IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 34  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) A Study on Malicious Communication Detection Using Attack Characteristics of Malware on an Internal Network.
Ken Aono, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95
Recently, targeted attacks have been increasing.
Malicious attackers use malware to gain access to the organization's ... [more]
IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95
pp.249-253
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Improving classification accuracy of imaged malware through data expansion
Kaoru Yokobori, Hiroki Tanioka, Masahiko Sano, Kenji Matsuura, Tetsushi Ueta (Tokushima Univ.) IT2023-115 ISEC2023-114 WBS2023-103 RCC2023-97
Although malware-based attacks have existed for years,
malware infections increased in 2019 and 2020.
One of the reaso... [more]
IT2023-115 ISEC2023-114 WBS2023-103 RCC2023-97
pp.259-264
IA, SITE, IPSJ-IOT [detail] 2024-03-12
16:00
Okinawa Miyakojima City Future Creation Center
(Primary: On-site, Secondary: Online)
Improvement of Unknown Malicious Domain Detection Based on DNS Query History Analysis
Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech) SITE2023-83 IA2023-89
Network users are increasing and there is concern about the malware infection.
In some cases, malware-infected terminal... [more]
SITE2023-83 IA2023-89
pp.92-97
NS, IN
(Joint)
2024-03-01
13:50
Okinawa Okinawa Convention Center Evaluation experiment on a route server function for maintaining dynamic routes in metabolic routers
Yuya Suga, Hiroki Saruta, Rei Ishioka, Junichi Murayama (Tokai Univ.) IN2023-112
As a measure against malware infecting routers, we are studying metabolic routers. This router can delete even undetecta... [more] IN2023-112
pp.279-282
NS, IN, CS, NV
(Joint)
2023-09-07
14:30
Miyagi Tohoku University
(Primary: On-site, Secondary: Online)
[Encouragement Talk] Approximate modeling of malware propagation on wireless mobile devices
Hideyoshi Miura, Shoya Abukawa (Kansai Univ.), Tomotaka Kimura (Doshisha Univ.), Kouji Hirata (Kansai Univ.) NS2023-52
In this paper, we propose an approximate epidemic model representing the behavior of malware propagation on mobile devic... [more] NS2023-52
pp.7-12
RCS, IN, NV
(Joint)
2023-05-25
10:00
Kanagawa Keio University (Hiyoshi Campus), and online
(Primary: On-site, Secondary: Online)
Designing a suppressing scheme of spreading malware infection within a metabolic router
Rei Ishioka, Haruto Hirose, Junichi Murayama (Tokai Univ.) IN2023-1
As a countermeasure against malware infection on routers, we have been studying a metabolic-type router. Inside this rou... [more] IN2023-1
pp.1-4
ICSS, IPSJ-SPT 2023-03-14
13:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Assessment Method for Persistent Malware Infection on IoT Devices
Shunki Soeda, Takahiro Inoue, Rui Tanabe, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-78
Malware targeting IoT devices has become a growing threat in recent years. Some of them continue to infect devices perma... [more] ICSS2022-78
pp.181-186
RISING
(3rd)
2022-10-31
14:00
Kyoto Kyoto Terrsa (Day 1), and Online (Day 2, 3) [Poster Presentation] Machine Learning Analyze for Undiscovered Malicious Domain Detection by using DNS Query Analysis
Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech)
Network users is increasing in recently and there is concern about the malware infection.
Malware exist various types a... [more]

NS 2022-10-05
16:40
Hokkaido Hokkaidou University + Online
(Primary: On-site, Secondary: Online)
Modeling of malware diffusion with mobile devices in intermittently connected networks
Hideyoshi Miura, Syoya Abukawa (Kansai Univ.), Tomotaka Kimura (Doshisha Univ.), Kouji Hirata (Kansai Univ.) NS2022-86
In this paper, we introduce an epidemic model of malware with mobile devices in intermittently connected networks. In re... [more] NS2022-86
pp.24-28
IA, ICSS 2022-06-24
11:50
Nagasaki Univ. of Nagasaki
(Primary: On-site, Secondary: Online)
Studies on Blacklists based DNS Query Analysis for Malicious Domain Detection
Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (Kyutech) IA2022-14 ICSS2022-14
Malware infection of network users is one of the critical threats on the Internet. Users have a risk of being infected w... [more] IA2022-14 ICSS2022-14
pp.76-80
ICSS, IPSJ-SPT 2022-03-08
13:20
Online Online Analyzing network status of IoT malware by dynamic analysis with bare-metal device
Kota Ogawa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2021-74
In this study, we first investigate the network state changes caused by IoT malware infection by executing malware sampl... [more] ICSS2021-74
pp.93-98
ICSS, IPSJ-SPT 2022-03-08
15:10
Online Online Simulation of security notification by ISP to malware-infected users
Xuping Huang (AIIT/YNU), Shunsuke Mochizuki (NTT Data Mathematical Systems Inc), Akira Fujita (NICT/YNU), Katsunari Yoshioka (YNU) ICSS2021-82
(To be available after the conference date) [more] ICSS2021-82
pp.141-146
ICSS, IPSJ-SPT 2021-03-01
14:55
Online Online Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox
Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] ICSS2020-41
pp.90-95
CS, IN, NS, NV
(Joint)
2020-09-11
09:50
Online Online An edge-router replacing scheme for achieving a metabolic network
Yuta Miyaoka, Yu Tamura, Junichi Murayama (Tokai Univ.) IN2020-25
A future cyber attack would tampers packet-forwarding routes of a target network using malware programs. As a solution a... [more] IN2020-25
pp.19-24
ICSS, IPSJ-SPT 2020-03-02
14:30
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Development of a recovery tool for a ransomware infected PC
Ryosuke Kokado (Kobe Univ.), Masato Ikegami, Tomohisa Hasegawa, Takafumi Harada, Hiroshi Kitani (Canon MJ), Masakatu Morii (Kobe Univ.) ICSS2019-77
In recent years, malware called ransomware, which encrypts data on terminal devices, including servers and personal comp... [more] ICSS2019-77
pp.55-60
ICSS, IPSJ-SPT 2020-03-02
16:00
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation
Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2019-81
While IoT malware such as Mirai have been targeting Telnet services, there are still many devices that are still running... [more] ICSS2019-81
pp.79-84
SS, MSS 2018-01-19
10:15
Hiroshima   On Modeling of Infection Phenomenon and Evaluation of Countermeasure for IoT Malware Mirai by Agent-Oriented Petri Net PN2
Shingo Yamaguchi, Hiroaki Tanaka (Yamaguchi Univ.) MSS2017-63 SS2017-50
In September 2016, an unprecedented massive DDoS attack was launched by IoT devices. This attack was caused by a new typ... [more] MSS2017-63 SS2017-50
pp.91-95
ICSS 2017-11-21
10:55
Oita Beppu International Convention Center Subspecies Classification for Malwares based on Visualization of Dynamic Analysis result
Taiki Gouda, Korehito Kashiki, Keisuke Furumoto, Masakatu Morii (Kobe Univ.) ICSS2017-45
Along with the activation of malware infection activity, the appearance frequency of new subspecies also tends to increa... [more] ICSS2017-45
pp.41-45
ICSS, IPSJ-SPT 2017-03-13
15:15
Nagasaki University of Nagasaki Supervised Classification for Detecting Malware Infected Host in HTTP Traffic and Long-time Evaluation for Detection Performance using Mixed Data
Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2016-51
The importance of post-infection countermeasures has greatly increased. Such countermeasures include generating blacklis... [more] ICSS2016-51
pp.43-48
ICSS, IPSJ-SPT 2017-03-13
16:15
Nagasaki University of Nagasaki Evaluation of memory image acquisition/analysis function in forensics tools
Ikuo Tanaka, Masaki Hashimoto (IISEC) ICSS2016-53
Currently, the information system is established as a social infrastructure, and accompanying it, the types and occurren... [more] ICSS2016-53
pp.79-84
 Results 1 - 20 of 34  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan