Technical Committee on Information and Communication System Security (ICSS) |
[schedule] [select]
|
|
Chair |
|
Hiroaki Kikuchi (Meiji Univ.) |
Vice Chair |
|
Yutaka Miyake (KDDI R&D Labs.), Shiho Moriai (NICT) |
Secretary |
|
Takashi Nishide (Univ. of Tsukuba), Yoshiaki Shiraishi (Kobe Univ.) |
Assistant |
|
Takeshi Ueda (Mitsubishi Electric) |
|
Conference Date |
Thu, Mar 27, 2014 13:05 - 16:35
Fri, Mar 28, 2014 09:00 - 15:35 |
Topics |
Communication Security, Security Psychology & Trust, etc. |
Conference Place |
Meio University |
Address |
1220-1 Biimata, Nago City, Okinawa Japan. |
Transportation Guide |
http://www.meio-u.ac.jp/access.html |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Thu, Mar 27 PM Session 1A - ICSS Chair: Hiroaki Kikuchi (Meiji Univ.) 13:05 - 14:45 |
(1) ICSS |
13:05-13:30 |
The countermeasures against extraction of AES keys from memory dumping. ICSS2013-62 |
Michiyoshi Satoh (TSH) |
(2) ICSS |
13:30-13:55 |
An Active Attack on RC4 in SSL/TLS ICSS2013-63 |
Toshihiro Ohigashi (Hiroshima Univ.), Takanori Isobe (Sony), Yuhei Watanabe (Kobe Univ.), Ryo Nojima (NICT), Masakatu Morii (Kobe Univ.) |
(3) ICSS |
13:55-14:20 |
Implementation and Evaluation of a Distributed Secure Multi-party Computation System ICSS2013-64 |
Koki Hamada (NTT) |
(4) ICSS |
14:20-14:45 |
General Construction of Certified Data Transmission Protocol Using ID-Based Encryption and ID-Based Signature ICSS2013-65 |
Hitoshi Miyazaki (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) |
|
14:45-14:55 |
Break ( 10 min. ) |
Thu, Mar 27 PM Session 2A - ICSS Chair: Daisuke Inoue(NICT) 14:55 - 16:35 |
(5) ICSS |
14:55-15:20 |
SSL Client Authentication with TPM
-- Issuance of Public Key Certificate with OpenID and Terminal Authentication with SSL Client Certificate -- ICSS2013-66 |
Akihito Shinoda (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) |
(6) ICSS |
15:20-15:45 |
An authenticated key exchange protocol for the network between a server and terminals ICSS2013-67 |
Yumiko Murakami, Yutaka Kawai, Nobuhiro Kobayashi (Mitsubishi Electric) |
(7) ICSS |
15:45-16:10 |
On Threats of Impersonation and Man-In-The-Middle Attack on Network Printers ICSS2013-68 |
Yuka Enomoto, Akira Kanaoka (Toho Univ.) |
(8) ICSS |
16:10-16:35 |
Applying Identity-based Cryptography to Mutual Authentication between OpenFlow Devices ICSS2013-69 |
Tomoko Kazama, Akira Kanaoka (Toho Univ.) |
Thu, Mar 27 PM Session 1B - ICSS Chair: Yoshiaki Shiraishi (Kobe Univ.) 13:05 - 14:45 |
(9) ICSS |
13:05-13:30 |
Practical Password Management System against password-list-attacks
-- Proposal of protection of Master Password -- ICSS2013-70 |
Hironao Teruya, Wataru Nakamura (Meio Univ.), Keisuke Furumoto (Kobe Univ.), Takeshi Tengan, Katsuyoshi Tanabe (Meio Univ.), Masakatu Morii (Kobe Univ.) |
(10) ICSS |
13:30-13:55 |
Measuring Lifetime of Malicious Website Based on Redirection from Compromised Websites ICSS2013-71 |
Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT) |
(11) ICSS |
13:55-14:20 |
An Investigation of Malicious JavaScript Code used in Drive-by Download ICSS2013-72 |
Yuta Takata, Mitsuaki Akiyama, Takeo Hariu (NTT) |
(12) ICSS |
14:20-14:45 |
Implementation and Evaluation of Web Phantom: Hybrid Web Honeypot ICSS2013-73 |
Takeshi Yagi, Takeo Hariu (NTT) |
|
14:45-14:55 |
Break ( 10 min. ) |
Thu, Mar 27 PM Session 2B - SPT Chair: Shigeyoshi Shima(NEC) 14:55 - 16:35 |
(13) |
14:55-15:20 |
STP(2) |
(14) |
15:20-15:45 |
STP(2) |
(15) |
15:45-16:10 |
SPT(3) |
(16) |
16:10-16:35 |
SPT(4) |
Fri, Mar 28 AM Session 3A - ICSS Chair: Takeshi Ueda (Mitsubishi Electric) 09:00 - 10:40 |
(17) ICSS |
09:00-09:25 |
Ruleset Optimization for Detecting Malware-Derived Traffic Based on Network-Dependent Log Analysis ICSS2013-74 |
Kensuke Nakata, Kazunori Kamiya, Hiroshi Kurakami, Kazufumi Aoki, Takeshi Yagi (NTT) |
(18) ICSS |
09:25-09:50 |
Spam Analysis based on Mail Relay Routing ICSS2013-75 |
Junji Nakazato, Tao Ban (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) |
(19) ICSS |
09:50-10:15 |
Implementation and Evaluation of a Proactive Cyber Attack Monitoring Platform ICSS2013-76 |
Masashi Eto (NICT), Tomohide Tanaka (clwit), Koei Suzuki, Daisuke Inoue, Koji Nakao (NICT) |
(20) ICSS |
10:15-10:40 |
MATATABI: Multi-layer Threat Analysis Platform with Hadoop ICSS2013-77 |
Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Yuji Sekiya (Univ. of Tokyo), Youki Kadobayashi (NAIST) |
|
10:40-10:50 |
Break ( 10 min. ) |
Fri, Mar 28 AM Session 4A - ICSS Chair: Hiroki Takakura (Nagoya Univ.) 10:50 - 12:30 |
(21) ICSS |
10:50-11:15 |
Detection of Android apps that secretly abuse the camera ICSS2013-78 |
Takuya Watanabe, Tatsuya Mori, Tetsuya Sakai (Waseda Univ.) |
(22) ICSS |
11:15-11:40 |
Timeline-Based Event Log Viewer over Multi-Host Environment ICSS2013-79 |
Takashi Tomine, Yu Tsuda, Masaki Kamizono (NICT), Kazunori Sugiura (Keio Univ.), Daisuke Inoue, Koji Nakao (NICT) |
(23) ICSS |
11:40-12:05 |
DNS Traffic Analysis Platform with Hadoop Framework ICSS2013-80 |
Tomohiro Ishihara, Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Daisuke Miyamoto, Yuji Sekiya (Univ. of Tokyo) |
(24) ICSS |
12:05-12:30 |
Identifying C&C Server by Analyzing Relation between Control Flow and Communications ICSS2013-81 |
Tomonori Ikuse, Kazufumi Aoki, Takeo Hariu (NTT) |
|
12:30-13:30 |
Lunch Break ( 60 min. ) |
Fri, Mar 28 PM Session 5A - ICSS Chair: Masakatu Morii (Kobe Univ.) 13:30 - 15:10 |
(25) ICSS |
13:30-13:55 |
A Method To Detect Android Privilege Escalation ICSS2013-82 |
Wataru Hasegawa, Lujo Bauer (Carnegie Mellon Univ.), Kilho Shin (Univ. of Hyogo) |
(26) ICSS |
13:55-14:20 |
Proposal of malware classification method based on pattern similarity of traffic ICSS2013-83 |
Hyoyoung Lim, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) |
(27) ICSS |
14:20-14:45 |
Design of HTTP Communication Profiling for Infected Hosts Detection ICSS2013-84 |
Daiki Chiba, Kensuke Nakata, Mitsuaki Akiyama, Kazufumi Aoki, Kazunori Kamiya, Takeshi Yagi (NTT) |
(28) ICSS |
14:45-15:10 |
Supporting Effect Assessment of Accessing Malicious Web Sites with Multi-Environment Analysis ICSS2013-85 |
Takayuki Yoshinori, Akihito Shinoda (Nagoya Inst. of Tech), Masaki Kamizono (NICT), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech) |
Fri, Mar 28 AM Session 3B - ICSS Chair: Yoshiro Wataguchi(FUJITSU labs) 09:00 - 10:40 |
(29) ICSS |
09:00-09:25 |
A Study on the Formulation of Re-identification of Anonymized Personal Information ICSS2013-86 |
Hiroko Akiyama, Akira Kato, Hideki Sunahara (Keio Univ.) |
(30) ICSS |
09:25-09:50 |
Comparison of Privacy Policies in Different Domains ICSS2013-87 |
Toru Nakamura (KDDI Lab.), Milena Tasic (Univ. of Belgrade), Shinsaku Kiyomoto, Yutaka Miyake (KDDI Lab.) |
(31) ICSS |
09:50-10:15 |
Shortening of High Load Virtual Machine Live Migration Time by Controlling CPU Resource ICSS2013-88 |
Yasuhiro Teramoto, Toshiharu Kishi, Yukio Nagafuchi, Takaaki Koyama, Hideo Kitazume (NTT) |
(32) ICSS |
10:15-10:40 |
Evaluation of user average delay reducing method in the live migration environment between datacenters ICSS2013-89 |
Yukio Nagafuchi, Yasuhiro Teramoto, Toshiharu Kishi, Takaaki Koyama, Hideo Kitazume (NTT) |
|
10:40-10:50 |
Break ( 10 min. ) |
Fri, Mar 28 AM Session4B - SPT Chair: Yukiyasu Tsunoo(NEC) 10:50 - 12:05 |
(33) |
10:50-11:15 |
SPT(5) |
(34) |
11:15-11:40 |
SPT(6) |
(35) |
11:40-12:05 |
SPT(7) |
|
12:05-13:35 |
Lunch Break ( 90 min. ) |
Fri, Mar 28 PM セッション5B - ICSS Chair: Yutaka Miyake (KDDI R&D Labs.) 13:30 - 15:35 |
(36) ICSS |
13:30-13:55 |
A Speculation of Operating an Integrated Service for Manifatures on Public Clouds and Issues Regarding Security ICSS2013-90 |
Takashi Sakakura (Mitsubishi Electric) |
(37) ICSS |
13:55-14:20 |
Evaluation of hash tree construction on P2P networks ICSS2013-91 |
Tomoyuki Asaeda, Taihei Higuchi, Masakazu Soshi (Hiroshima City Univ.) |
(38) ICSS |
14:20-14:45 |
Path Authentication for VANET with Group One-Way Cross-Networks ICSS2013-92 |
Shoma Kitayama, Masakazu Soshi (Hiroshima City Univ.) |
(39) ICSS |
14:45-15:10 |
System Security Analysis using Dependency Relationship on Cloud ICSS2013-93 |
Yoshiro Wataguchi, Nobuyuki Kanaya (FUJITSU labs), Takao Okubo (IISEC) |
(40) ICSS |
15:10-15:35 |
Higher Order Differential Property of LBlock(II) ICSS2013-94 |
Naoki Shibayama (Japan Air Self-Defense Force), Toshinobu Kaneko (Tokyo Univ. of Science) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
IPSJ-SPT |
Special Interest Group on Security Psychology and Trust (IPSJ-SPT) [Latest Schedule]
|
Contact Address |
|
ICSS |
Technical Committee on Information and Communication System Security (ICSS) [Latest Schedule]
|
Contact Address |
Yutaka Miyake (KDDI R&D Laboratories, Inc.)
TEL: +81-49-278-7367, FAX: +81-49-278-7510
E-: is-qst |
Announcement |
Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html |
Last modified: 2014-03-20 10:40:58
|