Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SS |
2023-03-14 16:30 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Toward improving code execution speed using micro benchmark dataset Fuki Omori, Akinori Ihara, Kazuya Saiki (Wakayama Univ.), Yutaro Kashiwa (NAIST) SS2022-56 |
There are some implementation approach with same functionality, but their execution speeds are different. It is difficul... [more] |
SS2022-56 pp.55-60 |
ET |
2020-03-07 10:35 |
Kagawa |
National Institute of Technology, Kagawa Collage (Cancelled but technical report was issued) |
Development of a visual learning tool for compiler behavior Hiroaki Hiranishi, Yoshiro Imai, Yoichi Sugimoto (Kagawa Univ.) ET2019-97 |
This paper proposes an educational tool, which can visualize the internal processing of the compiler. One of the purpose... [more] |
ET2019-97 pp.121-126 |
ICM |
2020-03-03 13:30 |
Okinawa |
Ohama Nobumoto Memorial Hall (Cancelled but technical report was issued) |
Network Design Visualization to Describe Topology Overview and Routing Details Tomohiro Kojo (SoftBank Corp.), Shintaro Kojima (Codeance, Inc.) ICM2019-57 |
In carrier-grade network design documents, hundreds of network diagrams are usually drawn to focus and elaborate on a sp... [more] |
ICM2019-57 pp.91-94 |
ICSS, IPSJ-SPT |
2020-03-02 15:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Evaluating Effectiveness of a Timing Attack on Android Devices in JavaScript Keisuke Sugita (Kobe Univ.), Ryoichi Isawa (NICT), Masakatsu Morii (Kobe Univ.) ICSS2019-79 |
(To be available after the conference date) [more] |
ICSS2019-79 pp.67-71 |
IA |
2019-11-15 13:15 |
Tokyo |
Kwansei Gakuin University, Tokyo Marunouchi Campus (Sapia Tower) |
Malicious URL Classification using Machine Learning Techniques Yu-Chen Chen, Li-Dong Chen, Yan-Ju Chen, Jiann-Liang Chen (NTUST) IA2019-41 |
The Website security is an important research topic that must be pursued to protect internet users. Traditionally, black... [more] |
IA2019-41 pp.79-83 |
MSS, SS |
2019-01-16 15:55 |
Okinawa |
|
MSS2018-79 SS2018-50 |
(To be available after the conference date) [more] |
MSS2018-79 SS2018-50 pp.139-144 |
SITE, ISEC, LOIS |
2018-11-04 11:30 |
Fukuoka |
|
A Machine Learning-based Method for Detecting Malicious JavaScript using Information based on Abstract Syntax Tree Ryota Sano, Junko Sato, Yoichi Murakami, Masaki Hanada, Eiji Nunohiro (Tokyo Univ. of Information Sciences) ISEC2018-75 SITE2018-53 LOIS2018-35 |
The number of Drive-by-Download attacks, which can be infected with malware via websites, has recently been increased. S... [more] |
ISEC2018-75 SITE2018-53 LOIS2018-35 pp.63-68 |
CS |
2017-07-27 09:39 |
Nagasaki |
Fukue Bunka Kaikan |
Obfuscated Malicious JavaScript Detection Scheme Using the Feature Based on Divided URL Shoya Morishige, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-15 |
Recently, obfuscated malicious JavaScript codes which divide URL into segments to evade the pattern matching of anti-vir... [more] |
CS2017-15 pp.13-18 |
EMM, IT |
2017-05-22 13:00 |
Yamagata |
Yamagata University(Yonezawa Campus) |
A Data Embedding Method based on the JavaScript Encoder jjencode Hirohisa Hioki, Takayuki Matsushita (Kyoto Univ.) IT2017-1 EMM2017-1 |
We have been implemented a data hiding method for JavaScript programs based on an obfuscator called jjencode. We can emb... [more] |
IT2017-1 EMM2017-1 pp.1-6 |
ICSS, IPSJ-SPT |
2017-03-13 16:40 |
Nagasaki |
University of Nagasaki |
Malicious PDF Detection Scheme using Keywords Feature based on Fuzzy inference Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) ICSS2016-54 |
Detecting malicious PDFs (Portable Document Format) is imperative. In several malicious PDF detection schemes, the schem... [more] |
