IEICE Technical Report

Online edition: ISSN 2432-6380

Volume 123, Number 448

Information and Communication System Security

Workshop Date : 2024-03-21 - 2024-03-22 / Issue Date : 2024-03-14

[PREV] [NEXT]

[TOP] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [2024] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ICSS2023-69
A comprehensive investigation of forgery attack on the Nostr protocol
Hayato Kimura (Univ. Hyogo), Ryoma Ito (NICT), Kazuhiko Minematsu (NEC), Takanori Isobe (Univ. Hyogo)
pp. 1 - 8

ICSS2023-70
Analyzing Attackers and Victims Actions via LockBit3.0 Website Data Dynamics
Yuji Sekine, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
pp. 9 - 16

ICSS2023-71
Security Analysis on End-to-End Encryption of Zoom Mail
Shogo Shiraki, Takanori Isobe (Univ.Hyogo)
pp. 17 - 24

ICSS2023-72
Unveiling the Shadows: Analyzing Cryptocurrency Address Management and Fund Movement of Darknet Markets
Aiman Syazwan Bin Abdul Razak, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
pp. 25 - 32

ICSS2023-73
A certain classification of trust services
Yuji Suga (IIJ)
pp. 33 - 35

ICSS2023-74
(See Japanese page.)
pp. 36 - 42

ICSS2023-75
(See Japanese page.)
pp. 43 - 50

ICSS2023-76
Investigating the functionalities of IoT malware to disrupt the activities of other intruders
Shun Ikeda, Hiroki Yasui, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
pp. 51 - 56

ICSS2023-77
Enhanced Analysis of IoT Botnet Activity by Fusing Honeypots, Malware Dynamic Analysis, and C&C Observation
Yuki Endo, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
pp. 57 - 62

ICSS2023-78
One Million Routers Under Control: Vulnerabilities in DDNS of IoT Devices
Kanta Okugawa (Ritsumei/NICT), Yoshiki Mori, Masaki Kubo, Takahiro Kasama (NICT), Koichi Mouri (Ritsumei), Daisuke Inoue (NICT)
pp. 63 - 70

ICSS2023-79
Considerations on Differential Privacy Mechanisms in MNIST
Naoki Kawahara, Pengxuan Wei, Ryunosuke Higashi, Kenta Okada, Tatsuhiro Yamatsuki, Atsuko Miyaji (Osaka Univ.)
pp. 71 - 78

ICSS2023-80
A poisoning-resilient LDP schema using oblivious transfer and Hadamard transform
Masahiro Shimizu, Hiroaki Kikuchi (Meiji Univ.)
pp. 79 - 86

ICSS2023-81
An Examination of Privacy-Aware Malicious Activity Detection Methods Using NII-SOCS Benchmark Data
Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.)
pp. 87 - 92

ICSS2023-82
Proposal of Moving Target Defense Approach on Reliability in Web Services
Mamoru Saita (Keio Univ.), Shunsuke Hashimoto (Univ. of Hyogo), Atsuo Inomata (Osaka Univ.), Hiroyuki Inoue (Kyoto Sangyo Univ.)
pp. 93 - 99

ICSS2023-83
A Method for Detecting Mirai Botnet Groups and Their C2 Servers Using Flow Data Collected in Large-Scale Network
Kosuke Murakami, Masataka Nakahara, Ayumu Kubota (KDDIR/KDDI)
pp. 100 - 107

ICSS2023-84
Design and Evaluation of Restricted Kernel Page to Mitigate Kernel Memory Corruption
Hiroki Kuzuno (Kobe Univ.), Toshihiro Yamauchi (Okayama Univ.)
pp. 108 - 115

ICSS2023-85
Prototyping of MPEG-DASH Player that Validates and Provides Content Provenance
Takumi Mouri, Satoshi Nishimura, Go Ohtake (NHK)
pp. 116 - 122

ICSS2023-86
Study of keyword-based search method for IoT devices deployed at important facilities
Mami Kawaguchi, Takayuki Sasaki, Kihara Momoka, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
pp. 123 - 128

ICSS2023-87
Improved signature-embedding techniques against backdoor attacks on DNN models
Akira Fujimoto, Yuntao Wang, Atsuko Miyaji (OU)
pp. 129 - 136

ICSS2023-88
Evaluation of Feature Inference Risk from Explainable AI metrics LIME and Shapley Values
Ryotaro Toma, Hiroaki Kikuchi (Meiji Univ.)
pp. 137 - 144

ICSS2023-89
Impact of ChatGPT Assisted Polymorphic Malware on Antivirus Detection
Huang Zhewei, Yinn Minn Pa pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
pp. 145 - 152

ICSS2023-90
Study of the Label-Flipping Poisoning Attack on Machine-Learning Based Malicious URL Query Detection.
Akira Matsunami (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.)
pp. 153 - 159

ICSS2023-91
Open Secrets of GPTs
Yusuke Kubo (NTT Communications), Tomoaki Tani (NTT Security), Ryusei Watanabe (N.F.Laboratories/Waseda Univ), Takuro Wakai, Yuto Toshikawa (Waseda Univ.), Tatsuya Mori (Waseda Univ. /NICT/ RIKEN)
pp. 160 - 165

ICSS2023-92
Discovery of a Vulnerable Structure of SIMON Variants
Hayato Watanabe (Tokai Univ.), Ryoma Ito (NICT), Toshihiro Ohigashi (Tokai Univ.)
pp. 166 - 173

ICSS2023-93
Development of an Outsourcing Password Evaluation System using Intel SGX
Takeki Kitayama, Yuma Nishihira (Tokai Univ.), Akira Kanaoka (Toho Univ.), Yoshio Kakizaki, Toshihiro Ohigashi (Tokai Univ.)
pp. 174 - 179

ICSS2023-94
Fast and Secure Scalar Multiplication for the GLS254 Binary Elliptic Curve
Ryosuke Kido, Atsuko Miyaji (OU)
pp. 180 - 187

ICSS2023-95
Extension of the linear approximation for stream cipher ChaCha
Yurie Okada, Atsuko Miyaji (OU)
pp. 188 - 193

ICSS2023-96
A Search Method for Fake QR Codes Suitable for Long-Distance Attack Using Laser Irradiation
Dai Itakura, Taiga Manabe, Yuki Kamata, Ayana Oku, Hiroshi Yamamoto, Yoshihisa Takayama, Toshihiro Ohigashi (Tokai Univ.)
pp. 194 - 200

ICSS2023-97
Adversarial Examples with Missing Perturbation Using Laser Irradiation
Daisuke Kosuge, Hayato Watanabe, Taiga Manabe, Yoshihisa Takayama, Toshihiro Ohigashi (Tokai Univ.)
pp. 201 - 207

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan