IEICE Technical Report

Online edition: ISSN 2432-6380

Volume 121, Number 410

Information and Communication System Security

Workshop Date : 2022-03-07 - 2022-03-08 / Issue Date : 2022-02-28

[PREV] [NEXT]

[TOP] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [2024] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ICSS2021-58
am I infected? A New Web Service to Inspect End Users' IoT Devices for Malware Infection and Vulnerabilities
Songwei He, Takaya Noma, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 1 - 6

ICSS2021-59
A Method for Identifying IoT Devices Using Features from WebUI Contents and Images
Kosuke Murakami (NICT/KDDI), Takahiro Kasama, Akira Fujita (NICT), Jumpei Urakawa (KDS), Daisuke Inoue (NICT)
pp. 7 - 12

ICSS2021-60
Time Efficient Risk Assessment Tool for IoT Systems
Rajulapati Shourya, Takashi Kawauchi (Hitachi)
p. 13

ICSS2021-61
Internet-wide discovery of IoT devices deployed at important facilities
Mizuki Hiraku, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ)
pp. 14 - 19

ICSS2021-62
Proposal and consideration of internal fraud model by signaling game
Junki Yuasa (Nagoya Univ.), Hiroki Kashiwazaki (NII)
pp. 20 - 25

ICSS2021-63
Efficient Construction of Hash Trees over P2P systems
Soma Ishihara, Masakazu Soshi (Hiroshima City Univ.)
pp. 26 - 31

ICSS2021-64
(See Japanese page.)
pp. 32 - 37

ICSS2021-65
Evaluation of Detection System of DNS Cache Poisoning Using Blockchain Technology
Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.)
pp. 38 - 43

ICSS2021-66
Identification of website users using browser fingerprinting and network packet
Takashi Tsukazaki, Yuichi Futa (TUT), Taku Yazawa (Dotexp)
pp. 44 - 48

ICSS2021-67
Input predictive attack by keyboard acoustic emanations using BERT and its countermeasures
Masahiro Iida (Teikyo Univ.), Mitsuaki Akiyama (NTT), Masaki Kamizono (DTCY), Takahiro Kasama (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Kyoto Sangyo Univ.), Atsuo Inomata (Osaka Univ.)
pp. 49 - 54

ICSS2021-68
Development of validation system for stack unwinding information according to the AArch64 calling convention
Tetsuhiro Kawaguchi, Yuki Takano, Atsuko Miyaji (Osaka Univ.)
pp. 55 - 60

ICSS2021-69
A Study on Self Destructive Tamper Resistant Software utilizing Return-Oriented Programming (Part 2)
Kazuomi Oishi (SIST)
pp. 61 - 65

ICSS2021-70
A study of new cyber attacks for fast charging of electric vehicle
Hiroki Nagayama, Masahiro Shiraishi, Yukio Nagafuchi, Asami Miyajima (NTT)
pp. 66 - 71

ICSS2021-71
A Method for Content Rights Succession and Editing Control Extended to Multi-dimensional Mesh Structures
Shinjiro Izumi (TUS), Masaki Inamura (Hiroshima City Univ.), Keiichi Iwamura (TUS)
pp. 72 - 77

ICSS2021-72
DOM-Based XSS Prevention Support System for Developers Using Abstract Syntax Tree Analysis
Takashi Nakahara, Syuta Ide, Tatsuya Maeda, Yusuke Hata, Takashi Kobayashi (Kansai Univ.)
pp. 78 - 86

ICSS2021-73
Remote-Control System for Securing IoT Devices
Masaru Takeuchi (JDC), Yohei Watanabe (UEC/ジャパンデータコム), Naoto Yanai (OU/ジャパンデータコム), Tatsuya Takehisa (Nisshin), Junji Shikata (YNU), Koji Nakao (NICT)
pp. 87 - 92

ICSS2021-74
Analyzing network status of IoT malware by dynamic analysis with bare-metal device
Kota Ogawa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
pp. 93 - 98

ICSS2021-75
ML-based detection of C&C communications for sandbox analysis of IoT malware
Yuki Endo, Kaichi Sameshima, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
pp. 99 - 104

ICSS2021-76
(See Japanese page.)
pp. 105 - 110

ICSS2021-77
Behavior Analysis of IoT Malware Using Function Call Sequence Graphs and Clustering
Satoshi Takada, Tianxiang He (Kyushu Univ), Chansu Han, Akira Tanaka (NICT), Jun'ichi Takeuchi (Kyushu Univ)
pp. 111 - 116

ICSS2021-78
A study of a decentralized reputation-based trust evaluation system
Iifan Tyou (NTT), Takahito Tanabe, Akinori Matsuo (msi)
pp. 117 - 122

ICSS2021-79
On Extension of scalable local differential privacy
Tatsuhiro Yamatsuki, Atsuko Miyaji (Osaka Univ.), Tomoaki Mimoto (Osaka Univ./ATR)
pp. 123 - 128

ICSS2021-80
Proposal of a lattice-based accumulator with efficient update function
Yuta Maeno, Hideaki Miyaji, Atsuko Miyaji (Osaka Univ)
pp. 129 - 134

ICSS2021-81
Secure Computation Using Secret Sharing Scheme that can be Configured on a Single Server and is Safe from Malicious Adversaries and Cheaters in the TTP
Keiichi Iwamura, Ryoya Kudo (TUS), Masaki Inamura (Hiroshima City Univ.)
pp. 135 - 140

ICSS2021-82
Simulation of security notification by ISP to malware-infected users
Xuping Huang (AIIT/YNU), Shunsuke Mochizuki (NTT Data Mathematical Systems Inc), Akira Fujita (NICT/YNU), Katsunari Yoshioka (YNU)
pp. 141 - 146

ICSS2021-83
Verifying concept of personalized malware by investigating end-user environments
Daigo Ichikawa, Rui Tanabe, XU Haoyuan, Yoshioka Katsunari, Matsumoto Tsutomu (YNU)
pp. 147 - 152

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan