Thu, Mar 6 AM 10:00 - 11:20 |
(1) ICSS |
10:00-10:20 |
DDoS attack detection by ensemble learning with dynamic layered structure depending on the complexity of the dataset |
Tomoya Nishina, Masakazu Soshi (HCU) |
(2) ICSS |
10:20-10:40 |
Lightweight DDoS attack classification model considering communication protocols |
Hayate Sudo, Masakazu Soshi (HCU) |
(3) ICSS |
10:40-11:00 |
Long-term Analysis of DoS Attack Commands in Multiple Mirai Variants |
Yuki Umemura (NICT/Kobe Univ.), Masaki Kubo, Takahiro Kasama (NICT), Yoshiaki Shiraishi (Kobe Univ.) [updated] |
(4) ICSS |
11:00-11:20 |
Early Detection of Ports Exploited in DRDoS Attacks by Focusing on Reflector Discovery Scans |
Ryuji Kurashige, Ryu Kuki (Yokohama National Univ.), Daisuke Makita (NICT), Takayuki Sasaki, Katsunari Yoshioka (Yokohama National Univ.) |
|
11:20-11:35 |
Break ( 15 min. ) |
Thu, Mar 6 AM 10:00 - 11:00 [updated] |
(5) |
10:00-10:20 |
|
(6) |
10:20-10:40 |
|
(7) [updated] |
10:40-11:00 [updated] |
|
|
11:00-11:35 [updated] |
Break ( 35 min. ) [updated] |
Thu, Mar 6 AM 11:35 - 12:35 |
(8) ICSS [updated] |
11:35-11:55 |
Proposal of an Attack Surface Analysis System Based on Firewall Rules Using LLM [updated] |
Tomohiro Nagai, Yuki Yamanaka, Yasuhiro Teramoto, Tomoya Yamashita, Akio Shiga, Ryota Sato (NTT) |
(9) ICSS [updated] |
11:55-12:15 |
Revaluation of BGP Hijacking Detection Method Applying BGP2Vec |
Toru Suzuki, Akira Kanaoka (toho-u), Masayuki Okada (sun) |
(10) ICSS [updated] |
12:15-12:35 |
Linking IoT Attacks to Cybercrime-as-a-Service Offerings Using LLM and DNS Data [updated] |
Qingxin Mao (YNU), Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka (IAS/YNU) [updated] |
|
12:35-13:45 |
Lunch Break ( 70 min. ) |
Thu, Mar 6 AM 11:35 - 12:35 |
(11) [updated] |
11:35-11:55 |
|
(12) [updated] |
11:55-12:15 |
|
(13) [updated] |
12:15-12:35 |
|
|
12:35-13:45 |
Lunch Break ( 70 min. ) |
Thu, Mar 6 PM 13:45 - 15:05 |
(14) ICSS [updated] |
13:45-14:05 |
A Signature Generation System for IoT Malware Communications Using Large Language Models [updated] |
Kazuma Shinomiya, Kazunori Kamiya, Yasuyuki Hamada, Kenji Takahashi (NTT) |
(15) ICSS [updated] |
14:05-14:25 |
Investigation of Multiple Infections by Matching Large-scale Network Flow Data of ISP with Sinkhole Observation Data [updated] |
Kosuke Murakami, Masataka Nakahara (KDDIR/KDDI), Takashi Matsunaka (KDDIR), Ayumu Kubota (KDDIR/KDDI) |
(16) ICSS [updated] |
14:25-14:45 |
How to Win the Battle Within:Towards Remotely Neutralize IoT Malware to Defend Devices |
Shun Ikeda (YNU), Rui Tanabe (YNU/Juntendo Univ), Katsunari Yoshioka (YNU) |
(17) ICSS [updated] |
14:45-15:05 |
A Large-Scale Investigation of Security Risks in Medical IoT Devices |
Kosuke Tanizaki (Kobe Univ./NICT), Keisuke Furumoto, Kohei Masumi, Takeshi Takahashi (NICT), Yoshiaki Shiraishi (Kobe Univ.) |
|
15:05-15:20 |
Break ( 15 min. ) |
Thu, Mar 6 PM 13:45 - 15:05 |
(18) ICSS [updated] |
13:45-14:05 |
Large-Scale Analysis of Malicious Packages on PyPI Using LLM Agents [updated] |
Takaaki Toda (Waseda University/RIKEN AIP), Takuro Wakai (Waseda University), Tatsuya Mori (Waseda University/NICT/RIKEN AIP) [updated] |
(19) ICSS [updated] |
14:05-14:25 |
A Comprehensive Survey on Secure Practices for GitHub Actions |
Yusuke Kubo (NTT Communications), Takuro Wakai (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT/RIKEN) |
(20) ICSS [updated] |
14:25-14:45 |
Proposal of Software Dependency Management Methodology with Blockchain Utilizing SBOM |
Shumpei Ikegami, Chisa Takano, Masaki Inamura (Hiroshima City Univ.) |
(21) ICSS [updated] |
14:45-15:05 |
Checking Software Build Environment for Acceptable Differences from Master: A Consideration |
Yoshitada Fujiwara, Satoshi Mimura, Tatsuya Takehisa, Daisuke Makita, Ryoichi Isawa, Takahiro Kasama (NICT) |
|
15:05-15:20 |
Break ( 15 min. ) |
Thu, Mar 6 PM 15:20 - 16:40 |
(22) ICSS [updated] |
15:20-15:40 |
A Signature Generation Method for WebUIs of IoT Devices Using LLM |
Kotoe Goya, Takayuki Sasaki, Katsunari Yoshioka (Yokohama National Univ.) |
(23) ICSS [updated] |
15:40-16:00 |
Why Didn't the Security Notification Reach Users?
-- Lessons Learned from IoT Security Notification Experiment via Dedicated Agents -- |
Kohsuke Sekido, Akihito Takeuchi, Junnosuke Kushibiki (YNU), Tanaka Hidekazu, Shintaro Kawamura (NICT), Akira Fujita (NICT/YNU), Takayuki Sasaki, Katsunari Yoshioka (YNU) |
(24) ICSS [updated] |
16:00-16:20 |
Towards Evaluating the Detection Accuracy of Internet-Wide Scanners for Frequently Exploited Vulnerabilities |
Koudai Aoyama, Ruri Otsuka, Yinn Minn Pa pa, Katsunari Yoshioka (YNU) |
(25) ICSS [updated] |
16:20-16:40 |
Investigation of OSS vulnerability fixes in IoT devices based on source code analysis |
Momoka Kihara, Takayuki Sasaki (Yokohama National Univ.), Mitsuaki Akiyama (NTT), Katsunari Yoshioka (Yokohama National Univ.) |
|
16:40-16:55 |
Break ( 15 min. ) |
Thu, Mar 6 PM 15:20 - 16:40 |
(26) ICSS [updated] |
15:20-15:40 |
Proposal for a provable multiple signature protocol with the ability to add signers |
Katsuhiro Sato, Atsuko Miyajisuko (Osaka Univ) |
(27) ICSS [updated] |
15:40-16:00 |
Proposal of an Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm [updated] |
Kenjiro Hirose, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) [updated] |
(28) ICSS [updated] |
16:00-16:20 |
Bridging Theory and Experiment in ChaCha Linear Approximation Analysis: A More Accurate Bias Estimation [updated] |
Atsuki Nagai, Atsuko Miyaji (Osaka Univ.) |
(29) ICSS [updated] |
16:20-16:40 |
Feasibility Study on Machine Learning Applications for Privacy-Protected Image Data |
Tomoshi Yagishita (Osaka Univ.), Pierre Boudvillain (IMT Nord Europe), Yuki Hyohdoh (Kochi University), Atsuko Miyaji (Osaka Univ.) |
|
16:40-16:55 |
Break ( 15 min. ) |
Thu, Mar 6 PM 16:55 - 17:55 |
(30) ICSS [updated] |
16:55-17:15 |
Improvements to security guidelines for Tier 3 and below suppliers in the domestic automobile industry |
Kang TaeSeok (IISEC) |
(31) ICSS [updated] |
17:15-17:35 |
Proposal for Patch Application Decision Methods in Industrial Control Systems Utilizing Generative AI |
Masashi Fukunaga (MELCO) |
(32) ICSS [updated] |
17:35-17:55 |
Public and private cooperation in case of critical infrastructure service outage due to cyber-attacks |
Yuya Yamada, Atsuhiro Goto (IISEC) |
Thu, Mar 6 PM 16:55 - 17:35 [updated] |
(33) [updated] |
16:55-17:15 [updated] |
|
(34) [updated] |
17:15-17:35 [updated] |
|
Fri, Mar 7 AM 09:30 - 10:50 |
(35) ICSS [updated] |
09:30-09:50 |
Design and Evaluation of Identification Method for System Call-related Kernel Functions |
Hiroki Kuzuno (Kobe Univ.), Toshihiro Yamauchi (Okayama Univ.) |
(36) ICSS [updated] |
09:50-10:10 |
|
|
(37) ICSS [updated] |
10:10-10:30 |
|
|
(38) ICSS [updated] |
10:30-10:50 |
Proposal for Detection and Visualization Method of Vulnerability Fixes for Open Source Software Considering Dependencies [updated] |
Tomohiko Yano (SECOM), Hiroki Kuzuno, Yoshiaki Shiraishi (Kobe Univ.) |
|
10:50-11:05 |
Break ( 15 min. ) |
Fri, Mar 7 AM 09:30 - 10:50 |
(39) [updated] |
09:30-09:50 |
|
(40) [updated] |
09:50-10:10 |
|
(41) [updated] |
10:10-10:30 |
|
(42) [updated] |
10:30-10:50 |
|
|
10:50-11:05 |
Break ( 15 min. ) |
Fri, Mar 7 AM 11:05 - 12:25 |
(43) ICSS [updated] |
11:05-11:25 |
Proposal and Feasibility of a PKI-based Attribute Authentication Service Model in a Distributed Environment of Attribute Management and Certificate Issuance [updated] |
Junichiro Hayata, Ryu Ishii, Tatsuya Nagai, Kenta Nomura, Tsunekazu Saito, Yuta Takata, Masaki Kamizono (DTCY) |
(44) ICSS [updated] |
11:25-11:45 |
Sequences of Attribute Certificate Issuance with Anonymity and Its PoC by OpenSSL3.4.0 |
Ryu Ishii, Junichiro Hayata, Tatsuya Nagai, Kenta Nomura, Tsunekazu Saito, Yuta Takata, Masaki Kamizono (DTCY) |
(45) ICSS [updated] |
11:45-12:05 |
Study toward a secure authentication flow for VC wallets using TEE |
Takashi Yagawa (Univ. of Tsukuba), Naoki Higo, Arifumi Matsumoto (NTT), Hirotake Abe (Univ. of Tsukuba) |
(46) ICSS [updated] |
12:05-12:25 |
Study on Man-in-the-Middle Attacks Abusing Power-Saving Mode and Authentication Vulnerabilities in Bluetooth |
Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) |
|
12:25-13:35 |
Lunch Break ( 70 min. ) |
Fri, Mar 7 AM 11:05 - 12:25 |
(47) ICSS [updated] |
11:05-11:25 |
Empirical Study on Spoofing Primitive Objects in Virtual Reality Environments |
Mayu Fujita, Shodai Kurasaki, Akira Kanaoka (Toho Univ.) |
(48) ICSS [updated] |
11:25-11:45 |
Towards Safety Evaluations of Theory of Mind in Large Language Models |
Tatsuhiro Aoshima, Mitsuaki Akiyama (NTT) |
(49) ICSS [updated] |
11:45-12:05 |
A Security Evaluation Framework for V2X Communication in Autonomous Driving System [updated] |
Kodai Hirai, Yuna Tanaka (Waseda Univ.), Kazuki Nomoto (Waseda Univ./DTCY), Ryunosuke Kobayashi, Go Tsuruoka (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT/RIKEN) |
(50) ICSS [updated] |
12:05-12:25 |
Evaluation of Threats and Impacts of HD Map Tampering Attacks in Autonomous Driving [updated] |
Miyu Sato, Ryunosuke Kobayashi (Waseda Univ.), Kazuki Nomoto (Waseda Univ./DTCY), Yuna Tanaka, Go Tsuruoka (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT/AIP) |
|
12:25-13:35 |
Lunch Break ( 70 min. ) |
Fri, Mar 7 PM 13:35 - 14:35 |
(51) ICSS [updated] |
13:35-13:55 |
Evaluation and Defense of Malicious SIM Applet Memory Exhaustion Attack |
Rei Sakomoto, Ryusei Watanabe, Takahiro Matsuki (NFLabs.) |
(52) ICSS [updated] |
13:55-14:15 |
High-Performance Static Analysis for Identifying Hardcoded Security Risks in Android Apps |
Akira Kanaoka (Toho Univ.) |
(53) ICSS [updated] |
14:15-14:35 |
Study of Directed Greybox Fuzzing using Reinforcement Learning |
Ryuichi Yoshizawa (Wasesa Univ.), Tatsuya Mori (Wasesa Univ./NICT/RIKEN AIP) [updated] |
|
14:35-14:50 |
Break ( 15 min. ) |
Fri, Mar 7 PM 13:35 - 14:35 |
(54) [updated] |
13:35-13:55 |
|
(55) [updated] |
13:55-14:15 |
|
(56) [updated] |
14:15-14:35 |
|
|
14:35-14:50 |
Break ( 15 min. ) |
Fri, Mar 7 PM 14:50 - 16:10 |
(57) ICSS [updated] |
14:50-15:10 |
Evaluation of Deployment Strategies for Active Directory Deception Techniques Using CyberBattleSim |
Akihiko Nakajima, Takao Okubo (IISEC) |
(58) ICSS [updated] |
15:10-15:30 |
STARDUST NxgGen
-- The next generation of infrastructure for observing human-operated cyber attacks -- |
Nobuyuki Kanaya, Etsuko Suzuki, Ohnori Nakamura, Shigeru Sato, Kohei Kawahara, Shohei Hiruta, Yuki Umemura, Masaki Kubo, Takahiro Kasama (NICT) |
(59) ICSS [updated] |
15:30-15:50 |
Evaluating the Classification Accuracy of an LLM for Sandbox Evasion Proof-of-Concept Code |
Yukihiro Higashi, Hikaru Matsuzawa (YOKOHAMA National Univ.), Rui Tanabe (YOKOHAMA National Univ./Juntendo Univ.), Yin Minn Pa Pa, Katsunari Yoshioka (YOKOHAMA National Univ.) |
(60) ICSS [updated] |
15:50-16:10 |
Improved malware code interpretation with GPT-4 |
Yasuyuki Tanaka, Wataru Matsuda, Takeshi Nakatsuru (NTT) |
|
16:10-16:25 |
Break ( 15 min. ) |
Fri, Mar 7 PM 14:50 - 16:10 |
(61) ICSS [updated] |
14:50-15:10 |
Evaluation of the Impact of Dataset Annotation Rules and MSF on Adversarial Attacks against LiDAR Object Detection [updated] |
Ryunosuke Kobayashi (Waseda Univ.), Kazuki Nomoto (Waseda Univ./DTCY), Yuna Tanaka, Go Tsuruoka (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT/RIKEN AIP) [updated] |
(62) ICSS [updated] |
15:10-15:30 |
Generating Adversarial Training Data for Specific Malware Evasion Using Reinforcement Learning with High-Dimensional Features and Continuous Action Space |
Shota Kiba (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) |
(63) ICSS [updated] |
15:30-15:50 |
Analyzing the Impact in Availability Attacks to LightGBM Based NIDS with Poisoning Attack Data Adding Perturbations by GA |
Yusha Yazici (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) |
(64) ICSS [updated] |
15:50-16:10 |
Data Generation Model for Evasion of Fraud Detection in Financial Transactions |
Akitaka Tsujita, Hiroaki Inoue (Kobe U), Chaw thetzan, Yusuke Maruyama (EAGLYS), Seiichi Ozawa (Kobe U) |
|
16:10-16:25 |
Break ( 15 min. ) |
Fri, Mar 7 PM 16:25 - 17:25 |
(65) ICSS [updated] |
16:25-16:45 |
Collecting Infrequently Accessed but Trustworthy Domain Names |
Daiki Chiba, Hiroki Nakano, Takashi Koide (NTT Security Holdings/NTT) |
(66) ICSS [updated] |
16:45-17:05 |
Text-based Human Intelligence Gathering Framework
-- Legal and Ethical Considerations and the Application of LLMs -- [updated] |
Suzuki Ryosuke, Yin Minn Pa Pa (YNU), Yamaoka Hiroaki (Yakumo Law Office/YNU), Yoshioka Katsunari (YNU) |
(67) ICSS [updated] |
17:05-17:25 |
Discovery and Analysis of Cybercrime-Related Telegram Channels using the Similar Channel Recommendation Feature |
Riku Aoto, Yin Minn Pa Pa, Katsunari Yoshioka (YNU) |
Fri, Mar 7 PM 16:25 - 17:25 |
(68) ICSS [updated] |
16:25-16:45 |
Performance Comparison of Machine Learning Models for Output Prediction Attacks and Their Interpretability [updated] |
Hayato Watanabe (Tokai Univ/NICT), Ryoma Ito (NICT), Toshihiro Ohigashi (Tokai Univ/NICT) |
(69) ICSS [updated] |
16:45-17:05 |
Security Analysis of Proton Key Transparency Exploited via Catch-All Addresses |
Kaito Naito, Hayato Kimura, Shogo Shiraki, Takanori Isobe (UoH) |
(70) ICSS [updated] |
17:05-17:25 |
Design of Key Scheduling Function for Block Cipher Midori128 Resistant to Differential Attacks under Related-Key Assumptions |
Shion Hirao, Kazuma Nakata, Takanori Isobe (UOH) |