Online edition: ISSN 2432-6380
[TOP] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [2024] | [Japanese] / [English]
ICSS2024-69
DDoS attack detection by ensemble learning with dynamic layered structure depending on the complexity of the dataset
Tomoya Nishina, Masakazu Soshi (HCU)
pp. 1 - 7
ICSS2024-70
Lightweight DDoS attack classification model considering communication protocols
Hayate Sudo, Masakazu Soshi (HCU)
pp. 8 - 14
ICSS2024-71
Long-term Analysis of DoS Attack Commands in Multiple Mirai Variants
Yuki Umemura (NICT/Kobe Univ.), Masaki Kubo, Takahiro Kasama (NICT), Yoshiaki Shiraishi (Kobe Univ.)
pp. 15 - 22
ICSS2024-72
Early Detection of Ports Exploited in DRDoS Attacks by Focusing on Reflector Discovery Scans
Ryuji Kurashige, Ryu Kuki (Yokohama National Univ.), Daisuke Makita (NICT), Takayuki Sasaki, Katsunari Yoshioka (Yokohama National Univ.)
pp. 23 - 30
ICSS2024-73
Proposal of an Attack Surface Analysis System Based on Firewall Rules Using LLM
Tomohiro Nagai, Yuki Yamanaka, Yasuhiro Teramoto, Tomoya Yamashita, Akio Shiga, Ryota Sato (NTT)
pp. 31 - 38
ICSS2024-74
Revaluation of BGP Hijacking Detection Method Applying BGP2Vec
Toru Suzuki, Akira Kanaoka (toho-u), Masayuki Okada (sun)
pp. 39 - 46
ICSS2024-75
Linking IoT Attacks to Cybercrime-as-a-Service Offerings Using LLM and DNS Data
Qingxin Mao (YNU), Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka (IAS/YNU)
pp. 47 - 54
ICSS2024-76
A Signature Generation System for IoT Malware Communications Using Large Language Models
Kazuma Shinomiya, Kazunori Kamiya, Yasuyuki Hamada, Kenji Takahashi (NTT)
pp. 55 - 62
ICSS2024-77
Investigation of Multiple Infections by Matching Large-scale Network Flow Data of ISP with Sinkhole Observation Data
Kosuke Murakami, Masataka Nakahara (KDDIR/KDDI), Takashi Matsunaka (KDDIR), Ayumu Kubota (KDDIR/KDDI)
pp. 63 - 70
ICSS2024-78
How to Win the Battle Within:Towards Remotely Neutralize IoT Malware to Defend Devices
Shun Ikeda (YNU), Rui Tanabe (YNU/Juntendo Univ), Katsunari Yoshioka (YNU)
pp. 71 - 77
ICSS2024-79
A Large-Scale Investigation of Security Risks in Medical IoT Devices
Kosuke Tanizaki (Kobe Univ./NICT), Keisuke Furumoto, Kohei Masumi, Takeshi Takahashi (NICT), Yoshiaki Shiraishi (Kobe Univ.)
pp. 78 - 83
ICSS2024-80
Large-Scale Analysis of Malicious Packages on PyPI Using LLM Agents
Takaaki Toda (Waseda University/RIKEN AIP), Takuro Wakai (Waseda University), Tatsuya Mori (Waseda University/NICT/RIKEN AIP)
pp. 84 - 91
ICSS2024-81
A Comprehensive Survey on Secure Practices for GitHub Actions
Yusuke Kubo (NTT Communications), Takuro Wakai (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT/RIKEN)
pp. 92 - 99
ICSS2024-82
Proposal of Software Dependency Management Methodology with Blockchain Utilizing SBOM
Shumpei Ikegami, Chisa Takano, Masaki Inamura (Hiroshima City Univ.)
pp. 100 - 106
ICSS2024-83
Checking Software Build Environment for Acceptable Differences from Master: A Consideration
Yoshitada Fujiwara, Satoshi Mimura, Tatsuya Takehisa, Daisuke Makita, Ryoichi Isawa, Takahiro Kasama (NICT)
pp. 107 - 112
ICSS2024-84
A Signature Generation Method for WebUIs of IoT Devices Using LLM
Kotoe Goya, Takayuki Sasaki, Katsunari Yoshioka (Yokohama National Univ.)
pp. 113 - 119
ICSS2024-85
Why Didn't the Security Notification Reach Users?
-- Lessons Learned from IoT Security Notification Experiment via Dedicated Agents --
Kohsuke Sekido, Akihito Takeuchi, Junnosuke Kushibiki (YNU), Tanaka Hidekazu, Shintaro Kawamura (NICT), Akira Fujita (NICT/YNU), Takayuki Sasaki, Katsunari Yoshioka (YNU)
pp. 120 - 127
ICSS2024-86
Towards Evaluating the Detection Accuracy of Internet-Wide Scanners for Frequently Exploited Vulnerabilities
Koudai Aoyama, Ruri Otsuka, Yinn Minn Pa pa, Katsunari Yoshioka (YNU)
pp. 128 - 135
ICSS2024-87
Investigation of OSS vulnerability fixes in IoT devices based on source code analysis
Momoka Kihara, Takayuki Sasaki (Yokohama National Univ.), Mitsuaki Akiyama (NTT), Katsunari Yoshioka (Yokohama National Univ.)
pp. 136 - 143
ICSS2024-88
Proposal for a provable multiple signature protocol with the ability to add signers
Katsuhiro Sato, Atsuko Miyajisuko (Osaka Univ)
pp. 144 - 153
ICSS2024-89
Proposal of an Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm
Kenjiro Hirose, Shinya Okumura, Atsuko Miyaji (Osaka Univ.)
pp. 154 - 161
ICSS2024-90
Bridging Theory and Experiment in ChaCha Linear Approximation Analysis: A More Accurate Bias Estimation
Atsuki Nagai, Atsuko Miyaji (Osaka Univ.)
pp. 162 - 169
ICSS2024-91
Feasibility Study on Machine Learning Applications for Privacy-Protected Image Data
Tomoshi Yagishita (Osaka Univ.), Pierre Boudvillain (IMT Nord Europe), Yuki Hyohdoh (Kochi University), Atsuko Miyaji (Osaka Univ.)
pp. 170 - 179
ICSS2024-92
Improvements to security guidelines for Tier 3 and below suppliers in the domestic automobile industry
Kang TaeSeok (IISEC)
pp. 180 - 187
ICSS2024-93
Proposal for Patch Application Decision Methods in Industrial Control Systems Utilizing Generative AI
Masashi Fukunaga (MELCO)
pp. 188 - 194
ICSS2024-94
Public and private cooperation in case of critical infrastructure service outage due to cyber-attacks
Yuya Yamada, Atsuhiro Goto (IISEC)
pp. 195 - 202
ICSS2024-95
Design and Evaluation of Identification Method for System Call-related Kernel Functions
Hiroki Kuzuno (Kobe Univ.), Toshihiro Yamauchi (Okayama Univ.)
pp. 203 - 210
ICSS2024-96
(See Japanese page.)
pp. 211 - 218
ICSS2024-97
(See Japanese page.)
pp. 219 - 226
ICSS2024-98
Proposal for Detection and Visualization Method of Vulnerability Fixes for Open Source Software Considering Dependencies
Tomohiko Yano (SECOM), Hiroki Kuzuno, Yoshiaki Shiraishi (Kobe Univ.)
pp. 227 - 234
ICSS2024-99
Proposal and Feasibility of a PKI-based Attribute Authentication Service Model in a Distributed Environment of Attribute Management and Certificate Issuance
Junichiro Hayata, Ryu Ishii, Tatsuya Nagai, Kenta Nomura, Tsunekazu Saito, Yuta Takata, Masaki Kamizono (DTCY)
pp. 235 - 242
ICSS2024-100
Sequences of Attribute Certificate Issuance with Anonymity and Its PoC by OpenSSL3.4.0
Ryu Ishii, Junichiro Hayata, Tatsuya Nagai, Kenta Nomura, Tsunekazu Saito, Yuta Takata, Masaki Kamizono (DTCY)
pp. 243 - 250
ICSS2024-101
Study toward a secure authentication flow for VC wallets using TEE
Takashi Yagawa (Univ. of Tsukuba), Naoki Higo, Arifumi Matsumoto (NTT), Hirotake Abe (Univ. of Tsukuba)
pp. 251 - 256
ICSS2024-102
Study on Man-in-the-Middle Attacks Abusing Power-Saving Mode and Authentication Vulnerabilities in Bluetooth
Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.)
pp. 257 - 264
ICSS2024-103
Empirical Study on Spoofing Primitive Objects in Virtual Reality Environments
Mayu Fujita, Shodai Kurasaki, Akira Kanaoka (Toho Univ.)
pp. 265 - 272
ICSS2024-104
Towards Safety Evaluations of Theory of Mind in Large Language Models
Tatsuhiro Aoshima, Mitsuaki Akiyama (NTT)
pp. 273 - 280
ICSS2024-105
A Security Evaluation Framework for V2X Communication in Autonomous Driving System
Kodai Hirai, Yuna Tanaka (Waseda Univ.), Kazuki Nomoto (Waseda Univ./DTCY), Ryunosuke Kobayashi, Go Tsuruoka (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT/RIKEN)
pp. 281 - 288
ICSS2024-106
Evaluation of Threats and Impacts of HD Map Tampering Attacks in Autonomous Driving
Miyu Sato, Ryunosuke Kobayashi (Waseda Univ.), Kazuki Nomoto (Waseda Univ./DTCY), Yuna Tanaka, Go Tsuruoka (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT/AIP)
pp. 289 - 296
ICSS2024-107
Evaluation and Defense of Malicious SIM Applet Memory Exhaustion Attack
Rei Sakomoto, Ryusei Watanabe, Takahiro Matsuki (NFLabs.)
pp. 297 - 305
ICSS2024-108
High-Performance Static Analysis for Identifying Hardcoded Security Risks in Android Apps
Akira Kanaoka (Toho Univ.)
pp. 306 - 312
ICSS2024-109
Study of Directed Greybox Fuzzing using Reinforcement Learning
Ryuichi Yoshizawa (Wasesa Univ.), Tatsuya Mori (Wasesa Univ./NICT/RIKEN AIP)
pp. 313 - 320
ICSS2024-110
Evaluation of Deployment Strategies for Active Directory Deception Techniques Using CyberBattleSim
Akihiko Nakajima, Takao Okubo (IISEC)
pp. 321 - 329
ICSS2024-111
STARDUST NxgGen
-- The next generation of infrastructure for observing human-operated cyber attacks --
Nobuyuki Kanaya, Etsuko Suzuki, Ohnori Nakamura, Shigeru Sato, Kohei Kawahara, Shohei Hiruta, Yuki Umemura, Masaki Kubo, Takahiro Kasama (NICT)
pp. 330 - 337
ICSS2024-112
Evaluating the Classification Accuracy of an LLM for Sandbox Evasion Proof-of-Concept Code
Yukihiro Higashi, Hikaru Matsuzawa (YOKOHAMA National Univ.), Rui Tanabe (YOKOHAMA National Univ./Juntendo Univ.), Yin Minn Pa Pa, Katsunari Yoshioka (YOKOHAMA National Univ.)
pp. 338 - 343
ICSS2024-113
Improved malware code interpretation with GPT-4
Yasuyuki Tanaka, Wataru Matsuda, Takeshi Nakatsuru (NTT)
pp. 344 - 351
ICSS2024-114
Evaluation of the Impact of Dataset Annotation Rules and MSF on Adversarial Attacks against LiDAR Object Detection
Ryunosuke Kobayashi (Waseda Univ.), Kazuki Nomoto (Waseda Univ./DTCY), Yuna Tanaka, Go Tsuruoka (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT/RIKEN AIP)
pp. 352 - 358
ICSS2024-115
Generating Adversarial Training Data for Specific Malware Evasion Using Reinforcement Learning with High-Dimensional Features and Continuous Action Space
Shota Kiba (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.)
pp. 359 - 366
ICSS2024-116
Analyzing the Impact in Availability Attacks to LightGBM Based NIDS with Poisoning Attack Data Adding Perturbations by GA
Yusha Yazici (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.)
pp. 367 - 374
ICSS2024-117
Data Generation Model for Evasion of Fraud Detection in Financial Transactions
Akitaka Tsujita, Hiroaki Inoue (Kobe U), Chaw thetzan, Yusuke Maruyama (EAGLYS), Seiichi Ozawa (Kobe U)
pp. 375 - 382
ICSS2024-118
Collecting Infrequently Accessed but Trustworthy Domain Names
Daiki Chiba, Hiroki Nakano, Takashi Koide (NTT Security Holdings/NTT)
pp. 383 - 390
ICSS2024-119
Text-based Human Intelligence Gathering Framework
-- Legal and Ethical Considerations and the Application of LLMs --
Suzuki Ryosuke, Yin Minn Pa Pa (YNU), Yamaoka Hiroaki (Yakumo Law Office/YNU), Yoshioka Katsunari (YNU)
pp. 391 - 398
ICSS2024-120
Discovery and Analysis of Cybercrime-Related Telegram Channels using the Similar Channel Recommendation Feature
Riku Aoto, Yin Minn Pa Pa, Katsunari Yoshioka (YNU)
pp. 399 - 406
ICSS2024-121
Performance Comparison of Machine Learning Models for Output Prediction Attacks and Their Interpretability
Hayato Watanabe (Tokai Univ/NICT), Ryoma Ito (NICT), Toshihiro Ohigashi (Tokai Univ/NICT)
pp. 407 - 414
ICSS2024-122
Security Analysis of Proton Key Transparency Exploited via Catch-All Addresses
Kaito Naito, Hayato Kimura, Shogo Shiraki, Takanori Isobe (UoH)
pp. 415 - 422
ICSS2024-123
Design of Key Scheduling Function for Block Cipher Midori128 Resistant to Differential Attacks under Related-Key Assumptions
Shion Hirao, Kazuma Nakata, Takanori Isobe (UOH)
pp. 423 - 430
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.