IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information and Communication System Security (ICSS)  (Searched in: 2022)

Search Results: Keywords 'from:2022-11-07 to:2022-11-07'

[Go to Official ICSS Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 10 of 10  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2022-11-07
13:30
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
A scalable and asyncronus group end-to-end encryption protocol
Taigen Takeshita, Kousei Akama (Keio Univ.), Masaaki Sato (Tokai Univ.), Keisuke Uehara (Keio Univ.) ICSS2022-38
E2E encryption is useful as a method of maintaining message confidentiality in chat, a modern and easy means of communic... [more] ICSS2022-38
pp.1-6
ICSS 2022-11-07
13:55
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
Blockchain-Based Cloud Storage Data Auditing Scheme for Identifying Data Provenance
Yuichi Kado (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ), Masakatu Morii (Kobe Univ.) ICSS2022-39
 [more] ICSS2022-39
pp.7-12
ICSS 2022-11-07
14:20
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
Real-time detection method for DOM-based XSS via multiple files
Shu Hiura, Akira Kanaoka (Toho Univ.) ICSS2022-40
DOM Based XSS is one of the most common vulnerabilities related to injection attacks and is caused by improper JavaScrip... [more] ICSS2022-40
pp.13-18
ICSS 2022-11-07
15:00
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
Observation of Attack Infrastructures by Scripts that Mimic C&C Communications of IoT Bots
Kaichi Sameshima, Yuki Endo, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2022-44
(To be available after the conference date) [more] ICSS2022-44
pp.37-42
ICSS 2022-11-07
15:25
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
Analysis of Environmental Sensitivity of Persistent IoT Malware using Sandboxes with File Systems from Various IoT Devices
Takahiro Inoue (YNU), Eizo Okada, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2022-45
(To be available after the conference date) [more] ICSS2022-45
pp.43-48
ICSS 2022-11-08
09:00
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
Survey of Support Policy Settings and Publication for Consumer IoT Devices
Takahiro Kasama (NICT), Kosuke Murakami (NICT/KDDI Research, Inc.), Akira Fujita, Daisuke Inoue (NICT) ICSS2022-41
There have been many cases of IoT devices that are in the End of Life (EoL) state, in which the vendor's support period ... [more] ICSS2022-41
pp.19-24
ICSS 2022-11-08
09:25
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
Analysis of Weak Password Settings for IoT Devices and Results of User Notifications
Kosuke Murakami (NICT/KDDIR), Takahiro Kasama, Daisuke Inoue (NICT) ICSS2022-42
IoT devices with weak ID/Password settings that are accessible from the Internet by services that enable password authen... [more] ICSS2022-42
pp.25-30
ICSS 2022-11-08
09:50
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
Tracing Methodology for Scanning Campaigns Based on Darknet Analysis
Chansu Han, Akira Tanaka, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (QU) ICSS2022-43
(To be available after the conference date) [more] ICSS2022-43
pp.31-36
ICSS 2022-11-08
10:30
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
Design and Implementation of a Task Scheduler for Delaying Ransomware
Shuhei Enomoto (TUAT), Hiroki Kuzuno (Kobe Univ.), Hiroshi Yamada (TUAT), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2022-46
(To be available after the conference date) [more] ICSS2022-46
pp.49-54
ICSS 2022-11-08
10:55
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
An Efficient Method of Finding Flippable Bits for RAMBleed
Haruka Okuda (Kobe Univ.), Makoto Takita (Univ. of Hyogo), Kazuhide Fukushima, Yuto Nakano (KDDI Research, Inc.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2022-47
Rowhammer is an attack that repeatedly accesses the same row in DRAM (Dynamic Random Access Memory) to cause bit flippin... [more] ICSS2022-47
pp.55-60
 Results 1 - 10 of 10  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan