Mon, Mar 13 PM 12:30 - 14:10 |
(1) |
12:30-12:50 |
|
(2) |
12:50-13:10 |
|
(3) |
13:10-13:30 |
|
(4) |
13:30-13:50 |
|
(5) |
13:50-14:10 |
|
|
14:10-14:20 |
Break ( 10 min. ) |
Mon, Mar 13 PM 12:30 - 13:50 |
(6) ICSS |
12:30-12:50 |
Developing a Hand Gesture Recognition System for VR Devices |
Mei Suzuki, Ryo Iijima, Kazuki Nomoto (Waseda Univ.), Tetsushi Ohki (Shizuoka Univ./AIP), Tatsuya Mori (Waseda Univ./NICT/AIP) |
(7) ICSS |
12:50-13:10 |
Dynamic Fake QR Code using Invisible Laser Irradiation |
Yuki Kamata, Shuya Kawaguchi, Toshihiro Ohigashi, Yoshihisa Takayama (Tokai Univ.) |
(8) ICSS |
13:10-13:30 |
sEMG-based Gesture Authentication for Smartwatch |
Akihisa Watanabe, Ryo Iijima, Tatsuya Mori (Waseda Univ.,) |
(9) ICSS |
13:30-13:50 |
Basic Study on IoT Security Using Robot Arm |
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) |
|
13:50-14:00 |
Break ( 10 min. ) |
Mon, Mar 13 PM 14:20 - 16:00 |
(10) ICSS |
14:20-14:40 |
Dynamic Analysis of Adversarial Attacks |
Kentaro Goto (JPNIC), Masato Uchida (Waseda Univ.) |
(11) ICSS |
14:40-15:00 |
Consideration of a Packet Level Anomaly Communication Classification Model Using Word Embedding and LSTM |
Yoshikatsu Kashiwabara, Kohei Miyamoto, Iida Masazumi, Shota Kawanaka (Kyushu Univ), Han Chansu, Ban Tao, Kenshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ) |
(12) ICSS |
15:00-15:20 |
Disabling Adversarial Examples through Color Conversion using CMYK Defense Model |
Ryo Soeda, Masato Uchida (Waseda Univ.) |
(13) ICSS |
15:20-15:40 |
Multimodal Feature Integration Toward High-Accuracy Network Intrusion Detection |
Masazumi Iida, Kohei Miyamoto, Yoshinari Takeishi, Shota Kawanaka (Kyushu Univ.), Chansu Han, Tao Ban, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.) |
(14) ICSS |
15:40-16:00 |
Generating Attack Trace Dataset Focusing on Attack Techniques and the Damage Caused by Each. |
Masahito Kumazaki, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) |
|
16:00-16:10 |
Break ( 10 min. ) |
Mon, Mar 13 PM 14:20 - 16:00 |
(15) ICSS |
14:20-14:40 |
A Study of Security Control Schemes in Fog Computing Based on TPO Conditions |
Yushi Hosokawa, Kanai Atushi, qian wu (Hosei Univ.), hatasima ryu (NTT), tanimoto sigeaki (ChibaTech Univ.) |
(16) ICSS |
14:40-15:00 |
Preservation Techniques of Fileless Attack Artifacts using Customized PowerShell |
Masahito Kimura (Ritsumeikan Univ.), Chris Liu (DTCY), Tetsutaro Uehara (Ritsumeikan Univ.) |
(17) ICSS |
15:00-15:20 |
|
|
(18) ICSS |
15:20-15:40 |
|
|
(19) ICSS |
15:40-16:00 |
Proposal and evaluation of visualization method for understanding security risks based on software dependencies |
Tomohiko Yano (SECOM), Hiroki Kuzuno (Kobe Univ.) |
|
16:00-16:10 |
Break ( 10 min. ) |
Mon, Mar 13 PM 16:10 - 18:10 |
(20) ICSS |
16:10-16:30 |
Evaluation of Copy Protection Technology Using Web Font |
Kazuki Nomoto (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT/RIKEN AIP) |
(21) ICSS |
16:30-16:50 |
Evaluation and countermeasures of notification destination restoration attacks using password recovery functions of multiple web services |
Ryusei Ishikawa, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ., Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.) |
(22) ICSS |
16:50-17:10 |
An Analysis of the Risk of Unauthorized Access to the WebUI of IoT Devices |
Kosuke Murakami (NICT/KDDIR), Takahiro Kasama, Daisuke Inoue (NICT) |
(23) ICSS |
17:10-17:30 |
A Study on Effectiveness of Malware Infection Notification based on Role-playing Type Survey |
Akira Fujita, Misato Matsuda, Takahiro Kasama, Daisuke Inoue (NICT) |
