Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2014-03-27 13:05 |
Okinawa |
Meio Univiersity |
The countermeasures against extraction of AES keys from memory dumping. Michiyoshi Satoh (TSH) ICSS2013-62 |
The cipher AES extends a 128 bits (or 192 bits, 256 bits) secret key to 1408 bits (or 1664 bits, 1920 bits). Since the e... [more] |
ICSS2013-62 pp.1-6 |
ICSS, IPSJ-SPT |
2014-03-27 13:30 |
Okinawa |
Meio Univiersity |
An Active Attack on RC4 in SSL/TLS Toshihiro Ohigashi (Hiroshima Univ.), Takanori Isobe (Sony), Yuhei Watanabe (Kobe Univ.), Ryo Nojima (NICT), Masakatu Morii (Kobe Univ.) ICSS2013-63 |
In 2013, Isobe et al. and AlFardan et al. proposed practical plaintext recovery attacks on RC4 in SSL/TLS in the broadca... [more] |
ICSS2013-63 pp.7-12 |
ICSS, IPSJ-SPT |
2014-03-27 13:55 |
Okinawa |
Meio Univiersity |
Implementation and Evaluation of a Distributed Secure Multi-party Computation System Koki Hamada (NTT) ICSS2013-64 |
[more] |
ICSS2013-64 pp.13-17 |
ICSS, IPSJ-SPT |
2014-03-27 14:20 |
Okinawa |
Meio Univiersity |
General Construction of Certified Data Transmission Protocol Using ID-Based Encryption and ID-Based Signature Hitoshi Miyazaki (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) ICSS2013-65 |
Certified data transmission protocols are used to attest to the fact that online deals of data is actually made. It is d... [more] |
ICSS2013-65 pp.19-24 |
ICSS, IPSJ-SPT |
2014-03-27 14:55 |
Okinawa |
Meio Univiersity |
SSL Client Authentication with TPM
-- Issuance of Public Key Certificate with OpenID and Terminal Authentication with SSL Client Certificate -- Akihito Shinoda (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) ICSS2013-66 |
TPM-embedded terminals can be used as authentication tokens by issuing certificates to signature keys generated by TPM. ... [more] |
ICSS2013-66 pp.25-30 |
ICSS, IPSJ-SPT |
2014-03-27 15:20 |
Okinawa |
Meio Univiersity |
An authenticated key exchange protocol for the network between a server and terminals Yumiko Murakami, Yutaka Kawai, Nobuhiro Kobayashi (Mitsubishi Electric) ICSS2013-67 |
[more] |
ICSS2013-67 pp.31-35 |
ICSS, IPSJ-SPT |
2014-03-27 15:45 |
Okinawa |
Meio Univiersity |
On Threats of Impersonation and Man-In-The-Middle Attack on Network Printers Yuka Enomoto, Akira Kanaoka (Toho Univ.) ICSS2013-68 |
From Windows Vista, automatic network printer discovery and configuration is available by UPnP functions.
Recent Window... [more] |
ICSS2013-68 pp.37-41 |
ICSS, IPSJ-SPT |
2014-03-27 16:10 |
Okinawa |
Meio Univiersity |
Applying Identity-based Cryptography to Mutual Authentication between OpenFlow Devices Tomoko Kazama, Akira Kanaoka (Toho Univ.) ICSS2013-69 |
Current OpenFlow specification apply TLS to establish mutual authentication between a controller and a switch, as option... [more] |
ICSS2013-69 pp.43-48 |
ICSS, IPSJ-SPT |
2014-03-27 13:05 |
Okinawa |
Meio Univiersity |
Practical Password Management System against password-list-attacks
-- Proposal of protection of Master Password -- Hironao Teruya, Wataru Nakamura (Meio Univ.), Keisuke Furumoto (Kobe Univ.), Takeshi Tengan, Katsuyoshi Tanabe (Meio Univ.), Masakatu Morii (Kobe Univ.) ICSS2013-70 |
With the increased use of the internet, the number of passwords which a user has to manage is also increasing. One of ma... [more] |
ICSS2013-70 pp.49-52 |
ICSS, IPSJ-SPT |
2014-03-27 13:30 |
Okinawa |
Meio Univiersity |
Measuring Lifetime of Malicious Website Based on Redirection from Compromised Websites Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT) ICSS2013-71 |
Attackers continuously generate URLs and FQDNs of malicious websites in order to circumvent security countermeasures
us... [more] |
ICSS2013-71 pp.53-58 |
ICSS, IPSJ-SPT |
2014-03-27 13:55 |
Okinawa |
Meio Univiersity |
An Investigation of Malicious JavaScript Code used in Drive-by Download Yuta Takata, Mitsuaki Akiyama, Takeo Hariu (NTT) ICSS2013-72 |
Malicious website contains JavaScript code that exploits vulnerabilities in the browser or the browser's plugins.Researc... [more] |
ICSS2013-72 pp.59-64 |
ICSS, IPSJ-SPT |
2014-03-27 14:20 |
Okinawa |
Meio Univiersity |
Implementation and Evaluation of Web Phantom: Hybrid Web Honeypot Takeshi Yagi, Takeo Hariu (NTT) ICSS2013-73 |
[more] |
ICSS2013-73 pp.65-70 |
ICSS, IPSJ-SPT |
2014-03-28 09:00 |
Okinawa |
Meio Univiersity |
Ruleset Optimization for Detecting Malware-Derived Traffic Based on Network-Dependent Log Analysis Kensuke Nakata, Kazunori Kamiya, Hiroshi Kurakami, Kazufumi Aoki, Takeshi Yagi (NTT) ICSS2013-74 |
Recent cyber-attacks rapidly get advanced to infect terminals via invalid network access and could damage enterprise act... [more] |
ICSS2013-74 pp.95-100 |
ICSS, IPSJ-SPT |
2014-03-28 09:25 |
Okinawa |
Meio Univiersity |
Spam Analysis based on Mail Relay Routing Junji Nakazato, Tao Ban (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-75 |
The characteristic analysis using contents of spam mail is changed by the purpose of spam campaign. In this paper, we pr... [more] |
ICSS2013-75 pp.101-106 |
ICSS, IPSJ-SPT |
2014-03-28 09:50 |
Okinawa |
Meio Univiersity |
Implementation and Evaluation of a Proactive Cyber Attack Monitoring Platform Masashi Eto (NICT), Tomohide Tanaka (clwit), Koei Suzuki, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-76 |
A number of network monitoring systems such as honeypot and web crawler have been launched to address increasingly-sophi... [more] |
ICSS2013-76 pp.107-112 |
ICSS, IPSJ-SPT |
2014-03-28 10:15 |
Okinawa |
Meio Univiersity |
MATATABI: Multi-layer Threat Analysis Platform with Hadoop Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Yuji Sekiya (Univ. of Tokyo), Youki Kadobayashi (NAIST) ICSS2013-77 |
Threat detections and analyses are indispensable processes in today’s cyberspace, but current state of the arts are stil... [more] |
ICSS2013-77 pp.113-118 |
ICSS, IPSJ-SPT |
2014-03-28 10:50 |
Okinawa |
Meio Univiersity |
Detection of Android apps that secretly abuse the camera Takuya Watanabe, Tatsuya Mori, Tetsuya Sakai (Waseda Univ.) ICSS2013-78 |
We propose a method for detecting Android apps that may secretly abuse the camera to leak private or important informati... [more] |
ICSS2013-78 pp.119-124 |
ICSS, IPSJ-SPT |
2014-03-28 11:15 |
Okinawa |
Meio Univiersity |
Timeline-Based Event Log Viewer over Multi-Host Environment Takashi Tomine, Yu Tsuda, Masaki Kamizono (NICT), Kazunori Sugiura (Keio Univ.), Daisuke Inoue, Koji Nakao (NICT) ICSS2013-79 |
A cyber attacking becomes clever and complicated.
Recently the number of Advanced Persistent Threat (APT) attacks to ge... [more] |
ICSS2013-79 pp.125-130 |
ICSS, IPSJ-SPT |
2014-03-28 11:40 |
Okinawa |
Meio Univiersity |
DNS Traffic Analysis Platform with Hadoop Framework Tomohiro Ishihara, Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Daisuke Miyamoto, Yuji Sekiya (Univ. of Tokyo) ICSS2013-80 |
Recently, cyber threats have rapidly grown in regarding to the large scale of botnets as well as the nancial damages fr... [more] |
ICSS2013-80 pp.131-135 |
ICSS, IPSJ-SPT |
2014-03-28 12:05 |
Okinawa |
Meio Univiersity |
Identifying C&C Server by Analyzing Relation between Control Flow and Communications Tomonori Ikuse, Kazufumi Aoki, Takeo Hariu (NTT) ICSS2013-81 |
In recent years, it is difficult to prevent malware infection entirely because of the diversication of attack vectors a... [more] |
ICSS2013-81 pp.137-142 |