IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 7 of 7  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA, ICSS 2015-06-12
11:30
Fukuoka Kyushu Institute of Technology Univ. A Report on International Conference NDSS2015
Hiroaki Anada (ISIT), Yuhei Kawakoya (NTTi3), Kuniyasu Suzaki (AIST) IA2015-12 ICSS2015-12
International conference NDSS (Network and Distributed System Security Symposium) is one of the top conference of inform... [more] IA2015-12 ICSS2015-12
pp.63-68
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
13:30
Hokkaido   Identifying the Code to be Analyzed with Taint Tags
Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu (NTT) ISEC2012-20 SITE2012-16 ICSS2012-22 EMM2012-12
 [more] ISEC2012-20 SITE2012-16 ICSS2012-22 EMM2012-12
pp.77-82
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
15:25
Hokkaido   Detecting Invalid Control Flow with Pseudo-Dispersion of Program Code
Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu (NTT) ISEC2012-24 SITE2012-20 ICSS2012-26 EMM2012-16
Attacks that modify the control flow of a running program by corrupting memory address pointers have been a major threat... [more] ISEC2012-24 SITE2012-20 ICSS2012-26 EMM2012-16
pp.103-108
IA, ICSS 2011-06-17
13:50
Fukuoka Kyushu Institute of Technology DenseShip: Virtual Machine Monitor Specialized for Server-Type Honeypot
Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT) IA2011-11 ICSS2011-11
(To be available after the conference date) [more] IA2011-11 ICSS2011-11
pp.63-68
ICSS 2011-03-25
15:10
Tokyo Suspended Automatic Unpacking Based on Entropy of Memory-Access Values
Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.) ICSS2010-63
Malware executables are often obfuscated with encryption or compression using a technique known as packing, thus perform... [more] ICSS2010-63
pp.41-46
IA, ICSS 2010-06-17
13:55
Kyoto Academic Center for Computing and Media Studies, Kyoto University Automatic OEP Finding Method for Malware Unpacking
Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT) IA2010-3 ICSS2010-3
Malware analysts have to first extract hidden original code from a packed executable to analyze malware functionalities,... [more] IA2010-3 ICSS2010-3
pp.13-18
ICSS 2009-05-15
15:10
Hyogo Kobe University Investigation of Spam Mail Driven Web-Based Passive Attack
Yuhei Kawakoya, Mitsuaki Akiyama, Kazufumi Aoki, Mitsutaka Itoh (NTT), Hiroki Takakura (Kyoto Univ) ICSS2009-5
In recent years, the number of web-based passive attacks which are driven by URLs included in spam mail is increasing. B... [more] ICSS2009-5
pp.21-26
 Results 1 - 7 of 7  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan