Technical Committee on Information and Communication System Security (ICSS) |
[schedule] [select]
|
|
Chair |
|
Yutaka Miyake (KDDI R&D Labs.) |
Vice Chair |
|
Takashi Nishide (Univ. of Tsukuba), Yoshiaki Shiraishi (Kobe Univ.) |
Secretary |
|
Takeshi Ueda (Mitsubishi Electric), Hiroki Takakura (NII) |
Assistant |
|
Katsunari Yoshioka (Yokohama National Univ.), Kazunori Kamiya (NTT) |
|
Conference Date |
Thu, Mar 3, 2016 12:40 - 17:00
Fri, Mar 4, 2016 10:00 - 16:10 |
Topics |
Information and Communication System Security, etc. |
Conference Place |
South Building, Academic Center for Computing and Media Studies, Kyoto University |
Address |
Yoshida-Honmachi, Sakyo Kyoto |
Transportation Guide |
http://www.media.kyoto-u.ac.jp/en/access |
Contact Person |
National Institute of Informatics, Hiroki Takakura |
Sponsors |
Co-sponsored by the IPSJ Security Psychology and Trust
|
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Thu, Mar 3 PM 12:40 - 14:10 |
(1) ICSS |
12:40-13:10 |
Improving IoTPOT for Observing Various Attacks Targeting Embedded Devices ICSS2015-47 |
Shogo Suzuki, YinMin Papa, Yuta Ezawa, Ying Tie, Sou Nakayama, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
(2) ICSS |
13:10-13:40 |
Observing Cyber Attacks on Building Control System by Honeypot ICSS2015-48 |
Ying Tie (YNU), Koichi Shimizu (Mitsubishi Electric Corporation), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
(3) ICSS |
13:40-14:10 |
Storage-Efficient and Low-Power Packet Classification for Internet of Things ICSS2015-49 |
Yuta Kitamura (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) |
Thu, Mar 3 PM 12:40 - 14:10 |
(4) ICSS |
12:40-13:10 |
Malicious-Spam-Mail Detection System with Autonomous Learning Ability ICSS2015-50 |
Shogo Osaka, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) |
(5) ICSS |
13:10-13:40 |
An Actual Survey on Web Scanning by URI Co-occurrence Detection ICSS2015-51 |
Yang Zhong, Shingo Orihara, Masaki Tanikawa (NTT), Hajime Shimada, Tutomu Murase (Nagoya Univ), Hiroki Takakura (NII), Yoshihito Oshima (NTT) |
(6) ICSS |
13:40-14:10 |
Analyzing Targeted Cyber Attacks by Focusing on Contents of Decoy Documents |
Natsuko Kawakami, Ryota kikkawa, Ying Tie, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
|
14:10-14:20 |
Break ( 10 min. ) |
Thu, Mar 3 PM 14:20 - 15:20 |
(7) ICSS |
14:20-15:20 |
[Invited Talk]
Looking Back on My Research ICSS2015-52 |
Yuko Murayama (Iwate Prefectural Univ.) |
|
15:20-15:30 |
Break ( 10 min. ) |
Thu, Mar 3 PM 15:30 - 17:00 |
(8) ICSS |
15:30-16:00 |
Current Status and Issues of the Application of AI Technology for Digital Forensics |
Shinichi Matsumoto (ISIT), Kouichi Sakurai (Kyushu Univ.) |
(9) ICSS |
16:00-16:30 |
Issue analysis toward forensics gathering infrastructure that supports the more efficient incident handling ICSS2015-53 |
Daichi Hasumi, Shigeyoshi Shima, Takahiro Kakumaru (NEC) |
(10) ICSS |
16:30-17:00 |
Privacy-preserving Log Analysis with Deterministic Encryption ICSS2015-54 |
Yuji Furuta, Naoto Yanai (Osaka Univ.), Masashi Karasaki (NTT-neomeit), Katsuhiko Eguchi (NTT Neomeit), Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) |
Thu, Mar 3 PM 15:30 - 17:00 |
(11) ICSS |
15:30-16:00 |
Detection of Vulnerability Scanning Using Features of Collective Accesses Collected from Several Honeypots ICSS2015-55 |
Naomi Kuze, Shu Ishikura (Osaka Univ.), Takeshi Yagi, Daiki Chiba (NTT), Masayuki Murata (Osaka Univ.) |
(12) ICSS |
16:00-16:30 |
Evaluation of the attack detection method based on duration of continuous packet arrival ICSS2015-56 |
Yuhei Hayashi, Satoshi Nishiyama, Akinori Suzuki, Katsuhiko Sakai, Ichiro Kudo, Kazunori Kamiya (NTT) |
(13) ICSS |
16:30-17:00 |
Investigation of cyber incident prediction method based on a technical analysis ICSS2015-57 |
Masaru Kawakita, Shigeyoshi Shima (NEC) |
Fri, Mar 4 AM 10:00 - 12:00 |
(14) ICSS |
10:00-10:30 |
A fast detecting method for obfuscated malicious JavaScript based on text pattern analysis ICSS2015-58 |
Jiawei Su, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (YNU) |
(15) ICSS |
10:30-11:00 |
Static Detection of ROP Chain Based on Hidden Markov Model ICSS2015-59 |
Toshinori Usui, Tomonori Ikuse, Makoto Iwamura, Takeshi Yada (NTT) |
(16) ICSS |
11:00-11:30 |
A Suspicious Processes Detection Scheme using Process Frequency and Network State ICSS2015-60 |
Junji Nakazato, Yu Tsuda, Eto Masashi, Daisuke Inoue, Koji Nakao (NICT) |
(17) ICSS |
11:30-12:00 |
Preliminary Studies of Linkage Analysis among Process Behavior for Intrusion Prevention ICSS2015-61 |
Yudai Tomaru, Masaki Hashimoto, Hidehiko Tanaka (iisec) |
Fri, Mar 4 AM 10:00 - 12:00 |
(18) ICSS |
10:00-10:30 |
A Study of Security of an Authentication Method Using Public and Private Keys with Relaying Plural Key Pairs ICSS2015-62 |
Yusuke Ogata, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) |
(19) ICSS |
10:30-11:00 |
Selection of authentication methods with game theory in VANET ICSS2015-63 |
Hiroaki Hiroaki, Masakazu Soshi (Hiroshima City Univ.) |
(20) ICSS |
11:00-11:30 |
Towards Non-Encryption-Based RFID Private Tag Authentication ICSS2015-64 |
Kazuya Sakai (TMU) |
(21) |
11:30-12:00 |
|
|
12:00-13:30 |
Lunch Break ( 90 min. ) |
Fri, Mar 4 PM 13:30 - 15:00 |
(22) ICSS |
13:30-14:00 |
A New Key Correlation in the Stream Cipher RC4 ICSS2015-65 |
Daiki Michihiro (JAIST), Atsuko Miyaji (Osaka Univ./JAIST/CREST) |
(23) ICSS |
14:00-14:30 |
Discrimination of communication traffic generated by malware-infected hosts ICSS2015-66 |
Sho Mizuno, Mitsuhiro Hatada, Tatsuya Mori, Shigeki Goto (Waseda University) |
(24) ICSS |
14:30-15:00 |
An Autonomous DDoS Backscatter Detection System from Darknet Traffic ICSS2015-67 |
Yuki Ukawa, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) |
Fri, Mar 4 PM 13:30 - 14:30 |
(25) ICSS |
13:30-14:00 |
Privacy-enhanced Similarity Search Scheme for Cloud Image Databases ICSS2015-68 |
Hao Liu, Hideaki Goto (Tohoku Univ.) |
(26) ICSS |
14:00-14:30 |
Instantly Self-Verifiable Pre-Shared Key Exchange for Cyber-Physical Systems ICSS2015-69 |
Kohei Isobe (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) |
|
14:30-14:40 |
Break ( 10 min. ) |
Fri, Mar 4 PM 15:10 - 16:10 |
(27) ICSS |
15:10-15:40 |
Cooperative Secure Network Coding ICSS2015-70 |
Sumiyo Ishige (JAIST), Atsuko Miyaji (JAIST/Osaka Univ./JST CREST) |
(28) ICSS |
15:40-16:10 |
Improvement and implementation of scalar multiplication algorithms with side-channel protection ICSS2015-71 |
Keisuke Kito (JAIST), Atsuko Miyaji (Osaka Univ./JAIST/JST CREST) |
Fri, Mar 4 PM 15:10 - 16:10 |
(29) ICSS |
15:10-15:40 |
Verification of Division Property and High-Order Differential Characteristic of Lightweight Blockcipher Piccolo ICSS2015-72 |
Takuya Kubo, Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ of Science) |
(30) ICSS |
15:40-16:10 |
Higher-order differential attack on the round-reduced variants of the block cipher ICSS2015-73 |
Yusuke Takahashi, Yasutaka Igarashi, Toshinobu Kaneko (TUS) |
Announcement for Speakers |
General Talk | Each speech will have 25 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ICSS |
Technical Committee on Information and Communication System Security (ICSS) [Latest Schedule]
|
Contact Address |
Yutaka Miyake (KDDI R&D Laboratories, Inc.)
TEL: +81-49-278-7367, FAX: +81-49-278-7510
E- : i s- q st  |
Announcement |
Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html |
IPSJ-SPT |
Special Interest Group on Security Psychology and Trust (IPSJ-SPT) [Latest Schedule]
|
Contact Address |
|
Last modified: 2016-02-23 17:56:49
|