IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Internet Architecture (IA)  (Searched in: 2010)

Search Results: Keywords 'from:2010-06-17 to:2010-06-17'

[Go to Official IA Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 16 of 16  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA, ICSS 2010-06-17
13:05
Kyoto Academic Center for Computing and Media Studies, Kyoto University Visualizing Gumblar infected machines by Analysis of Network Traffic
Hirokazu Kaneko, Takahiro Matsuki, Yuu Arai (LAC) IA2010-1 ICSS2010-1
Recently, the cyber attack accomplishes evolution more and more, and stealing information by using various techniques. I... [more] IA2010-1 ICSS2010-1
pp.1-6
IA, ICSS 2010-06-17
13:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University A data screening technique for network log data by frequent sequential pattern mining
Hisashi Tsuruta, Takayoshi Shoudai, Jun'ichi Takeuchi (Kyushu Univ./ISIT) IA2010-2 ICSS2010-2
To early detect and defend the threats in the Internet caused by botnet,
darknet monitoring is very important to unders... [more]
IA2010-2 ICSS2010-2
pp.7-12
IA, ICSS 2010-06-17
13:55
Kyoto Academic Center for Computing and Media Studies, Kyoto University Automatic OEP Finding Method for Malware Unpacking
Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT) IA2010-3 ICSS2010-3
Malware analysts have to first extract hidden original code from a packed executable to analyze malware functionalities,... [more] IA2010-3 ICSS2010-3
pp.13-18
IA, ICSS 2010-06-17
14:20
Kyoto Academic Center for Computing and Media Studies, Kyoto University How to Identify Code Region after Detecting Entry Point of Malware
Makoto Iwamura, Mitsutaka Itoh (NTT/Waseda Univ.), Yoichi Muraoka (Waseda Univ.) IA2010-4 ICSS2010-4
The goal of many existing methods for unpacking was finding OEP (Original Entry Point), not identifying where the origin... [more] IA2010-4 ICSS2010-4
pp.19-24
IA, ICSS 2010-06-17
14:55
Kyoto Academic Center for Computing and Media Studies, Kyoto University Anonymous Communication Protocol for Encouraging to Report Problems in Social Groups and Its Evaluation using Game Theory
Kohei Sugiyama, Masaki Fukushima, Teruyuki Hasegawa (KDDI Labs.) IA2010-5 ICSS2010-5
In this paper, we propose an anonymous communication protocol for encouraging to report problems in social groups. The p... [more] IA2010-5 ICSS2010-5
pp.25-30
IA, ICSS 2010-06-17
15:20
Kyoto Academic Center for Computing and Media Studies, Kyoto University Proposal and Consideration for An Anonymity Method for Widespred High-Speed Incident Analysis System(II)
Ryoichi Isawa (CRYPTO), Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO), Koji Nakao (NICT) IA2010-6 ICSS2010-6
Some organizations need to collaborate each other to analyze the computer security incidents which become complex. The n... [more] IA2010-6 ICSS2010-6
pp.31-36
IA, ICSS 2010-06-17
15:45
Kyoto Academic Center for Computing and Media Studies, Kyoto University Implementation and its Evaluation of A Secure One-Time Passoword Method against the Stolen-Verifier Attack
Tatsuya Takehisa (JDC), Ryoichi Isawa (Crypto), Masakatu Morii (Kobe Univ.) IA2010-7 ICSS2010-7
The ssh is widely used for the construction of the secure communication channel, and the authentic method based on publi... [more] IA2010-7 ICSS2010-7
pp.37-42
IA, ICSS 2010-06-17
16:10
Kyoto Academic Center for Computing and Media Studies, Kyoto University iAuth: Yet Another HTTP Authentication Framework Integrated into HTML Forms
Takeru Inoue, Yohei Katayama, Hiroshi Sato, Noriyuki Takahashi (NTT) IA2010-8 ICSS2010-8
Current Web authentication methods have their own issues. Forms and cookies, which is most commonly used, has a long-st... [more] IA2010-8 ICSS2010-8
pp.43-48
IA, ICSS 2010-06-17
16:45
Kyoto Academic Center for Computing and Media Studies, Kyoto University [Invited Talk] *
Hiromitsu Takagi (AIST)
 [more]
IA, ICSS 2010-06-18
10:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University Scalable and User-friendly Access Control Mechanism for Distirubted File System
Jumpei Arakawa, Koichi Sasada (Univ. of Tokyo.), Ikuo Takeuchi IA2010-9 ICSS2010-9
This paper describes our access control mechanism for distributed file
system. Capability-based access control mechanis... [more]
IA2010-9 ICSS2010-9
pp.49-54
IA, ICSS 2010-06-18
10:25
Kyoto Academic Center for Computing and Media Studies, Kyoto University A Vision of the Open Mobile Communication System with All Stratum Virtualization
Nao Kawanishi (ATR), Ahmad Kamil Abdul Hamid (The Univ. of Tokyo), Yoshimasa Miyamori, Atsushi Kusuda (ATR), Yoshihiro Kawahara (The Univ. of Tokyo), Masayoshi Ohashi (ATR), Tohru Asami (The Univ. of Tokyo) IA2010-10 ICSS2010-10
 [more] IA2010-10 ICSS2010-10
pp.55-59
IA, ICSS 2010-06-18
10:50
Kyoto Academic Center for Computing and Media Studies, Kyoto University A study on security threats to Android devices
Ei Shimamura, Masaya Yamagata (NEC) IA2010-11 ICSS2010-11
Due to the increase of non-business use introduced by iPhone and Android, the sales volume of smartphone devices, especi... [more] IA2010-11 ICSS2010-11
pp.61-66
IA, ICSS 2010-06-18
13:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University [Invited Talk] *
Itsuro Nishimoto (LAC) IA2010-12 ICSS2010-12
 [more] IA2010-12 ICSS2010-12
p.67
IA, ICSS 2010-06-18
13:55
Kyoto Academic Center for Computing and Media Studies, Kyoto University An Empirical Investigation of Gumblar Evolution
Mitsuaki Akiyama, Kazumichi Sato, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.) IA2010-13 ICSS2010-13
Due to incidents of web-based malware infection lead by a tampered web content, called Gumblar, clarification of
the ac... [more]
IA2010-13 ICSS2010-13
pp.69-74
IA, ICSS 2010-06-18
14:20
Kyoto Academic Center for Computing and Media Studies, Kyoto University A Life-cycle Monitoring Method of Malware Download Sites for Websites
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IA2010-14 ICSS2010-14
This paper proposes a method to monitor life-cycle of malware download sites for websites and reports the actual life-cy... [more] IA2010-14 ICSS2010-14
pp.75-80
IA, ICSS 2010-06-18
14:45
Kyoto Academic Center for Computing and Media Studies, Kyoto University Hard-wired Shellcode Detection Algorithm -- trial implementations on FPGA and ASIC --
Hiroki Nogawa, Fuminori Adachi, Yasumitsu Tsujino, Seiji Moriya, Kazunori Saito (Secureware) IA2010-15 ICSS2010-15
Shellcodes are essential parts of remote exploit, and display wide range of varieties (polymorphism). Many researchers h... [more] IA2010-15 ICSS2010-15
pp.81-86
 Results 1 - 16 of 16  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan