IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Information and Communication System Security (ICSS) [schedule] [select]
Chair Daisuke Inoue (NICT)
Vice Chair Keisuke Kito (Mitsubishi Electric), Toshihiro Yamauchi (Okayama Univ.)
Secretary Yo Kanemoto (NTT), Masaya Sato (Okayama Prefectural Univ.)
Assistant Ryoichi Izawa (NICT), Rui Tanabe (Juntendo Univ.)

Special Interest Group on Security Psychology and Trust (IPSJ-SPT) [schedule] [select]

Conference Date Thu, Mar 6, 2025 10:00 - 17:55
Fri, Mar 7, 2025 09:30 - 17:25
Topics Security, Trust, etc. 
Conference Place Museum Lecture Room and Art Museum Lecture Room, Okinawa Prefectural Museum & Art Museum 
Address 〒900-0006 3-1-1, Omoromachi, Naha-shi, Okinawa
Transportation Guide https://okimu-jp-e.athp.transer.com/guide/access/
Registration Fee This workshop will be held as the IEICE workshop in fully electronic publishing. Registration fee will be necessary except the speakers and participants other than the participants to workshop(s) in non-electronic publishing. See the registration fee page. We request the registration fee or presentation fee to participants who will attend the workshop(s) on ICSS.

Thu, Mar 6 AM 
10:00 - 11:20
(1)
ICSS
10:00-10:20 DDoS attack detection by ensemble learning with dynamic layered structure depending on the complexity of the dataset Tomoya Nishina, Masakazu Soshi (HCU)
(2)
ICSS
10:20-10:40 Lightweight DDoS attack classification model considering communication protocols Hayate Sudo, Masakazu Soshi (HCU)
(3)
ICSS
10:40-11:00 Long-term Analysis of DoS Attack Commands in Multiple Mirai Variants Yuki Umemura (NICT/Kobe Univ.), Masaki Kubo, Takahiro Kasama (NICT), Yoshiaki Shiraishi (Kobe Univ.)
[updated]
(4)
ICSS
11:00-11:20 Early Detection of Ports Exploited in DRDoS Attacks by Focusing on Reflector Discovery Scans Ryuji Kurashige, Ryu Kuki (Yokohama National Univ.), Daisuke Makita (NICT), Takayuki Sasaki, Katsunari Yoshioka (Yokohama National Univ.)
  11:20-11:35 Break ( 15 min. )
Thu, Mar 6 AM 
10:00 - 11:00 [updated]
(5) 10:00-10:20  
(6) 10:20-10:40  
(7)
[updated]
10:40-11:00
[updated]
 
  11:00-11:35
[updated]
Break ( 35 min. )
[updated]
Thu, Mar 6 AM 
11:35 - 12:35
(8)
ICSS
[updated]
11:35-11:55 Proposal of an Attack Surface Analysis System Based on Firewall Rules Using LLM
[updated]
Tomohiro Nagai, Yuki Yamanaka, Yasuhiro Teramoto, Tomoya Yamashita, Akio Shiga, Ryota Sato (NTT)
(9)
ICSS
[updated]
11:55-12:15 Revaluation of BGP Hijacking Detection Method Applying BGP2Vec Toru Suzuki, Akira Kanaoka (toho-u), Masayuki Okada (sun)
(10)
ICSS
[updated]
12:15-12:35 Linking IoT Attacks to Cybercrime-as-a-Service Offerings Using LLM and DNS Data
[updated]
Qingxin Mao (YNU), Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka (IAS/YNU)
[updated]
  12:35-13:45 Lunch Break ( 70 min. )
Thu, Mar 6 AM 
11:35 - 12:35
(11)
[updated]
11:35-11:55  
(12)
[updated]
11:55-12:15  
(13)
[updated]
12:15-12:35  
  12:35-13:45 Lunch Break ( 70 min. )
Thu, Mar 6 PM 
13:45 - 15:05
(14)
ICSS
[updated]
13:45-14:05 A Signature Generation System for IoT Malware Communications Using Large Language Models
[updated]
Kazuma Shinomiya, Kazunori Kamiya, Yasuyuki Hamada, Kenji Takahashi (NTT)
(15)
ICSS
[updated]
14:05-14:25 Investigation of Multiple Infections by Matching Large-scale Network Flow Data of ISP with Sinkhole Observation Data
[updated]
Kosuke Murakami, Masataka Nakahara (KDDIR/KDDI), Takashi Matsunaka (KDDIR), Ayumu Kubota (KDDIR/KDDI)
(16)
ICSS
[updated]
14:25-14:45 How to Win the Battle Within:Towards Remotely Neutralize IoT Malware to Defend Devices Shun Ikeda (YNU), Rui Tanabe (YNU/Juntendo Univ), Katsunari Yoshioka (YNU)
(17)
ICSS
[updated]
14:45-15:05 A Large-Scale Investigation of Security Risks in Medical IoT Devices Kosuke Tanizaki (Kobe Univ./NICT), Keisuke Furumoto, Kohei Masumi, Takeshi Takahashi (NICT), Yoshiaki Shiraishi (Kobe Univ.)
  15:05-15:20 Break ( 15 min. )
Thu, Mar 6 PM 
13:45 - 15:05
(18)
ICSS
[updated]
13:45-14:05 Large-Scale Analysis of Malicious Packages on PyPI Using LLM Agents
[updated]
Takaaki Toda (Waseda University/RIKEN AIP), Takuro Wakai (Waseda University), Tatsuya Mori (Waseda University/NICT/RIKEN AIP)
[updated]
(19)
ICSS
[updated]
14:05-14:25 A Comprehensive Survey on Secure Practices for GitHub Actions Yusuke Kubo (NTT Communications), Takuro Wakai (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT/RIKEN)
(20)
ICSS
[updated]
14:25-14:45 Proposal of Software Dependency Management Methodology with Blockchain Utilizing SBOM Shumpei Ikegami, Chisa Takano, Masaki Inamura (Hiroshima City Univ.)
(21)
ICSS
[updated]
14:45-15:05 Checking Software Build Environment for Acceptable Differences from Master: A Consideration Yoshitada Fujiwara, Satoshi Mimura, Tatsuya Takehisa, Daisuke Makita, Ryoichi Isawa, Takahiro Kasama (NICT)
  15:05-15:20 Break ( 15 min. )
Thu, Mar 6 PM 
15:20 - 16:40
(22)
ICSS
[updated]
15:20-15:40 A Signature Generation Method for WebUIs of IoT Devices Using LLM Kotoe Goya, Takayuki Sasaki, Katsunari Yoshioka (Yokohama National Univ.)
(23)
ICSS
[updated]
15:40-16:00 Why Didn't the Security Notification Reach Users?
-- Lessons Learned from IoT Security Notification Experiment via Dedicated Agents --
Kohsuke Sekido, Akihito Takeuchi, Junnosuke Kushibiki (YNU), Tanaka Hidekazu, Shintaro Kawamura (NICT), Akira Fujita (NICT/YNU), Takayuki Sasaki, Katsunari Yoshioka (YNU)
(24)
ICSS
[updated]
16:00-16:20 Towards Evaluating the Detection Accuracy of Internet-Wide Scanners for Frequently Exploited Vulnerabilities Koudai Aoyama, Ruri Otsuka, Yinn Minn Pa pa, Katsunari Yoshioka (YNU)
(25)
ICSS
[updated]
16:20-16:40 Investigation of OSS vulnerability fixes in IoT devices based on source code analysis Momoka Kihara, Takayuki Sasaki (Yokohama National Univ.), Mitsuaki Akiyama (NTT), Katsunari Yoshioka (Yokohama National Univ.)
  16:40-16:55 Break ( 15 min. )
Thu, Mar 6 PM 
15:20 - 16:40
(26)
ICSS
[updated]
15:20-15:40 Proposal for a provable multiple signature protocol with the ability to add signers Katsuhiro Sato, Atsuko Miyajisuko (Osaka Univ)
(27)
ICSS
[updated]
15:40-16:00 Proposal of an Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm
[updated]
Kenjiro Hirose, Shinya Okumura, Atsuko Miyaji (Osaka Univ.)
[updated]
(28)
ICSS
[updated]
16:00-16:20 Bridging Theory and Experiment in ChaCha Linear Approximation Analysis: A More Accurate Bias Estimation
[updated]
Atsuki Nagai, Atsuko Miyaji (Osaka Univ.)
(29)
ICSS
[updated]
16:20-16:40 Feasibility Study on Machine Learning Applications for Privacy-Protected Image Data Tomoshi Yagishita (Osaka Univ.), Pierre Boudvillain (IMT Nord Europe), Yuki Hyohdoh (Kochi University), Atsuko Miyaji (Osaka Univ.)
  16:40-16:55 Break ( 15 min. )
Thu, Mar 6 PM 
16:55 - 17:55
(30)
ICSS
[updated]
16:55-17:15 Improvements to security guidelines for Tier 3 and below suppliers in the domestic automobile industry Kang TaeSeok (IISEC)
(31)
ICSS
[updated]
17:15-17:35 Proposal for Patch Application Decision Methods in Industrial Control Systems Utilizing Generative AI Masashi Fukunaga (MELCO)
(32)
ICSS
[updated]
17:35-17:55 Public and private cooperation in case of critical infrastructure service outage due to cyber-attacks Yuya Yamada, Atsuhiro Goto (IISEC)
Thu, Mar 6 PM 
16:55 - 17:35 [updated]
(33)
[updated]
16:55-17:15
[updated]
 
(34)
[updated]
17:15-17:35
[updated]
 
Fri, Mar 7 AM 
09:30 - 10:50
(35)
ICSS
[updated]
09:30-09:50 Design and Evaluation of Identification Method for System Call-related Kernel Functions Hiroki Kuzuno (Kobe Univ.), Toshihiro Yamauchi (Okayama Univ.)
(36)
ICSS
[updated]
09:50-10:10
(37)
ICSS
[updated]
10:10-10:30
(38)
ICSS
[updated]
10:30-10:50 Proposal for Detection and Visualization Method of Vulnerability Fixes for Open Source Software Considering Dependencies
[updated]
Tomohiko Yano (SECOM), Hiroki Kuzuno, Yoshiaki Shiraishi (Kobe Univ.)
  10:50-11:05 Break ( 15 min. )
Fri, Mar 7 AM 
09:30 - 10:50
(39)
[updated]
09:30-09:50  
(40)
[updated]
09:50-10:10  
(41)
[updated]
10:10-10:30  
(42)
[updated]
10:30-10:50  
  10:50-11:05 Break ( 15 min. )
Fri, Mar 7 AM 
11:05 - 12:25
(43)
ICSS
[updated]
11:05-11:25 Proposal and Feasibility of a PKI-based Attribute Authentication Service Model in a Distributed Environment of Attribute Management and Certificate Issuance
[updated]
Junichiro Hayata, Ryu Ishii, Tatsuya Nagai, Kenta Nomura, Tsunekazu Saito, Yuta Takata, Masaki Kamizono (DTCY)
(44)
ICSS
[updated]
11:25-11:45 Sequences of Attribute Certificate Issuance with Anonymity and Its PoC by OpenSSL3.4.0 Ryu Ishii, Junichiro Hayata, Tatsuya Nagai, Kenta Nomura, Tsunekazu Saito, Yuta Takata, Masaki Kamizono (DTCY)
(45)
ICSS
[updated]
11:45-12:05 Study toward a secure authentication flow for VC wallets using TEE Takashi Yagawa (Univ. of Tsukuba), Naoki Higo, Arifumi Matsumoto (NTT), Hirotake Abe (Univ. of Tsukuba)
(46)
ICSS
[updated]
12:05-12:25 Study on Man-in-the-Middle Attacks Abusing Power-Saving Mode and Authentication Vulnerabilities in Bluetooth Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.)
  12:25-13:35 Lunch Break ( 70 min. )
Fri, Mar 7 AM 
11:05 - 12:25
(47)
ICSS
[updated]
11:05-11:25 Empirical Study on Spoofing Primitive Objects in Virtual Reality Environments Mayu Fujita, Shodai Kurasaki, Akira Kanaoka (Toho Univ.)
(48)
ICSS
[updated]
11:25-11:45 Towards Safety Evaluations of Theory of Mind in Large Language Models Tatsuhiro Aoshima, Mitsuaki Akiyama (NTT)
(49)
ICSS
[updated]
11:45-12:05 A Security Evaluation Framework for V2X Communication in Autonomous Driving System
[updated]
Kodai Hirai, Yuna Tanaka (Waseda Univ.), Kazuki Nomoto (Waseda Univ./DTCY), Ryunosuke Kobayashi, Go Tsuruoka (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT/RIKEN)
(50)
ICSS
[updated]
12:05-12:25 Evaluation of Threats and Impacts of HD Map Tampering Attacks in Autonomous Driving
[updated]
Miyu Sato, Ryunosuke Kobayashi (Waseda Univ.), Kazuki Nomoto (Waseda Univ./DTCY), Yuna Tanaka, Go Tsuruoka (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT/AIP)
  12:25-13:35 Lunch Break ( 70 min. )
Fri, Mar 7 PM 
13:35 - 14:35
(51)
ICSS
[updated]
13:35-13:55 Evaluation and Defense of Malicious SIM Applet Memory Exhaustion Attack Rei Sakomoto, Ryusei Watanabe, Takahiro Matsuki (NFLabs.)
(52)
ICSS
[updated]
13:55-14:15 High-Performance Static Analysis for Identifying Hardcoded Security Risks in Android Apps Akira Kanaoka (Toho Univ.)
(53)
ICSS
[updated]
14:15-14:35 Study of Directed Greybox Fuzzing using Reinforcement Learning Ryuichi Yoshizawa (Wasesa Univ.), Tatsuya Mori (Wasesa Univ./NICT/RIKEN AIP)
[updated]
  14:35-14:50 Break ( 15 min. )
Fri, Mar 7 PM 
13:35 - 14:35
(54)
[updated]
13:35-13:55  
(55)
[updated]
13:55-14:15  
(56)
[updated]
14:15-14:35  
  14:35-14:50 Break ( 15 min. )
Fri, Mar 7 PM 
14:50 - 16:10
(57)
ICSS
[updated]
14:50-15:10 Evaluation of Deployment Strategies for Active Directory Deception Techniques Using CyberBattleSim Akihiko Nakajima, Takao Okubo (IISEC)
(58)
ICSS
[updated]
15:10-15:30 STARDUST NxgGen
-- The next generation of infrastructure for observing human-operated cyber attacks --
Nobuyuki Kanaya, Etsuko Suzuki, Ohnori Nakamura, Shigeru Sato, Kohei Kawahara, Shohei Hiruta, Yuki Umemura, Masaki Kubo, Takahiro Kasama (NICT)
(59)
ICSS
[updated]
15:30-15:50 Evaluating the Classification Accuracy of an LLM for Sandbox Evasion Proof-of-Concept Code Yukihiro Higashi, Hikaru Matsuzawa (YOKOHAMA National Univ.), Rui Tanabe (YOKOHAMA National Univ./Juntendo Univ.), Yin Minn Pa Pa, Katsunari Yoshioka (YOKOHAMA National Univ.)
(60)
ICSS
[updated]
15:50-16:10 Improved malware code interpretation with GPT-4 Yasuyuki Tanaka, Wataru Matsuda, Takeshi Nakatsuru (NTT)
  16:10-16:25 Break ( 15 min. )
Fri, Mar 7 PM 
14:50 - 16:10
(61)
ICSS
[updated]
14:50-15:10 Evaluation of the Impact of Dataset Annotation Rules and MSF on Adversarial Attacks against LiDAR Object Detection
[updated]
Ryunosuke Kobayashi (Waseda Univ.), Kazuki Nomoto (Waseda Univ./DTCY), Yuna Tanaka, Go Tsuruoka (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT/RIKEN AIP)
[updated]
(62)
ICSS
[updated]
15:10-15:30 Generating Adversarial Training Data for Specific Malware Evasion Using Reinforcement Learning with High-Dimensional Features and Continuous Action Space Shota Kiba (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.)
(63)
ICSS
[updated]
15:30-15:50 Analyzing the Impact in Availability Attacks to LightGBM Based NIDS with Poisoning Attack Data Adding Perturbations by GA Yusha Yazici (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.)
(64)
ICSS
[updated]
15:50-16:10 Data Generation Model for Evasion of Fraud Detection in Financial Transactions Akitaka Tsujita, Hiroaki Inoue (Kobe U), Chaw thetzan, Yusuke Maruyama (EAGLYS), Seiichi Ozawa (Kobe U)
  16:10-16:25 Break ( 15 min. )
Fri, Mar 7 PM 
16:25 - 17:25
(65)
ICSS
[updated]
16:25-16:45 Collecting Infrequently Accessed but Trustworthy Domain Names Daiki Chiba, Hiroki Nakano, Takashi Koide (NTT Security Holdings/NTT)
(66)
ICSS
[updated]
16:45-17:05 Text-based Human Intelligence Gathering Framework
-- Legal and Ethical Considerations and the Application of LLMs --

