurement unit
Yuta Minamisawa, Ryo Iijima (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT)
pp. 154 - 159

ICSS2020-53
Security Evaluation of PUF utilizing Unrolled Architecture
Yusuke Nozaki, Kensaku Asahi, Masaya Yoshikawa (Meijo Univ.)
pp. 160 - 165

ICSS2020-54
A Study on the Adoption of Link Preview by the Phishing Sites
Norihito Omori (Waseda Univ.), Satoshi Furutani, Takuya Watanabe, Toshiki Shibahara, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.)
pp. 166 - 171

ICSS2020-55
An Efficient Discovery of Malicious URL Using VirusTotal and Web Access Log
Chika Hiraishi, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
pp. 172 - 177

ICSS2020-56
Evaluation of Uncertain Reports by Multiple Anti-virus Engines
Kazuya Nomura (Waseda Univ.), Mistuaki Akiyama (NTT), Masaki Kamizono (Deloitte Tohmatsu Cyber LLC), Takahiro Kasama (NICT)
pp. 178 - 183

ICSS2020-57
Proof of concept of sandbox evasion attack using email address stored in target machine
Yuta Inoue, Rui Tanabe (YNU), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
pp. 184 - 189

ICSS2020-58
Accuracy evaluation of CNNs and random forests with Malware API call sequences
Shugo Asai, Futa Yuichi (TUT)
pp. 190 - 194

ICSS2020-59
Detecting unknown malware families by anomaly detection using deep learning
Ren Takeuchi, Shintaro Mizuno, Vo Ngoc Khoi Nguyen, Jun Tsuchiya, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.)
pp. 195 - 200

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan