Mon, Nov 7 PM ICSS 1 13:30 - 14:45 |
(1) |
13:30-13:55 |
A scalable and asyncronus group end-to-end encryption protocol |
Taigen Takeshita, Kousei Akama (Keio Univ.), Masaaki Sato (Tokai Univ.), Keisuke Uehara (Keio Univ.) |
(2) |
13:55-14:20 |
Blockchain-Based Cloud Storage Data Auditing Scheme for Identifying Data Provenance |
Yuichi Kado (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ), Masakatu Morii (Kobe Univ.) |
(3) |
14:20-14:45 |
Real-time detection method for DOM-based XSS via multiple files |
Shu Hiura, Akira Kanaoka (Toho Univ.) |
Mon, Nov 7 PM ICSS 2 15:00 - 15:50 |
(4) |
15:00-15:25 |
Observation of Attack Infrastructures by Scripts that Mimic C&C Communications of IoT Bots |
Kaichi Sameshima, Yuki Endo, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) |
(5) |
15:25-15:50 |
Analysis of Environmental Sensitivity of Persistent IoT Malware using Sandboxes with File Systems from Various IoT Devices |
Takahiro Inoue (YNU), Eizo Okada, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) |
Mon, Nov 7 PM ICSS 3 16:10 - 17:20 |
(6) |
16:10-17:20 |
|
Tue, Nov 8 AM ICSS 4 09:00 - 10:15 |
(7) |
09:00-09:25 |
Survey of Support Policy Settings and Publication for Consumer IoT Devices |
Takahiro Kasama (NICT), Kosuke Murakami (NICT/KDDI Research, Inc.), Akira Fujita, Daisuke Inoue (NICT) |
(8) |
09:25-09:50 |
Analysis of Weak Password Settings for IoT Devices and Results of User Notifications |
Kosuke Murakami (NICT/KDDIR), Takahiro Kasama, Daisuke Inoue (NICT) |
(9) |
09:50-10:15 |
Tracing Methodology for Scanning Campaigns Based on Darknet Analysis |
Chansu Han, Akira Tanaka, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (QU) |
Tue, Nov 8 AM ICSS 5 10:30 - 11:20 |
(10) |
10:30-10:55 |
Design and Implementation of a Task Scheduler for Delaying Ransomware |
Shuhei Enomoto (TUAT), Hiroki Kuzuno (Kobe Univ.), Hiroshi Yamada (TUAT), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) |
(11) |
10:55-11:20 |
An Efficient Method of Finding Flippable Bits for RAMBleed |
Haruka Okuda (Kobe Univ.), Makoto Takita (Univ. of Hyogo), Kazuhide Fukushima, Yuto Nakano (KDDI Research, Inc.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) |