Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2018-03-07 13:00 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
A Study on Malware Activity Detection Based on Real-time Analysis of Darknet Data Using Graphical Lasso Chansu Han (Kyushu Univ.), Jumpei Shimamura (Clwit Inc.), Takeshi Takahashi, Daisuke Inoue (NICT), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT) ICSS2017-51 |
In this study, we considered a method to detect malignant activity (especially botnet) in cyber space automatically and ... [more] |
ICSS2017-51 pp.1-6 |
ICSS, IPSJ-SPT |
2018-03-07 13:25 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Combining Local and Global Graph-based Features for Stealth Scan Detection on LAN Hiroki Nagayama, Bo HU, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2017-52 |
In recent years, the increase of unknown malware is remarkable and it is difficult to prevent malware infiltration by 10... [more] |
ICSS2017-52 pp.7-12 |
ICSS, IPSJ-SPT |
2018-03-07 13:50 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Malware Detection by Anomaly of Traffic Data for IoT Devices Kana Sakano, Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2017-53 |
(To be available after the conference date) [more] |
ICSS2017-53 pp.13-18 |
ICSS, IPSJ-SPT |
2018-03-07 14:15 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Modeling Worm Propagation using Dynamic Patching Sugitani Yuki, Francois Bonnet, Miyaji Atsuko (Osaka Univ.) ICSS2017-54 |
Computer worms have been plaa big threat on the Internet these days.In order to prevent the worm propagation efficiently... [more] |
ICSS2017-54 pp.19-24 |
ICSS, IPSJ-SPT |
2018-03-07 13:00 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
On the effectiveness of solving ECDLP using Characteristic set methods Tomoya Nishiguchi, Chen Mou, Kenta kodera, Atuko Miyaji (Osaka Univ.) ICSS2017-55 |
An elliptic curves cryptosystem is cryptography which guarantee safety in public key cryptosystem.When we use index calc... [more] |
ICSS2017-55 pp.25-30 |
ICSS, IPSJ-SPT |
2018-03-07 13:25 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Application of Multi-Party Private Set-Intersection Motoi Hayashi, Katsunari Shishido, Atsuko Miyaji (Osaka Univ.) ICSS2017-56 |
Multi-party set operation is important for the utilization of big data distributed and stored in various organizations. ... [more] |
ICSS2017-56 pp.31-36 |
ICSS, IPSJ-SPT |
2018-03-07 13:50 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
An analysis of the Guo-Johansson-Stankovski attack against QC-MDPC codes Yohei Maezawa, Tung Chou, Atsuko Miyaji (Osaka Univ,) ICSS2017-57 |
In ASIACRYPT 2016, the Guo-Johansson-Stankovski (GJS) attack appears as a key-recovery attack against code--based encryp... [more] |
ICSS2017-57 pp.37-42 |
ICSS, IPSJ-SPT |
2018-03-07 14:50 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
A study of decentralized IoT Security Controller Iifan Tyou, Hiroki Nagayama, Takuya Saeki, Yukio Nagafuchi, Masaki Tanikawa (NTT) ICSS2017-58 |
With the spread of IoT devices, IoT security management has become important to network administrators. It is hard to im... [more] |
ICSS2017-58 pp.43-48 |
ICSS, IPSJ-SPT |
2018-03-07 15:15 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
A study of security requirements and function implementation for home networks in a period of IoT expansion Shingo Kashima, Tsuyoshi Kondoh, Tetsuhiko Murata, Masami Ueno (NTT) ICSS2017-59 |
We discuss the security requirements in the home networks in a period of IoT expansion. Based on the security requiremen... [more] |
ICSS2017-59 pp.49-54 |
ICSS, IPSJ-SPT |
2018-03-07 15:40 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
A Preliminary Study on Defining Malignant Activity by Linking in-System Elements Takuya Koike (IISEC), Miyuu Okubo (IRI), Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2017-60 |
In recent years, cyber-attacks have become large-scale and complicated, and the impact on society continues to become in... [more] |
ICSS2017-60 pp.55-60 |
ICSS, IPSJ-SPT |
2018-03-07 16:05 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
The spread and the containment of virus in random network model Taichi Nishino, Francois Bonnet, Atsuko Miyaji (Osaka Univ.) ICSS2017-61 |
[more] |
ICSS2017-61 pp.61-66 |
ICSS, IPSJ-SPT |
2018-03-07 14:50 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Safety evaluation of stream cipher, Salsa20/ChaCha20 by redesign of diffusion Yusuke Matsuoka, Atsuko Miyaji (Osaka Univ.) ICSS2017-62 |
As of April 2016, in newly proposed TLS1.3, as encryption methods of symmetric key encryption scheme, AES in the block e... [more] |
ICSS2017-62 pp.67-72 |
ICSS, IPSJ-SPT |
2018-03-07 15:15 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Evaluation of HIBE based on Universal Sampler Shunsuke Otsuka, Akinori Kawachi, Atsuko Miyaji (Osaka Univ.) ICSS2017-63 |
In a system that participants use common parameters, the setup has to be executed honestly since a
corrupt setup includ... [more] |
ICSS2017-63 pp.73-78 |
ICSS, IPSJ-SPT |
2018-03-07 15:40 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
ICSS2017-64 |
[more] |
ICSS2017-64 pp.79-84 |
ICSS, IPSJ-SPT |
2018-03-08 09:20 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Estimate of Malicious Web Sites Based on Users' Web Access Behavior and Destination AS Numbers Kosuke Murakami, Jumpei Urakawa, Akira Yamada, Ayumu Kubota (KDDI Research) ICSS2017-65 |
[more] |
ICSS2017-65 pp.85-90 |
ICSS, IPSJ-SPT |
2018-03-08 09:45 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Automatically Collecting User-initiated Web-based Attacks Takashi Koide, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT) ICSS2017-66 |
Recently, web content uses social engineering techniques to lure victims into clicking on them, originating malware down... [more] |
ICSS2017-66 pp.91-96 |
ICSS, IPSJ-SPT |
2018-03-08 10:10 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
An Empirical Analysis of Online Advertising Fraud by analyzing User Activities Observed in the Ad Network Fumihiro Kanei, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT) ICSS2017-67 |
With the growth of online advertising market, it has become the target of abuse, such as ad fraud by adware and bots. To... [more] |
ICSS2017-67 pp.97-102 |
ICSS, IPSJ-SPT |
2018-03-08 10:35 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Darkweb Analysis System by Combining HSDir's Snooping and Active Scanning Akito Ono (Ritsumeikan Univ.), Masaki Kamizono (PwC Cyber Services), Takahiro Kasama (NICT), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2017-68 |
[more] |
ICSS2017-68 pp.103-108 |
ICSS, IPSJ-SPT |
2018-03-08 09:20 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Considering Opcode-based Similarity between IoT Malware Samples Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2017-69 |
In this paper, we generate a similarity matrix between IoT (Internet of Things) malware samples based on their disassemb... [more] |
ICSS2017-69 pp.109-114 |
ICSS, IPSJ-SPT |
2018-03-08 09:45 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Evaluation of malware sandbox using evasive test samples Kou Ishii, Wateru Ueno, Rui Tanabe (Yokohama National Univ.), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
[more] |
|