Technical Committee on Information and Communication System Security (ICSS) |
[schedule] [select]
|
|
Chair |
|
Katsunari Yoshioka (Yokohama National Univ.) |
Vice Chair |
|
Takahiro Kasama (NICT), Akira Yamada (KDDI labs.) |
Secretary |
|
Toshihiro Yamauchi (Okayama Univ.), Keisuke Kito (Mitsubishi Electric) |
Assistant |
|
Takeshi Sugawara (Univ. of Electro-Comm.), Yo Kanemoto (NTT) |
|
Conference Date |
Mon, Mar 13, 2023 12:30 - 18:10
Tue, Mar 14, 2023 10:30 - 16:00 |
Topics |
Security, Trust, etc. |
Conference Place |
|
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Registration Fee |
This workshop will be held as the IEICE workshop in fully electronic publishing. Registration fee will be necessary except the speakers and participants other than the participants to workshop(s) in non-electronic publishing. See the registration fee page. We request the registration fee or presentation fee to participants who will attend the workshop(s) on ICSS. |
Mon, Mar 13 PM 12:30 - 14:10 |
(1) |
12:30-12:50 |
|
(2) |
12:50-13:10 |
|
(3) |
13:10-13:30 |
|
(4) |
13:30-13:50 |
|
(5) |
13:50-14:10 |
|
|
14:10-14:20 |
Break ( 10 min. ) |
Mon, Mar 13 PM 12:30 - 13:50 |
(6) ICSS |
12:30-12:50 |
Developing a Hand Gesture Recognition System for VR Devices ICSS2022-48 |
Mei Suzuki, Ryo Iijima, Kazuki Nomoto (Waseda Univ.), Tetsushi Ohki (Shizuoka Univ./AIP), Tatsuya Mori (Waseda Univ./NICT/AIP) |
(7) ICSS |
12:50-13:10 |
Dynamic Fake QR Code using Invisible Laser Irradiation ICSS2022-49 |
Yuki Kamata, Shuya Kawaguchi, Toshihiro Ohigashi, Yoshihisa Takayama (Tokai Univ.) |
(8) ICSS |
13:10-13:30 |
sEMG-based Gesture Authentication for Smartwatch ICSS2022-50 |
Akihisa Watanabe, Ryo Iijima, Tatsuya Mori (Waseda Univ.,) |
(9) ICSS |
13:30-13:50 |
Basic Study on IoT Security Using Robot Arm ICSS2022-51 |
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) |
|
13:50-14:00 |
Break ( 10 min. ) |
Mon, Mar 13 PM 14:20 - 16:00 |
(10) ICSS |
14:20-14:40 |
Dynamic Analysis of Adversarial Attacks ICSS2022-52 |
Kentaro Goto (JPNIC), Masato Uchida (Waseda Univ.) |
(11) ICSS |
14:40-15:00 |
Consideration of a Packet Level Anomaly Communication Classification Model Using Word Embedding and LSTM ICSS2022-53 |
Yoshikatsu Kashiwabara, Kohei Miyamoto, Iida Masazumi, Shota Kawanaka (Kyushu Univ), Han Chansu, Ban Tao, Kenshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ) |
(12) ICSS |
15:00-15:20 |
Disabling Adversarial Examples through Color Conversion using CMYK Defense Model ICSS2022-54 |
Ryo Soeda, Masato Uchida (Waseda Univ.) |
(13) ICSS |
15:20-15:40 |
Multimodal Feature Integration Toward High-Accuracy Network Intrusion Detection ICSS2022-55 |
Masazumi Iida, Kohei Miyamoto, Yoshinari Takeishi, Shota Kawanaka (Kyushu Univ.), Chansu Han, Tao Ban, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.) |
(14) ICSS |
15:40-16:00 |
Generating Attack Trace Dataset Focusing on Attack Techniques and the Damage Caused by Each. ICSS2022-56 |
Masahito Kumazaki, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) |
|
16:00-16:10 |
Break ( 10 min. ) |
Mon, Mar 13 PM 14:20 - 16:00 |
(15) ICSS |
14:20-14:40 |
A Study of Security Control Schemes in Fog Computing Based on TPO Conditions ICSS2022-80 |
Yushi Hosokawa, Kanai Atushi, qian wu (Hosei Univ.), hatasima ryu (NTT), tanimoto sigeaki (ChibaTech Univ.) |
(16) ICSS |
14:40-15:00 |
Preservation Techniques of Fileless Attack Artifacts using Customized PowerShell ICSS2022-57 |
Masahito Kimura (Ritsumeikan Univ.), Chris Liu (DTCY), Tetsutaro Uehara (Ritsumeikan Univ.) |
(17) ICSS |
15:00-15:20 |
ICSS2022-58 |
|
(18) ICSS |
15:20-15:40 |
ICSS2022-59 |
|
(19) ICSS |
15:40-16:00 |
Proposal and evaluation of visualization method for understanding security risks based on software dependencies ICSS2022-60 |
Tomohiko Yano (SECOM), Hiroki Kuzuno (Kobe Univ.) |
|
16:00-16:10 |
Break ( 10 min. ) |
Mon, Mar 13 PM 16:10 - 18:10 |
(20) ICSS |
16:10-16:30 |
Evaluation of Copy Protection Technology Using Web Font ICSS2022-61 |
Kazuki Nomoto (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT/RIKEN AIP) |
(21) ICSS |
16:30-16:50 |
Evaluation and countermeasures of notification destination restoration attacks using password recovery functions of multiple web services ICSS2022-62 |
Ryusei Ishikawa, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ., Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.) |
(22) ICSS |
16:50-17:10 |
An Analysis of the Risk of Unauthorized Access to the WebUI of IoT Devices ICSS2022-63 |
Kosuke Murakami (NICT/KDDIR), Takahiro Kasama, Daisuke Inoue (NICT) |
