Mon, Mar 7 PM 12:50 - 14:10 |
(1) ICSS |
12:50-13:10 |
am I infected? A New Web Service to Inspect End Users' IoT Devices for Malware Infection and Vulnerabilities |
Songwei He, Takaya Noma, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
(2) ICSS |
13:10-13:30 |
A Method for Identifying IoT Devices Using Features from WebUI Contents and Images |
Kosuke Murakami (NICT/KDDI), Takahiro Kasama, Akira Fujita (NICT), Jumpei Urakawa (KDS), Daisuke Inoue (NICT) |
(3) ICSS |
13:30-13:50 |
Time Efficient Risk Assessment Tool for IoT Systems |
Rajulapati Shourya, Takashi Kawauchi (Hitachi) |
(4) ICSS |
13:50-14:10 |
Internet-wide discovery of IoT devices deployed at important facilities |
Mizuki Hiraku, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ) |
|
14:10-14:40 |
Break ( 30 min. ) |
Mon, Mar 7 PM 12:50 - 14:30 |
(5) |
12:50-13:10 |
|
(6) |
13:10-13:30 |
|
(7) |
13:30-13:50 |
|
(8) |
13:50-14:10 |
|
(9) ICSS |
14:10-14:30 |
Proposal and consideration of internal fraud model by signaling game |
Junki Yuasa (Nagoya Univ.), Hiroki Kashiwazaki (NII) |
|
14:30-14:40 |
Break ( 10 min. ) |
Mon, Mar 7 PM 14:40 - 15:40 |
(10) ICSS |
14:40-15:00 |
Efficient Construction of Hash Trees over P2P systems |
Soma Ishihara, Masakazu Soshi (Hiroshima City Univ.) |
(11) ICSS |
15:00-15:20 |
|
|
(12) ICSS |
15:20-15:40 |
Evaluation of Detection System of DNS Cache Poisoning Using Blockchain Technology |
Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) |
|
15:40-15:50 |
Break ( 10 min. ) |
Mon, Mar 7 PM 14:40 - 15:40 |
(13) |
14:40-15:00 |
|
(14) ICSS |
15:00-15:20 |
Identification of website users using browser fingerprinting and network packet |
Takashi Tsukazaki, Yuichi Futa (TUT), Taku Yazawa (Dotexp) |
(15) |
15:20-15:40 |
|
|
15:40-15:50 |
Break ( 10 min. ) |
Mon, Mar 7 PM 15:50 - 16:30 |
(16) |
15:50-16:30 |
|
Tue, Mar 8 AM 10:00 - 11:40 |
(17) ICSS |
10:00-10:20 |
Input predictive attack by keyboard acoustic emanations using BERT and its countermeasures |
Masahiro Iida (Teikyo Univ.), Mitsuaki Akiyama (NTT), Masaki Kamizono (DTCY), Takahiro Kasama (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Kyoto Sangyo Univ.), Atsuo Inomata (Osaka Univ.) |
(18) ICSS |
10:20-10:40 |
Development of validation system for stack unwinding information according to the AArch64 calling convention |
Tetsuhiro Kawaguchi, Yuki Takano, Atsuko Miyaji (Osaka Univ.) |
(19) ICSS |
10:40-11:00 |
A Study on Self Destructive Tamper Resistant Software utilizing Return-Oriented Programming (Part 2) |
Kazuomi Oishi (SIST) |
(20) ICSS |
11:00-11:20 |
A study of new cyber attacks for fast charging of electric vehicle |
Hiroki Nagayama, Masahiro Shiraishi, Yukio Nagafuchi, Asami Miyajima (NTT) |
(21) ICSS |
11:20-11:40 |
A Method for Content Rights Succession and Editing Control Extended to Multi-dimensional Mesh Structures |
Shinjiro Izumi (TUS), Masaki Inamura (Hiroshima City Univ.), Keiichi Iwamura (TUS) |
|
11:40-13:00 |
Break ( 80 min. ) |
Tue, Mar 8 AM 10:00 - 11:00 |
(22) |
10:00-10:20 |
|
(23) |
10:20-10:40 |
|
(24) ICSS |
10:40-11:00 |
DOM-Based XSS Prevention Support System for Developers Using Abstract Syntax Tree Analysis |
Takashi Nakahara, Syuta Ide, Tatsuya Maeda, Yusuke Hata, Takashi Kobayashi (Kansai Univ.) |
|
11:00-13:00 |
Lunch Break ( 120 min. ) |
Tue, Mar 8 PM 13:00 - 14:40 |
(25) ICSS |
13:00-13:20 |
Remote-Control System for Securing IoT Devices |
Masaru Takeuchi (JDC), Yohei Watanabe (UEC/ジャパンデータコム), Naoto Yanai (OU/ジャパンデータコム), Tatsuya Takehisa (Nisshin), Junji Shikata (YNU), Koji Nakao (NICT) |
(26) ICSS |
13:20-13:40 |
Analyzing network status of IoT malware by dynamic analysis with bare-metal device |
Kota Ogawa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
(27) ICSS |
13:40-14:00 |
ML-based detection of C&C communications for sandbox analysis of IoT malware |
Yuki Endo, Kaichi Sameshima, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
(28) ICSS |
14:00-14:20 |
|
|
(29) ICSS |
14:20-14:40 |
Behavior Analysis of IoT Malware Using Function Call Sequence Graphs and Clustering |
Satoshi Takada, Tianxiang He (Kyushu Univ), Chansu Han, Akira Tanaka (NICT), Jun'ichi Takeuchi (Kyushu Univ) |
|
14:40-14:50 |
Break ( 10 min. ) |
Tue, Mar 8 PM 13:00 - 14:00 |
(30) |
13:00-13:20 |
|
(31) |
13:20-13:40 |
|
(32) ICSS |
13:40-14:00 |
A study of a decentralized reputation-based trust evaluation system |
Iifan Tyou (NTT), Takahito Tanabe, Akinori Matsuo (msi) |
|
14:00-14:50 |
Break ( 50 min. ) |
Tue, Mar 8 PM 14:50 - 15:50 |
(33) ICSS |
14:50-15:10 |
On Extension of scalable local differential privacy |
Tatsuhiro Yamatsuki, Atsuko Miyaji (Osaka Univ.), Tomoaki Mimoto (Osaka Univ./ATR) |
(34) ICSS |
15:10-15:30 |
Proposal of a lattice-based accumulator with efficient update function |
Yuta Maeno, Hideaki Miyaji, Atsuko Miyaji (Osaka Univ) |
(35) ICSS |
15:30-15:50 |
Secure Computation Using Secret Sharing Scheme that can be Configured on a Single Server and is Safe from Malicious Adversaries and Cheaters in the TTP |
Keiichi Iwamura, Ryoya Kudo (TUS), Masaki Inamura (Hiroshima City Univ.) |
Tue, Mar 8 PM 14:50 - 15:50 |
(36) |
14:50-15:10 |
|
(37) ICSS |
15:10-15:30 |
Simulation of security notification by ISP to malware-infected users |
Xuping Huang (AIIT/YNU), Shunsuke Mochizuki (NTT Data Mathematical Systems Inc), Akira Fujita (NICT/YNU), Katsunari Yoshioka (YNU) |
(38) ICSS |
15:30-15:50 |
Verifying concept of personalized malware by investigating end-user environments |
Daigo Ichikawa, Rui Tanabe, XU Haoyuan, Yoshioka Katsunari, Matsumoto Tsutomu (YNU) |