|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
WBS, IT, ISEC |
2021-03-04 15:45 |
Online |
Online |
A Real-Time Bluetooth Protocol Fuzzing System Bo Wang, Suzuki Ako (JVCKW), Yuichi Kaji (NU) IT2020-137 ISEC2020-67 WBS2020-56 |
In recent years, with the practical use and spread of Bluetooth IoT (Internet of Things) devices, there are concerns abo... [more] |
IT2020-137 ISEC2020-67 WBS2020-56 pp.152-159 |
HWS |
2020-04-07 11:15 |
Online |
Online |
IoTPoCoFuzz: Power Consumption aware Fuzzing against IoT device Shintaro Mizuno, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.) HWS2020-4 |
In many cases, IoT devices have limitations on input and program activation, and that makes it difficult for external te... [more] |
HWS2020-4 pp.19-24 |
ICSS, IPSJ-SPT |
2020-03-02 14:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
A Study on Fuzzing for Device Drivers with AddressSanitizer Kentaro Ishii (Kove Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kove Univ.) ICSS2019-76 |
A device driver is a program which runs with higher privilege in an operating system. If a device driver is compromised,... [more] |
ICSS2019-76 pp.49-53 |
IPSJ-SLDM, RECONF, VLD, CPSY, IPSJ-ARC [detail] |
2020-01-22 15:50 |
Kanagawa |
Raiosha, Hiyoshi Campus, Keio University |
Mutation Fuzzing Based on Type Estimation of Data Items Utilizing Data Writer Yoko Higuchi, Nagisa Ishiura, Namba Noriyuki (Kwansei Gakuin Univ.) VLD2019-62 CPSY2019-60 RECONF2019-52 |
This article proposes a novel way of acquiring information, which is used for enhancing efficiency of fuzzing for softwa... [more] |
VLD2019-62 CPSY2019-60 RECONF2019-52 pp.49-53 |
ICSS |
2017-11-20 14:15 |
Oita |
Beppu International Convention Center |
[Invited Talk]
Case Study and Future Perspective on Security Assessment of Connected Car Masaki Kamizono (PwC) ICSS2017-38 |
Various cyber security threats and vulnerabilities are reported in accordance with the remarkable rise of the connected ... [more] |
ICSS2017-38 pp.1-4 |
ICSS |
2016-11-25 14:40 |
Kanagawa |
Institute of Information Security |
A fuzz testing method cooperated with threat modeling Yasuhiko Nishio, Tadashi Shiroma (CCDS), Hiroyuki Inoue (CCDS/HCU) ICSS2016-41 |
The purpose of this study is to develop a fuzz testing method that can ensure the IoT security especially automotive sys... [more] |
ICSS2016-41 pp.15-20 |
DC |
2010-10-14 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Evaluation of Automated Testing Tools for Web Application Vulnerability Detection Ryosuke Nakai, Tatsuhiro Tsuchiya, Tohru Kikuno (Osaka Univ) DC2010-21 |
This paper reports an evaluation of some automatic testing tools for web
applications. These testing tools are intende... [more] |
DC2010-21 pp.19-23 |
ISEC |
2007-12-19 17:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Evaluation of a Detection System against Fuzzing Attacks on the SIP Protocol Masaya Ozawa (Chuo Univ.), Eric Y. Chen, Mitsutaka Itoh (NTT PF Lab.), Mitsutoshi Hatori (Chuo Univ.) ISEC2007-128 |
As the number of VoIP users grows rapidly in recent years, the available attack vectors against VoIP systems also increa... [more] |
ISEC2007-128 pp.115-121 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|