IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 147 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2022-03-08
14:20
Online Online Behavior Analysis of IoT Malware Using Function Call Sequence Graphs and Clustering
Satoshi Takada, Tianxiang He (Kyushu Univ), Chansu Han, Akira Tanaka (NICT), Jun'ichi Takeuchi (Kyushu Univ) ICSS2021-77
Most IoT Malware is variants generated by editing and reusing a part of the functions based on publicly available source... [more] ICSS2021-77
pp.111-116
ICSS, IPSJ-SPT 2022-03-08
15:10
Online Online Simulation of security notification by ISP to malware-infected users
Xuping Huang (AIIT/YNU), Shunsuke Mochizuki (NTT Data Mathematical Systems Inc), Akira Fujita (NICT/YNU), Katsunari Yoshioka (YNU) ICSS2021-82
(To be available after the conference date) [more] ICSS2021-82
pp.141-146
IE, ITS, ITE-AIT, ITE-ME, ITE-MMS [detail] 2022-02-22
11:55
Online Online Bit-plane oriented Detection method of Malicious Code Hidden in the Image
Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2021-50 IE2021-59
With the increasing importance of cyberspace, the threat of malware has also been increasing. Malware which hides malici... [more] ITS2021-50 IE2021-59
pp.151-156
ICSS 2021-11-29
16:15
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Automating the collection of malware behavior captured by honeypots
Eisuke Tomiyama, Hideya Ochiai, Hiroshi Esaki (UTokyo) ICSS2021-53
A honeypot is a system that exposes vulnerable systems to cyber attacks on the Internet. They are used to analyze the at... [more] ICSS2021-53
pp.43-48
ICSS 2021-11-30
09:55
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Comparison of CNN padding method using a part of malware API call sequence data with RNN.
Shugo Asai, Yuichi Futa (TUT) ICSS2021-55
In recent years, as society has become more information-oriented, malware for information has been increasing. In such a... [more] ICSS2021-55
pp.55-60
IA 2021-10-15
16:50
Online Online Malware Traffic Detection at Certain Time Using IP Flow Information
Seiya Komatsu, Yusei Katsura, Masatoshi Kakiuchi, Ismail Arai, Kazutoshi Fujikawa (NAIST) IA2021-27
The damage caused by the activities of malware such as botnets and ransomware has become a social problem. In order to d... [more] IA2021-27
pp.6-11
ICSS, IPSJ-SPT 2021-03-01
09:35
Online Online Detection of Infected Device Using DNS Traffic
Soichiro Kogo, Atsushi Kanai (Hosei Univ.) ICSS2020-27
The damage caused by computer viruses is becoming a serious problem. However, it requires a lot of effort to manage all ... [more] ICSS2020-27
pp.7-12
ICSS, IPSJ-SPT 2021-03-01
14:30
Online Online Analyzing the Transition of Vulnerabilities Targeted by IoT Malware
Kaichi Sameshima, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-40
While the popularity of IoT devices are rapidly growing, vulnerable IoT devices have been the target of cyber-attacks. I... [more] ICSS2020-40
pp.84-89
ICSS, IPSJ-SPT 2021-03-01
14:55
Online Online Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox
Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] ICSS2020-41
pp.90-95
ICSS, IPSJ-SPT 2021-03-02
10:00
Online Online Evaluation of Uncertain Reports by Multiple Anti-virus Engines
Kazuya Nomura (Waseda Univ.), Mistuaki Akiyama (NTT), Masaki Kamizono (Deloitte Tohmatsu Cyber LLC), Takahiro Kasama (NICT) ICSS2020-56
VirusTotal is an online service that provides detection results from multiple anti-virus engines. It is used in a wide r... [more] ICSS2020-56
pp.178-183
ICSS, IPSJ-SPT 2021-03-02
11:05
Online Online Accuracy evaluation of CNNs and random forests with Malware API call sequences
Shugo Asai, Futa Yuichi (TUT) ICSS2020-58
In this paper, we compare the accuracy of the results of classifying each malware family by Random Forest and CNN using ... [more] ICSS2020-58
pp.190-194
ICSS, IPSJ-SPT 2021-03-02
11:30
Online Online Detecting unknown malware families by anomaly detection using deep learning
Ren Takeuchi, Shintaro Mizuno, Vo Ngoc Khoi Nguyen, Jun Tsuchiya, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.) ICSS2020-59
The analysis of malware has become an indispensable process for anti-malware. Malware is diversifying day by day, so tha... [more] ICSS2020-59
pp.195-200
ICSS 2020-11-26
14:25
Online Online Function Estimation for Malwares based on Similarity and Its Effectiveness
Kohei Kodama, Hiroshi Kai (Ehime Univ.), Masakatu Morii (Kobe Univ.) ICSS2020-21
In this paper, we consider about a method which estimates malware functions using the results of malware dynamic analysi... [more] ICSS2020-21
pp.13-16
CS, IN, NS, NV
(Joint)
2020-09-11
09:25
Online Online A virtual-network replacing scheme for achieving a metabolic network
Yu Tamura, Yuta Miyaoka, Junichi Murayama (Tokai Univ.) IN2020-24
A future targeted attacks would infect a network with a malware program and then tampers packet-forwarding routes. As a ... [more] IN2020-24
pp.13-18
CS, IN, NS, NV
(Joint)
2020-09-11
09:50
Online Online An edge-router replacing scheme for achieving a metabolic network
Yuta Miyaoka, Yu Tamura, Junichi Murayama (Tokai Univ.) IN2020-25
A future cyber attack would tampers packet-forwarding routes of a target network using malware programs. As a solution a... [more] IN2020-25
pp.19-24
ISEC, IT, WBS 2020-03-11
11:20
Hyogo University of Hyogo
(Cancelled but technical report was issued)
Applying Machine Learning to Malware Detection in Mobile Applications
Yoshiki Kusama, Keiji Takeda, Kazuma Kobayashi, Osamu Nakamura (Keio Univ.), Lee Myoungje (LINE corp.) IT2019-112 ISEC2019-108 WBS2019-61
In this paper, we proposed and implemented a detection method that focuses on a binary file stored in an APK(Android app... [more] IT2019-112 ISEC2019-108 WBS2019-61
pp.151-157
NS, IN
(Joint)
2020-03-05
11:00
Okinawa Royal Hotel Okinawa Zanpa-Misaki
(Cancelled but technical report was issued)
An inheritance scheme of dynamic routing information for achieving successive replacing of virtual routers
Yu Tamura, Yuta Miyaoka, Junichi Murayama (Tokai Univ.) IN2019-93
In future targeted attacks, malware programs infected in routers may cause various problems. Thus, we have proposed a sc... [more] IN2019-93
pp.103-108
ICSS, IPSJ-SPT 2020-03-02
14:30
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Development of a recovery tool for a ransomware infected PC
Ryosuke Kokado (Kobe Univ.), Masato Ikegami, Tomohisa Hasegawa, Takafumi Harada, Hiroshi Kitani (Canon MJ), Masakatu Morii (Kobe Univ.) ICSS2019-77
In recent years, malware called ransomware, which encrypts data on terminal devices, including servers and personal comp... [more] ICSS2019-77
pp.55-60
ICSS, IPSJ-SPT 2020-03-02
15:40
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Proposing Criteria for Detecting Internet-Wide Scanners for Darknet Monitoring
Yukiko Endo, Yoshiki Mori (NICT), Jumpei Shimamura (Clwit), Masaki Kubo (NICT) ICSS2019-80
The NICTER project has been observing the darknet (observing packets arriving at unused IP addresses) for over 10 years.... [more] ICSS2019-80
pp.73-78
ICSS, IPSJ-SPT 2020-03-02
16:00
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation
Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2019-81
While IoT malware such as Mirai have been targeting Telnet services, there are still many devices that are still running... [more] ICSS2019-81
pp.79-84
 Results 21 - 40 of 147 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan