IEICE Technical Report

Online edition: ISSN 2432-6380

Volume 122, Number 422

Information and Communication System Security

Workshop Date : 2023-03-13 - 2023-03-14 / Issue Date : 2023-03-06

[PREV] [NEXT]

[TOP] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [2024] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ICSS2022-48
Developing a Hand Gesture Recognition System for VR Devices
Mei Suzuki, Ryo Iijima, Kazuki Nomoto (Waseda Univ.), Tetsushi Ohki (Shizuoka Univ./AIP), Tatsuya Mori (Waseda Univ./NICT/AIP)
pp. 1 - 6

ICSS2022-49
Dynamic Fake QR Code using Invisible Laser Irradiation
Yuki Kamata, Shuya Kawaguchi, Toshihiro Ohigashi, Yoshihisa Takayama (Tokai Univ.)
pp. 7 - 12

ICSS2022-50
sEMG-based Gesture Authentication for Smartwatch
Akihisa Watanabe, Ryo Iijima, Tatsuya Mori (Waseda Univ.,)
pp. 13 - 18

ICSS2022-51
Basic Study on IoT Security Using Robot Arm
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.)
pp. 19 - 24

ICSS2022-52
Dynamic Analysis of Adversarial Attacks
Kentaro Goto (JPNIC), Masato Uchida (Waseda Univ.)
pp. 25 - 30

ICSS2022-53
Consideration of a Packet Level Anomaly Communication Classification Model Using Word Embedding and LSTM
Yoshikatsu Kashiwabara, Kohei Miyamoto, Iida Masazumi, Shota Kawanaka (Kyushu Univ), Han Chansu, Ban Tao, Kenshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ)
pp. 31 - 36

ICSS2022-54
Disabling Adversarial Examples through Color Conversion using CMYK Defense Model
Ryo Soeda, Masato Uchida (Waseda Univ.)
pp. 37 - 42

ICSS2022-55
Multimodal Feature Integration Toward High-Accuracy Network Intrusion Detection
Masazumi Iida, Kohei Miyamoto, Yoshinari Takeishi, Shota Kawanaka (Kyushu Univ.), Chansu Han, Tao Ban, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.)
pp. 43 - 48

ICSS2022-56
Generating Attack Trace Dataset Focusing on Attack Techniques and the Damage Caused by Each.
Masahito Kumazaki, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.)
pp. 49 - 54

ICSS2022-57
Preservation Techniques of Fileless Attack Artifacts using Customized PowerShell
Masahito Kimura (Ritsumeikan Univ.), Chris Liu (DTCY), Tetsutaro Uehara (Ritsumeikan Univ.)
pp. 55 - 60

ICSS2022-58
(See Japanese page.)
pp. 61 - 66

ICSS2022-59
(See Japanese page.)
pp. 67 - 72

ICSS2022-60
Proposal and evaluation of visualization method for understanding security risks based on software dependencies
Tomohiko Yano (SECOM), Hiroki Kuzuno (Kobe Univ.)
pp. 73 - 78

ICSS2022-61
Evaluation of Copy Protection Technology Using Web Font
Kazuki Nomoto (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT/RIKEN AIP)
pp. 79 - 84

ICSS2022-62
Evaluation and countermeasures of notification destination restoration attacks using password recovery functions of multiple web services
Ryusei Ishikawa, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ., Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.)
pp. 85 - 90

ICSS2022-63
An Analysis of the Risk of Unauthorized Access to the WebUI of IoT Devices
Kosuke Murakami (NICT/KDDIR), Takahiro Kasama, Daisuke Inoue (NICT)
pp. 91 - 96

ICSS2022-64
A Study on Effectiveness of Malware Infection Notification based on Role-playing Type Survey
Akira Fujita, Misato Matsuda, Takahiro Kasama, Daisuke Inoue (NICT)
pp. 97 - 102

ICSS2022-65
Lessons Learned from Construction of the Security Technical Term Dictionary
Misato Matsuda, Akira Fujita, Yu Tsuda, piyokango, Daisuke Inoue (NICT)
pp. 103 - 108

ICSS2022-66
URL Warning List Creation and Manage Methods using VirusTotal and Web Access Log
Kyohei Takao, Chika Hiraishi (YNU), Kazuki Takada (SecureBrain), Akira Fujita, Daisuke Inoue (NICT), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
pp. 109 - 114

ICSS2022-67
Implementation and Evaluation for Remote-Control Security System of IoT Devices
Masaru Takeuchi (JDC), Yohei Watanabe (UEC/JDC), Naoto Yanai (OU/JDC), Akira Takeuchi (JDC), Tatsuya Takehisa (Nisshin), Yukitoshi Sanada (KU/JDC), Junji Shikata (YNU), Koji Nakao (NICT)
pp. 115 - 120

ICSS2022-68
A Study on Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities
Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU)
pp. 121 - 126

ICSS2022-69
New linear approximation and improved bias of ChaCha in differential linear analysis
Ryo Watanabe (Osaka Univ..), Atsuko Miyaji (Osaka Univ./JAIST)
pp. 127 - 132

ICSS2022-70
Improvement of Linear Approximations in Differential Linear Analysis of Stream Cipher ChaCha
Atsuki Nagai (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST)
pp. 133 - 138

ICSS2022-71
Expanding Underlying Number Fields Reducing from Module-LWE to Ring-LWE
Sosuke Funatsu, Atsuko Miyaji, Shinya Okumura (OU)
pp. 139 - 144

ICSS2022-72
On a Threshold Ring Signature Scheme for Generating Efficiently Sized Signatures
Ryunosuke Higashi, Yuta Maeno, Hideaki Miyaji, Atsuko Miyaji (OU)
pp. 145 - 150

ICSS2022-73
Port-aware IPv6 Scanning and Large-scale Security Surveys
Tatsuya Takemura, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama (NTT)
pp. 151 - 156

ICSS2022-74
Discussion about Privacy-aware Anonymization of Traffic Logs for Malicious Activity Detection
Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.)
pp. 157 - 162

ICSS2022-75
Investigating Server Fingerprints and Their Identifiability in Onion Service
Yuuki Kimura, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ./Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.)
pp. 163 - 168

ICSS2022-76
An Empirical Study on Opting out of Internet-wide Scanning
Takahiro Kasama, Yukiko Endo, Masaki Kubo, Daisuke Inoue (NICT)
pp. 169 - 174

ICSS2022-77
Towards observation of online fraud exploiting multiple SNS
Yamato Kawaguchi (Yokohama National Univ.), Kazuki Takada (SecureBrain), Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 175 - 180

ICSS2022-78
Assessment Method for Persistent Malware Infection on IoT Devices
Shunki Soeda, Takahiro Inoue, Rui Tanabe, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
pp. 181 - 186

ICSS2022-79
An Edge Computing Platform based on Modular Architecture using Intel SGX and its Evaluation
Yuma Nishihira, Tomoya Suzuki, Takuya Ishibashi, Yoshio Kakizaki, Toshihiro Ohigashi (Tokai Univ.), Hidenobu Watanabe, Tohru Kondo, Reiji Aibara (Hiroshima Univ.)
pp. 187 - 192

ICSS2022-80
A Study of Security Control Schemes in Fog Computing Based on TPO Conditions
Yushi Hosokawa, Kanai Atushi, qian wu (Hosei Univ.), hatasima ryu (NTT), tanimoto sigeaki (ChibaTech Univ.)
pp. 193 - 198

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan