IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information and Communication System Security (ICSS)  (Searched in: 2017)

Search Results: Keywords 'from:2018-03-07 to:2018-03-07'

[Go to Official ICSS Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 36  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2018-03-07
13:00
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center A Study on Malware Activity Detection Based on Real-time Analysis of Darknet Data Using Graphical Lasso
Chansu Han (Kyushu Univ.), Jumpei Shimamura (Clwit Inc.), Takeshi Takahashi, Daisuke Inoue (NICT), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT) ICSS2017-51
In this study, we considered a method to detect malignant activity (especially botnet) in cyber space automatically and ... [more] ICSS2017-51
pp.1-6
ICSS, IPSJ-SPT 2018-03-07
13:25
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Combining Local and Global Graph-based Features for Stealth Scan Detection on LAN
Hiroki Nagayama, Bo HU, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2017-52
In recent years, the increase of unknown malware is remarkable and it is difficult to prevent malware infiltration by 10... [more] ICSS2017-52
pp.7-12
ICSS, IPSJ-SPT 2018-03-07
13:50
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Malware Detection by Anomaly of Traffic Data for IoT Devices
Kana Sakano, Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2017-53
(To be available after the conference date) [more] ICSS2017-53
pp.13-18
ICSS, IPSJ-SPT 2018-03-07
14:15
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Modeling Worm Propagation using Dynamic Patching
Sugitani Yuki, Francois Bonnet, Miyaji Atsuko (Osaka Univ.) ICSS2017-54
Computer worms have been plaa big threat on the Internet these days.In order to prevent the worm propagation efficiently... [more] ICSS2017-54
pp.19-24
ICSS, IPSJ-SPT 2018-03-07
13:00
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center On the effectiveness of solving ECDLP using Characteristic set methods
Tomoya Nishiguchi, Chen Mou, Kenta kodera, Atuko Miyaji (Osaka Univ.) ICSS2017-55
An elliptic curves cryptosystem is cryptography which guarantee safety in public key cryptosystem.When we use index calc... [more] ICSS2017-55
pp.25-30
ICSS, IPSJ-SPT 2018-03-07
13:25
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Application of Multi-Party Private Set-Intersection
Motoi Hayashi, Katsunari Shishido, Atsuko Miyaji (Osaka Univ.) ICSS2017-56
Multi-party set operation is important for the utilization of big data distributed and stored in various organizations. ... [more] ICSS2017-56
pp.31-36
ICSS, IPSJ-SPT 2018-03-07
13:50
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center An analysis of the Guo-Johansson-Stankovski attack against QC-MDPC codes
Yohei Maezawa, Tung Chou, Atsuko Miyaji (Osaka Univ,) ICSS2017-57
In ASIACRYPT 2016, the Guo-Johansson-Stankovski (GJS) attack appears as a key-recovery attack against code--based encryp... [more] ICSS2017-57
pp.37-42
ICSS, IPSJ-SPT 2018-03-07
14:50
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center A study of decentralized IoT Security Controller
Iifan Tyou, Hiroki Nagayama, Takuya Saeki, Yukio Nagafuchi, Masaki Tanikawa (NTT) ICSS2017-58
With the spread of IoT devices, IoT security management has become important to network administrators. It is hard to im... [more] ICSS2017-58
pp.43-48
ICSS, IPSJ-SPT 2018-03-07
15:15
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center A study of security requirements and function implementation for home networks in a period of IoT expansion
Shingo Kashima, Tsuyoshi Kondoh, Tetsuhiko Murata, Masami Ueno (NTT) ICSS2017-59
We discuss the security requirements in the home networks in a period of IoT expansion. Based on the security requiremen... [more] ICSS2017-59
pp.49-54
ICSS, IPSJ-SPT 2018-03-07
15:40
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center A Preliminary Study on Defining Malignant Activity by Linking in-System Elements
Takuya Koike (IISEC), Miyuu Okubo (IRI), Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2017-60
In recent years, cyber-attacks have become large-scale and complicated, and the impact on society continues to become in... [more] ICSS2017-60
pp.55-60
ICSS, IPSJ-SPT 2018-03-07
16:05
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center The spread and the containment of virus in random network model
Taichi Nishino, Francois Bonnet, Atsuko Miyaji (Osaka Univ.) ICSS2017-61
 [more] ICSS2017-61
pp.61-66
ICSS, IPSJ-SPT 2018-03-07
14:50
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Safety evaluation of stream cipher, Salsa20/ChaCha20 by redesign of diffusion
Yusuke Matsuoka, Atsuko Miyaji (Osaka Univ.) ICSS2017-62
As of April 2016, in newly proposed TLS1.3, as encryption methods of symmetric key encryption scheme, AES in the block e... [more] ICSS2017-62
pp.67-72
ICSS, IPSJ-SPT 2018-03-07
15:15
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Evaluation of HIBE based on Universal Sampler
Shunsuke Otsuka, Akinori Kawachi, Atsuko Miyaji (Osaka Univ.) ICSS2017-63
In a system that participants use common parameters, the setup has to be executed honestly since a
corrupt setup includ... [more]
ICSS2017-63
pp.73-78
ICSS, IPSJ-SPT 2018-03-07
15:40
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center ICSS2017-64  [more] ICSS2017-64
pp.79-84
ICSS, IPSJ-SPT 2018-03-08
09:20
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Estimate of Malicious Web Sites Based on Users' Web Access Behavior and Destination AS Numbers
Kosuke Murakami, Jumpei Urakawa, Akira Yamada, Ayumu Kubota (KDDI Research) ICSS2017-65
 [more] ICSS2017-65
pp.85-90
ICSS, IPSJ-SPT 2018-03-08
09:45
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Automatically Collecting User-initiated Web-based Attacks
Takashi Koide, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT) ICSS2017-66
Recently, web content uses social engineering techniques to lure victims into clicking on them, originating malware down... [more] ICSS2017-66
pp.91-96
ICSS, IPSJ-SPT 2018-03-08
10:10
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center An Empirical Analysis of Online Advertising Fraud by analyzing User Activities Observed in the Ad Network
Fumihiro Kanei, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT) ICSS2017-67
With the growth of online advertising market, it has become the target of abuse, such as ad fraud by adware and bots. To... [more] ICSS2017-67
pp.97-102
ICSS, IPSJ-SPT 2018-03-08
10:35
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Darkweb Analysis System by Combining HSDir's Snooping and Active Scanning
Akito Ono (Ritsumeikan Univ.), Masaki Kamizono (PwC Cyber Services), Takahiro Kasama (NICT), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2017-68
 [more] ICSS2017-68
pp.103-108
ICSS, IPSJ-SPT 2018-03-08
09:20
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Considering Opcode-based Similarity between IoT Malware Samples
Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2017-69
In this paper, we generate a similarity matrix between IoT (Internet of Things) malware samples based on their disassemb... [more] ICSS2017-69
pp.109-114
ICSS, IPSJ-SPT 2018-03-08
09:45
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Evaluation of malware sandbox using evasive test samples
Kou Ishii, Wateru Ueno, Rui Tanabe (Yokohama National Univ.), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
 [more]
 Results 1 - 20 of 36  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan