Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2013-03-25 10:20 |
Kanagawa |
Yokohama National University |
A Method to Identify the Writer's Birthday on a Blog article Masataka Kawahara, Atsushi Kanai (Hosei Univ.) ICSS2012-57 |
In recent years, personal information is unconsciously written in many cases because of the opportunity for an individua... [more] |
ICSS2012-57 pp.1-6 |
ICSS |
2013-03-25 10:45 |
Kanagawa |
Yokohama National University |
A STUDY ON QUANTIFYING THE DEGREE OF PERSONAL INFORMATION DISCLOSURE USING STATISTICAL DATA Maya Takizawa, Daiki Matsunaga, Atsushi Kanai (Hosei Univ.) ICSS2012-58 |
In recent years, people’s concern towards the protection of personal information is growing and many companies and unive... [more] |
ICSS2012-58 pp.7-12 |
ICSS |
2013-03-25 11:10 |
Kanagawa |
Yokohama National University |
Design and Implementation of Application Framework for Pairing-based Cryptography Takuya Ban (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) ICSS2012-59 |
Applications of pairing-based cryptography are searchable encryption, secure function evaluation and so on. To implement... [more] |
ICSS2012-59 pp.13-18 |
ICSS |
2013-03-25 11:35 |
Kanagawa |
Yokohama National University |
Partially Doubly-Encrypted ID-based Encryption and its Security Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) ICSS2012-60 |
In concealing files by common key encryption, a key used for the encryption must be shared safely between a sender and a... [more] |
ICSS2012-60 pp.19-24 |
ICSS |
2013-03-25 13:00 |
Kanagawa |
Yokohama National University |
Finding Malicious Authoritative DNS Servers Yin Minn Pa Pa, Daisuke Makita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2012-61 |
This study proposes an approach to find authoritative DNS servers that are heavily involved with
malicious online activ... [more] |
ICSS2012-61 pp.25-30 |
ICSS |
2013-03-25 13:25 |
Kanagawa |
Yokohama National University |
Observing DNS Communication of Android Malware using Sandbox Analysis Fumihiro Kanei, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2012-62 |
With the spread of smartphones in recent years, Android OS has become popular. On the other hand, malware targeting the ... [more] |
ICSS2012-62 pp.31-36 |
ICSS |
2013-03-25 13:50 |
Kanagawa |
Yokohama National University |
Packer Identification Based on Difference Execution Traces Between Input and Output Programs Pham Anh Phong, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2012-63 |
To prevent the analysis process, most of malware are compressed or encrypted by packer . We can support manual unpacking... [more] |
ICSS2012-63 pp.37-42 |
ICSS |
2013-03-25 14:30 |
Kanagawa |
Yokohama National University |
Possibility of Remote Exploits by Android Phones Hiroshi Mori, Fumihiro Kanei, Yuki Shoda, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2012-64 |
Recently, malware that run on Android OS are increasing. For now, a class of Android malware that leak information from ... [more] |
ICSS2012-64 pp.43-48 |
ICSS |
2013-03-25 14:55 |
Kanagawa |
Yokohama National University |
Network-based classification of remote exploit attacks focusing on UUID Yusuke Takahashi (Yokohama National Univ.), Masaki Kamizono, Yuji Hoshizawa (Securebrain), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2012-65 |
Remote exploit attacks, which target vulnerabilities of network services, is the class of most common attacks utilized i... [more] |
ICSS2012-65 pp.49-54 |
ICSS |
2013-03-25 15:30 |
Kanagawa |
Yokohama National University |
[Invited Talk]
PRACTICE - Proactive Response Against Cyber-attacks Through International Collaborative Exchange Katsunari Yoshioka (Yokohama National Univ.) ICSS2012-66 |
Proactive Response Against Cyber Attacks Through International Collaborative Exchange (PRACTICE) project aims at develop... [more] |
ICSS2012-66 p.55 |