IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 16 of 16  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2017-03-13
13:25
Nagasaki University of Nagasaki Modeling of Attack Activity for Integrated Analysis of Threat Information
Kenta Nomura, Daiki Ito (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-47
Cyber attacks targeting specific victims use multiple intrusion routes and various attack methods. In order to combat su... [more] ICSS2016-47
pp.7-12
ICSS, IPSJ-SPT 2017-03-14
11:45
Nagasaki University of Nagasaki Representation for Attack Activity to Associate Threat Information
Daiki Ito, Kenta Nomura (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-64
As sophisticated and complicated cyber attacks become a social problem, Threat Intelligence, in which new knowledge obta... [more] ICSS2016-64
pp.147-152
ICSS, IPSJ-SPT 2017-03-14
10:55
Nagasaki University of Nagasaki A Vulnerability Analysis of Android Applications from the View of Framework
Ryoya Furukawa, Tatsuya Nagai (Kobe Univ.), Hiroshi Kumagai, Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.)
 [more]
ICSS 2016-11-25
16:10
Kanagawa Institute of Information Security Performance of link-mining techniques to detect malicious websites
Yasuhiro Takano, Daiki Ito, Tatsuya Nagai (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-44
Conventional techniques to avoid malicious websites techniques by referring URL's keywords reported in black lists have ... [more] ICSS2016-44
pp.31-35
ICSS, IA 2016-06-07
13:25
Saga Saga University
Tatsuya Nagai (Kobe Univ.), Masaki Kamizono (PwC Cyber Services LLCPwC Cyber Services), Yoshiaki Shiraishi (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services LLCPwC Cyber Services), Masakatu Morii (Kobe Univ.) IA2016-12 ICSS2016-12
(To be available after the conference date) [more] IA2016-12 ICSS2016-12
pp.63-68
ICSS 2015-03-04
10:50
Okinawa Meio Univiersity Prediction of Malware Activities based on Loopback Address from DNS
Masaki Kamizono (NICT/SecureBrain), Takashi Tomine, Yu Tsuda, Masashi Eto (NICT), Yuji Hoshizawa (Securebrain Corporation), Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (ynu) ICSS2014-80
During malware dynamic analysis, the analysis system often finds the loopback address in responses of DNS name resolutio... [more] ICSS2014-80
pp.103-108
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
14:40
Hokkaido San-Refure Hakodate Analysis of Cyber-attack Infrastructure with Malicious Website focused on Backdoor Shell
Masaki Kamizono (YNU/NICT), Yuji Hoshizawa (SecureBrain), Takahiro Kasama, Masashi Eto, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ISEC2014-46 SITE2014-41 ICSS2014-50 EMM2014-46
 [more] ISEC2014-46 SITE2014-41 ICSS2014-50 EMM2014-46
pp.321-326
ICSS 2013-03-25
14:55
Kanagawa Yokohama National University Network-based classification of remote exploit attacks focusing on UUID
Yusuke Takahashi (Yokohama National Univ.), Masaki Kamizono, Yuji Hoshizawa (Securebrain), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2012-65
Remote exploit attacks, which target vulnerabilities of network services, is the class of most common attacks utilized i... [more] ICSS2012-65
pp.49-54
ICSS 2012-03-16
15:50
Tokyo Kikai-Shinko-Kaikan Bldg. Evaluation of Anti-Malware User Support System through Field Experiments
Toshihiko Kasagi (KDDI), Takayuki Yoda, Hiroki Yamaguchi (Hitachi), Yuji Hoshizawa (Securebrain), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2011-48
 [more] ICSS2011-48
pp.55-60
IA, ICSS 2011-06-17
14:35
Fukuoka Kyushu Institute of Technology Automatically Removing Malware Using Malware Analysis System
Nobutaka Kawaguchi, Takayuki Yoda, Hiroki Yamaguchi (Hitachi), Toshihiko Kasagi (KDDI), Yuji Hoshizawa (SecureBrain) IA2011-12 ICSS2011-12
 [more] IA2011-12 ICSS2011-12
pp.69-74
ICSS 2011-03-25
15:35
Tokyo Suspended Development and evaluation of PDF malware analysis system using dynamic analysis
Masaki Kamizono, Masata Nishida, Yuji Hoshizawa (Securebrain Corp.) ICSS2010-64
Several Adobe Reader zero-day vulnerabilities have been discovered recently, and the threat of PDF malware continues to ... [more] ICSS2010-64
pp.47-52
IA, ICSS 2009-06-18
11:10
Tokyo Kikai-Shinko-Kaikan Bldg A proposal for autonomous crawling client honeypot
Yuji Hoshizawa, Kazuo Kawamorita, Tsuyoshi Tachikawa, Masaki Kamizono (SecureBrain Corp.) IA2009-3 ICSS2009-11
In recent years, the trend in attack techniques of malware is changing from active attack targeting vulnerabilities, to ... [more] IA2009-3 ICSS2009-11
pp.13-17
ISEC, SITE, IPSJ-CSEC 2007-07-20
11:10
Hokkaido Future University-Hakodate Exploring the required condtions for malware to run for behavior analysis
Yuji Hoshizawa, Kouichirou Okada, Motoaki Yamamura (SecureBrain Corp.), Takayoshi Shiigi (JPCERT) ISEC2007-53
As a way of knowing host or behavior of malware on the network, we run malware in an isolated environment that doesn't a... [more] ISEC2007-53
pp.57-61
ISEC, SITE, IPSJ-CSEC 2007-07-20
11:35
Hokkaido Future University-Hakodate Automatic malware classification
Yuji Hoshizawa, Tsuyoshi Tachikawa, Motoaki Yamamura (SecureBrain Corp.) ISEC2007-54
It is determined by engineers of Antivirus companies whether the detected malware is new or variant based on past experi... [more] ISEC2007-54
pp.63-70
ISEC, SITE, IPSJ-CSEC 2006-07-20
15:45
Okayama Okayama Univ. A Study on Bot Detection using Response Time
Yuji Hoshizawa, Motoaki Yamamura (SecureBrain)
 [more]
ISEC, LOIS 2004-11-09
13:25
Osaka Osaka Univ. Virtual Transmission Monitoring System for Behavior Analysis of Virus
Toshihiko Hirooka (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima), Yuji Hoshizawa (Secure Brain), Koji Nakao (KDDI)
The resarch of virus such as detection of virus, or behavior analysis of virus is active. It is difficult to know the be... [more] ISEC2004-92 OIS2004-59
pp.51-56
 Results 1 - 16 of 16  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan