Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, ICSS |
2010-06-17 13:05 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Visualizing Gumblar infected machines by Analysis of Network Traffic Hirokazu Kaneko, Takahiro Matsuki, Yuu Arai (LAC) IA2010-1 ICSS2010-1 |
Recently, the cyber attack accomplishes evolution more and more, and stealing information by using various techniques. I... [more] |
IA2010-1 ICSS2010-1 pp.1-6 |
IA, ICSS |
2010-06-17 13:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A data screening technique for network log data by frequent sequential pattern mining Hisashi Tsuruta, Takayoshi Shoudai, Jun'ichi Takeuchi (Kyushu Univ./ISIT) IA2010-2 ICSS2010-2 |
To early detect and defend the threats in the Internet caused by botnet,
darknet monitoring is very important to unders... [more] |
IA2010-2 ICSS2010-2 pp.7-12 |
IA, ICSS |
2010-06-17 13:55 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Automatic OEP Finding Method for Malware Unpacking Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT) IA2010-3 ICSS2010-3 |
Malware analysts have to first extract hidden original code from a packed executable to analyze malware functionalities,... [more] |
IA2010-3 ICSS2010-3 pp.13-18 |
IA, ICSS |
2010-06-17 14:20 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
How to Identify Code Region after Detecting Entry Point of Malware Makoto Iwamura, Mitsutaka Itoh (NTT/Waseda Univ.), Yoichi Muraoka (Waseda Univ.) IA2010-4 ICSS2010-4 |
The goal of many existing methods for unpacking was finding OEP (Original Entry Point), not identifying where the origin... [more] |
IA2010-4 ICSS2010-4 pp.19-24 |
IA, ICSS |
2010-06-17 14:55 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Anonymous Communication Protocol for Encouraging to Report Problems in Social Groups and Its Evaluation using Game Theory Kohei Sugiyama, Masaki Fukushima, Teruyuki Hasegawa (KDDI Labs.) IA2010-5 ICSS2010-5 |
In this paper, we propose an anonymous communication protocol for encouraging to report problems in social groups. The p... [more] |
IA2010-5 ICSS2010-5 pp.25-30 |
IA, ICSS |
2010-06-17 15:20 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Proposal and Consideration for An Anonymity Method for Widespred High-Speed Incident Analysis System(II) Ryoichi Isawa (CRYPTO), Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO), Koji Nakao (NICT) IA2010-6 ICSS2010-6 |
Some organizations need to collaborate each other to analyze the computer security incidents which become complex. The n... [more] |
IA2010-6 ICSS2010-6 pp.31-36 |
IA, ICSS |
2010-06-17 15:45 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Implementation and its Evaluation of A Secure One-Time Passoword Method against the Stolen-Verifier Attack Tatsuya Takehisa (JDC), Ryoichi Isawa (Crypto), Masakatu Morii (Kobe Univ.) IA2010-7 ICSS2010-7 |
The ssh is widely used for the construction of the secure communication channel, and the authentic method based on publi... [more] |
IA2010-7 ICSS2010-7 pp.37-42 |
IA, ICSS |
2010-06-17 16:10 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
iAuth: Yet Another HTTP Authentication Framework Integrated into HTML Forms Takeru Inoue, Yohei Katayama, Hiroshi Sato, Noriyuki Takahashi (NTT) IA2010-8 ICSS2010-8 |
Current Web authentication methods have their own issues. Forms and cookies, which is most commonly used, has a long-st... [more] |
IA2010-8 ICSS2010-8 pp.43-48 |
IA, ICSS |
2010-06-17 16:45 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
[Invited Talk]
* Hiromitsu Takagi (AIST) |
[more] |
|
IA, ICSS |
2010-06-18 10:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Scalable and User-friendly Access Control Mechanism for Distirubted File System Jumpei Arakawa, Koichi Sasada (Univ. of Tokyo.), Ikuo Takeuchi IA2010-9 ICSS2010-9 |
This paper describes our access control mechanism for distributed file
system. Capability-based access control mechanis... [more] |
IA2010-9 ICSS2010-9 pp.49-54 |
IA, ICSS |
2010-06-18 10:25 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A Vision of the Open Mobile Communication System with All Stratum Virtualization Nao Kawanishi (ATR), Ahmad Kamil Abdul Hamid (The Univ. of Tokyo), Yoshimasa Miyamori, Atsushi Kusuda (ATR), Yoshihiro Kawahara (The Univ. of Tokyo), Masayoshi Ohashi (ATR), Tohru Asami (The Univ. of Tokyo) IA2010-10 ICSS2010-10 |
[more] |
IA2010-10 ICSS2010-10 pp.55-59 |
IA, ICSS |
2010-06-18 10:50 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A study on security threats to Android devices Ei Shimamura, Masaya Yamagata (NEC) IA2010-11 ICSS2010-11 |
Due to the increase of non-business use introduced by iPhone and Android, the sales volume of smartphone devices, especi... [more] |
IA2010-11 ICSS2010-11 pp.61-66 |
IA, ICSS |
2010-06-18 13:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
[Invited Talk]
* Itsuro Nishimoto (LAC) IA2010-12 ICSS2010-12 |
[more] |
IA2010-12 ICSS2010-12 p.67 |
IA, ICSS |
2010-06-18 13:55 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
An Empirical Investigation of Gumblar Evolution Mitsuaki Akiyama, Kazumichi Sato, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.) IA2010-13 ICSS2010-13 |
Due to incidents of web-based malware infection lead by a tampered web content, called Gumblar, clarification of
the ac... [more] |
IA2010-13 ICSS2010-13 pp.69-74 |
IA, ICSS |
2010-06-18 14:20 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A Life-cycle Monitoring Method of Malware Download Sites for Websites Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IA2010-14 ICSS2010-14 |
This paper proposes a method to monitor life-cycle of malware download sites for websites and reports the actual life-cy... [more] |
IA2010-14 ICSS2010-14 pp.75-80 |
IA, ICSS |
2010-06-18 14:45 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Hard-wired Shellcode Detection Algorithm
-- trial implementations on FPGA and ASIC -- Hiroki Nogawa, Fuminori Adachi, Yasumitsu Tsujino, Seiji Moriya, Kazunori Saito (Secureware) IA2010-15 ICSS2010-15 |
Shellcodes are essential parts of remote exploit, and display wide range of varieties (polymorphism). Many researchers h... [more] |
IA2010-15 ICSS2010-15 pp.81-86 |