Technical Committee on Information and Communication System Security (ICSS) |
[schedule] [select]
|
|
Chair |
|
Yutaka Miyake (KDDI R&D Labs.) |
Vice Chair |
|
Yoshiaki Shiraishi (Kobe Univ.), Takeshi Ueda (Mitsubishi Electric) |
Secretary |
|
Hiroki Takakura (NII), Katsunari Yoshioka (Yokohama National Univ.) |
Assistant |
|
Kazunori Kamiya (NTT), Takahiro Kasama (NICT) |
|
Conference Date |
Mon, Mar 13, 2017 13:00 - 18:25
Tue, Mar 14, 2017 09:30 - 13:10 |
Topics |
System Security, etc. |
Conference Place |
University of Nagasaki |
Address |
-1-1 Manabino, Nagayo-cho, Nishi-Sonogi-gun, Nagasaki 851-2195,JAPAN |
Transportation Guide |
http://sun.ac.jp/e/campus/siebold/ |
Contact Person |
Prof. Ayako Komatsu |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Mon, Mar 13 PM Network Security 1 13:00 - 14:15 |
(1) ICSS |
13:00-13:25 |
Clustering of Bot Port Scan and Brute-force Activities ICSS2016-46 |
Shohei Araki, Bo Hu, Yukio Nagafuchi, Takaaki Koyama, Jun Miyoshi (NTT), Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) |
(2) ICSS |
13:25-13:50 |
Modeling of Attack Activity for Integrated Analysis of Threat Information ICSS2016-47 |
Kenta Nomura, Daiki Ito (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) |
(3) ICSS |
13:50-14:15 |
Early Detection of New DRDoS Attack with Protocol-Agnostic Honeypot ICSS2016-48 |
Tomomi Nishizoe (Yokohama National Univ.), Daisuke Makita (Yokohama National Univ./NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
Mon, Mar 13 PM 13:00 - 13:50 |
(4) |
13:00-13:25 |
|
(5) |
13:25-13:50 |
|
|
14:15-14:25 |
Break ( 10 min. ) |
Mon, Mar 13 PM Network Security 2 14:25 - 16:05 |
(6) ICSS |
14:25-14:50 |
Feature Extraction for Identifying High Yielding Investment Programs Related Transactions in Bitcoin ICSS2016-49 |
Kentaroh Toyoda, Tomoaki Ohtsuki (Keio Univ.), P. Takis Mathiopoulos (UoA) |
(7) ICSS |
14:50-15:15 |
A Brief Review on Anomaly Detection and its Applications to Cybersecurity ICSS2016-50 |
Danilo Vasconcellos Vargas, Kouichi Sakurai (Kyudai) |
(8) ICSS |
15:15-15:40 |
Supervised Classification for Detecting Malware Infected Host in HTTP Traffic and Long-time Evaluation for Detection Performance using Mixed Data ICSS2016-51 |
Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT) |
(9) ICSS |
15:40-16:05 |
Deep Learning Approach for Detecting Malware Infected Host and Detection Performance Evaluation with HTTP Traffic ICSS2016-52 |
Taishi Nishiyama, Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT), Kazuya Okada, Yuji Sekiya (University of Tokyo) |
Mon, Mar 13 PM 14:25 - 16:05 |
(10) |
14:25-14:50 |
|
(11) |
14:50-15:15 |
|
(12) |
15:15-15:40 |
|
(13) |
15:40-16:05 |
|
|
16:05-16:15 |
Break ( 10 min. ) |
Mon, Mar 13 PM Malware Countermeasure 16:15 - 17:30 |
(14) ICSS |
16:15-16:40 |
Evaluation of memory image acquisition/analysis function in forensics tools ICSS2016-53 |
Ikuo Tanaka, Masaki Hashimoto (IISEC) |
(15) ICSS |
16:40-17:05 |
Malicious PDF Detection Scheme using Keywords Feature based on Fuzzy inference ICSS2016-54 |
Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) |
(16) ICSS |
17:05-17:30 |
Effective Analysis of Macro Malware Based on Clustering ICSS2016-55 |
Toshinori Usui (NTT), Tomonori Ikuse (NTT Security Japan), Makoto Iwamura, Takeshi Yada (NTT) |
Mon, Mar 13 PM IoT Security 1 16:15 - 17:05 |
(17) ICSS |
16:15-16:40 |
A Study on Parameter Adjustment of Whitelist Detection Rule ICSS2016-56 |
Takeshi Ueda (Mitsubishi Electric Corp.), Kobayashi Nobuhiro (Mitsubishi Electric Corp./ Shizuoka Univ.), Masakatsu Nishigaki (Shizuoka Univ) |
(18) ICSS |
16:40-17:05 |
Primary Discussion about a Honeypot System for IoT Aimed Protocols ICSS2016-57 |
Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) |
|
17:30-17:40 |
Break ( 10 min. ) |
Mon, Mar 13 PM 17:40 - 18:25 |
(19) |
17:40-18:25 |
|
Tue, Mar 14 AM Web Security 09:30 - 10:45 |
(20) ICSS |
09:30-09:55 |
Visual Similarity-based Phishing Websites Detection Scheme using Image and CSS with Target Website Finder ICSS2016-58 |
Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ) |
(21) ICSS |
09:55-10:20 |
Towards Reducing False Positives of Host based Intrusion Detection by Static Code Analysis of Web Applications ICSS2016-59 |
Yang Zhong, Tohru Sato, Masaki Tanikawa (NTT) |
(22) ICSS |
10:20-10:45 |
Attack Pattern Extraction by Clustering Parameters ICSS2016-60 |
Shingo Orihara, Tohru Sato, Masaki Tanikawa (NTT) |
Tue, Mar 14 AM IoT Security 2 09:30 - 10:45 |
(23) ICSS |
09:30-09:55 |
ICSS2016-61 |
|
(24) ICSS |
09:55-10:20 |
ICSS2016-62 |
|
(25) ICSS |
10:20-10:45 |
Assignment and Solution regarding Access Control of a Camera on a Computer ICSS2016-63 |
Yuri Yoshino, Masaki Inamura (TDU) |
|
10:45-10:55 |
Break ( 10 min. ) |
Tue, Mar 14 AM Network Security 3 10:55 - 12:10 |
(26) ICSS |
10:55-11:20 |
Low rate attack detection method based on duration of burst state by using quick packet matching function ICSS2016-66 |
Yuhei Hayashi, Jia Yong Zhen, Satoshi Nishiyama, Akira Misawa (NTT) |
(27) ICSS |
11:20-11:45 |
Graph based Detection of Advanced Persistent Threat on LAN ICSS2016-65 |
Hiroki Nagayama, Bo Hu, Takaaki Koyama, Jun Miyoshi (NTT) |
(28) ICSS |
11:45-12:10 |
Representation for Attack Activity to Associate Threat Information ICSS2016-64 |
Daiki Ito, Kenta Nomura (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) |
Tue, Mar 14 AM Malware Countermeasure 10:55 - 12:10 |
(29) ICSS |
10:55-11:20 |
A Vulnerability Analysis of Android Applications from the View of Framework |
Ryoya Furukawa, Tatsuya Nagai (Kobe Univ.), Hiroshi Kumagai, Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) |
(30) ICSS |
11:20-11:45 |
Ransomware Detection Focused on Encryption Processing ICSS2016-67 |
Shigeta Takanari, Morii Masakatu (Kobe Univ.), Hasegawa Tomohisa, Ikegami Masato, Ishikawa Teiichi (Canon IT Solutions) |
(31) ICSS |
11:45-12:10 |
Towards finding Code Snippets on a Question and Answer Website causing Mobile App Vulnerabilities ICSS2016-68 |
Hiroki Nakano (YNU), Fumihiro Kanei, Mitsuaki Akiyama (NTT), Katsunari Yoshioka (YNU) |
|
12:10-12:20 |
Break ( 10 min. ) |
Tue, Mar 14 PM Network Security 4 12:20 - 13:10 |
(32) ICSS |
12:20-12:45 |
Evaluation of Host Independent and Distributed Detection System of the Network Attack by Using OpenFlow ICSS2016-69 |
Ryosuke Miyazaki (ISIT/Kyushu Univ.), Junpei Kawamoto (), Shinichi Matsumoto (Kyushu Univ.), Kouichi Sakurai (ISIT/Kyushu Univ.) |
(33) ICSS |
12:45-13:10 |
A Study of Security Evaluation for Composite Systems ICSS2016-70 |
Kobayashi Nobuhiro (Mitsubishi Electric Corp./ Shizuoka Univ.), Takeshi Ueda (Mitsubishi Electric Corp.), Masakatsu Nishigaki (Shizuoka Univ.) |
Tue, Mar 14 PM Authenticaion, Cryptography 12:20 - 13:10 |
(34) ICSS |
12:20-12:45 |
Vibration-based Key Exchange among Multiple Smart Devices on the Desk ICSS2016-71 |
Alisa Arno, Kentaroh Toyoda (Keio Univ.), Yuji Watanabe (IBM Japan), Iwao Sasase (Keio Univ.), P. Takis Mathiopoulos (Athens Univ.) |
(35) ICSS |
12:45-13:10 |
A system architecture that prevents fraud issue using third parties to issue authentication information ICSS2016-72 |
Masahiro Matsui, Akira Nagai, Tetsutaro Kobayashi, Hironobu Okuyama (NTT) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ICSS |
Technical Committee on Information and Communication System Security (ICSS) [Latest Schedule]
|
Contact Address |
Yutaka Miyake (KDDI R&D Laboratories, Inc.)
TEL: +81-49-278-7367, FAX: +81-49-278-7510
E-: is-qst |
Announcement |
Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html |
IPSJ-SPT |
Special Interest Group on Security Psychology and Trust (IPSJ-SPT) [Latest Schedule]
|
Contact Address |
|
Last modified: 2017-03-11 17:11:27
|