Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2019-03-07 13:55 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Period Analysis for Visualization of Industrial Network Hiroki Nagayama, Hu Bo, Kazunori Kamiya, Shingo Kashima, Masaki Tanikawa (NTT) ICSS2018-88 |
Since communications of the industrial network have strong periodicity, profiling the period of communications between d... [more] |
ICSS2018-88 pp.173-178 |
ICSS, IPSJ-SPT |
2019-03-07 14:20 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
How to build malware sandbox using real IoT devices Jia Xiong, Tatsuya Tamai, Kazuki Tamiya (Yokohama National Univ.), Satoshi Hara (Yokohama National Univ./Fujisoft), Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2018-69 |
In spite of their increasing importance in the battle against evolving IoT threats, construction of IoT malware sandboxe... [more] |
ICSS2018-69 pp.7-12 |
ICSS, IPSJ-SPT |
2019-03-07 14:45 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Discrimination of IoT devices by clustering their responses to network scan Takuya Hoizumi, Shin Nishida, Keisuke Uchida, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
[more] |
|
ICSS, IPSJ-SPT |
2019-03-07 13:30 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
A Method for Realizing Traceability of Security Requirements for Information Systems deployed in Public Cloud using GSN Ryo Hase, Yohei Matsuura (Mitsubishi Electric) ICSS2018-70 |
Public clouds have gained much attention due to flexible computing resources provided by cloud vendors for rapid develop... [more] |
ICSS2018-70 pp.13-18 |
ICSS, IPSJ-SPT |
2019-03-07 13:55 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Regulatory Compliance Monitoring on the Web Using Paragraph Vector Mitsuharu Sasaki (NTT EAST), Taishi Nishiyama, Atsutoshi Kumagai, Kazunori Kamiya (NTT) ICSS2018-71 |
There are a certain number of employees who violate regulatory compliance by non-malicious acts. Since their violation m... [more] |
ICSS2018-71 pp.19-24 |
ICSS, IPSJ-SPT |
2019-03-07 14:20 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
On Improvement of a White-box Cryptographic Scheme Masakazu Soshi (Hiroshima City Univ.) ICSS2018-72 |
White-box cryptography provides a method to conceal a secret key embedded in a hardware device for encryption even if an... [more] |
ICSS2018-72 pp.25-27 |
ICSS, IPSJ-SPT |
2019-03-07 14:45 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Implementation and evaluation of aggregate message authentication method Atsuhiro Yamagishi (JDC), Tatsuya Takehisa, Eiichi Nishiura (NISSIN), Shouichi Hirose, Yu Imamura (JDC), Kazuhiko Minematsu (nec), Junji Shikata, Koji Nakao (YNU) ICSS2018-73 |
[more] |
ICSS2018-73 pp.29-33 |
ICSS, IPSJ-SPT |
2019-03-07 15:25 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
A User Participation Type Web Security Platform and Its Real World Evaluation Akira Yamada, Yukiko Sawaya, Takashi Matsunaka, Shoma Tanaka, Ayumu Kubota (KDDI Research) ICSS2018-74 |
A User Participation Type Web Security Platform and Its Real World [more] |
ICSS2018-74 pp.35-40 |
ICSS, IPSJ-SPT |
2019-03-07 15:50 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
An experiment design of security notification to users of IoT devices through dedicated client software Shin Nishida, Takuya Hoizumi, Keisuke Uchida, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2018-75 |
Notification of vulnerability and malware infection of IoT devices to the stakeholders is becoming increasingly importan... [more] |
ICSS2018-75 pp.41-46 |
ICSS, IPSJ-SPT |
2019-03-07 16:15 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Analyzing Deceptive Internationalized Domain Names Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide (NTT), Yuta Sawabe, Shigeki Goto (Waseda Univ.), Mitsuaki Akiyama (NTT) ICSS2018-76 |
Internationalized domain names (IDNs) are abused to create domain names visually similar to those of legitimate brands. ... [more] |
ICSS2018-76 pp.47-52 |
ICSS, IPSJ-SPT |
2019-03-07 16:40 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Web Application Identification Method Applicable to Large-scale Flow Data Using a Small-scale Labeled Data Shun Tobiyama, Shohei Araki, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT), Kenji Takahashi (NTT Security) ICSS2018-77 |
[more] |
ICSS2018-77 pp.53-58 |
ICSS, IPSJ-SPT |
2019-03-08 10:00 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
ICSS2018-78 |
[more] |
ICSS2018-78 pp.89-94 |
ICSS, IPSJ-SPT |
2019-03-08 10:25 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
ICSS2018-79 |
[more] |
ICSS2018-79 pp.95-100 |
ICSS, IPSJ-SPT |
2019-03-08 10:50 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
ICSS2018-80 |
(To be available after the conference date) [more] |
ICSS2018-80 pp.101-104 |
ICSS, IPSJ-SPT |
2019-03-08 11:15 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Threat Information Analysis Using Conditional Generative Adversarial Network Keisuke Furumoto, Hideaki Kanehara, Takeshi Takahashi (NICT), Yoshiaki Shiraishi (Kobe Univ.), Daisuke Inoue (NICT) ICSS2018-81 |
[more] |
ICSS2018-81 pp.105-110 |
ICSS, IPSJ-SPT |
2019-03-08 13:00 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
A proposal of detection method of singed malicious program Hiroyuki Sakakibara, Kiyoto Kawauchi (Mitsubishi Electric) ICSS2018-82 |
[more] |
ICSS2018-82 pp.139-144 |
ICSS, IPSJ-SPT |
2019-03-08 13:25 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Proposal of a Non-Technical Skills Map for Computer Security Incident Responses Takahiro Kasama, Shingo Yasuda, Hironobu Satoh (NICT), Masaki Kamizono, Emi Kojima (PwC), Takao Yamaguchi, Kazuharu Nara (JAMSS) ICSS2018-90 |
[more] |
ICSS2018-90 pp.185-190 |
ICSS, IPSJ-SPT |
2019-03-08 13:50 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Report on 35th Chaos Computer Congress(35C3) Keisuke Kito (Mitsubishi Electric) ICSS2018-83 |
[more] |
ICSS2018-83 pp.145-148 |
ICSS, IPSJ-SPT |
2019-03-08 13:00 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Authentication with hash chain computation model Shinta Hirai, Masakazu Soshi (Hiroshima City Univ.) ICSS2018-84 |
Due to the spread of IoT devices, the number of devices restricted by memory etc. has increased.
In order to securely ... [more] |
ICSS2018-84 pp.149-153 |
ICSS, IPSJ-SPT |
2019-03-08 13:25 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
ICSS2018-85 |
(To be available after the conference date) [more] |
ICSS2018-85 pp.155-160 |