Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IA |
2014-06-05 13:35 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
[Invited Talk]
A two-path authentication for protecting net banking against illegal access
-- How to prevent Man-In-The-Middle/Browser Attack -- Haruhiko Fujii (NTT) IA2014-1 ICSS2014-1 |
(To be available after the conference date) [more] |
IA2014-1 ICSS2014-1 pp.1-5 |
ICSS, IA |
2014-06-05 14:25 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
[Invited Talk]
How did we arrive at the top Tsunehiko Suzuki (Chukyo Univ.), Toshinori Maeno |
In 2008, Dan Kaminsky presented the efficient poisoning method that DNS caches could mistakenly accept fake responses. H... [more] |
|
ICSS, IA |
2014-06-05 15:15 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
[Invited Talk]
Threat and Countermeasure Against the Targeted Attack Satoru Torii (Fujitsu Labs.) IA2014-2 ICSS2014-2 |
A lot of incidents by crafty cyber-attacks such as a targeted attack are made public. To confront such novel cyber-attac... [more] |
IA2014-2 ICSS2014-2 pp.7-8 |
ICSS, IA |
2014-06-05 16:15 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Attack on Knapsack Cryptography by Using Intermediary Plaintext Yoshihiro Kusanagi, Atsushi Nagao, Masakatu Morii (Kobe Univ.) IA2014-3 ICSS2014-3 |
Knapsack cryptography is the public key cryptosystem based on knapsack problem (especially subset sum problem).
Density... [more] |
IA2014-3 ICSS2014-3 pp.9-14 |
ICSS, IA |
2014-06-05 16:40 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Higher Order Monomial Attack to FEAL-4 Toshinobu Kaneko (TUS) IA2014-4 ICSS2014-4 |
In ARX type cipher, relations between input and output variables are a system of quadratic equations on $GF (2)$, if you... [more] |
IA2014-4 ICSS2014-4 pp.15-20 |
ICSS, IA |
2014-06-06 10:30 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Malicious Web Site Detection Based on Redirection Control using Client Environment Takahiro Kasama, Masashi Eto (NICT), Masaki Kamizono (NICT/SecureBrain), Daisuke Inoue (NICT) IA2014-5 ICSS2014-5 |
[more] |
IA2014-5 ICSS2014-5 pp.21-26 |
ICSS, IA |
2014-06-06 10:55 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Development of an Environment-independent Dynamic Analysis System for Document Malware Masaki Kamizono (NICT/SecureBrain), Kazuki Iwamoto (SecureBrain), Takahiro Kasama, Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) IA2014-6 ICSS2014-6 |
[more] |
IA2014-6 ICSS2014-6 pp.27-32 |
ICSS, IA |
2014-06-06 11:20 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Ransomware: Threat Analysis and Countermeasures Akira Kanaoka (Toho Univ.), Toshihiro Ohigashi (Hiroshima Univ.) IA2014-7 ICSS2014-7 |
Ransomware which disables data or functions in victim's computer and demand money from victim, uses cryptographic techno... [more] |
IA2014-7 ICSS2014-7 pp.33-38 |
ICSS, IA |
2014-06-06 13:00 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Analyzing Dynamic Class Loaded Applications in Android Takaaki Nagumo, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT) IA2014-8 ICSS2014-8 |
[more] |
IA2014-8 ICSS2014-8 pp.39-44 |
ICSS, IA |
2014-06-06 13:25 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Study on Comparison Regarding Schemes of Information-centric Networking Daisuke Matsubara (Hitachi), Satoru Okamoto, Naoaki Yamanaka (Keio Univ.), Tatsuro Takahashi (Kyoto Univ.) IA2014-9 ICSS2014-9 |
[more] |
IA2014-9 ICSS2014-9 pp.45-47 |
ICSS, IA |
2014-06-06 13:50 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Implementation of the Administration Policy Description Method on Automatic Network Organization System Minori Shiota, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) IA2014-10 ICSS2014-10 |
To confront recent sophisticated targeted attacks, we have to consider a information system to prevent the destruction ... [more] |
IA2014-10 ICSS2014-10 pp.49-54 |
ICSS, IA |
2014-06-06 14:25 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Shared Nothing Secure Programming in Erlang/OTP Kenji Rikitake IA2014-11 ICSS2014-11 |
Shared nothing architecture (SN) is a standard design method for distributed systems. In this paper, the author presents... [more] |
IA2014-11 ICSS2014-11 pp.55-60 |
ICSS, IA |
2014-06-06 14:50 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
List Representation Using Succinct Data Structure for Packet Filtering Yuta Kitamura (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) IA2014-12 ICSS2014-12 |
In packet filtering, increase of filtering rules causes the following two problems; complication of grasping all rules a... [more] |
IA2014-12 ICSS2014-12 pp.61-65 |
ICSS, IA |
2014-06-06 15:15 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
A Web-based Encrypted File Sending and Receiving System and Applying OpenID Authentication Kohei Isobe (Nagoya Inst. of Tech.), Masanori Hirotomo (Saga Univ.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) IA2014-13 ICSS2014-13 |
In the case of sending and receiving files which need secret via the Internet, files get encrypted. Encrypting files req... [more] |
IA2014-13 ICSS2014-13 pp.67-72 |