(24) ICSS |
17:30-17:50 |
Lessons Learned from Construction of the Security Technical Term Dictionary |
Misato Matsuda, Akira Fujita, Yu Tsuda, piyokango, Daisuke Inoue (NICT) |
(25) ICSS |
17:50-18:10 |
URL Warning List Creation and Manage Methods using VirusTotal and Web Access Log |
Kyohei Takao, Chika Hiraishi (YNU), Kazuki Takada (SecureBrain), Akira Fujita, Daisuke Inoue (NICT), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
Mon, Mar 13 PM 16:10 - 18:10 |
(26) ICSS |
16:10-16:30 |
Implementation and Evaluation for Remote-Control Security System of IoT Devices |
Masaru Takeuchi (JDC), Yohei Watanabe (UEC/JDC), Naoto Yanai (OU/JDC), Akira Takeuchi (JDC), Tatsuya Takehisa (Nisshin), Yukitoshi Sanada (KU/JDC), Junji Shikata (YNU), Koji Nakao (NICT) |
(27) ICSS |
16:30-16:50 |
A Study on Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities |
Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) |
(28) ICSS |
16:50-17:10 |
New linear approximation and improved bias of ChaCha in differential linear analysis |
Ryo Watanabe (Osaka Univ..), Atsuko Miyaji (Osaka Univ./JAIST) |
(29) ICSS |
17:10-17:30 |
Improvement of Linear Approximations in Differential Linear Analysis of Stream Cipher ChaCha |
Atsuki Nagai (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) |
(30) ICSS |
17:30-17:50 |
Expanding Underlying Number Fields Reducing from Module-LWE to Ring-LWE |
Sosuke Funatsu, Atsuko Miyaji, Shinya Okumura (OU) |
(31) ICSS |
17:50-18:10 |
On a Threshold Ring Signature Scheme for Generating Efficiently Sized Signatures |
Ryunosuke Higashi, Yuta Maeno, Hideaki Miyaji, Atsuko Miyaji (OU) |
Tue, Mar 14 AM 10:30 - 11:50 |
(32) |
10:30-10:50 |
|
(33) |
10:50-11:10 |
|
(34) |
11:10-11:30 |
|
(35) |
11:30-11:50 |
|
|
11:50-13:10 |
Lunch Break ( 80 min. ) |
Tue, Mar 14 AM 10:30 - 11:50 |
(36) ICSS |
10:30-10:50 |
Port-aware IPv6 Scanning and Large-scale Security Surveys |
Tatsuya Takemura, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama (NTT) |
(37) ICSS |
10:50-11:10 |
Discussion about Privacy-aware Anonymization of Traffic Logs for Malicious Activity Detection |
Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) |
(38) ICSS |
11:10-11:30 |
Investigating Server Fingerprints and Their Identifiability in Onion Service |
Yuuki Kimura, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ./Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.) |
(39) ICSS |
11:30-11:50 |
An Empirical Study on Opting out of Internet-wide Scanning |
Takahiro Kasama, Yukiko Endo, Masaki Kubo, Daisuke Inoue (NICT) |
|
11:50-13:10 |
Lunch Break ( 80 min. ) |
Tue, Mar 14 PM 13:10 - 14:30 |
(40) |
13:10-13:30 |
|
(41) |
13:30-13:50 |
|
(42) |
13:50-14:10 |
|
(43) |
14:10-14:30 |
|
|
14:30-14:40 |
Break ( 10 min. ) |
Tue, Mar 14 PM 13:10 - 14:10 |
(44) ICSS |
13:10-13:30 |
Towards observation of online fraud exploiting multiple SNS |
Yamato Kawaguchi (Yokohama National Univ.), Kazuki Takada (SecureBrain), Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
(45) ICSS |
13:30-13:50 |
Assessment Method for Persistent Malware Infection on IoT Devices |
Shunki Soeda, Takahiro Inoue, Rui Tanabe, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
(46) ICSS |
13:50-14:10 |
An Edge Computing Platform based on Modular Architecture using Intel SGX and its Evaluation |
Yuma Nishihira, Tomoya Suzuki, Takuya Ishibashi, Yoshio Kakizaki, Toshihiro Ohigashi (Tokai Univ.), Hidenobu Watanabe, Tohru Kondo, Reiji Aibara (Hiroshima Univ.) |
|
14:10-14:20 |
Break ( 10 min. ) |
Tue, Mar 14 PM 14:40 - 16:00 |
(47) |
14:40-15:20 |
|
(48) |
15:20-16:00 |
|