Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2012-03-16 10:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Malicious QR Code and its protection Yuhei Watanabe, Yuki Kashii, Masakatu Morii (Kobe Univ.) ICSS2011-39 |
With the spread of mobile phones, the two dimensional code is used for various uses. But the visibility of QR Code stori... [more] |
ICSS2011-39 pp.1-4 |
ICSS |
2012-03-16 10:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Proposal of a Method for Tracing Diffusion of Information and Preventing Information Leakage on Android Kenji Okuda, Ryo Nakatsuka, Toshihiro Yamauchi (Okayama Univ.) ICSS2011-40 |
Application program (AP) can collaborate with other APs and control personal information with Intent or user's allowing ... [more] |
ICSS2011-40 pp.5-10 |
ICSS |
2012-03-16 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A report on the state of blog publication photograph which can pinpoint the address Noriyuki Takada, Atsushi Kanai (Hosei Univ) ICSS2011-41 |
In recent years, personal information disclosure has become a serious problem with the rapid spread of the Internet. Man... [more] |
ICSS2011-41 pp.11-16 |
ICSS |
2012-03-16 11:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Self-Protectable Secure Name Mapping System (S2NMS) Ruidong Li, Ved P. Kafle, Hiroaki Harai (NICT) ICSS2011-42 |
In general network architectures, name mapping systems (NMS) are designed to map a host name to the corresponding locato... [more] |
ICSS2011-42 pp.17-24 |
ICSS |
2012-03-16 13:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Device for Transparent Probabilistic Packet Marking Akira Kanaoka (Univ. of Tsukuba), Masayuki Okada (Univ. of Tsukuba/JPNIC), Eiji Okamoto (Univ. of Tsukuba) ICSS2011-43 |
Probabilistic Packet Marking (PPM) is known as better defence solution for Denial of Service (DoS) attack. However, most... [more] |
ICSS2011-43 pp.25-30 |
ICSS |
2012-03-16 13:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Study of Quantification Method of Security Measures by Consideration of Reachability of Attacks Tetsuro Kito, Satoshi Kai, Tomohiro Shigemoto, Satoshi Takemoto, Tadashi Kaji (Hitachi) ICSS2011-44 |
There are many users who feel uneasy about security to use cloud computing environment. To provide the cloud computing e... [more] |
ICSS2011-44 pp.31-36 |
ICSS |
2012-03-16 14:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Behavior-based Detection Method for Outbreaks of Low-rate Attacks Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun'ichi Takeuchi (ISIT) ICSS2011-45 |
Low-rate attacks can conceal their traffic because they are very much like normal communication. Thus, although a number... [more] |
ICSS2011-45 pp.37-42 |
ICSS |
2012-03-16 15:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A malicious packet visualization in darknet and its application to malware analysis Naoto Sone (Naruto Univ.), Tatsuya Syoriki, Akihisa Torii, Taketo Murao, Masakatu Morii (Kobe Univ.) ICSS2011-46 |
We analyzed malicious IP packets in the darknet with visualization tool for IP packet which we developed. Furthermore ... [more] |
ICSS2011-46 pp.43-48 |
ICSS |
2012-03-16 15:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Proposal on Dynamic Decision Making Model for Cyber Attack and Defense Strategy Naoshi Sato (IISEC), Hitoshi Watanabe (SUT) ICSS2011-47 |
This paper discusses real-time and dynamic decision making process on cyber attacks, under the game-theoretical assumpti... [more] |
ICSS2011-47 pp.49-54 |
ICSS |
2012-03-16 15:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Evaluation of Anti-Malware User Support System through Field Experiments Toshihiko Kasagi (KDDI), Takayuki Yoda, Hiroki Yamaguchi (Hitachi), Yuji Hoshizawa (Securebrain), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2011-48 |
[more] |
ICSS2011-48 pp.55-60 |