[updated]
Suzuki Ryosuke, Yin Minn Pa Pa (YNU), Yamaoka Hiroaki (Yakumo Law Office/YNU), Yoshioka Katsunari (YNU)
(67)
ICSS
[updated]
17:05-17:25 Discovery and Analysis of Cybercrime-Related Telegram Channels using the Similar Channel Recommendation Feature Riku Aoto, Yin Minn Pa Pa, Katsunari Yoshioka (YNU)
Fri, Mar 7 PM 
16:25 - 17:25
(68)
ICSS
[updated]
16:25-16:45 Performance Comparison of Machine Learning Models for Output Prediction Attacks and Their Interpretability
[updated]
Hayato Watanabe (Tokai Univ/NICT), Ryoma Ito (NICT), Toshihiro Ohigashi (Tokai Univ/NICT)
(69)
ICSS
[updated]
16:45-17:05 Security Analysis of Proton Key Transparency Exploited via Catch-All Addresses Kaito Naito, Hayato Kimura, Shogo Shiraki, Takanori Isobe (UoH)
(70)
ICSS
[updated]
17:05-17:25 Design of Key Scheduling Function for Block Cipher Midori128 Resistant to Differential Attacks under Related-Key Assumptions Shion Hirao, Kazuma Nakata, Takanori Isobe (UOH)

Announcement for Speakers
General TalkEach speech will have 15 minutes for presentation and 5 minutes for discussion.

Contact Address and Latest Schedule Information
ICSS Technical Committee on Information and Communication System Security (ICSS)   [Latest Schedule]
Contact Address ICSS Technical Committee
E--mail: is-adm-q 
Announcement Latest information will be presented on ICSS webpage:
https://icss.ieice.org/
IPSJ-SPT Special Interest Group on Security Psychology and Trust (IPSJ-SPT)   [Latest Schedule]
Contact Address  


Last modified: 2025-02-04 10:52:22


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ICSS Schedule Page]   /   [Return to IPSJ-SPT Schedule Page]   /  
 
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan