Technical Committee on Information and Communication System Security (ICSS) |
[schedule] [select]
|
|
Chair |
|
Hiroaki Kikuchi (Meiji Univ.) |
Vice Chair |
|
Yutaka Miyake (KDDI R&D Labs.), Takashi Nishide (Univ. of Tsukuba) |
Secretary |
|
Yoshiaki Shiraishi (Kobe Univ.), Takeshi Ueda (Mitsubishi Electric) |
Assistant |
|
Hiroki Takakura (Nagoya Univ.), Katsunari Yoshioka (Yokohama National Univ.) |
|
Conference Date |
Tue, Mar 3, 2015 13:00 - 18:20
Wed, Mar 4, 2015 09:00 - 16:20 |
Topics |
Communication Security, etc. |
Conference Place |
Meio University |
Address |
1220-1 Biimata, Nago City, Okinawa Japan. |
Transportation Guide |
http://www.meio-u.ac.jp/access.html |
Contact Person |
0980-51-1100 |
Announcement |
Please join the reception banquet.
2015/3/3 19:00-
Restaurant Name: Kaisen Shijo
http://r.gnavi.co.jp/6p4utj100000/
TEL: 0980-54-1216
5 mins drive from the workshop venue.
Charge: 3,500 yen
Please email y if you would like to join the banquet. |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Tue, Mar 3 PM 13:00 - 14:40 |
(1) |
13:00-13:25 |
A detection system which uses DNS traffic features to detect domains which are related to botnets ICSS2014-63 |
Wataru Tsuda, Youki Kadobayashi, Takeshi Okuda, Hiroaki Hazeyama (NAIST) |
(2) |
13:25-13:50 |
Anomaly Detection Based on Clustering of Network Traffic Characteristics Considering Results of Signature Based IDS Evaluation ICSS2014-64 |
Kohei Imai, Shigeki Aoki, Takao Miyamoto (Osaka Prefecture Univ.) |
(3) |
13:50-14:15 |
Measures to Prevent Cyber-Attack Using Multi-Layer-Binding (MLB) Router
-- A Proposal of Dropping Request Protocol, and its Implementation and Evaluation Using OpenFlow -- ICSS2014-65 |
Ken Eguchi, Shota Nagatomo, Yuji Yokoyama, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno (Tokyo Denki Univ.), Hiroshi Kobayashi (Tokyo Denki Univ) |
(4) |
14:15-14:40 |
Implementation and Evaluation of Botnet Detection System with Temporal Locality of DGA ICSS2014-66 |
Teppei Fukuda, Tomohiro Ishihara (UTokyo), Akira Kato (Keio Univ.) |
|
14:40-14:50 |
Break ( 10 min. ) |
Tue, Mar 3 PM 14:50 - 16:05 |
(5) |
14:50-15:15 |
A trial of network security tests over federated testbeds ICSS2014-67 |
Masatoshi Enomoto, Hiroaki Hazeyama (NAIST), Kazumasa Kobayashi (KUSA), Suguru Yamaguchi (NAIST) |
(6) |
15:15-15:40 |
A Pluggable and Programmable Flamework for Analyzing Security Logs ICSS2014-68 |
Yu Tsuda, Takashi Tomine, Masaki Kamizono, Masashi Eto, Daisuke Inoue (NICT) |
(7) |
15:40-16:05 |
A Study on the Effectiveness of Correlation Analysis of Cyber Attack Information by means of Tagging Technique ICSS2014-69 |
Taichi Hata (JDC/Nissin), Manabu Inuma (Josai Univ.), Junji Shikata (Yokohama National Univ.), Shin Takeuchi (JDC/Nissin), Koji Nakao (NICT) |
|
16:05-16:15 |
Break ( 10 min. ) |
Tue, Mar 3 PM 16:15 - 17:30 |
(8) |
16:15-16:40 |
Link Structural Analysis of Drive-by-Download Attacks ICSS2014-70 |
Yuji Dairiki (Kobe Univ.), Masaki Kamizono (SecureBrain), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) |
(9) |
16:40-17:05 |
Implementation and evaluation of Drive by Download Attack detection using the features of the obfuscation ICSS2014-71 |
Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama (NAIST), Takuji Iimura (UT), Youki Kadobayashi (NAIST) |
(10) |
17:05-17:30 |
A Study on CAPTCHA System Using Differential Awkwardness-Objects ICSS2014-72 |
Michitomo Yamguchi (Meiji Univ.), Takeshi Okamoto (Tsukuba Univ. of Tech.), Hiroaki Kikuchi (Meiji Univ.) |
|
17:30-17:40 |
Break ( 10 min. ) |
Tue, Mar 3 PM 17:40 - 18:20 |
(11) |
17:40-18:20 |
[Invited Talk]
Cyber Security Management |
Koji Nakao (NICT/KDDI) |
Wed, Mar 4 AM 09:00 - 10:15 |
(12) |
09:00-09:25 |
Novel USB Hub against the Malicious USB Devices ICSS2014-73 |
Tatsuya Takehisa (NICT/Nissin), Makoto Iwamura (NICT/NTT), Hayato Ushimaru (NICT/CDI), Daisuke Inoue (NICT) |
(13) |
09:25-09:50 |
Yet Another Electrical Forgery Attack on CAN using Strong Recessive ICSS2014-74 |
Takeshi Sugawara, Minoru Saeki, Manabu Misawa (Mitsubishi Electric Corp.) |
(14) |
09:50-10:15 |
A study on the safety of the pseudo-random number generator in RFID ICSS2014-75 |
Hiroyuki Sato (JAIST), Atsuko Miyaji (JAIST/JST CREST), Chunhua Su (JAIST) |
Wed, Mar 4 AM 09:00 - 10:15 |
(15) |
09:00-09:25 |
A New Explicit Relation Between Trace, Definition Field, and Embedding Degree ICSS2014-76 |
Atsuko Miyaji, Satoru Tanaka (JAIST) |
(16) |
09:25-09:50 |
Scalar Multiplication Algorithm with Resistance for Side-channel Attacks ICSS2014-77 |
Keisuke Kito (JAIST), Atsuko Miyaji (JAIST/JST CREST), Ryota Takahashi (JAIST) |
(17) |
09:50-10:15 |
An Estimation of Signature Schemes for Multiple Signers ICSS2014-78 |
Kenta Muranaka, Naoto Yanai (Osaka Univ.), Shingo Okamura (NITNC), Toru Fujiwara (Osaka Univ.) |
|
10:15-10:25 |
Break ( 10 min. ) |
Wed, Mar 4 AM 10:25 - 12:30 |
(18) |
10:25-10:50 |
Estimation of Vulnerability Score based on Annual Analysis with Supervised Latent Dirichlet Allocation ICSS2014-79 |
Yasuhiro Yamamoto, Daisuke Miyamoto, Masaya Nakayama (Tokyo Univ.) |
(19) |
10:50-11:15 |
Prediction of Malware Activities based on Loopback Address from DNS ICSS2014-80 |
Masaki Kamizono (NICT/SecureBrain), Takashi Tomine, Yu Tsuda, Masashi Eto (NICT), Yuji Hoshizawa (Securebrain Corporation), Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (ynu) |
(20) |
11:15-11:40 |
A Cyber Attack Information Gathering Method That Adopts Integrated Malware Detection Service and Dynamic Analysis ICSS2014-81 |
Shuta Morishima, Takuya Tsutsumi, Rui Tanabe, Yusuke Takahashi, Masaaki Kobayashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
(21) |
11:40-12:05 |
Internet Alive Monitoring Method around Disaster Areas Using Large-scale Darknet, Autonomous System Information, and Geographical Information ICSS2014-82 |
Mio Suzuki (NICT), Jumpei Shimamura (Clwit), Junji Nakazato, Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) |
(22) |
12:05-12:30 |
Finding Network Address Blocks Intensively Used for Cyber Attacks ICSS2014-83 |
Takuya Tsutsumi, Shuta Morishima, Shogo Suzuki, Kenichi Shibahara, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
|
12:30-13:40 |
Lunch Break ( 70 min. ) |
Wed, Mar 4 AM 10:25 - 12:05 |
(23) |
10:25-10:50 |
Improving certificate validation function in SSL/TLS implementations of web browser ICSS2014-84 |
Satoshi Kamekawa (JAIST), Atsuko Miyaji (JAIST/JST CREST), Yuichi Futa (JAIST) |
(24) |
10:50-11:15 |
New Linear Correlations and Analysis Method for Key Recovery Attack of RC4 in WPA ICSS2014-85 |
Daiki Michihiro (JAIST), Atsuko Miyaji (JAIST/JST CREST), Ryoma Ito (JAIST) |
(25) |
11:15-11:40 |
A Multi-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme For Line Topology ICSS2014-86 |
Hitoshi Miyazaki (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) |
(26) |
11:40-12:05 |
Consideration for Path Authentication for VANET with Group One-Way Cross-Networks ICSS2014-87 |
Shoma Kitayama, Masakazu Soshi (Hiroshima City Univ.) |
|
12:05-13:40 |
Lunch Break ( 95 min. ) |
Wed, Mar 4 PM 13:40 - 14:55 |
(27) |
13:40-14:05 |
The Geographical Origin Estimation of Malware Using Language Information ICSS2014-88 |
Masaru Kawakita, Shigeyoshi Shima (NEC) |
(28) |
14:05-14:30 |
Targeted Malware Detection Focused on Dummy Document Display ICSS2014-89 |
Yusuke Takahashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
(29) |
14:30-14:55 |
Visualization of Various DoS Attacks Observed by Malware Sandbox Analysis ICSS2014-90 |
Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
Wed, Mar 4 PM 13:40 - 14:55 |
(30) |
13:40-14:05 |
Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking ICSS2014-91 |
Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) |
(31) |
14:05-14:30 |
A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function ICSS2014-92 |
Koji Tomida (Nagoya Inst. of Tech.), Hiroshi Doi (IISEC), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) |
(32) |
14:30-14:55 |
Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data ICSS2014-93 |
Takeru Naruse (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) |
|
14:55-15:05 |
Break ( 10 min. ) |
Wed, Mar 4 PM 15:05 - 16:20 |
(33) |
15:05-15:30 |
Understanding Android apps that are similar to legitimate ones ICSS2014-94 |
Yuta Ishii, Takuya Watanabe (Waseda Univ.), Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.) |
(34) |
15:30-15:55 |
A Study on Risk Quantification Techniques for Android Applications with Category Information ICSS2014-95 |
Takeshi Takahashi (NICT), Takao Mimura, Masata Nishida (SecureBrain), Koji Nakao (NICT) |
(35) |
15:55-16:20 |
Evaluation on Malware Classification by Combining Traffic Analysis and Fuzzy Hashing of Malware Binary ICSS2014-96 |
Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) |
Wed, Mar 4 PM 15:05 - 16:20 |
(36) |
15:05-15:30 |
A Message authentication scheme with variable-length MAC ICSS2014-97 |
Yumiko Murakami, Nobuhiro Kobayashi (MELCO) |
(37) |
15:30-15:55 |
Flexible Constructions of Hash Chains and Their Key Generation ICSS2014-98 |
Shouki Nishiyama, Masakazu Soshi (Hiroshima City Univ.) |
(38) |
15:55-16:20 |
An Experimental Implementation of Self Destructive Tamper Resistant Software and Its Evaluation ICSS2014-99 |
Kazuomi Oishi (SIST), Naoki Yoshida, Naoki Watanabe, Jun'ichi Sakamoto, Tsutomu Matsumoto (YNU) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Invited Talk | Each speech will have 35 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ICSS |
Technical Committee on Information and Communication System Security (ICSS) [Latest Schedule]
|
Contact Address |
Yutaka Miyake (KDDI R&D Laboratories, Inc.)
TEL: +81-49-278-7367, FAX: +81-49-278-7510
E-: is-qst |
Announcement |
Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html |
Last modified: 2015-02-21 03:24:41
|
Notification: Mail addresses are partially hidden against SPAM.
|