Technical Committee on Information and Communication System Security (ICSS) |
[schedule] [select]
|
|
Chair |
|
Hiroki Takakura (NII) |
Vice Chair |
|
Katsunari Yoshioka (Yokohama National Univ.), Kazunori Kamiya (NTT) |
Secretary |
|
Takahiro Kasama (NICT), Akira Yamada (KDDI labs.) |
Assistant |
|
Keisuke Kito (Mitsubishi Electric), Toshihiro Yamauchi (Okayama Univ.) |
|
Conference Date |
Mon, Mar 1, 2021 09:10 - 18:00
Tue, Mar 2, 2021 09:10 - 18:05 |
Topics |
Security, Trust, etc. |
Conference Place |
|
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Registration Fee |
This workshop will be held as the IEICE workshop in fully electronic publishing. Registration fee will be necessary except the speakers and participants other than the participants to workshop(s) in non-electronic publishing. See the registration fee page. We request the registration fee or presentation fee to participants who will attend the workshop(s) on ICSS. |
Mon, Mar 1 09:10 - 10:50 |
(1) ICSS |
09:10-09:35 |
Developing and Characterizing a New Approach to Extracting Communication Sessions Associated with NIDS Alerts ICSS2020-26 |
Ryosuke Ishibashi, Hiroki Goto (Kyushu Univ.), Chansu Han, Tao Ban, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.) |
(2) ICSS |
09:35-10:00 |
Detection of Infected Device Using DNS Traffic ICSS2020-27 |
Soichiro Kogo, Atsushi Kanai (Hosei Univ.) |
(3) ICSS |
10:00-10:25 |
Understanding the Adoption and Operation of DNS Cookie: Current State and Future Prospects ICSS2020-28 |
Masanori Yajima (Waseda Univ.), Daiki Chiba (NTT), Yoshiro Yoneya (JPRS), Tatsuya Mori (Waseda Univ./NICT) |
(4) ICSS |
10:25-10:50 |
Construction of Vulnerability Evaluation System with Machine Learning Methods ICSS2020-29 |
Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota (KDDIR), Junpei Urakawa (KDS/KDDIR) |
|
10:50-11:05 |
Break ( 15 min. ) |
Mon, Mar 1 11:05 - 12:20 |
(5) ICSS |
11:05-11:30 |
A proposal of model for scale and frequency of cyber incidents based on organizational attributes ICSS2020-30 |
Kazuki Ikegami, Hiroaki Kikuchi (Meiji Univ.) |
(6) ICSS |
11:30-11:55 |
Method of Similarity Evaluation among Incidents for Multi-Located Network ICSS2020-31 |
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) |
(7) ICSS |
11:55-12:20 |
Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures ICSS2020-32 |
Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) |
|
12:20-13:40 |
Lunch Break ( 80 min. ) |
Mon, Mar 1 13:40 - 14:55 |
(8) |
13:40-14:05 |
|
(9) |
14:05-14:30 |
|
(10) ICSS |
14:30-14:55 |
A path authentication framework based on One-way cross networks ICSS2020-33 |
Kosuke Ishibashi, Masakazu Soshi (Hiroshima City Univ.) |
|
14:55-16:00 |
Break ( 65 min. ) |
Mon, Mar 1 16:00 - 18:00 |
(11) |
16:00-18:00 |
|
Mon, Mar 1 09:10 - 10:50 |
(12) ICSS |
09:10-09:35 |
On the Privacy Risk of Exposure Notification Framework: Assessment and Countermeasures ICSS2020-34 |
Kazuki Nomoto (Waseda Univ.), Mitsuaki Akiyama (NTT), Masashi Eto (NICT), Atsuo Inomata (Osaka Univ.), Tatsuya Mori (Waseda Univ./NICT) |
(13) ICSS |
09:35-10:00 |
A Method for Reconstructing Hidden Background Image in Tele-conference with Virtual Background ICSS2020-35 |
Satoki Tsuji, Ryusei Ishikawa (Ritsumeikan Univ.), Masashi Eto (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Hiroshima City Univ.) |
(14) ICSS |
10:00-10:25 |
Implementation and Evaluation of a Plagiarism Detection Method for Source Code on Programming Contest ICSS2020-36 |
Ryusei Ishikawa (Ritsumeikan Univ.), Yuichi Hattori (Secure Cycle), Hiroyuki Inoue (Hiroshima City Univ.), Atsuo Inomata (Osaka Univ.) |
(15) ICSS |
10:25-10:50 |
Design and implementation of a cyber security exercise rewinding mechanism ICSS2020-37 |
Yuma Kodera, Chinen Kenichi (JAIST) |
|
10:50-11:05 |
Break ( 15 min. ) |
Mon, Mar 1 11:05 - 12:20 |
(16) |
11:05-11:30 |
|
(17) |
11:30-11:55 |
|
(18) |
11:55-12:20 |
|
|
12:20-13:40 |
Lunch Break ( 80 min. ) |
Mon, Mar 1 13:40 - 15:20 |
(19) ICSS |
13:40-14:05 |
An Evaluation of Scalable Clustering in Fast Construction Algorithm of Phylogenetic Tree ICSS2020-38 |
Tianxiang He (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Shuji Kijima, Jun'ichi Takeuchi (Kyushu Univ.) |
(20) ICSS |
14:05-14:30 |
Improvement of Functional Difference Investigation Method and Analyzing for Clusters of IoT Malware ICSS2020-39 |
Reo Kawasoe (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.) |
(21) ICSS |
14:30-14:55 |
Analyzing the Transition of Vulnerabilities Targeted by IoT Malware ICSS2020-40 |
Kaichi Sameshima, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) |
(22) ICSS |
14:55-15:20 |
Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox ICSS2020-41 |
Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) |
|
15:20-16:00 |
Break ( 40 min. ) |
Tue, Mar 2 09:35 - 10:50 |
(23) ICSS |
09:35-10:00 |
Proposal for Chameleon Hash with a Revocation Function ICSS2020-42 |
Koki Matsubara (Osaka Univ.), Atsuko Miyaji (Osaka Univ./ JAIST), Tian Yangguang (Osaka Univ.) |
(24) ICSS |
10:00-10:25 |
Authentication and authorization of IoT devices using blockchain and fog nodes ICSS2020-43 |
Takahiro Igarashi, Yuichi Futa (TUT) |
(25) ICSS |
10:25-10:50 |
Consideration on the mechanism of identifying and tracking Bitcoin users ICSS2020-44 |
Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) |
|
10:50-11:05 |
Break ( 15 min. ) |
Tue, Mar 2 11:05 - 11:55 |
(26) ICSS |
11:05-11:30 |
Study on analyzing Memcached DRDoS attacks and their infrastructures ICSS2020-45 |
Mizuki Kondo, Natsuo Shintani (YNU), Daisuke Makita (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
(27) ICSS |
11:30-11:55 |
Distributed Slow HTTP DoS Attack Detection by Combining Multiple Schemes ICSS2020-46 |
Koki Tamura, Yuichi Futa (TUT) |
|
11:55-13:40 |
Lunch Break ( 105 min. ) |
Tue, Mar 2 PM 13:40 - 15:45 |
(28) ICSS |
13:40-14:05 |
Research on the vulnerability of homoglyph attacks to online machine translation system ICSS2020-50 |
Takeshi Sakamoto, Tatsuya Mori (Waseda Univ) |
(29) ICSS |
14:05-14:30 |
Developing an Interactive Analysis System for Voice Assistant Apps ICSS2020-48 |
Atsuko Natatsuka (Waseda Univ.), Ryo Iijima (Waseda Univ./NICT), Takuya Watanabe, Mitsuaki Akiyama (NTT), Tetsuya Sakai (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT) |
(30) ICSS |
14:30-14:55 |
ICSS2020-49 |
|
(31) ICSS |
14:55-15:20 |
Security Evaluation of End-to-End Encryption of LINE Version 2 ICSS2020-47 |
Kotaro Kita, Takanori Isobe (UH) |
(32) ICSS |
15:20-15:45 |
The linear probability of the stream cipher Salsa ICSS2020-51 |
Junru Li (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) |
|
15:45-16:00 |
Break ( 15 min. ) |
Tue, Mar 2 PM 16:00 - 16:50 |
(33) ICSS |
16:00-16:25 |
Evaluation of resonance-induced attacks on inertial measurement unit ICSS2020-52 |
Yuta Minamisawa, Ryo Iijima (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT) |
(34) ICSS |
16:25-16:50 |
Security Evaluation of PUF utilizing Unrolled Architecture ICSS2020-53 |
Yusuke Nozaki, Kensaku Asahi, Masaya Yoshikawa (Meijo Univ.) |
Tue, Mar 2 AM 09:10 - 10:50 |
(35) ICSS |
09:10-09:35 |
A Study on the Adoption of Link Preview by the Phishing Sites ICSS2020-54 |
Norihito Omori (Waseda Univ.), Satoshi Furutani, Takuya Watanabe, Toshiki Shibahara, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.) |
(36) ICSS |
09:35-10:00 |
An Efficient Discovery of Malicious URL Using VirusTotal and Web Access Log ICSS2020-55 |
Chika Hiraishi, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
(37) ICSS |
10:00-10:25 |
Evaluation of Uncertain Reports by Multiple Anti-virus Engines ICSS2020-56 |
Kazuya Nomura (Waseda Univ.), Mistuaki Akiyama (NTT), Masaki Kamizono (Deloitte Tohmatsu Cyber LLC), Takahiro Kasama (NICT) |
(38) ICSS |
10:25-10:50 |
Proof of concept of sandbox evasion attack using email address stored in target machine ICSS2020-57 |
Yuta Inoue, Rui Tanabe (YNU), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
|
10:50-11:05 |
Break ( 15 min. ) |
Tue, Mar 2 AM 11:05 - 11:55 |
(39) ICSS |
11:05-11:30 |
Accuracy evaluation of CNNs and random forests with Malware API call sequences ICSS2020-58 |
Shugo Asai, Futa Yuichi (TUT) |
(40) ICSS |
11:30-11:55 |
Detecting unknown malware families by anomaly detection using deep learning ICSS2020-59 |
Ren Takeuchi, Shintaro Mizuno, Vo Ngoc Khoi Nguyen, Jun Tsuchiya, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.) |
|
11:55-13:40 |
Lunch Break ( 105 min. ) |
Tue, Mar 2 PM 13:40 - 15:45 |
(41) |
13:40-14:05 |
|
(42) |
14:05-14:30 |
|
(43) |
14:30-14:55 |
|
(44) |
14:55-15:20 |
|
(45) |
15:20-15:45 |
|
|
15:45-16:00 |
Break ( 15 min. ) |
Tue, Mar 2 PM 16:00 - 18:05 |
(46) |
16:00-16:25 |
|
(47) |
16:25-16:50 |
|
(48) |
16:50-17:15 |
|
(49) |
17:15-17:40 |
|
(50) |
17:40-18:05 |
|
Announcement for Speakers |
General Talk | Each speech will have 18 minutes for presentation and 7 minutes for discussion. |
Contact Address and Latest Schedule Information |
IPSJ-SPT |
Special Interest Group on Security Psychology and Trust (IPSJ-SPT) [Latest Schedule]
|
Contact Address |
|
ICSS |
Technical Committee on Information and Communication System Security (ICSS) [Latest Schedule]
|
Contact Address |
Hiroki Takakura(National Institute of Informatics)
E- : i s-adm- q![](/ken/images/new/ta.gif) ![](/ken/images/new/liam.gif) |
Announcement |
Latest information will be presented on the homepage:
https://www.ieice.org/iss/icss/index-en.html |
Last modified: 2021-02-28 09:50:45
|