IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 80  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2024-03-21
11:20
Okinawa OIST
(Primary: On-site, Secondary: Online)
Analyzing Attackers and Victims Actions via LockBit3.0 Website Data Dynamics
Yuji Sekine, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-70
LockBit3.0 is one of the top ransomware groups that has been active since July 2022, targeting over 1,000 companies. In ... [more] ICSS2023-70
pp.9-16
ICSS, IPSJ-SPT 2024-03-21
12:10
Okinawa OIST
(Primary: On-site, Secondary: Online)
Unveiling the Shadows: Analyzing Cryptocurrency Address Management and Fund Movement of Darknet Markets
Aiman Syazwan Bin Abdul Razak, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-72
Darknet markets use cryptocurrencies like Bitcoin for anonymous transactions in exchanging illicit goods and services. T... [more] ICSS2023-72
pp.25-32
ICSS, IPSJ-SPT 2024-03-21
15:20
Okinawa OIST
(Primary: On-site, Secondary: Online)
Investigating the functionalities of IoT malware to disrupt the activities of other intruders
Shun Ikeda, Hiroki Yasui, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-76
 [more] ICSS2023-76
pp.51-56
ICSS, IPSJ-SPT 2024-03-21
15:45
Okinawa OIST
(Primary: On-site, Secondary: Online)
Enhanced Analysis of IoT Botnet Activity by Fusing Honeypots, Malware Dynamic Analysis, and C&C Observation
Yuki Endo, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-77
 [more] ICSS2023-77
pp.57-62
ICSS, IPSJ-SPT 2024-03-22
10:10
Okinawa OIST
(Primary: On-site, Secondary: Online)
Study of keyword-based search method for IoT devices deployed at important facilities
Mami Kawaguchi, Takayuki Sasaki, Kihara Momoka, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-86
IoT devices are increasingly deployed in various systems, including remote monitoring systems.Some of these IoT devices ... [more] ICSS2023-86
pp.123-128
ICSS, IPSJ-SPT 2024-03-22
11:45
Okinawa OIST
(Primary: On-site, Secondary: Online)
Impact of ChatGPT Assisted Polymorphic Malware on Antivirus Detection
Huang Zhewei, Yinn Minn Pa pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-89
With the rapid implementation of large-scale language models (LLMs), there are concerns about their misuse in cyberattac... [more] ICSS2023-89
pp.145-152
VLD, HWS, ICD 2024-02-29
14:00
Okinawa
(Primary: On-site, Secondary: Online)
Nano Artifact Metric Systems Resistant Against Clones Produced by Scanning Probe Lithography
Akira Iwahashi, Naoki Yoshida, Katsunari Yoshioka (YNU), Tsutomu Matsumoto (AIST) VLD2023-113 HWS2023-73 ICD2023-102
 [more] VLD2023-113 HWS2023-73 ICD2023-102
pp.83-88
ICSS, IPSJ-SPT 2023-03-13
17:50
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
URL Warning List Creation and Manage Methods using VirusTotal and Web Access Log
Kyohei Takao, Chika Hiraishi (YNU), Kazuki Takada (SecureBrain), Akira Fujita, Daisuke Inoue (NICT), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-66
Security services such as URL blocklists are widely used to prevent users from accessing malicious websites.
However, ... [more]
ICSS2022-66
pp.109-114
ICSS, IPSJ-SPT 2023-03-14
13:10
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Towards observation of online fraud exploiting multiple SNS
Yamato Kawaguchi (Yokohama National Univ.), Kazuki Takada (SecureBrain), Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2022-77
SNS (Social Networking Service) fraud has been reported in accordance with the increase in SNS users. In this study, we ... [more] ICSS2022-77
pp.175-180
ICSS, IPSJ-SPT 2023-03-14
13:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Assessment Method for Persistent Malware Infection on IoT Devices
Shunki Soeda, Takahiro Inoue, Rui Tanabe, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-78
Malware targeting IoT devices has become a growing threat in recent years. Some of them continue to infect devices perma... [more] ICSS2022-78
pp.181-186
ICSS 2022-11-07
15:00
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
Observation of Attack Infrastructures by Scripts that Mimic C&C Communications of IoT Bots
Kaichi Sameshima, Yuki Endo, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2022-44
(To be available after the conference date) [more] ICSS2022-44
pp.37-42
ICSS 2022-11-07
15:25
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
Analysis of Environmental Sensitivity of Persistent IoT Malware using Sandboxes with File Systems from Various IoT Devices
Takahiro Inoue (YNU), Eizo Okada, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2022-45
(To be available after the conference date) [more] ICSS2022-45
pp.43-48
ICSS, IPSJ-SPT 2022-03-07
12:50
Online Online am I infected? A New Web Service to Inspect End Users' IoT Devices for Malware Infection and Vulnerabilities
Songwei He, Takaya Noma, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2021-58
IoT devices have become prevalent in recent years, but unfortunately, many devices are infected by malware due to their ... [more] ICSS2021-58
pp.1-6
ICSS, IPSJ-SPT 2022-03-07
13:50
Online Online Internet-wide discovery of IoT devices deployed at important facilities
Mizuki Hiraku, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ) ICSS2021-61
Previous study has revealed that there are a number of IoT devices used at important facilities, such as water treatment... [more] ICSS2021-61
pp.14-19
ICSS, IPSJ-SPT 2022-03-08
13:20
Online Online Analyzing network status of IoT malware by dynamic analysis with bare-metal device
Kota Ogawa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2021-74
In this study, we first investigate the network state changes caused by IoT malware infection by executing malware sampl... [more] ICSS2021-74
pp.93-98
ICSS, IPSJ-SPT 2022-03-08
13:40
Online Online ML-based detection of C&C communications for sandbox analysis of IoT malware
Yuki Endo, Kaichi Sameshima, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2021-75
In order to analyze the behavior of malware, dynamic analysis has been widely utilized. Among various communication of m... [more] ICSS2021-75
pp.99-104
ICSS, IPSJ-SPT 2022-03-08
15:10
Online Online Simulation of security notification by ISP to malware-infected users
Xuping Huang (AIIT/YNU), Shunsuke Mochizuki (NTT Data Mathematical Systems Inc), Akira Fujita (NICT/YNU), Katsunari Yoshioka (YNU) ICSS2021-82
(To be available after the conference date) [more] ICSS2021-82
pp.141-146
IA, ICSS 2021-06-22
09:25
Online Online Analtsis of cost-effectiveness in malicious site detection using VirusTotal
Kyohei Takao (YNU), Hiroshi Mori (Deloitte Tohmatsu Cyber LLC), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) IA2021-10 ICSS2021-10
VirusTotal receives to-be-tested files and URLs and provides scan results by more than 70 security software.
Its incre... [more]
IA2021-10 ICSS2021-10
pp.50-55
ICSS, IPSJ-SPT 2021-03-01
14:30
Online Online Analyzing the Transition of Vulnerabilities Targeted by IoT Malware
Kaichi Sameshima, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-40
While the popularity of IoT devices are rapidly growing, vulnerable IoT devices have been the target of cyber-attacks. I... [more] ICSS2020-40
pp.84-89
ICSS, IPSJ-SPT 2021-03-01
14:55
Online Online Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox
Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] ICSS2020-41
pp.90-95
 Results 1 - 20 of 80  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan