Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, ICSS |
2015-06-11 13:45 |
Fukuoka |
Kyushu Institute of Technology Univ. |
[Invited Talk]
Establishment of Cybersecurity Education by Industry-Academia Collaboration Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-2 ICSS2015-2 |
[more] |
IA2015-2 ICSS2015-2 pp.3-8 |
IA, ICSS |
2015-06-12 10:50 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Detecting Malicious Domain Names based on the Time-series Analysis of Attackers Network Resources Daiki Chiba (NTT/Waseda Univ.), Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeshi Yada, Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-10 ICSS2015-10 |
Attackers launching cyber attacks frequently change their malicious websites to evade countermeasures such as blacklisti... [more] |
IA2015-10 ICSS2015-10 pp.51-56 |
ICSS, IA |
2014-06-06 13:00 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Analyzing Dynamic Class Loaded Applications in Android Takaaki Nagumo, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT) IA2014-8 ICSS2014-8 |
[more] |
IA2014-8 ICSS2014-8 pp.39-44 |
ICSS, IPSJ-SPT |
2014-03-27 13:30 |
Okinawa |
Meio Univiersity |
Measuring Lifetime of Malicious Website Based on Redirection from Compromised Websites Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT) ICSS2013-71 |
Attackers continuously generate URLs and FQDNs of malicious websites in order to circumvent security countermeasures
us... [more] |
ICSS2013-71 pp.53-58 |
ICSS, IPSJ-SPT |
2014-03-27 13:55 |
Okinawa |
Meio Univiersity |
An Investigation of Malicious JavaScript Code used in Drive-by Download Yuta Takata, Mitsuaki Akiyama, Takeo Hariu (NTT) ICSS2013-72 |
Malicious website contains JavaScript code that exploits vulnerabilities in the browser or the browser's plugins.Researc... [more] |
ICSS2013-72 pp.59-64 |
ICSS, IPSJ-SPT |
2014-03-27 14:20 |
Okinawa |
Meio Univiersity |
Implementation and Evaluation of Web Phantom: Hybrid Web Honeypot Takeshi Yagi, Takeo Hariu (NTT) ICSS2013-73 |
[more] |
ICSS2013-73 pp.65-70 |
ICSS, IPSJ-SPT |
2014-03-28 12:05 |
Okinawa |
Meio Univiersity |
Identifying C&C Server by Analyzing Relation between Control Flow and Communications Tomonori Ikuse, Kazufumi Aoki, Takeo Hariu (NTT) ICSS2013-81 |
In recent years, it is difficult to prevent malware infection entirely because of the diversication of attack vectors a... [more] |
ICSS2013-81 pp.137-142 |
ICSS |
2013-11-12 14:15 |
Fukuoka |
Nishijin Plaza |
Evaluations of Multi-Stage Traffic Analysis against Attacks on Websites Takeshi Yagi, Takeo Hariu (NTT), Hiroki Takakura (Nagoya University) ICSS2013-57 |
This paper proposes a traffic analysis scheme to detect attacks from accesses to websites. Conventional schemes can dete... [more] |
ICSS2013-57 pp.3-8 |
IN, NV (Joint) |
2013-07-18 11:35 |
Hokkaido |
Hokkaido Univ. Faculty of Eng. Academic Lounge 3 |
Analysis of Blacklist Update Frequency for Monitoring Malware Infection Attacks on Websites Takeshi Yagi, Takeo Hariu (NTT), Hiroyuki Ohsaki (Kwansei Gakuin Univ.), Masayuki Murata (Osaka Univ.) IN2013-38 |
(Advance abstract in Japanese is available) [more] |
IN2013-38 pp.13-18 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 13:30 |
Hokkaido |
|
Identifying the Code to be Analyzed with Taint Tags Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu (NTT) ISEC2012-20 SITE2012-16 ICSS2012-22 EMM2012-12 |
[more] |
ISEC2012-20 SITE2012-16 ICSS2012-22 EMM2012-12 pp.77-82 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 15:25 |
Hokkaido |
|
Detecting Invalid Control Flow with Pseudo-Dispersion of Program Code Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu (NTT) ISEC2012-24 SITE2012-20 ICSS2012-26 EMM2012-16 |
Attacks that modify the control flow of a running program by corrupting memory address pointers have been a major threat... [more] |
ISEC2012-24 SITE2012-20 ICSS2012-26 EMM2012-16 pp.103-108 |
IA, ICSS |
2011-06-17 15:00 |
Fukuoka |
Kyushu Institute of Technology |
Analysis of Website Infections using Malware Takeshi Yagi, Shinta Nakayama, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Mitsutaka Itoh (NTT) IA2011-13 ICSS2011-13 |
This paper reports the actual situation of website infections using malware. Recently, with the widespread of the web, m... [more] |
IA2011-13 ICSS2011-13 pp.75-80 |
IN, MoNA (Joint) |
2010-11-18 14:50 |
Fukuoka |
Fukuoka Institute of Technology |
Architecture Design of Web Phantom: Hybrid Web Honeypot Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT) IN2010-85 |
This paper proposes a hybrid web honeypot, namely Web Phantom, which generates a blacklist to prevent malware infection ... [more] |
IN2010-85 pp.25-30 |
IN |
2010-07-08 15:25 |
Hokkaido |
Hokkaido Univ. |
Investigation and Evaluation of Attack Monitoring Methods Using Web Honeypots Takeshi Yagi (NTT Corp.), Alberto Chan (Univ. of British Columbia), Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IN2010-29 |
[more] |
IN2010-29 pp.37-42 |
IA, ICSS |
2010-06-18 14:20 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A Life-cycle Monitoring Method of Malware Download Sites for Websites Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IA2010-14 ICSS2010-14 |
This paper proposes a method to monitor life-cycle of malware download sites for websites and reports the actual life-cy... [more] |
IA2010-14 ICSS2010-14 pp.75-80 |
ICSS |
2010-03-26 15:30 |
Fukuoka |
The University of Kitakyushu |
Investigation of Attacks to Websites using Multi-domain Web-based Honeypots Naoto Tanimoto, Takeshi Yagi, Takeo Hariu, Mitsutaka Itoh (NTT Corporation) ICSS2009-66 |
Recently, a large number of websites are under attacks from attackers. Many compromised websites are used by attackers a... [more] |
ICSS2009-66 pp.25-28 |
NS, IN (Joint) |
2010-03-05 11:40 |
Miyazaki |
Miyazaki Phoenix Seagaia Resort (Miyazaki) |
A Scheme of Detecting Malware for Websites Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IN2009-200 |
This paper reports the actual situation of malware distributed to websites by constructing web honeypots, which carries ... [more] |
IN2009-200 pp.337-342 |