ICSS2016-54 pp.85-90 |
ET |
2017-03-10 13:10 |
Ehime |
National Institute of Technology, Niihama College |
Development and Trial Evaluation of CPU Simulator with Register-transfer level Micro-Operation Shinya Hara, Yoshiro Imai (Kagawa Univ.) ET2016-113 |
This paper proposes a new educational tool for Computer Architecture, which can provide simulation of assembly program c... [more] |
ET2016-113 pp.111-116 |
ET |
2016-06-11 13:25 |
Aichi |
Nagoya Institute of Technology |
Development of teaching materials for computer programming in the class of economic data analysis Katsumi Yoshine (Nanzan Univ.) ET2016-13 |
Computer programming education is overheated. In programming education, there is a variety of goals. For use with the cl... [more] |
ET2016-13 pp.31-36 |
ICSS, IPSJ-SPT |
2016-03-04 10:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A fast detecting method for obfuscated malicious JavaScript based on text pattern analysis Jiawei Su, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (YNU) ICSS2015-58 |
The malicious JavaScript is a common springboard for attackers to launch several types of network attacks, such as Drive... [more] |
ICSS2015-58 pp.65-70 |
ET |
2015-06-06 11:20 |
Mie |
Faculty of Engineering, Mie Univ. |
A web-based programming environment for learning economic data analysis Katsumi Yoshine (Nanzan Univ.) ET2015-14 |
In the class of data analysis for the students of the faculty of economics, we have introduced a programming education i... [more] |
ET2015-14 pp.19-24 |
ICSS |
2015-03-03 16:40 |
Okinawa |
Meio Univiersity |
Implementation and evaluation of Drive by Download Attack detection using the features of the obfuscation Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama (NAIST), Takuji Iimura (UT), Youki Kadobayashi (NAIST) ICSS2014-71 |
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in a browser or in browse... [more] |
ICSS2014-71 pp.49-54 |
ICSS |
2014-11-28 10:45 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
A Study of Drive by Download Attack detection using the features of the obfuscation Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama, Youki Kadobayashi (NAIST) ICSS2014-60 |
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in the browser or its plu... [more] |
ICSS2014-60 pp.55-60 |
ICSS, IPSJ-SPT |
2014-03-27 13:55 |
Okinawa |
Meio Univiersity |
An Investigation of Malicious JavaScript Code used in Drive-by Download Yuta Takata, Mitsuaki Akiyama, Takeo Hariu (NTT) ICSS2013-72 |
Malicious website contains JavaScript code that exploits vulnerabilities in the browser or the browser's plugins.Researc... [more] |
ICSS2013-72 pp.59-64 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-28 15:10 |
Ishikawa |
Hotel Rurikoh |
The impact of JavaScript to the increasing complexity in the Web traffic Megumi Ninomiya, Kenjiro Cho (IIJ-II) SITE2013-73 IA2013-98 |
Recently, traffic volume of JavaScript tends to increase in Web applications. In this paper, we focused on JavaScript, a... [more] |
SITE2013-73 IA2013-98 pp.183-188 |
ET |
2013-03-29 16:00 |
Ehime |
|
Implementation of Common Lisp for e-Learning in JavaScript
-- Special variable and Lexical scope -- Hiroshi Mitani, Keiichi Shiraishi (Kagawa N.C.T.) ET2012-97 |
To display and calculate formulas on a client-side of e-Learning, an implementation a computer algebra system on a web b... [more] |
ET2012-97 pp.91-94 |
ET |
2013-03-29 14:00 |
Ehime |
|
Development of the editing system of English teaching materials for tablets
-- JSON format and CSV format -- Katsuya Azuma, Keiichi Shiraishi (Kagawa N.C.T.) ET2012-109 |
To help students enjoy learning English, developing an editing system of English teaching materials for tablets is tried... [more] |
ET2012-109 pp.157-159 |