Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, ICSS |
2011-06-16 13:05 |
Fukuoka |
Kyushu Institute of Technology |
Combining the outcomes of IP reputation services Tatsuya Mori, Kazumichi Sato, Yousuke Takahashi, Tatsuaki Kimura, Keisuke Ishibashi (NTT) IA2011-1 ICSS2011-1 |
(To be available after the conference date) [more] |
IA2011-1 ICSS2011-1 pp.1-6 |
IA, ICSS |
2011-06-16 13:30 |
Fukuoka |
Kyushu Institute of Technology |
An Architecture of A Multifactor Authentication Platform for Hybrid Cloud Satoshi Yagi, Ryoichi Kasuga, Satoshi Imamura, Jiro Yamada, Hidetoshi Takasugi (NTT Communications) IA2011-2 ICSS2011-2 |
The multifactor authentication platform which manages user identity with the authentication information like the passwor... [more] |
IA2011-2 ICSS2011-2 pp.7-12 |
IA, ICSS |
2011-06-16 13:55 |
Fukuoka |
Kyushu Institute of Technology |
[Invited Talk]
IPA's Activities on Cloud Security and Recent Topics of Cloud Security Alliance (CSA) Ben T. Katsumi (IPA) IA2011-3 ICSS2011-3 |
(To be available after the conference date) [more] |
IA2011-3 ICSS2011-3 pp.13-18 |
IA, ICSS |
2011-06-16 15:00 |
Fukuoka |
Kyushu Institute of Technology |
An Extension of Hierarchical Automatic Locator Number Allocation Protocol HANA for a Hierarchical Routing Protocol Kenji Fujikawa (NICT), Masataka Ohta (TITECH) IA2011-7 ICSS2011-7 |
In order to suppress the increase in the global routing table size,
address hierarchicalization
and multihoming that d... [more] |
IA2011-7 ICSS2011-7 pp.37-40 |
IA, ICSS |
2011-06-16 16:35 |
Fukuoka |
Kyushu Institute of Technology |
A Practical Usage of Large-scale Darknet Monitoring for Disaster Recovery Daisuke Inoue, Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Koji Nakao (NICT) IA2011-5 ICSS2011-5 |
[more] |
IA2011-5 ICSS2011-5 pp.25-30 |
IA, ICSS |
2011-06-16 17:00 |
Fukuoka |
Kyushu Institute of Technology |
A study of the information system at the time of earthquake disaster Masahiro Hiji (Tohoku Univ./Hitachi East Japan Solutions, Ltd.) IA2011-6 ICSS2011-6 |
The 2011 off the Pacific coast of Tohoku Earthquake caused serious damage in the Pacific coast of the Tohoku district. T... [more] |
IA2011-6 ICSS2011-6 pp.31-36 |
IA, ICSS |
2011-06-17 10:00 |
Fukuoka |
Kyushu Institute of Technology |
A Profiling Method of Attacking Hosts based on Scan Feature Extraction Masashi Eto, Yaichiro Takagi, Jungsuk Song, Daisuke Inoue, Koji Nakao (NICT) IA2011-4 ICSS2011-4 |
[more] |
IA2011-4 ICSS2011-4 pp.19-24 |
IA, ICSS |
2011-06-17 10:25 |
Fukuoka |
Kyushu Institute of Technology |
Secure and Traceable Online Image Sharing Scheme for Service Providers Kohei Sugiyama, Masaki Fukushima, Teruyuki Hasegawa (KDDI Labs.) IA2011-8 ICSS2011-8 |
We propose a scheme for application service providers to provide a secure and traceable online image sharing service. To... [more] |
IA2011-8 ICSS2011-8 pp.41-46 |
IA, ICSS |
2011-06-17 10:50 |
Fukuoka |
Kyushu Institute of Technology |
[Invited Talk]
Trend on Information Security and Technologies for Solving Issues Ryoichi Sasaki (Tokyo Denki Univ.) IA2011-9 ICSS2011-9 |
Information security issues can be considered to reach new stage judging from appearances of Wikileaks and Stuxnet, and ... [more] |
IA2011-9 ICSS2011-9 pp.47-56 |
IA, ICSS |
2011-06-17 13:00 |
Fukuoka |
Kyushu Institute of Technology |
Detecting Original Entry Point based on Comparing Runtime Library Codes in Malware Unpacking Kazuki Iwamoto, Katsumi Wasaki (Shinshu Univ.) IA2011-10 ICSS2011-10 |
Almost malwares are compressed or encrypted by packer.
So we can't analyse them directly.
Several methods to extract a... [more] |
IA2011-10 ICSS2011-10 pp.57-62 |
IA, ICSS |
2011-06-17 13:50 |
Fukuoka |
Kyushu Institute of Technology |
DenseShip: Virtual Machine Monitor Specialized for Server-Type Honeypot Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT) IA2011-11 ICSS2011-11 |
(To be available after the conference date) [more] |
IA2011-11 ICSS2011-11 pp.63-68 |
IA, ICSS |
2011-06-17 14:35 |
Fukuoka |
Kyushu Institute of Technology |
Automatically Removing Malware Using Malware Analysis System Nobutaka Kawaguchi, Takayuki Yoda, Hiroki Yamaguchi (Hitachi), Toshihiko Kasagi (KDDI), Yuji Hoshizawa (SecureBrain) IA2011-12 ICSS2011-12 |
[more] |
IA2011-12 ICSS2011-12 pp.69-74 |
IA, ICSS |
2011-06-17 15:00 |
Fukuoka |
Kyushu Institute of Technology |
Analysis of Website Infections using Malware Takeshi Yagi, Shinta Nakayama, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Mitsutaka Itoh (NTT) IA2011-13 ICSS2011-13 |
This paper reports the actual situation of website infections using malware. Recently, with the widespread of the web, m... [more] |
IA2011-13 ICSS2011-13 pp.75-80 |