Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2022-03-08 14:20 |
Online |
Online |
Behavior Analysis of IoT Malware Using Function Call Sequence Graphs and Clustering Satoshi Takada, Tianxiang He (Kyushu Univ), Chansu Han, Akira Tanaka (NICT), Jun'ichi Takeuchi (Kyushu Univ) ICSS2021-77 |
Most IoT Malware is variants generated by editing and reusing a part of the functions based on publicly available source... [more] |
ICSS2021-77 pp.111-116 |
ICSS, IPSJ-SPT |
2022-03-08 15:10 |
Online |
Online |
Simulation of security notification by ISP to malware-infected users Xuping Huang (AIIT/YNU), Shunsuke Mochizuki (NTT Data Mathematical Systems Inc), Akira Fujita (NICT/YNU), Katsunari Yoshioka (YNU) ICSS2021-82 |
(To be available after the conference date) [more] |
ICSS2021-82 pp.141-146 |
IE, ITS, ITE-AIT, ITE-ME, ITE-MMS [detail] |
2022-02-22 11:55 |
Online |
Online |
Bit-plane oriented Detection method of Malicious Code Hidden in the Image Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2021-50 IE2021-59 |
With the increasing importance of cyberspace, the threat of malware has also been increasing. Malware which hides malici... [more] |
ITS2021-50 IE2021-59 pp.151-156 |
ICSS |
2021-11-29 16:15 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Automating the collection of malware behavior captured by honeypots Eisuke Tomiyama, Hideya Ochiai, Hiroshi Esaki (UTokyo) ICSS2021-53 |
A honeypot is a system that exposes vulnerable systems to cyber attacks on the Internet. They are used to analyze the at... [more] |
ICSS2021-53 pp.43-48 |
ICSS |
2021-11-30 09:55 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Comparison of CNN padding method using a part of malware API call sequence data with RNN. Shugo Asai, Yuichi Futa (TUT) ICSS2021-55 |
In recent years, as society has become more information-oriented, malware for information has been increasing. In such a... [more] |
ICSS2021-55 pp.55-60 |
IA |
2021-10-15 16:50 |
Online |
Online |
Malware Traffic Detection at Certain Time Using IP Flow Information Seiya Komatsu, Yusei Katsura, Masatoshi Kakiuchi, Ismail Arai, Kazutoshi Fujikawa (NAIST) IA2021-27 |
The damage caused by the activities of malware such as botnets and ransomware has become a social problem. In order to d... [more] |
IA2021-27 pp.6-11 |
ICSS, IPSJ-SPT |
2021-03-01 09:35 |
Online |
Online |
Detection of Infected Device Using DNS Traffic Soichiro Kogo, Atsushi Kanai (Hosei Univ.) ICSS2020-27 |
The damage caused by computer viruses is becoming a serious problem. However, it requires a lot of effort to manage all ... [more] |
ICSS2020-27 pp.7-12 |
ICSS, IPSJ-SPT |
2021-03-01 14:30 |
Online |
Online |
Analyzing the Transition of Vulnerabilities Targeted by IoT Malware Kaichi Sameshima, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-40 |
While the popularity of IoT devices are rapidly growing, vulnerable IoT devices have been the target of cyber-attacks. I... [more] |
ICSS2020-40 pp.84-89 |
ICSS, IPSJ-SPT |
2021-03-01 14:55 |
Online |
Online |
Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41 |
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] |
ICSS2020-41 pp.90-95 |
ICSS, IPSJ-SPT |
2021-03-02 10:00 |
Online |
Online |
Evaluation of Uncertain Reports by Multiple Anti-virus Engines Kazuya Nomura (Waseda Univ.), Mistuaki Akiyama (NTT), Masaki Kamizono (Deloitte Tohmatsu Cyber LLC), Takahiro Kasama (NICT) ICSS2020-56 |
VirusTotal is an online service that provides detection results from multiple anti-virus engines. It is used in a wide r... [more] |
ICSS2020-56 pp.178-183 |
ICSS, IPSJ-SPT |
2021-03-02 11:05 |
Online |
Online |
Accuracy evaluation of CNNs and random forests with Malware API call sequences Shugo Asai, Futa Yuichi (TUT) ICSS2020-58 |
In this paper, we compare the accuracy of the results of classifying each malware family by Random Forest and CNN using ... [more] |
ICSS2020-58 pp.190-194 |
ICSS, IPSJ-SPT |
2021-03-02 11:30 |
Online |
Online |
Detecting unknown malware families by anomaly detection using deep learning Ren Takeuchi, Shintaro Mizuno, Vo Ngoc Khoi Nguyen, Jun Tsuchiya, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.) ICSS2020-59 |
The analysis of malware has become an indispensable process for anti-malware. Malware is diversifying day by day, so tha... [more] |
ICSS2020-59 pp.195-200 |
ICSS |
2020-11-26 14:25 |
Online |
Online |
Function Estimation for Malwares based on Similarity and Its Effectiveness Kohei Kodama, Hiroshi Kai (Ehime Univ.), Masakatu Morii (Kobe Univ.) ICSS2020-21 |
In this paper, we consider about a method which estimates malware functions using the results of malware dynamic analysi... [more] |
ICSS2020-21 pp.13-16 |
CS, IN, NS, NV (Joint) |
2020-09-11 09:25 |
Online |
Online |
A virtual-network replacing scheme for achieving a metabolic network Yu Tamura, Yuta Miyaoka, Junichi Murayama (Tokai Univ.) IN2020-24 |
A future targeted attacks would infect a network with a malware program and then tampers packet-forwarding routes. As a ... [more] |
IN2020-24 pp.13-18 |
CS, IN, NS, NV (Joint) |
2020-09-11 09:50 |
Online |
Online |
An edge-router replacing scheme for achieving a metabolic network Yuta Miyaoka, Yu Tamura, Junichi Murayama (Tokai Univ.) IN2020-25 |
A future cyber attack would tampers packet-forwarding routes of a target network using malware programs. As a solution a... [more] |
IN2020-25 pp.19-24 |
ISEC, IT, WBS |
2020-03-11 11:20 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Applying Machine Learning to Malware Detection in Mobile Applications Yoshiki Kusama, Keiji Takeda, Kazuma Kobayashi, Osamu Nakamura (Keio Univ.), Lee Myoungje (LINE corp.) IT2019-112 ISEC2019-108 WBS2019-61 |
In this paper, we proposed and implemented a detection method that focuses on a binary file stored in an APK(Android app... [more] |
IT2019-112 ISEC2019-108 WBS2019-61 pp.151-157 |
NS, IN (Joint) |
2020-03-05 11:00 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
An inheritance scheme of dynamic routing information for achieving successive replacing of virtual routers Yu Tamura, Yuta Miyaoka, Junichi Murayama (Tokai Univ.) IN2019-93 |
In future targeted attacks, malware programs infected in routers may cause various problems. Thus, we have proposed a sc... [more] |
IN2019-93 pp.103-108 |
ICSS, IPSJ-SPT |
2020-03-02 14:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Development of a recovery tool for a ransomware infected PC Ryosuke Kokado (Kobe Univ.), Masato Ikegami, Tomohisa Hasegawa, Takafumi Harada, Hiroshi Kitani (Canon MJ), Masakatu Morii (Kobe Univ.) ICSS2019-77 |
In recent years, malware called ransomware, which encrypts data on terminal devices, including servers and personal comp... [more] |
ICSS2019-77 pp.55-60 |
ICSS, IPSJ-SPT |
2020-03-02 15:40 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Proposing Criteria for Detecting Internet-Wide Scanners for Darknet Monitoring Yukiko Endo, Yoshiki Mori (NICT), Jumpei Shimamura (Clwit), Masaki Kubo (NICT) ICSS2019-80 |
The NICTER project has been observing the darknet (observing packets arriving at unused IP addresses) for over 10 years.... [more] |
ICSS2019-80 pp.73-78 |
ICSS, IPSJ-SPT |
2020-03-02 16:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2019-81 |
While IoT malware such as Mirai have been targeting Telnet services, there are still many devices that are still running... [more] |
ICSS2019-81 pp.79-84 |