Tue, Mar 3 PM 13:00 - 14:40 |
(1) |
13:00-13:25 |
A detection system which uses DNS traffic features to detect domains which are related to botnets |
Wataru Tsuda, Youki Kadobayashi, Takeshi Okuda, Hiroaki Hazeyama (NAIST) |
(2) |
13:25-13:50 |
Anomaly Detection Based on Clustering of Network Traffic Characteristics Considering Results of Signature Based IDS Evaluation |
Kohei Imai, Shigeki Aoki, Takao Miyamoto (Osaka Prefecture Univ.) |
(3) |
13:50-14:15 |
Measures to Prevent Cyber-Attack Using Multi-Layer-Binding (MLB) Router
-- A Proposal of Dropping Request Protocol, and its Implementation and Evaluation Using OpenFlow -- |
Ken Eguchi, Shota Nagatomo, Yuji Yokoyama, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno (Tokyo Denki Univ.), Hiroshi Kobayashi (Tokyo Denki Univ) |
(4) |
14:15-14:40 |
Implementation and Evaluation of Botnet Detection System with Temporal Locality of DGA |
Teppei Fukuda, Tomohiro Ishihara (UTokyo), Akira Kato (Keio Univ.) |
|
14:40-14:50 |
Break ( 10 min. ) |
Tue, Mar 3 PM 14:50 - 16:05 |
(5) |
14:50-15:15 |
A trial of network security tests over federated testbeds |
Masatoshi Enomoto, Hiroaki Hazeyama (NAIST), Kazumasa Kobayashi (KUSA), Suguru Yamaguchi (NAIST) |
(6) |
15:15-15:40 |
A Pluggable and Programmable Flamework for Analyzing Security Logs |
Yu Tsuda, Takashi Tomine, Masaki Kamizono, Masashi Eto, Daisuke Inoue (NICT) |
(7) |
15:40-16:05 |
A Study on the Effectiveness of Correlation Analysis of Cyber Attack Information by means of Tagging Technique |
Taichi Hata (JDC/Nissin), Manabu Inuma (Josai Univ.), Junji Shikata (Yokohama National Univ.), Shin Takeuchi (JDC/Nissin), Koji Nakao (NICT) |
|
16:05-16:15 |
Break ( 10 min. ) |
Tue, Mar 3 PM 16:15 - 17:30 |
(8) |
16:15-16:40 |
Link Structural Analysis of Drive-by-Download Attacks |
Yuji Dairiki (Kobe Univ.), Masaki Kamizono (SecureBrain), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) |
(9) |
16:40-17:05 |
Implementation and evaluation of Drive by Download Attack detection using the features of the obfuscation |
Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama (NAIST), Takuji Iimura (UT), Youki Kadobayashi (NAIST) |
(10) |
17:05-17:30 |
A Study on CAPTCHA System Using Differential Awkwardness-Objects |
Michitomo Yamguchi (Meiji Univ.), Takeshi Okamoto (Tsukuba Univ. of Tech.), Hiroaki Kikuchi (Meiji Univ.) |
|
17:30-17:40 |
Break ( 10 min. ) |
Tue, Mar 3 PM 17:40 - 18:20 |
(11) |
17:40-18:20 |
[Invited Talk]
Cyber Security Management |
Koji Nakao (NICT/KDDI) |
Wed, Mar 4 AM 09:00 - 10:15 |
(12) |
09:00-09:25 |
Novel USB Hub against the Malicious USB Devices |
Tatsuya Takehisa (NICT/Nissin), Makoto Iwamura (NICT/NTT), Hayato Ushimaru (NICT/CDI), Daisuke Inoue (NICT) |
(13) |
09:25-09:50 |
Yet Another Electrical Forgery Attack on CAN using Strong Recessive |
Takeshi Sugawara, Minoru Saeki, Manabu Misawa (Mitsubishi Electric Corp.) |
(14) |
09:50-10:15 |
A study on the safety of the pseudo-random number generator in RFID |
Hiroyuki Sato (JAIST), Atsuko Miyaji (JAIST/JST CREST), Chunhua Su (JAIST) |
Wed, Mar 4 AM 09:00 - 10:15 |
(15) |
09:00-09:25 |
A New Explicit Relation Between Trace, Definition Field, and Embedding Degree |
Atsuko Miyaji, Satoru Tanaka (JAIST) |
(16) |
09:25-09:50 |
Scalar Multiplication Algorithm with Resistance for Side-channel Attacks |
Keisuke Kito (JAIST), Atsuko Miyaji (JAIST/JST CREST), Ryota Takahashi (JAIST) |
(17) |
09:50-10:15 |
An Estimation of Signature Schemes for Multiple Signers |
Kenta Muranaka, Naoto Yanai (Osaka Univ.), Shingo Okamura (NITNC), Toru Fujiwara (Osaka Univ.) |
|
10:15-10:25 |
Break ( 10 min. ) |
Wed, Mar 4 AM 10:25 - 12:30 |
(18) |
10:25-10:50 |
Estimation of Vulnerability Score based on Annual Analysis with Supervised Latent Dirichlet Allocation |
Yasuhiro Yamamoto, Daisuke Miyamoto, Masaya Nakayama (Tokyo Univ.) |
(19) |
10:50-11:15 |
Prediction of Malware Activities based on Loopback Address from DNS |
Masaki Kamizono (NICT/SecureBrain), Takashi Tomine, Yu Tsuda, Masashi Eto (NICT), Yuji Hoshizawa (Securebrain Corporation), Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (ynu) |
(20) |
11:15-11:40 |
A Cyber Attack Information Gathering Method That Adopts Integrated Malware Detection Service and Dynamic Analysis |
Shuta Morishima, Takuya Tsutsumi, Rui Tanabe, Yusuke Takahashi, Masaaki Kobayashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
(21) |
11:40-12:05 |
Internet Alive Monitoring Method around Disaster Areas Using Large-scale Darknet, Autonomous System Information, and Geographical Information |
Mio Suzuki (NICT), Jumpei Shimamura (Clwit), Junji Nakazato, Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) |
(22) |
12:05-12:30 |
Finding Network Address Blocks Intensively Used for Cyber Attacks |
Takuya Tsutsumi, Shuta Morishima, Shogo Suzuki, Kenichi Shibahara, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
|
12:30-13:40 |
Lunch Break ( 70 min. ) |
Wed, Mar 4 AM 10:25 - 12:05 |
(23) |
10:25-10:50 |
Improving certificate validation function in SSL/TLS implementations of web browser |
Satoshi Kamekawa (JAIST), Atsuko Miyaji (JAIST/JST CREST), Yuichi Futa (JAIST) |
(24) |
10:50-11:15 |
New Linear Correlations and Analysis Method for Key Recovery Attack of RC4 in WPA |
Daiki Michihiro (JAIST), Atsuko Miyaji (JAIST/JST CREST), Ryoma Ito (JAIST) |
(25) |
11:15-11:40 |
A Multi-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme For Line Topology |
Hitoshi Miyazaki (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) |
(26) |
11:40-12:05 |
Consideration for Path Authentication for VANET with Group One-Way Cross-Networks |
Shoma Kitayama, Masakazu Soshi (Hiroshima City Univ.) |
|
12:05-13:40 |
Lunch Break ( 95 min. ) |
Wed, Mar 4 PM 13:40 - 14:55 |
(27) |
13:40-14:05 |
The Geographical Origin Estimation of Malware Using Language Information |
Masaru Kawakita, Shigeyoshi Shima (NEC) |
(28) |
14:05-14:30 |
Targeted Malware Detection Focused on Dummy Document Display |
Yusuke Takahashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
(29) |
14:30-14:55 |
Visualization of Various DoS Attacks Observed by Malware Sandbox Analysis |
Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
Wed, Mar 4 PM 13:40 - 14:55 |
(30) |
13:40-14:05 |
Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking |
Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) |
(31) |
14:05-14:30 |
A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function |
Koji Tomida (Nagoya Inst. of Tech.), Hiroshi Doi (IISEC), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) |
(32) |
14:30-14:55 |
Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data |
Takeru Naruse (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) |
|
14:55-15:05 |
Break ( 10 min. ) |
Wed, Mar 4 PM 15:05 - 16:20 |
(33) |
15:05-15:30 |
Understanding Android apps that are similar to legitimate ones |
Yuta Ishii, Takuya Watanabe (Waseda Univ.), Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.) |
(34) |
15:30-15:55 |
A Study on Risk Quantification Techniques for Android Applications with Category Information |
Takeshi Takahashi (NICT), Takao Mimura, Masata Nishida (SecureBrain), Koji Nakao (NICT) |
(35) |
15:55-16:20 |
Evaluation on Malware Classification by Combining Traffic Analysis and Fuzzy Hashing of Malware Binary |
Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) |
Wed, Mar 4 PM 15:05 - 16:20 |
(36) |
15:05-15:30 |
A Message authentication scheme with variable-length MAC |
Yumiko Murakami, Nobuhiro Kobayashi (MELCO) |
(37) |
15:30-15:55 |
Flexible Constructions of Hash Chains and Their Key Generation |
Shouki Nishiyama, Masakazu Soshi (Hiroshima City Univ.) |
(38) |
15:55-16:20 |
An Experimental Implementation of Self Destructive Tamper Resistant Software and Its Evaluation |
Kazuomi Oishi (SIST), Naoki Yoshida, Naoki Watanabe, Jun'ichi Sakamoto, Tsutomu Matsumoto (YNU) |