IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 80 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2021-03-02
11:05
Online Online Study on analyzing Memcached DRDoS attacks and their infrastructures
Mizuki Kondo, Natsuo Shintani (YNU), Daisuke Makita (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-45
Internet-facing Memcached services are known to have been misused as powerful reflectors of DRDoS attacks. In this paper... [more] ICSS2020-45
pp.114-119
ICSS, IPSJ-SPT 2021-03-02
09:35
Online Online An Efficient Discovery of Malicious URL Using VirusTotal and Web Access Log
Chika Hiraishi, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-55
The threats of malicious websites are increasing that, urgent countermeasures are needed. Using a block list of known ma... [more] ICSS2020-55
pp.172-177
ICSS, IPSJ-SPT 2021-03-02
10:25
Online Online Proof of concept of sandbox evasion attack using email address stored in target machine
Yuta Inoue, Rui Tanabe (YNU), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-57
In recent years, malware sandbox appliances that dynamically analyze target files are becoming popular. However, malware... [more] ICSS2020-57
pp.184-189
ICSS, IPSJ-SPT 2020-03-02
16:00
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation
Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2019-81
While IoT malware such as Mirai have been targeting Telnet services, there are still many devices that are still running... [more] ICSS2019-81
pp.79-84
ICSS, IPSJ-SPT 2020-03-02
16:20
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Mirai may detect that you talk to smart speaker -- On privacy violation by attackers who compromised home router --
Shoya Okuda, Tatsuya Tamai, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2019-82
In this study, we analyze the traffic of four popular smart speakers to assess the risk of privacy invasion by attackers... [more] ICSS2019-82
pp.85-90
ICSS, IPSJ-SPT 2020-03-02
11:30
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
An Evaluation of Contact Points for Security Notifications
Miori Saito, Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2019-94
With the evolving threat of cyber attacks, the importance of security notifications is increasing. In general, informati... [more] ICSS2019-94
pp.195-200
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
10:20
Kochi Kochi University of Technology An Approach to Attack Scenario Generation for Simulation of Targeted Attacks
Yusuke Takahashi, Shigeyoshi Shima, Atsunori Naito (NEC), Rui Tanabe, Katsunari Yoshioka (YNU) ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16
Cyber exercise is implemented by security organizations for the purpose of development of human re-sources against targe... [more] ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16
pp.7-14
ICSS, IPSJ-SPT 2019-03-07
14:20
Okinawa NICT Okinawa Electromagnetic Technology Center How to build malware sandbox using real IoT devices
Jia Xiong, Tatsuya Tamai, Kazuki Tamiya (Yokohama National Univ.), Satoshi Hara (Yokohama National Univ./Fujisoft), Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2018-69
In spite of their increasing importance in the battle against evolving IoT threats, construction of IoT malware sandboxe... [more] ICSS2018-69
pp.7-12
ICSS, IPSJ-SPT 2019-03-07
14:45
Okinawa NICT Okinawa Electromagnetic Technology Center Discrimination of IoT devices by clustering their responses to network scan
Takuya Hoizumi, Shin Nishida, Keisuke Uchida, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
 [more]
ICSS, IPSJ-SPT 2019-03-07
15:50
Okinawa NICT Okinawa Electromagnetic Technology Center An experiment design of security notification to users of IoT devices through dedicated client software
Shin Nishida, Takuya Hoizumi, Keisuke Uchida, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2018-75
Notification of vulnerability and malware infection of IoT devices to the stakeholders is becoming increasingly importan... [more] ICSS2018-75
pp.41-46
ICSS 2018-11-22
14:20
Kagoshima   Part II: Calculating Similarity between IoT Malware over CPU Architectures
Ryoichi Isawa, Tao Ban (NICT), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2018-66
At the ICSS workshop held in June, 2018, we proposed a method for calculating
similarity between IoT malware samples ov... [more]
ICSS2018-66
pp.73-78
ICSS, IA 2018-06-25
13:25
Ehime Ehime University Calculating Similarity between IoT Malware Samples over CPU Architectures
Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) IA2018-2 ICSS2018-2
Malware samples infecting IoT (Internet of Things) devices such as Web cameras and
home routers have spread over the In... [more]
IA2018-2 ICSS2018-2
pp.7-12
ICSS, IPSJ-SPT 2018-03-08
09:20
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Considering Opcode-based Similarity between IoT Malware Samples
Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2017-69
In this paper, we generate a similarity matrix between IoT (Internet of Things) malware samples based on their disassemb... [more] ICSS2017-69
pp.109-114
ICSS, IPSJ-SPT 2018-03-08
09:45
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Evaluation of malware sandbox using evasive test samples
Kou Ishii, Wateru Ueno, Rui Tanabe (Yokohama National Univ.), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
 [more]
ICSS, IPSJ-SPT 2018-03-08
11:10
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Classification for Important Decoy Documents Based on Supervised Learning
Yao Xiao, Shuta Morishima (Yokohama National Univ.), Tsuyufumi Watanabe (Yokohama National Univ./Fujisoft), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2017-72
In recent targeted e-mail attacks, attackers often send their target organization an email with a malware disguised as a... [more] ICSS2017-72
pp.127-132
ICSS, IPSJ-SPT 2018-03-08
13:50
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Investigation of Inferability of IP addresses for Clients in Organizations
Miori Saito, Wataru Ueno, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2017-78
(To be available after the conference date) [more] ICSS2017-78
pp.161-166
ICSS, IPSJ-SPT 2018-03-08
15:40
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Analyzing Victims of DRDoS Attacks Observed by Honeypots
Kazuya Watanabe (Yokohama National Univ.), Tomomi Nishizoe (NTT Com), Daisuke Makita (NICT), Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2017-83
In recent years, Distributed Reflection Denial-of-Service (DRDoS) Attack are increasing. We have been observing DRDoS at... [more] ICSS2017-83
pp.205-210
IA, ICSS 2017-06-08
14:25
Kochi Kochi University of Technolo, Eikokuji Campus A First Trend Review of Runtime Packers for IoT Malware
Ryoichi Isawa (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Tao Ban, Daisuke Inoue (NICT) IA2017-4 ICSS2017-4
Malicious software (malware) specimens that infect IoT (Internet of Things) devices rapidly increase. If those specimens... [more] IA2017-4 ICSS2017-4
pp.19-24
ISEC 2017-05-12
14:50
Tokyo Kikai-Shinko-Kaikan Bldg. SandVeil: A Tool for Improving Sandbox Resilience to Evasion
Rui Tanabe, Atsushi Yahata, Kou Ishii, Akira Yokoyama, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ISEC2017-8
Malware sandbox is an essential tool for malware analysis and detection. However, many sandbox detection methods have be... [more] ISEC2017-8
pp.43-49
ICSS, IPSJ-SPT 2017-03-13
13:50
Nagasaki University of Nagasaki Early Detection of New DRDoS Attack with Protocol-Agnostic Honeypot
Tomomi Nishizoe (Yokohama National Univ.), Daisuke Makita (Yokohama National Univ./NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2016-48
In DRDoS attacks, attackers abuse UDP-based protocols that can amplify traffic. It's essential that we find such protoco... [more] ICSS2016-48
pp.13-18
 Results 21 - 40 of 80 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan