Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
A Study on Malicious Communication Detection Using Attack Characteristics of Malware on an Internal Network. Ken Aono, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95 |
Recently, targeted attacks have been increasing.
Malicious attackers use malware to gain access to the organization's ... [more] |
IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95 pp.249-253 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Improving classification accuracy of imaged malware through data expansion Kaoru Yokobori, Hiroki Tanioka, Masahiko Sano, Kenji Matsuura, Tetsushi Ueta (Tokushima Univ.) IT2023-115 ISEC2023-114 WBS2023-103 RCC2023-97 |
Although malware-based attacks have existed for years,
malware infections increased in 2019 and 2020.
One of the reaso... [more] |
IT2023-115 ISEC2023-114 WBS2023-103 RCC2023-97 pp.259-264 |
IA, SITE, IPSJ-IOT [detail] |
2024-03-12 16:00 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
Improvement of Unknown Malicious Domain Detection Based on DNS Query History Analysis Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech) SITE2023-83 IA2023-89 |
Network users are increasing and there is concern about the malware infection.
In some cases, malware-infected terminal... [more] |
SITE2023-83 IA2023-89 pp.92-97 |
NS, IN (Joint) |
2024-03-01 13:50 |
Okinawa |
Okinawa Convention Center |
Evaluation experiment on a route server function for maintaining dynamic routes in metabolic routers Yuya Suga, Hiroki Saruta, Rei Ishioka, Junichi Murayama (Tokai Univ.) IN2023-112 |
As a measure against malware infecting routers, we are studying metabolic routers. This router can delete even undetecta... [more] |
IN2023-112 pp.279-282 |
NS, IN, CS, NV (Joint) |
2023-09-07 14:30 |
Miyagi |
Tohoku University (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
Approximate modeling of malware propagation on wireless mobile devices Hideyoshi Miura, Shoya Abukawa (Kansai Univ.), Tomotaka Kimura (Doshisha Univ.), Kouji Hirata (Kansai Univ.) NS2023-52 |
In this paper, we propose an approximate epidemic model representing the behavior of malware propagation on mobile devic... [more] |
NS2023-52 pp.7-12 |
RCS, IN, NV (Joint) |
2023-05-25 10:00 |
Kanagawa |
Keio University (Hiyoshi Campus), and online (Primary: On-site, Secondary: Online) |
Designing a suppressing scheme of spreading malware infection within a metabolic router Rei Ishioka, Haruto Hirose, Junichi Murayama (Tokai Univ.) IN2023-1 |
As a countermeasure against malware infection on routers, we have been studying a metabolic-type router. Inside this rou... [more] |
IN2023-1 pp.1-4 |
ICSS, IPSJ-SPT |
2023-03-14 13:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Assessment Method for Persistent Malware Infection on IoT Devices Shunki Soeda, Takahiro Inoue, Rui Tanabe, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-78 |
Malware targeting IoT devices has become a growing threat in recent years. Some of them continue to infect devices perma... [more] |
ICSS2022-78 pp.181-186 |
RISING (3rd) |
2022-10-31 14:00 |
Kyoto |
Kyoto Terrsa (Day 1), and Online (Day 2, 3) |
[Poster Presentation]
Machine Learning Analyze for Undiscovered Malicious Domain Detection by using DNS Query Analysis Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech) |
Network users is increasing in recently and there is concern about the malware infection.
Malware exist various types a... [more] |
|
NS |
2022-10-05 16:40 |
Hokkaido |
Hokkaidou University + Online (Primary: On-site, Secondary: Online) |
Modeling of malware diffusion with mobile devices in intermittently connected networks Hideyoshi Miura, Syoya Abukawa (Kansai Univ.), Tomotaka Kimura (Doshisha Univ.), Kouji Hirata (Kansai Univ.) NS2022-86 |
In this paper, we introduce an epidemic model of malware with mobile devices in intermittently connected networks. In re... [more] |
NS2022-86 pp.24-28 |
IA, ICSS |
2022-06-24 11:50 |
Nagasaki |
Univ. of Nagasaki (Primary: On-site, Secondary: Online) |
Studies on Blacklists based DNS Query Analysis for Malicious Domain Detection Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (Kyutech) IA2022-14 ICSS2022-14 |
Malware infection of network users is one of the critical threats on the Internet. Users have a risk of being infected w... [more] |
IA2022-14 ICSS2022-14 pp.76-80 |
ICSS, IPSJ-SPT |
2022-03-08 13:20 |
Online |
Online |
Analyzing network status of IoT malware by dynamic analysis with bare-metal device Kota Ogawa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2021-74 |
In this study, we first investigate the network state changes caused by IoT malware infection by executing malware sampl... [more] |
ICSS2021-74 pp.93-98 |
ICSS, IPSJ-SPT |
2022-03-08 15:10 |
Online |
Online |
Simulation of security notification by ISP to malware-infected users Xuping Huang (AIIT/YNU), Shunsuke Mochizuki (NTT Data Mathematical Systems Inc), Akira Fujita (NICT/YNU), Katsunari Yoshioka (YNU) ICSS2021-82 |
(To be available after the conference date) [more] |
ICSS2021-82 pp.141-146 |
ICSS, IPSJ-SPT |
2021-03-01 14:55 |
Online |
Online |
Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41 |
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] |
ICSS2020-41 pp.90-95 |
CS, IN, NS, NV (Joint) |
2020-09-11 09:50 |
Online |
Online |
An edge-router replacing scheme for achieving a metabolic network Yuta Miyaoka, Yu Tamura, Junichi Murayama (Tokai Univ.) IN2020-25 |
A future cyber attack would tampers packet-forwarding routes of a target network using malware programs. As a solution a... [more] |
IN2020-25 pp.19-24 |
ICSS, IPSJ-SPT |
2020-03-02 14:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Development of a recovery tool for a ransomware infected PC Ryosuke Kokado (Kobe Univ.), Masato Ikegami, Tomohisa Hasegawa, Takafumi Harada, Hiroshi Kitani (Canon MJ), Masakatu Morii (Kobe Univ.) ICSS2019-77 |
In recent years, malware called ransomware, which encrypts data on terminal devices, including servers and personal comp... [more] |
ICSS2019-77 pp.55-60 |
ICSS, IPSJ-SPT |
2020-03-02 16:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2019-81 |
While IoT malware such as Mirai have been targeting Telnet services, there are still many devices that are still running... [more] |
ICSS2019-81 pp.79-84 |
SS, MSS |
2018-01-19 10:15 |
Hiroshima |
|
On Modeling of Infection Phenomenon and Evaluation of Countermeasure for IoT Malware Mirai by Agent-Oriented Petri Net PN2 Shingo Yamaguchi, Hiroaki Tanaka (Yamaguchi Univ.) MSS2017-63 SS2017-50 |
In September 2016, an unprecedented massive DDoS attack was launched by IoT devices. This attack was caused by a new typ... [more] |
MSS2017-63 SS2017-50 pp.91-95 |
ICSS |
2017-11-21 10:55 |
Oita |
Beppu International Convention Center |
Subspecies Classification for Malwares based on Visualization of Dynamic Analysis result Taiki Gouda, Korehito Kashiki, Keisuke Furumoto, Masakatu Morii (Kobe Univ.) ICSS2017-45 |
Along with the activation of malware infection activity, the appearance frequency of new subspecies also tends to increa... [more] |
ICSS2017-45 pp.41-45 |
ICSS, IPSJ-SPT |
2017-03-13 15:15 |
Nagasaki |
University of Nagasaki |
Supervised Classification for Detecting Malware Infected Host in HTTP Traffic and Long-time Evaluation for Detection Performance using Mixed Data Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2016-51 |
The importance of post-infection countermeasures has greatly increased. Such countermeasures include generating blacklis... [more] |
ICSS2016-51 pp.43-48 |
ICSS, IPSJ-SPT |
2017-03-13 16:15 |
Nagasaki |
University of Nagasaki |
Evaluation of memory image acquisition/analysis function in forensics tools Ikuo Tanaka, Masaki Hashimoto (IISEC) ICSS2016-53 |
Currently, the information system is established as a social infrastructure, and accompanying it, the types and occurren... [more] |
ICSS2016-53 pp.79-84 |