IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information and Communication System Security (ICSS)  (Searched in: 2021)

Search Results: Keywords 'from:2021-11-29 to:2021-11-29'

[Go to Official ICSS Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 12 of 12  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2021-11-29
13:00
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Current status, issues, and research trends of user authentication in mobile networks
Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) ICSS2021-46
We will report on the current status of 5G, issues to be examined for Beyond 5G / 6G, research trends, etc. regarding se... [more] ICSS2021-46
pp.1-6
ICSS 2021-11-29
13:25
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
A Study on Tamper Resistance of Trusted Execution Environment
Kazuomi Oishi (SIST) ICSS2021-47
A Trusted Execution Environment (TEE) provides isolated execution inside a TEE from the outside. The outside environment... [more] ICSS2021-47
pp.7-12
ICSS 2021-11-29
13:50
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Automation of Security Vulnerability Analysis by Auto-generated DFD
Shun Miyazaki, Junpei Kamimura (NEC) ICSS2021-48
System vulnerabilities can be caused by bugs such as buffer overflow, misconfigurations such as improper permission cont... [more] ICSS2021-48
pp.13-18
ICSS 2021-11-29
14:15
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Ring Signature scheme based on prime-order bilinear group
Masato Uehara, Tian Yangguang, Atsuko Miyaji (OU) ICSS2021-49
Among the Ring Signature schemes that satisfy Forward-Secure security, the most efficient scheme is Joseph K. Liu et al.... [more] ICSS2021-49
pp.19-24
ICSS 2021-11-29
15:00
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Design and Implementation of a Session Types-based Secure Communication Protocol for Processes
Xiaolong, Yuuki Takano, Atsuko Miyaji (OU) ICSS2021-50
For inter-process communication, the type and order of data to be passed must be specified in advance from the viewpoint... [more] ICSS2021-50
pp.25-30
ICSS 2021-11-29
15:25
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Masquerade Detection using command log of Honeypot
Ryusei Higuchi, Hideya Ochiai, Hiroshi Esaki (UTokyo) ICSS2021-51
A masquerade attack is an attack in which an attacker impersonates a legitimate user and invades the system. In order to... [more] ICSS2021-51
pp.31-36
ICSS 2021-11-29
15:50
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
A SDN-based Honeypot System: Attracting Suspicious Traffic in Local Area Networks
Koki Ito, Hideya Ochiai, Esaki Hiroshi (The Univ. of Tokyo) ICSS2021-52
With the increasing informatization of society, attacks via networks are increasing and diversifying, and the need for s... [more] ICSS2021-52
pp.37-42
ICSS 2021-11-29
16:15
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Automating the collection of malware behavior captured by honeypots
Eisuke Tomiyama, Hideya Ochiai, Hiroshi Esaki (UTokyo) ICSS2021-53
A honeypot is a system that exposes vulnerable systems to cyber attacks on the Internet. They are used to analyze the at... [more] ICSS2021-53
pp.43-48
ICSS 2021-11-30
09:30
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Real-time detection of Distributed Slow HTTP DoS attacks using communication analysis
Koki Tamura, Yuichi Futa (TUT), Tomomichi Suzuki (PitApp) ICSS2021-54
At ICSS in this March, we proposed a detection method of Slow HTTP DoS Attacks with
distinguishment between communicat... [more]
ICSS2021-54
pp.49-54
ICSS 2021-11-30
09:55
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Comparison of CNN padding method using a part of malware API call sequence data with RNN.
Shugo Asai, Yuichi Futa (TUT) ICSS2021-55
In recent years, as society has become more information-oriented, malware for information has been increasing. In such a... [more] ICSS2021-55
pp.55-60
ICSS 2021-11-30
10:20
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Monitoring IPv6 packets by dynamic routing in a LAN configured with IPv4
Yuki Yagi, Hideya Ochiai, Hiroshi Esaki (the Univ. of Tokyo) ICSS2021-56
With IPv4 address exhaustion, the transition to IPv6 has been progressing in recent years, but the security measures for... [more] ICSS2021-56
pp.61-66
ICSS 2021-11-30
10:45
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Detection of spoofing attacks in RS-485/Modbus communication by non-contact current measurement
Tatsuya Arisawa, Hideya Ochiai, Hiroshi Esaki (Tokyo Univ.) ICSS2021-57
 [more] ICSS2021-57
pp.67-72
 Results 1 - 12 of 12  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan