Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2021-11-29 13:00 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Current status, issues, and research trends of user authentication in mobile networks Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) ICSS2021-46 |
We will report on the current status of 5G, issues to be examined for Beyond 5G / 6G, research trends, etc. regarding se... [more] |
ICSS2021-46 pp.1-6 |
ICSS |
2021-11-29 13:25 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
A Study on Tamper Resistance of Trusted Execution Environment Kazuomi Oishi (SIST) ICSS2021-47 |
A Trusted Execution Environment (TEE) provides isolated execution inside a TEE from the outside. The outside environment... [more] |
ICSS2021-47 pp.7-12 |
ICSS |
2021-11-29 13:50 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Automation of Security Vulnerability Analysis by Auto-generated DFD Shun Miyazaki, Junpei Kamimura (NEC) ICSS2021-48 |
System vulnerabilities can be caused by bugs such as buffer overflow, misconfigurations such as improper permission cont... [more] |
ICSS2021-48 pp.13-18 |
ICSS |
2021-11-29 14:15 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Ring Signature scheme based on prime-order bilinear group Masato Uehara, Tian Yangguang, Atsuko Miyaji (OU) ICSS2021-49 |
Among the Ring Signature schemes that satisfy Forward-Secure security, the most efficient scheme is Joseph K. Liu et al.... [more] |
ICSS2021-49 pp.19-24 |
ICSS |
2021-11-29 15:00 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Design and Implementation of a Session Types-based Secure Communication Protocol for Processes Xiaolong, Yuuki Takano, Atsuko Miyaji (OU) ICSS2021-50 |
For inter-process communication, the type and order of data to be passed must be specified in advance from the viewpoint... [more] |
ICSS2021-50 pp.25-30 |
ICSS |
2021-11-29 15:25 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Masquerade Detection using command log of Honeypot Ryusei Higuchi, Hideya Ochiai, Hiroshi Esaki (UTokyo) ICSS2021-51 |
A masquerade attack is an attack in which an attacker impersonates a legitimate user and invades the system. In order to... [more] |
ICSS2021-51 pp.31-36 |
ICSS |
2021-11-29 15:50 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
A SDN-based Honeypot System: Attracting Suspicious Traffic in Local Area Networks Koki Ito, Hideya Ochiai, Esaki Hiroshi (The Univ. of Tokyo) ICSS2021-52 |
With the increasing informatization of society, attacks via networks are increasing and diversifying, and the need for s... [more] |
ICSS2021-52 pp.37-42 |
ICSS |
2021-11-29 16:15 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Automating the collection of malware behavior captured by honeypots Eisuke Tomiyama, Hideya Ochiai, Hiroshi Esaki (UTokyo) ICSS2021-53 |
A honeypot is a system that exposes vulnerable systems to cyber attacks on the Internet. They are used to analyze the at... [more] |
ICSS2021-53 pp.43-48 |
ICSS |
2021-11-30 09:30 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Real-time detection of Distributed Slow HTTP DoS attacks using communication analysis Koki Tamura, Yuichi Futa (TUT), Tomomichi Suzuki (PitApp) ICSS2021-54 |
At ICSS in this March, we proposed a detection method of Slow HTTP DoS Attacks with
distinguishment between communicat... [more] |
ICSS2021-54 pp.49-54 |
ICSS |
2021-11-30 09:55 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Comparison of CNN padding method using a part of malware API call sequence data with RNN. Shugo Asai, Yuichi Futa (TUT) ICSS2021-55 |
In recent years, as society has become more information-oriented, malware for information has been increasing. In such a... [more] |
ICSS2021-55 pp.55-60 |
ICSS |
2021-11-30 10:20 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Monitoring IPv6 packets by dynamic routing in a LAN configured with IPv4 Yuki Yagi, Hideya Ochiai, Hiroshi Esaki (the Univ. of Tokyo) ICSS2021-56 |
With IPv4 address exhaustion, the transition to IPv6 has been progressing in recent years, but the security measures for... [more] |
ICSS2021-56 pp.61-66 |
ICSS |
2021-11-30 10:45 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Detection of spoofing attacks in RS-485/Modbus communication by non-contact current measurement Tatsuya Arisawa, Hideya Ochiai, Hiroshi Esaki (Tokyo Univ.) ICSS2021-57 |
[more] |
ICSS2021-57 pp.67-72 |