Wed, Nov 21 PM 13:00 - 13:50 |
(1) |
13:00-13:25 |
Development of remote LAN monitoring system |
Katsuya Matsuoka, Masaya Mizutani, Hideya Ochiai, Hiroshi Esaki (UT) |
(2) |
13:25-13:50 |
Investigation of Security-Related Factors of Satisfactions in Internet Services |
Yukiko Sawaya, Akira Yamada, Ayumu Kubota (KDDI Research) |
Wed, Nov 21 PM 13:50 - 14:30 |
(3) |
13:50-14:30 |
[Invited Talk]
Advanced R&D Required at the Leading Edge of Cybersecurity |
Takeshi Yagi (NTT Security Japan) |
|
14:30-14:50 |
Break ( 20 min. ) |
Wed, Nov 21 PM 14:50 - 16:05 |
(4) |
14:50-15:15 |
Spoofed Website Detection using Machine Learning |
Naoki Kurihara, Hidenori Tsuji, Masaki Hashimoto (Institute of Information Security) |
(5) |
15:15-15:40 |
Malware Analysis Method Using Conditional Generative Adversarial Network |
Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) |
(6) |
15:40-16:05 |
|
|
Wed, Nov 21 PM 16:05 - 16:45 |
(7) |
16:05-16:45 |
[Invited Talk]
Security Countermeasure at ShowNet in Interop Tokyo 2018 |
Kenichiro Hashimoto (Lastline), Masato Jingu (NICT), Takashi Tomine (lepidum) |
Thu, Nov 22 AM 10:00 - 11:15 |
(8) |
10:00-10:25 |
|
|
(9) |
10:25-10:50 |
|
|
(10) |
10:50-11:15 |
Identification Scheme Based on the Binary Syndrome Decoding Problem Using High Density Parity Check Codes |
Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) |
Thu, Nov 22 AM 11:15 - 11:55 |
(11) |
11:15-11:55 |
[Invited Talk]
An Overview of Cyber Security for Connected Vehicles |
Junko Takahashi (NTT) |
Thu, Nov 22 PM 13:30 - 15:10 |
(12) |
13:30-13:55 |
|
|
(13) |
13:55-14:20 |
|
|
(14) |
14:20-14:45 |
Part II: Calculating Similarity between IoT Malware over CPU Architectures |
Ryoichi Isawa, Tao Ban (NICT), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) |
(15) |
14:45-15:10 |
|
|