Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2017-11-20 13:30 |
Oita |
Beppu International Convention Center |
|
[more] |
|
ICSS |
2017-11-20 14:15 |
Oita |
Beppu International Convention Center |
[Invited Talk]
Case Study and Future Perspective on Security Assessment of Connected Car Masaki Kamizono (PwC) ICSS2017-38 |
Various cyber security threats and vulnerabilities are reported in accordance with the remarkable rise of the connected ... [more] |
ICSS2017-38 pp.1-4 |
ICSS |
2017-11-20 15:15 |
Oita |
Beppu International Convention Center |
Preliminary Evaluation on the Program Classification at the Processor Level using Machine Learning Ryotaro Kobayashi (Kogakuin Univ.), Hayate Takase, Genki Otani, Ren Ohmura (Toyohashi Univ. of Tech.), Masahiko Kato (Univ. of Nagasaki) ICSS2017-39 |
As use of IoT devices becomes widespread, a lot of things are connected to the Internet, and the convenience of everyday... [more] |
ICSS2017-39 pp.5-10 |
ICSS |
2017-11-20 15:40 |
Oita |
Beppu International Convention Center |
Educational Tools to Learn Concrete Control Measures Corresponding to Threats of Cyber Attacks Tan Omiya, Daisuke Miyamoto, Youki Kadobayashi (NAIST) ICSS2017-40 |
Recently, the threats of cyber attacks have increased. There is the need to understand information security measures to ... [more] |
ICSS2017-40 pp.11-16 |
ICSS |
2017-11-20 16:05 |
Oita |
Beppu International Convention Center |
* Emi Kojima (PwC), Kazuharu Nara (JAMSS), Masaki Kamizono (PwC) ICSS2017-41 |
(To be available after the conference date) [more] |
ICSS2017-41 pp.17-22 |
ICSS |
2017-11-21 09:30 |
Oita |
Beppu International Convention Center |
ICSS2017-42 |
[more] |
ICSS2017-42 pp.23-27 |
ICSS |
2017-11-21 09:55 |
Oita |
Beppu International Convention Center |
A Study on the Security of Dynamic Multi-Cast Key Distribution Protocol After Static Secret Keys Revealed Masahiro Matsui, Yuki Okano, Reo Yoshida, Tetsutaro Kobayashi (NTT) ICSS2017-43 |
The security that an adversary can not guess the exchanged key after static secret key leaking is called Post Compromise... [more] |
ICSS2017-43 pp.29-34 |
ICSS |
2017-11-21 10:20 |
Oita |
Beppu International Convention Center |
A note on the threat of malware infection for cryptographic functions in software implementation Dai Watanabe (Hitachi) ICSS2017-44 |
[more] |
ICSS2017-44 pp.35-40 |
ICSS |
2017-11-21 10:55 |
Oita |
Beppu International Convention Center |
Subspecies Classification for Malwares based on Visualization of Dynamic Analysis result Taiki Gouda, Korehito Kashiki, Keisuke Furumoto, Masakatu Morii (Kobe Univ.) ICSS2017-45 |
Along with the activation of malware infection activity, the appearance frequency of new subspecies also tends to increa... [more] |
ICSS2017-45 pp.41-45 |
ICSS |
2017-11-21 11:20 |
Oita |
Beppu International Convention Center |
A Study on the structure and Its Classification Naoya Nitta, Masakatu Morii (Kobe Univ.) ICSS2017-46 |
[more] |
ICSS2017-46 pp.47-51 |
ICSS |
2017-11-21 11:45 |
Oita |
Beppu International Convention Center |
A Study of Detecting Infected Hosts by Graph Analysis of DNS Server Logs Kazunori Kamiya, Ayako Hasegawa (SC-Lab.), Yuji Sekiya, Kazuya Okada (Univ. of Tokyo) ICSS2017-47 |
[more] |
ICSS2017-47 pp.53-58 |
ICSS |
2017-11-21 13:10 |
Oita |
Beppu International Convention Center |
Study of Traffic Analysis Method for Illegal Host Detection with Kmeans++ Taisuke Yamada, Masaki Inamura (Tokyo Denki Univ.) ICSS2017-48 |
With the development of the Internet, the number of devices connected to cyberspace is increasing. By being left untreat... [more] |
ICSS2017-48 pp.59-64 |
ICSS |
2017-11-21 13:35 |
Oita |
Beppu International Convention Center |
Development of verification tool for Whitelisting Intrusion Detection Method Teruyoshi Yamaguchi, Takeshi Asai, Hideaki Ijiro, Tsunato Nakai, Koichi Shimizu, Nobuhiro Kobayashi, Kazuki Watanabe (Mitsubishi Electric) ICSS2017-49 |
[more] |
ICSS2017-49 pp.65-70 |
ICSS |
2017-11-21 14:00 |
Oita |
Beppu International Convention Center |
ICSS2017-50 |
[more] |
ICSS2017-50 pp.71-76 |