Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2021-03-02 11:05 |
Online |
Online |
Study on analyzing Memcached DRDoS attacks and their infrastructures Mizuki Kondo, Natsuo Shintani (YNU), Daisuke Makita (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-45 |
Internet-facing Memcached services are known to have been misused as powerful reflectors of DRDoS attacks. In this paper... [more] |
ICSS2020-45 pp.114-119 |
ICSS, IPSJ-SPT |
2021-03-02 09:35 |
Online |
Online |
An Efficient Discovery of Malicious URL Using VirusTotal and Web Access Log Chika Hiraishi, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-55 |
The threats of malicious websites are increasing that, urgent countermeasures are needed. Using a block list of known ma... [more] |
ICSS2020-55 pp.172-177 |
ICSS, IPSJ-SPT |
2021-03-02 10:25 |
Online |
Online |
Proof of concept of sandbox evasion attack using email address stored in target machine Yuta Inoue, Rui Tanabe (YNU), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-57 |
In recent years, malware sandbox appliances that dynamically analyze target files are becoming popular. However, malware... [more] |
ICSS2020-57 pp.184-189 |
ICSS, IPSJ-SPT |
2020-03-02 16:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2019-81 |
While IoT malware such as Mirai have been targeting Telnet services, there are still many devices that are still running... [more] |
ICSS2019-81 pp.79-84 |
ICSS, IPSJ-SPT |
2020-03-02 16:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Mirai may detect that you talk to smart speaker
-- On privacy violation by attackers who compromised home router -- Shoya Okuda, Tatsuya Tamai, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2019-82 |
In this study, we analyze the traffic of four popular smart speakers to assess the risk of privacy invasion by attackers... [more] |
ICSS2019-82 pp.85-90 |
ICSS, IPSJ-SPT |
2020-03-02 11:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
An Evaluation of Contact Points for Security Notifications Miori Saito, Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2019-94 |
With the evolving threat of cyber attacks, the importance of security notifications is increasing. In general, informati... [more] |
ICSS2019-94 pp.195-200 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 10:20 |
Kochi |
Kochi University of Technology |
An Approach to Attack Scenario Generation for Simulation of Targeted Attacks Yusuke Takahashi, Shigeyoshi Shima, Atsunori Naito (NEC), Rui Tanabe, Katsunari Yoshioka (YNU) ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16 |
Cyber exercise is implemented by security organizations for the purpose of development of human re-sources against targe... [more] |
ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16 pp.7-14 |
ICSS, IPSJ-SPT |
2019-03-07 14:20 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
How to build malware sandbox using real IoT devices Jia Xiong, Tatsuya Tamai, Kazuki Tamiya (Yokohama National Univ.), Satoshi Hara (Yokohama National Univ./Fujisoft), Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2018-69 |
In spite of their increasing importance in the battle against evolving IoT threats, construction of IoT malware sandboxe... [more] |
ICSS2018-69 pp.7-12 |
ICSS, IPSJ-SPT |
2019-03-07 14:45 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Discrimination of IoT devices by clustering their responses to network scan Takuya Hoizumi, Shin Nishida, Keisuke Uchida, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
[more] |
|
ICSS, IPSJ-SPT |
2019-03-07 15:50 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
An experiment design of security notification to users of IoT devices through dedicated client software Shin Nishida, Takuya Hoizumi, Keisuke Uchida, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2018-75 |
Notification of vulnerability and malware infection of IoT devices to the stakeholders is becoming increasingly importan... [more] |
ICSS2018-75 pp.41-46 |
ICSS |
2018-11-22 14:20 |
Kagoshima |
|
Part II: Calculating Similarity between IoT Malware over CPU Architectures Ryoichi Isawa, Tao Ban (NICT), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2018-66 |
At the ICSS workshop held in June, 2018, we proposed a method for calculating
similarity between IoT malware samples ov... [more] |
ICSS2018-66 pp.73-78 |
ICSS, IA |
2018-06-25 13:25 |
Ehime |
Ehime University |
Calculating Similarity between IoT Malware Samples over CPU Architectures Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) IA2018-2 ICSS2018-2 |
Malware samples infecting IoT (Internet of Things) devices such as Web cameras and
home routers have spread over the In... [more] |
IA2018-2 ICSS2018-2 pp.7-12 |
ICSS, IPSJ-SPT |
2018-03-08 09:20 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Considering Opcode-based Similarity between IoT Malware Samples Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2017-69 |
In this paper, we generate a similarity matrix between IoT (Internet of Things) malware samples based on their disassemb... [more] |
ICSS2017-69 pp.109-114 |
ICSS, IPSJ-SPT |
2018-03-08 09:45 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Evaluation of malware sandbox using evasive test samples Kou Ishii, Wateru Ueno, Rui Tanabe (Yokohama National Univ.), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
[more] |
|
ICSS, IPSJ-SPT |
2018-03-08 11:10 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Classification for Important Decoy Documents Based on Supervised Learning Yao Xiao, Shuta Morishima (Yokohama National Univ.), Tsuyufumi Watanabe (Yokohama National Univ./Fujisoft), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2017-72 |
In recent targeted e-mail attacks, attackers often send their target organization an email with a malware disguised as a... [more] |
ICSS2017-72 pp.127-132 |
ICSS, IPSJ-SPT |
2018-03-08 13:50 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Investigation of Inferability of IP addresses for Clients in Organizations Miori Saito, Wataru Ueno, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2017-78 |
(To be available after the conference date) [more] |
ICSS2017-78 pp.161-166 |
ICSS, IPSJ-SPT |
2018-03-08 15:40 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Analyzing Victims of DRDoS Attacks Observed by Honeypots Kazuya Watanabe (Yokohama National Univ.), Tomomi Nishizoe (NTT Com), Daisuke Makita (NICT), Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2017-83 |
In recent years, Distributed Reflection Denial-of-Service (DRDoS) Attack are increasing. We have been observing DRDoS at... [more] |
ICSS2017-83 pp.205-210 |
IA, ICSS |
2017-06-08 14:25 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
A First Trend Review of Runtime Packers for IoT Malware Ryoichi Isawa (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Tao Ban, Daisuke Inoue (NICT) IA2017-4 ICSS2017-4 |
Malicious software (malware) specimens that infect IoT (Internet of Things) devices rapidly increase. If those specimens... [more] |
IA2017-4 ICSS2017-4 pp.19-24 |
ISEC |
2017-05-12 14:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
SandVeil: A Tool for Improving Sandbox Resilience to Evasion Rui Tanabe, Atsushi Yahata, Kou Ishii, Akira Yokoyama, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ISEC2017-8 |
Malware sandbox is an essential tool for malware analysis and detection. However, many sandbox detection methods have be... [more] |
ISEC2017-8 pp.43-49 |
ICSS, IPSJ-SPT |
2017-03-13 13:50 |
Nagasaki |
University of Nagasaki |
Early Detection of New DRDoS Attack with Protocol-Agnostic Honeypot Tomomi Nishizoe (Yokohama National Univ.), Daisuke Makita (Yokohama National Univ./NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2016-48 |
In DRDoS attacks, attackers abuse UDP-based protocols that can amplify traffic. It's essential that we find such protoco... [more] |
ICSS2016-48 pp.13-18 |