IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 37  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
HWS 2023-04-14
16:10
Oita
(Primary: On-site, Secondary: Online)
An Application of Information Flow Tracking to Support Detection of Hardware Trojans
Ryoichi Isawa, Nobuyuki Kanaya, Daisuke Inoue (NICT) HWS2023-7
(To be available after the conference date) [more] HWS2023-7
pp.26-31
BioX 2022-10-03
16:30
Okinawa   A proposal on Reflective Pseudo Blood Volume Pulse Presentation Attack against PPG Sensor
Tatsuya Takehisa (NICT/Nissin), Hayato Ushimaru (NICT/CDI), Daisuke Makita, Dai Arisue (NICT), Satoshi Mimura (NICT/Ierae), Ryo Iijima (Waseda), Ryouichi Isawa, Daisuke Inoue (NICT) BioX2022-59
The authors study an attack that presents a pseudo pulse wave signal to a photoplethysmography (PPG) sensor. A previous ... [more] BioX2022-59
pp.20-25
VLD, HWS [detail] 2022-03-08
11:25
Online Online A Method for Automatic Test Pattern Generation using an SMT Solver for HDL Code
Ryoichi Isawa, Nobuyuki Kanaya, Yoshitada Fujiwara, Tatsuta Takehisa, Hayato Ushimaru, Dai Arisue, Daisuke Makita, Satoshi Mimura, Daisuke Inoue (NICT) VLD2021-95 HWS2021-72
(To be available after the conference date) [more] VLD2021-95 HWS2021-72
pp.105-110
ICSS, IPSJ-SPT 2021-03-01
13:40
Online Online An Evaluation of Scalable Clustering in Fast Construction Algorithm of Phylogenetic Tree
Tianxiang He (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Shuji Kijima, Jun'ichi Takeuchi (Kyushu Univ.) ICSS2020-38
 [more] ICSS2020-38
pp.72-77
ICSS, IPSJ-SPT 2021-03-01
14:05
Online Online Improvement of Functional Difference Investigation Method and Analyzing for Clusters of IoT Malware
Reo Kawasoe (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.) ICSS2020-39
 [more] ICSS2020-39
pp.78-83
ICSS, IPSJ-SPT 2020-03-02
14:10
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
A Study on Fuzzing for Device Drivers with AddressSanitizer
Kentaro Ishii (Kove Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kove Univ.) ICSS2019-76
A device driver is a program which runs with higher privilege in an operating system. If a device driver is compromised,... [more] ICSS2019-76
pp.49-53
ICSS, IPSJ-SPT 2020-03-02
15:20
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Evaluating Effectiveness of a Timing Attack on Android Devices in JavaScript
Keisuke Sugita (Kobe Univ.), Ryoichi Isawa (NICT), Masakatsu Morii (Kobe Univ.) ICSS2019-79
(To be available after the conference date) [more] ICSS2019-79
pp.67-71
ICSS 2019-11-13
13:55
Miyazaki MRT Terrace(Miyazaki) A Fast Algorithm for Constructing Phylogenetic Trees and Its Evaluation
Tianxiang He (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Shuji Kijima, Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT) ICSS2019-61
 [more] ICSS2019-61
pp.7-12
ICSS 2018-11-21
15:15
Kagoshima   Malware Analysis Method Using Conditional Generative Adversarial Network
Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) ICSS2018-57
Many schemes combining deep learning with methods for imaging malware have been proposed. These methods are considered t... [more] ICSS2018-57
pp.25-30
ICSS 2018-11-22
14:20
Kagoshima   Part II: Calculating Similarity between IoT Malware over CPU Architectures
Ryoichi Isawa, Tao Ban (NICT), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2018-66
At the ICSS workshop held in June, 2018, we proposed a method for calculating
similarity between IoT malware samples ov... [more]
ICSS2018-66
pp.73-78
ICSS, IA 2018-06-25
13:25
Ehime Ehime University Calculating Similarity between IoT Malware Samples over CPU Architectures
Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) IA2018-2 ICSS2018-2
Malware samples infecting IoT (Internet of Things) devices such as Web cameras and
home routers have spread over the In... [more]
IA2018-2 ICSS2018-2
pp.7-12
ICSS, IA 2018-06-26
11:40
Ehime Ehime University A Study on Extraction Method of Characteristics of Malware Using Generative Adversalial Networks
Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) IA2018-13 ICSS2018-13
To classify malware families including many subspecies, several methods have been proposed for acquiring malware feature... [more] IA2018-13 ICSS2018-13
pp.77-82
ICSS, IPSJ-SPT 2018-03-08
09:20
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Considering Opcode-based Similarity between IoT Malware Samples
Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2017-69
In this paper, we generate a similarity matrix between IoT (Internet of Things) malware samples based on their disassemb... [more] ICSS2017-69
pp.109-114
IA, ICSS 2017-06-08
14:25
Kochi Kochi University of Technolo, Eikokuji Campus A First Trend Review of Runtime Packers for IoT Malware
Ryoichi Isawa (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Tao Ban, Daisuke Inoue (NICT) IA2017-4 ICSS2017-4
Malicious software (malware) specimens that infect IoT (Internet of Things) devices rapidly increase. If those specimens... [more] IA2017-4 ICSS2017-4
pp.19-24
ICSS, IA 2016-06-06
14:10
Saga Saga University Method to Locate Cryptographic Functions from Malware
Ryoya Furukawa (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT)
 [more]
IA, ICSS 2015-06-11
14:55
Fukuoka Kyushu Institute of Technology Univ. An Empirical Evaluation of Locating Cryptographic Functions on the Memory
Ryoya Furukawa (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT) IA2015-4 ICSS2015-4
This paper presents a simple and effective idea to locate cryptographic functions on the memory for malware analysis.
... [more]
IA2015-4 ICSS2015-4
pp.15-20
ICSS 2013-11-12
15:10
Fukuoka Nishijin Plaza An OEP Identifying Method based on the Order of Opcodes
Noriaki Nakamura, Masakatu Morii (Kobe Univ.), Ryoichi Isawa, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-59
To skip unpacking steps, automated generic unpacking methods are strongly required.Most of generic unpackers extract mem... [more] ICSS2013-59
pp.13-18
IA, ICSS 2013-06-20
14:35
Niigata Ao-re Nagaoka Three Party Secure Anonymous Authentication Scheme with Hard Learning Problems
Kotaro Kishibe (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.) IA2013-3 ICSS2013-3
In late years, with the spread of RFID, the lightweight certification protocol between RFID tag and readers attracts att... [more] IA2013-3 ICSS2013-3
pp.13-18
IA, ICSS 2013-06-21
13:25
Niigata Ao-re Nagaoka Generic Unpacking Method Using Data Execution Prevention
Ryoichi Isawa (NICT), Masaki Kamizono (NICT/SecureBrain Corporation), Daisuke Inoue (NICT) IA2013-13 ICSS2013-13
To skip unpacking steps, automated generic unpacking methods are strongly required. The basic idea of the generic unpack... [more] IA2013-13 ICSS2013-13
pp.73-78
ICSS 2012-11-22
13:15
Hiroshima Miyajima Mori-no-Yado Packer Identification Based on Binary Code of Malware Using Machine Learning
Ryoichi Isawa, Tao Ban, Daisuke Inoue (NICT) ICSS2012-48
PEiD is a well-known packer identi cation tool. However, it often fails to identify a packer name of the target le beca... [more] ICSS2012-48
pp.19-24
 Results 1 - 20 of 37  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan