Technical Committee on Information and Communication System Security (ICSS) |
[schedule] [select]
|
|
Chair |
|
Daisuke Inoue (NICT) |
Vice Chair |
|
Akira Yamada (Kobe Univ.), Toshihiro Yamauchi (Okayama Univ.) |
Secretary |
|
Keisuke Kito (Mitsubishi Electric), Takeshi Sugawara (Univ. of Electro-Comm.) |
Assistant |
|
Yo Kanemoto (NTT), Masaya Sato (Okayama Prefectural Univ.) |
|
Conference Date |
Thu, Mar 21, 2024 10:55 - 16:35
Fri, Mar 22, 2024 08:30 - 15:45 |
Topics |
Security, Trust, etc. |
Conference Place |
|
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Registration Fee |
This workshop will be held as the IEICE workshop in fully electronic publishing. Registration fee will be necessary except the speakers and participants other than the participants to workshop(s) in non-electronic publishing. See the registration fee page. We request the registration fee or presentation fee to participants who will attend the workshop(s) on ICSS. |
Thu, Mar 21 AM ICSS(1) 10:55 - 13:00 |
(1) ICSS |
10:55-11:20 |
A comprehensive investigation of forgery attack on the Nostr protocol ICSS2023-69 |
Hayato Kimura (Univ. Hyogo), Ryoma Ito (NICT), Kazuhiko Minematsu (NEC), Takanori Isobe (Univ. Hyogo) |
(2) ICSS |
11:20-11:45 |
Analyzing Attackers and Victims Actions via LockBit3.0 Website Data Dynamics ICSS2023-70 |
Yuji Sekine, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
(3) ICSS |
11:45-12:10 |
Security Analysis on End-to-End Encryption of Zoom Mail ICSS2023-71 |
Shogo Shiraki, Takanori Isobe (Univ.Hyogo) |
(4) ICSS |
12:10-12:35 |
Unveiling the Shadows: Analyzing Cryptocurrency Address Management and Fund Movement of Darknet Markets ICSS2023-72 |
Aiman Syazwan Bin Abdul Razak, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
(5) ICSS |
12:35-13:00 |
A certain classification of trust services ICSS2023-73 |
Yuji Suga (IIJ) |
|
13:00-14:30 |
Break ( 90 min. ) |
Thu, Mar 21 AM SPT(1) 11:45 - 13:00 |
(6) |
11:45-12:10 |
|
(7) |
12:10-12:35 |
|
(8) |
12:35-13:00 |
|
|
13:00-14:30 |
Break ( 90 min. ) |
Thu, Mar 21 PM ICSS(2) 14:30 - 16:35 |
(9) ICSS |
14:30-14:55 |
ICSS2023-74 |
|
(10) ICSS |
14:55-15:20 |
ICSS2023-75 |
|
(11) ICSS |
15:20-15:45 |
Investigating the functionalities of IoT malware to disrupt the activities of other intruders ICSS2023-76 |
Shun Ikeda, Hiroki Yasui, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
(12) ICSS |
15:45-16:10 |
Enhanced Analysis of IoT Botnet Activity by Fusing Honeypots, Malware Dynamic Analysis, and C&C Observation ICSS2023-77 |
Yuki Endo, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
(13) ICSS |
16:10-16:35 |
One Million Routers Under Control: Vulnerabilities in IoT Devices with DDNS Service ICSS2023-78 |
Kanta Okugawa (Ritsumei/NICT), Yoshiki Mori, Masaki Kubo, Takahiro Kasama (NICT), Koichi Mouri (Ritsumei), Daisuke Inoue (NICT) |
Thu, Mar 21 PM ICSS-SPT(1) 14:30 - 16:35 |
(14) ICSS |
14:30-14:55 |
A poisoning-resilient LDP schema using oblivious transfer and Hadamard transform ICSS2023-80 |
Masahiro Shimizu, Hiroaki Kikuchi (Meiji Univ.) |
(15) ICSS |
14:55-15:20 |
An Examination of Privacy-Aware Malicious Activity Detection Methods Using NII-SOCS Benchmark Data ICSS2023-81 |
Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) |
(16) |
15:20-15:45 |
|
(17) |
15:45-16:10 |
|
(18) ICSS |
16:10-16:35 |
Considerations on Differential Privacy Mechanisms in MNIST ICSS2023-79 |
Naoki Kawahara, Pengxuan Wei, Ryunosuke Higashi, Kenta Okada, Tatsuhiro Yamatsuki, Atsuko Miyaji (Osaka Univ.) |
Fri, Mar 22 AM ICSS(3) 08:30 - 10:35 |
(19) ICSS |
08:30-08:55 |
Proposal of Moving Target Defense Approach on Reliability in Web Services ICSS2023-82 |
Mamoru Saita (Keio Univ.), Shunsuke Hashimoto (Univ. of Hyogo), Atsuo Inomata (Osaka Univ.), Hiroyuki Inoue (Kyoto Sangyo Univ.) |
(20) ICSS |
08:55-09:20 |
A Method for Detecting Mirai Botnet Groups and Their C2 Servers Using Flow Data Collected in Large-Scale Network ICSS2023-83 |
Kosuke Murakami, Masataka Nakahara, Ayumu Kubota (KDDIR/KDDI) |
(21) ICSS |
09:20-09:45 |
Design and Evaluation of Restricted Kernel Page to Mitigate Kernel Memory Corruption ICSS2023-84 |
Hiroki Kuzuno (Kobe Univ.), Toshihiro Yamauchi (Okayama Univ.) |
(22) ICSS |
09:45-10:10 |
Prototyping of MPEG-DASH Player that Validates and Provides Content Provenance ICSS2023-85 |
Takumi Mouri, Satoshi Nishimura, Go Ohtake (NHK) |
(23) ICSS |
10:10-10:35 |
Study of keyword-based search method for IoT devices deployed at important facilities ICSS2023-86 |
Mami Kawaguchi, Takayuki Sasaki, Kihara Momoka, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
|
10:35-10:55 |
Break ( 20 min. ) |
Fri, Mar 22 AM SPT(2) 08:30 - 10:35 |
(24) |
08:30-08:55 |
|
(25) |
08:55-09:20 |
|
(26) |
09:20-09:45 |
|
(27) |
09:45-10:10 |
|
(28) |
10:10-10:35 |
|
|
10:35-10:55 |
Break ( 20 min. ) |
Fri, Mar 22 AM 10:55 - 13:00 |
(29) ICSS |
10:55-11:20 |
Improved signature-embedding techniques against backdoor attacks on DNN models ICSS2023-87 |
Akira Fujimoto, Yuntao Wang, Atsuko Miyaji (OU) |
(30) ICSS |
11:20-11:45 |
Evaluation of Feature Inference Risk from Explainable AI metrics LIME and Shapley Values ICSS2023-88 |
Ryotaro Toma, Hiroaki Kikuchi (Meiji Univ.) |
(31) ICSS |
11:45-12:10 |
Impact of ChatGPT Assisted Polymorphic Malware on Antivirus Detection ICSS2023-89 |
Huang Zhewei, Yinn Minn Pa pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
(32) ICSS |
12:10-12:35 |
Study of the Label-Flipping Poisoning Attack on Machine-Learning Based Malicious URL Query Detection. ICSS2023-90 |
Akira Matsunami (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) |
(33) ICSS |
12:35-13:00 |
Open Secrets of GPTs ICSS2023-91 |
Yusuke Kubo (NTT Communications), Tomoaki Tani (NTT Security), Ryusei Watanabe (N.F.Laboratories/Waseda Univ), Takuro Wakai, Yuto Toshikawa (Waseda Univ.), Tatsuya Mori (Waseda Univ. /NICT/ RIKEN) |
|
13:00-14:30 |
Break ( 90 min. ) |
Fri, Mar 22 AM 10:55 - 12:35 |
(34) ICSS |
10:55-11:20 |
Discovery of a Vulnerable Structure of SIMON Variants ICSS2023-92 |
Hayato Watanabe (Tokai Univ.), Ryoma Ito (NICT), Toshihiro Ohigashi (Tokai Univ.) |
(35) ICSS |
11:20-11:45 |
Development of an Outsourcing Password Evaluation System using Intel SGX ICSS2023-93 |
Takeki Kitayama, Yuma Nishihira (Tokai Univ.), Akira Kanaoka (Toho Univ.), Yoshio Kakizaki, Toshihiro Ohigashi (Tokai Univ.) |
(36) ICSS |
11:45-12:10 |
Fast and Secure Scalar Multiplication for the GLS254 Binary Elliptic Curve ICSS2023-94 |
Ryosuke Kido, Atsuko Miyaji (OU) |
(37) ICSS |
12:10-12:35 |
Extension of the linear approximation for stream cipher ChaCha ICSS2023-95 |
Yurie Okada, Atsuko Miyaji (OU) |
|
12:35-14:30 |
Break ( 115 min. ) |
Fri, Mar 22 PM 14:30 - 15:20 |
(38) ICSS |
14:30-14:55 |
A Search Method for Fake QR Codes Suitable for Long-Distance Attack Using Laser Irradiation ICSS2023-96 |
Dai Itakura, Taiga Manabe, Yuki Kamata, Ayana Oku, Hiroshi Yamamoto, Yoshihisa Takayama, Toshihiro Ohigashi (Tokai Univ.) |
(39) ICSS |
14:55-15:20 |
Adversarial Examples with Missing Perturbation Using Laser Irradiation ICSS2023-97 |
Daisuke Kosuge, Hayato Watanabe, Taiga Manabe, Yoshihisa Takayama, Toshihiro Ohigashi (Tokai Univ.) |
Fri, Mar 22 PM 14:30 - 15:45 |
(40) |
14:30-14:55 |
|
(41) |
14:55-15:20 |
|
(42) |
15:20-15:45 |
|
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ICSS |
Technical Committee on Information and Communication System Security (ICSS) [Latest Schedule]
|
Contact Address |
ICSS Technical Committee
E-: is-adm-q |
Announcement |
Latest information will be presented on ICSS webpage:
https://icss.ieice.org/ |
IPSJ-SPT |
Special Interest Group on Security Psychology and Trust (IPSJ-SPT) [Latest Schedule]
|
Contact Address |
|
Last modified: 2024-03-21 14:19:57
|