(23) ICSS |
17:10-17:30 |
A Study on Effectiveness of Malware Infection Notification based on Role-playing Type Survey ICSS2022-64 |
Akira Fujita, Misato Matsuda, Takahiro Kasama, Daisuke Inoue (NICT) |
(24) ICSS |
17:30-17:50 |
Lessons Learned from Construction of the Security Technical Term Dictionary ICSS2022-65 |
Misato Matsuda, Akira Fujita, Yu Tsuda, piyokango, Daisuke Inoue (NICT) |
(25) ICSS |
17:50-18:10 |
URL Warning List Creation and Manage Methods using VirusTotal and Web Access Log ICSS2022-66 |
Kyohei Takao, Chika Hiraishi (YNU), Kazuki Takada (SecureBrain), Akira Fujita, Daisuke Inoue (NICT), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
Mon, Mar 13 PM 16:10 - 18:10 |
(26) ICSS |
16:10-16:30 |
Implementation and Evaluation for Remote-Control Security System of IoT Devices ICSS2022-67 |
Masaru Takeuchi (JDC), Yohei Watanabe (UEC/JDC), Naoto Yanai (OU/JDC), Akira Takeuchi (JDC), Tatsuya Takehisa (Nisshin), Yukitoshi Sanada (KU/JDC), Junji Shikata (YNU), Koji Nakao (NICT) |
(27) ICSS |
16:30-16:50 |
A Study on Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities ICSS2022-68 |
Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) |
(28) ICSS |
16:50-17:10 |
New linear approximation and improved bias of ChaCha in differential linear analysis ICSS2022-69 |
Ryo Watanabe (Osaka Univ..), Atsuko Miyaji (Osaka Univ./JAIST) |
(29) ICSS |
17:10-17:30 |
Improvement of Linear Approximations in Differential Linear Analysis of Stream Cipher ChaCha ICSS2022-70 |
Atsuki Nagai (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) |
(30) ICSS |
17:30-17:50 |
Expanding Underlying Number Fields Reducing from Module-LWE to Ring-LWE ICSS2022-71 |
Sosuke Funatsu, Atsuko Miyaji, Shinya Okumura (OU) |
(31) ICSS |
17:50-18:10 |
On a Threshold Ring Signature Scheme for Generating Efficiently Sized Signatures ICSS2022-72 |
Ryunosuke Higashi, Yuta Maeno, Hideaki Miyaji, Atsuko Miyaji (OU) |
Tue, Mar 14 AM 10:30 - 11:50 |
(32) |
10:30-10:50 |
|
(33) |
10:50-11:10 |
|
(34) |
11:10-11:30 |
|
(35) |
11:30-11:50 |
|
|
11:50-13:10 |
Lunch Break ( 80 min. ) |
Tue, Mar 14 AM 10:30 - 11:50 |
(36) ICSS |
10:30-10:50 |
Port-aware IPv6 Scanning and Large-scale Security Surveys ICSS2022-73 |
Tatsuya Takemura, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama (NTT) |
(37) ICSS |
10:50-11:10 |
Discussion about Privacy-aware Anonymization of Traffic Logs for Malicious Activity Detection ICSS2022-74 |
Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) |
(38) ICSS |
11:10-11:30 |
Investigating Server Fingerprints and Their Identifiability in Onion Service ICSS2022-75 |
Yuuki Kimura, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ./Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.) |
(39) ICSS |
11:30-11:50 |
An Empirical Study on Opting out of Internet-wide Scanning ICSS2022-76 |
Takahiro Kasama, Yukiko Endo, Masaki Kubo, Daisuke Inoue (NICT) |
|
11:50-13:10 |
Lunch Break ( 80 min. ) |
Tue, Mar 14 PM 13:10 - 14:30 |
(40) |
13:10-13:30 |
|
(41) |
13:30-13:50 |
|
(42) |
13:50-14:10 |
|
(43) |
14:10-14:30 |
|
|
14:30-14:40 |
Break ( 10 min. ) |
Tue, Mar 14 PM 13:10 - 14:10 |
(44) ICSS |
13:10-13:30 |
Towards observation of online fraud exploiting multiple SNS ICSS2022-77 |
Yamato Kawaguchi (Yokohama National Univ.), Kazuki Takada (SecureBrain), Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
(45) ICSS |
13:30-13:50 |
Assessment Method for Persistent Malware Infection on IoT Devices ICSS2022-78 |
Shunki Soeda, Takahiro Inoue, Rui Tanabe, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
(46) ICSS |
13:50-14:10 |
An Edge Computing Platform based on Modular Architecture using Intel SGX and its Evaluation ICSS2022-79 |
Yuma Nishihira, Tomoya Suzuki, Takuya Ishibashi, Yoshio Kakizaki, Toshihiro Ohigashi (Tokai Univ.), Hidenobu Watanabe, Tohru Kondo, Reiji Aibara (Hiroshima Univ.) |
|
14:10-14:20 |
Break ( 10 min. ) |
Tue, Mar 14 PM 14:40 - 16:00 |
(47) |
14:40-15:20 |
|
(48) |
15:20-16:00 |
|
Announcement for Speakers |
General Talk | Each speech will have 15 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ICSS |
Technical Committee on Information and Communication System Security (ICSS) [Latest Schedule]
|
Contact Address |
ICSS Technical Committee
E-: is-adm-q |
Announcement |
Latest information will be presented on the homepage:
https://www.ieice.org/iss/icss/index-en.html |
IPSJ-SPT |
Special Interest Group on Security Psychology and Trust (IPSJ-SPT) [Latest Schedule]
|
Contact Address |
|
Last modified: 2023-03-14 09:59:03
|