Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2021-03-01 09:10 |
Online |
Online |
On the Privacy Risk of Exposure Notification Framework: Assessment and Countermeasures Kazuki Nomoto (Waseda Univ.), Mitsuaki Akiyama (NTT), Masashi Eto (NICT), Atsuo Inomata (Osaka Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-34 |
The Exposure Notification Framework uses the Bluetooth Low Energy (BLE) signal generated by a smartphone to determine cl... [more] |
ICSS2020-34 pp.49-54 |
ICSS, IPSJ-SPT |
2021-03-01 09:35 |
Online |
Online |
A Method for Reconstructing Hidden Background Image in Tele-conference with Virtual Background Satoki Tsuji, Ryusei Ishikawa (Ritsumeikan Univ.), Masashi Eto (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Hiroshima City Univ.) ICSS2020-35 |
Interpersonal communications through video chat software has become essential since a remote work is now encouraged. Whe... [more] |
ICSS2020-35 pp.55-60 |
ICSS |
2016-11-25 13:00 |
Kanagawa |
Institute of Information Security |
[Invited Talk]
Analyses of social needs and training programs of security human resources in Japan Masashi Eto (NICT), Masaki Kamizono (PwC Cyber Services LLC) ICSS2016-38 |
In response to the serious shortage of cybersecurity human resources in the domestic industry, a number of training prog... [more] |
ICSS2016-38 p.1 |
ICSS, IPSJ-SPT |
2016-03-04 11:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A Suspicious Processes Detection Scheme using Process Frequency and Network State Junji Nakazato, Yu Tsuda, Eto Masashi, Daisuke Inoue, Koji Nakao (NICT) ICSS2015-60 |
Many serious security incidents caused by the targeted attacks have been occurred. The targeted attacks can not be preve... [more] |
ICSS2015-60 pp.77-82 |
ICSS |
2015-11-27 13:00 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
[Invited Talk]
International Standardization for Secure Software Update of ITS Communication Devices Masashi Eto (NICT) |
[more] |
|
ICSS |
2015-11-27 14:40 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
A Suspicious Processes Detection Scheme using Process Frequency Junji Nakazato, Yu Tsuda, Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2015-45 |
Many serious security incidents caused by the targeted attacks have been occurred. The targeted attacks can not be preve... [more] |
ICSS2015-45 pp.61-66 |
ICSS |
2015-03-03 15:15 |
Okinawa |
Meio Univiersity |
A Pluggable and Programmable Flamework for Analyzing Security Logs Yu Tsuda, Takashi Tomine, Masaki Kamizono, Masashi Eto, Daisuke Inoue (NICT) ICSS2014-68 |
SIEM (Security Information and Event Management) systems can unify a lot of security logs from various security applianc... [more] |
ICSS2014-68 pp.31-36 |
ICSS |
2015-03-04 10:50 |
Okinawa |
Meio Univiersity |
Prediction of Malware Activities based on Loopback Address from DNS Masaki Kamizono (NICT/SecureBrain), Takashi Tomine, Yu Tsuda, Masashi Eto (NICT), Yuji Hoshizawa (Securebrain Corporation), Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (ynu) ICSS2014-80 |
During malware dynamic analysis, the analysis system often finds the loopback address in responses of DNS name resolutio... [more] |
ICSS2014-80 pp.103-108 |
ICSS |
2015-03-04 11:40 |
Okinawa |
Meio Univiersity |
Internet Alive Monitoring Method around Disaster Areas Using Large-scale Darknet, Autonomous System Information, and Geographical Information Mio Suzuki (NICT), Jumpei Shimamura (Clwit), Junji Nakazato, Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) ICSS2014-82 |
At the time of large natural disaster, the Internet could lost its functionalities caused by power outage and physical d... [more] |
ICSS2014-82 pp.115-120 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 14:40 |
Hokkaido |
San-Refure Hakodate |
Analysis of Cyber-attack Infrastructure with Malicious Website focused on Backdoor Shell Masaki Kamizono (YNU/NICT), Yuji Hoshizawa (SecureBrain), Takahiro Kasama, Masashi Eto, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ISEC2014-46 SITE2014-41 ICSS2014-50 EMM2014-46 |
[more] |
ISEC2014-46 SITE2014-41 ICSS2014-50 EMM2014-46 pp.321-326 |
ICSS, IA |
2014-06-06 10:30 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Malicious Web Site Detection Based on Redirection Control using Client Environment Takahiro Kasama, Masashi Eto (NICT), Masaki Kamizono (NICT/SecureBrain), Daisuke Inoue (NICT) IA2014-5 ICSS2014-5 |
[more] |
IA2014-5 ICSS2014-5 pp.21-26 |
ICSS, IA |
2014-06-06 10:55 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Development of an Environment-independent Dynamic Analysis System for Document Malware Masaki Kamizono (NICT/SecureBrain), Kazuki Iwamoto (SecureBrain), Takahiro Kasama, Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) IA2014-6 ICSS2014-6 |
[more] |
IA2014-6 ICSS2014-6 pp.27-32 |
ICSS, IPSJ-SPT |
2014-03-28 09:25 |
Okinawa |
Meio Univiersity |
Spam Analysis based on Mail Relay Routing Junji Nakazato, Tao Ban (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-75 |
The characteristic analysis using contents of spam mail is changed by the purpose of spam campaign. In this paper, we pr... [more] |
ICSS2013-75 pp.101-106 |
ICSS, IPSJ-SPT |
2014-03-28 09:50 |
Okinawa |
Meio Univiersity |
Implementation and Evaluation of a Proactive Cyber Attack Monitoring Platform Masashi Eto (NICT), Tomohide Tanaka (clwit), Koei Suzuki, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-76 |
A number of network monitoring systems such as honeypot and web crawler have been launched to address increasingly-sophi... [more] |
ICSS2013-76 pp.107-112 |
ICSS |
2013-11-12 15:50 |
Fukuoka |
Nishijin Plaza |
Experimental Evaluation of A Botnet Detection Method based on Non-negative Matrix Factorization Yuki Kawamura (Kyushu Univ.), Junpei Shimamura, Junji Nakazato (NICT), Katsunari Yoshioka (Yokohama National Univ.), Masashi Eto, Daisuke Inoue (NICT), Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT) ICSS2013-61 |
[more] |
ICSS2013-61 pp.23-28 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 11:30 |
Hokkaido |
|
Network Observation and Analysis Report on nicter
-- Malware infection to embedded systems -- Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ISEC2013-48 SITE2013-43 ICSS2013-53 EMM2013-50 |
[more] |
ISEC2013-48 SITE2013-43 ICSS2013-53 EMM2013-50 pp.381-385 |
IA, ICSS |
2013-06-21 13:50 |
Niigata |
Ao-re Nagaoka |
Network Observation and Analysis Report on nicter
-- Close Encounters of Network Incident Sign -- Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) IA2013-14 ICSS2013-14 |
In this paper, we reported sign of a network incident using a large-scale traffic which can be obtained with the darknet... [more] |
IA2013-14 ICSS2013-14 pp.79-84 |
IA, ICSS |
2013-06-21 14:15 |
Niigata |
Ao-re Nagaoka |
NONSTOP: Secure Remote Analysis Platform for Cybersecurity Information Tatsuya Takehisa (NICT/Nissin), Daisuke Inoue, Masashi Eto (NICT), Katsunari Yoshioka (YNU), Takahiro Kasama, Junji Nakazato, Koji Nakao (NICT) IA2013-15 ICSS2013-15 |
Practical attack information such as attack traffic and malware samples is extremely important for researchers in the fi... [more] |
IA2013-15 ICSS2013-15 pp.85-90 |
ICSS |
2012-11-22 13:40 |
Hiroshima |
Miyajima Mori-no-Yado |
Malicious Traffic Detection based on Multimodal Analysis Takahiro Kasama, Masashi Eto, Daisuke Inoue (NICT) ICSS2012-49 |
[more] |
ICSS2012-49 pp.25-30 |
ICSS, IA |
2012-06-22 09:25 |
Tokyo |
Room 1206, 1st bldg, Takanawa Campus, Tokai University |
Network Observation and Analysis Report on nicter
-- Transition and Categorization of DDoS Backscatter -- Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) IA2012-7 ICSS2012-7 |
Since e-commerce progressed quickly, a DDoS attack became a social problem. A lot of rebounding packets called backscatt... [more] |
IA2012-7 ICSS2012-7 pp.37-42 |