|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, ICSS |
2015-06-12 11:30 |
Fukuoka |
Kyushu Institute of Technology Univ. |
A Report on International Conference NDSS2015 Hiroaki Anada (ISIT), Yuhei Kawakoya (NTTi3), Kuniyasu Suzaki (AIST) IA2015-12 ICSS2015-12 |
International conference NDSS (Network and Distributed System Security Symposium) is one of the top conference of inform... [more] |
IA2015-12 ICSS2015-12 pp.63-68 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 13:30 |
Hokkaido |
|
Identifying the Code to be Analyzed with Taint Tags Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu (NTT) ISEC2012-20 SITE2012-16 ICSS2012-22 EMM2012-12 |
[more] |
ISEC2012-20 SITE2012-16 ICSS2012-22 EMM2012-12 pp.77-82 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 15:25 |
Hokkaido |
|
Detecting Invalid Control Flow with Pseudo-Dispersion of Program Code Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu (NTT) ISEC2012-24 SITE2012-20 ICSS2012-26 EMM2012-16 |
Attacks that modify the control flow of a running program by corrupting memory address pointers have been a major threat... [more] |
ISEC2012-24 SITE2012-20 ICSS2012-26 EMM2012-16 pp.103-108 |
IA, ICSS |
2011-06-17 13:50 |
Fukuoka |
Kyushu Institute of Technology |
DenseShip: Virtual Machine Monitor Specialized for Server-Type Honeypot Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT) IA2011-11 ICSS2011-11 |
(To be available after the conference date) [more] |
IA2011-11 ICSS2011-11 pp.63-68 |
ICSS |
2011-03-25 15:10 |
Tokyo |
Suspended |
Automatic Unpacking Based on Entropy of Memory-Access Values Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.) ICSS2010-63 |
Malware executables are often obfuscated with encryption or compression using a technique known as packing, thus perform... [more] |
ICSS2010-63 pp.41-46 |
IA, ICSS |
2010-06-17 13:55 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Automatic OEP Finding Method for Malware Unpacking Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT) IA2010-3 ICSS2010-3 |
Malware analysts have to first extract hidden original code from a packed executable to analyze malware functionalities,... [more] |
IA2010-3 ICSS2010-3 pp.13-18 |
ICSS |
2009-05-15 15:10 |
Hyogo |
Kobe University |
Investigation of Spam Mail Driven Web-Based Passive Attack Yuhei Kawakoya, Mitsuaki Akiyama, Kazufumi Aoki, Mitsutaka Itoh (NTT), Hiroki Takakura (Kyoto Univ) ICSS2009-5 |
In recent years, the number of web-based passive attacks which are driven by URLs included in spam mail is increasing. B... [more] |
ICSS2009-5 pp.21-26 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|