Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2023-03-13 12:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Developing a Hand Gesture Recognition System for VR Devices Mei Suzuki, Ryo Iijima, Kazuki Nomoto (Waseda Univ.), Tetsushi Ohki (Shizuoka Univ./AIP), Tatsuya Mori (Waseda Univ./NICT/AIP) ICSS2022-48 |
We develop a hand gesture recognition scheme using finger movements to recognize the VR user wearing a head-mounted disp... [more] |
ICSS2022-48 pp.1-6 |
ICSS, IPSJ-SPT |
2023-03-13 12:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Dynamic Fake QR Code using Invisible Laser Irradiation Yuki Kamata, Shuya Kawaguchi, Toshihiro Ohigashi, Yoshihisa Takayama (Tokai Univ.) ICSS2022-49 |
In this paper, we propose a method to generate a fake QR code that can lead to a malicious site at any given time by las... [more] |
ICSS2022-49 pp.7-12 |
ICSS, IPSJ-SPT |
2023-03-13 13:10 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
sEMG-based Gesture Authentication for Smartwatch Akihisa Watanabe, Ryo Iijima, Tatsuya Mori (Waseda Univ.,) ICSS2022-50 |
We propose a gesture-based user recognition system using sEMG signals for smartwatches.
We designed the system to reali... [more] |
ICSS2022-50 pp.13-18 |
ICSS, IPSJ-SPT |
2023-03-13 13:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Basic Study on IoT Security Using Robot Arm Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ICSS2022-51 |
The introduction of IoT devices in industrial systems is becoming increasingly active in order to realise Industry 4.0. ... [more] |
ICSS2022-51 pp.19-24 |
ICSS, IPSJ-SPT |
2023-03-13 14:20 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Dynamic Analysis of Adversarial Attacks Kentaro Goto (JPNIC), Masato Uchida (Waseda Univ.) ICSS2022-52 |
In this study, we propose a method for identifying the characteristics of attack methods by operating them as “samples” ... [more] |
ICSS2022-52 pp.25-30 |
ICSS, IPSJ-SPT |
2023-03-13 14:40 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Consideration of a Packet Level Anomaly Communication Classification Model Using Word Embedding and LSTM Yoshikatsu Kashiwabara, Kohei Miyamoto, Iida Masazumi, Shota Kawanaka (Kyushu Univ), Han Chansu, Ban Tao, Kenshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ) ICSS2022-53 |
In recent years, network-based intrusion detection systems (NIDS), which are systems for detecting unauthorized access o... [more] |
ICSS2022-53 pp.31-36 |
ICSS, IPSJ-SPT |
2023-03-13 15:00 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Disabling Adversarial Examples through Color Conversion using CMYK Defense Model Ryo Soeda, Masato Uchida (Waseda Univ.) ICSS2022-54 |
[more] |
ICSS2022-54 pp.37-42 |
ICSS, IPSJ-SPT |
2023-03-13 15:20 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Multimodal Feature Integration Toward High-Accuracy Network Intrusion Detection Masazumi Iida, Kohei Miyamoto, Yoshinari Takeishi, Shota Kawanaka (Kyushu Univ.), Chansu Han, Tao Ban, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.) ICSS2022-55 |
(To be available after the conference date) [more] |
ICSS2022-55 pp.43-48 |
ICSS, IPSJ-SPT |
2023-03-13 15:40 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Generating Attack Trace Dataset Focusing on Attack Techniques and the Damage Caused by Each. Masahito Kumazaki, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) ICSS2022-56 |
[more] |
ICSS2022-56 pp.49-54 |
ICSS, IPSJ-SPT |
2023-03-13 14:20 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
A Study of Security Control Schemes in Fog Computing Based on TPO Conditions Yushi Hosokawa, Kanai Atushi, qian wu (Hosei Univ.), hatasima ryu (NTT), tanimoto sigeaki (ChibaTech Univ.) ICSS2022-80 |
[more] |
ICSS2022-80 pp.193-198 |
ICSS, IPSJ-SPT |
2023-03-13 14:40 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Preservation Techniques of Fileless Attack Artifacts using Customized PowerShell Masahito Kimura (Ritsumeikan Univ.), Chris Liu (DTCY), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2022-57 |
Many attackers use PowerShell in fileless attacks that do not generate files on the target machine.
When a fileless att... [more] |
ICSS2022-57 pp.55-60 |
ICSS, IPSJ-SPT |
2023-03-13 15:00 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
ICSS2022-58 |
(To be available after the conference date) [more] |
ICSS2022-58 pp.61-66 |
ICSS, IPSJ-SPT |
2023-03-13 15:20 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
ICSS2022-59 |
(To be available after the conference date) [more] |
ICSS2022-59 pp.67-72 |
ICSS, IPSJ-SPT |
2023-03-13 15:40 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Proposal and evaluation of visualization method for understanding security risks based on software dependencies Tomohiko Yano (SECOM), Hiroki Kuzuno (Kobe Univ.) ICSS2022-60 |
[more] |
ICSS2022-60 pp.73-78 |
ICSS, IPSJ-SPT |
2023-03-13 16:10 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Evaluation of Copy Protection Technology Using Web Font Kazuki Nomoto (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT/RIKEN AIP) ICSS2022-61 |
This study proposes and evaluates Fonty, a copy protection technology for text content. First, Fonty encrypts text conte... [more] |
ICSS2022-61 pp.79-84 |
ICSS, IPSJ-SPT |
2023-03-13 16:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Evaluation and countermeasures of notification destination restoration attacks using password recovery functions of multiple web services Ryusei Ishikawa, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ., Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2022-62 |
Many web services with a login function using pair of ID and password have the password recovery function in case the us... [more] |
ICSS2022-62 pp.85-90 |
ICSS, IPSJ-SPT |
2023-03-13 16:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
An Analysis of the Risk of Unauthorized Access to the WebUI of IoT Devices Kosuke Murakami (NICT/KDDIR), Takahiro Kasama, Daisuke Inoue (NICT) ICSS2022-63 |
(To be available after the conference date) [more] |
ICSS2022-63 pp.91-96 |
ICSS, IPSJ-SPT |
2023-03-13 17:10 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
A Study on Effectiveness of Malware Infection Notification based on Role-playing Type Survey Akira Fujita, Misato Matsuda, Takahiro Kasama, Daisuke Inoue (NICT) ICSS2022-64 |
(To be available after the conference date) [more] |
ICSS2022-64 pp.97-102 |
ICSS, IPSJ-SPT |
2023-03-13 17:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Lessons Learned from Construction of the Security Technical Term Dictionary Misato Matsuda, Akira Fujita, Yu Tsuda, piyokango, Daisuke Inoue (NICT) ICSS2022-65 |
In order to do OSINT, natural language processing technology for processing documents is an important elemental technolo... [more] |
ICSS2022-65 pp.103-108 |
ICSS, IPSJ-SPT |
2023-03-13 17:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
URL Warning List Creation and Manage Methods using VirusTotal and Web Access Log Kyohei Takao, Chika Hiraishi (YNU), Kazuki Takada (SecureBrain), Akira Fujita, Daisuke Inoue (NICT), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-66 |
Security services such as URL blocklists are widely used to prevent users from accessing malicious websites.
However, ... [more] |
ICSS2022-66 pp.109-114 |