Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2022-11-07 13:30 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
A scalable and asyncronus group end-to-end encryption protocol Taigen Takeshita, Kousei Akama (Keio Univ.), Masaaki Sato (Tokai Univ.), Keisuke Uehara (Keio Univ.) ICSS2022-38 |
E2E encryption is useful as a method of maintaining message confidentiality in chat, a modern and easy means of communic... [more] |
ICSS2022-38 pp.1-6 |
ICSS |
2022-11-07 13:55 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Blockchain-Based Cloud Storage Data Auditing Scheme for Identifying Data Provenance Yuichi Kado (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ), Masakatu Morii (Kobe Univ.) ICSS2022-39 |
[more] |
ICSS2022-39 pp.7-12 |
ICSS |
2022-11-07 14:20 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Real-time detection method for DOM-based XSS via multiple files Shu Hiura, Akira Kanaoka (Toho Univ.) ICSS2022-40 |
DOM Based XSS is one of the most common vulnerabilities related to injection attacks and is caused by improper JavaScrip... [more] |
ICSS2022-40 pp.13-18 |
ICSS |
2022-11-07 15:00 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Observation of Attack Infrastructures by Scripts that Mimic C&C Communications of IoT Bots Kaichi Sameshima, Yuki Endo, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2022-44 |
(To be available after the conference date) [more] |
ICSS2022-44 pp.37-42 |
ICSS |
2022-11-07 15:25 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Analysis of Environmental Sensitivity of Persistent IoT Malware using Sandboxes with File Systems from Various IoT Devices Takahiro Inoue (YNU), Eizo Okada, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2022-45 |
(To be available after the conference date) [more] |
ICSS2022-45 pp.43-48 |
ICSS |
2022-11-08 09:00 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Survey of Support Policy Settings and Publication for Consumer IoT Devices Takahiro Kasama (NICT), Kosuke Murakami (NICT/KDDI Research, Inc.), Akira Fujita, Daisuke Inoue (NICT) ICSS2022-41 |
There have been many cases of IoT devices that are in the End of Life (EoL) state, in which the vendor's support period ... [more] |
ICSS2022-41 pp.19-24 |
ICSS |
2022-11-08 09:25 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Analysis of Weak Password Settings for IoT Devices and Results of User Notifications Kosuke Murakami (NICT/KDDIR), Takahiro Kasama, Daisuke Inoue (NICT) ICSS2022-42 |
IoT devices with weak ID/Password settings that are accessible from the Internet by services that enable password authen... [more] |
ICSS2022-42 pp.25-30 |
ICSS |
2022-11-08 09:50 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Tracing Methodology for Scanning Campaigns Based on Darknet Analysis Chansu Han, Akira Tanaka, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (QU) ICSS2022-43 |
(To be available after the conference date) [more] |
ICSS2022-43 pp.31-36 |
ICSS |
2022-11-08 10:30 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Design and Implementation of a Task Scheduler for Delaying Ransomware Shuhei Enomoto (TUAT), Hiroki Kuzuno (Kobe Univ.), Hiroshi Yamada (TUAT), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2022-46 |
(To be available after the conference date) [more] |
ICSS2022-46 pp.49-54 |
ICSS |
2022-11-08 10:55 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
An Efficient Method of Finding Flippable Bits for RAMBleed Haruka Okuda (Kobe Univ.), Makoto Takita (Univ. of Hyogo), Kazuhide Fukushima, Yuto Nakano (KDDI Research, Inc.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2022-47 |
Rowhammer is an attack that repeatedly accesses the same row in DRAM (Dynamic Random Access Memory) to cause bit flippin... [more] |
ICSS2022-47 pp.55-60 |