Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Phishing Detection Method Based on Content-Similarity in DNS Graph WenBo Zhou, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110 |
Phishing attacks, known as a prevalent form of social engineering attacks, have become one of the most significant cyber... [more] |
IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110 pp.332-336 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Phishing Detection Method Based on Machine Learning Using DNS Graph Yuki Ishida, Syota Nihei, Junko Sato, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of Information Sciences) IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111 |
Recently, phishing scams have been on the rise, the need for effective defense methods against this phishing scams.
A b... [more] |
IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111 pp.337-342 |
NS, IN (Joint) |
2024-03-01 14:15 |
Okinawa |
Okinawa Convention Center |
A centralized control scheme of router switching for suppressing malware spreading within a metabolic router Rei Ishioka, Yuya Suga, Junichi Murayama (Tokai Univ.) IN2023-113 |
As a countermeasure against router targeting malware, we have been studying a metabolic-type router. In this metabolic-t... [more] |
IN2023-113 pp.283-286 |
MIKA (3rd) |
2023-10-11 14:30 |
Okinawa |
Okinawa Jichikaikan (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Detecting Poisoning Attacks Using Adversarial Examples in Deep Phishing Detection Koko Nishiura, Tomotaka Kimura, Jun Cheng (Doshisha Univ.) |
In recent years, the convenience of online services has greatly improved, but the number of phishing scams has skyrocket... [more] |
|
MIKA (3rd) |
2022-10-14 10:40 |
Niigata |
Niigata Citizens Plaza (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Countermeasure Backdoor Attacks against Phishing Countermeasures Using Deep Learning Koko Nishiura, Tomotaka Kimura, Jun Cheng (Doshisha Univ.) |
The convenience has greatly improved with the wide spread of online services in recent years, though the number of victi... [more] |
|
IA, ICSS |
2022-06-23 14:55 |
Nagasaki |
Univ. of Nagasaki (Primary: On-site, Secondary: Online) |
Control method for web push notification by browser extension Masaya Sato, Hibiki Watanabe (OPU) IA2022-5 ICSS2022-5 |
Along with the increase of web push notifications, its abuse is increased. For example, some web push notifications indu... [more] |
IA2022-5 ICSS2022-5 pp.25-30 |
CS |
2021-07-16 10:25 |
Online |
Online |
Countermeasures against Adversarial Examples using Majority Decision Discriminators for Deep learning-Based Phishing Detection Methods Yuji Ogawa, Tomotaka Kimura, Jun Cheng (Doshisha Univ.) CS2021-33 |
In recent years, the number of phishing attacks has been increasing, and the detection of phishing URLs using deep learn... [more] |
CS2021-33 pp.78-79 |
IA, ICSS |
2021-06-22 09:00 |
Online |
Online |
Feature analysis of phishing website and phishing detection based on machine learning algorithms Yi Wei, Yuji Sekiya (Todai) IA2021-9 ICSS2021-9 |
Phishing is a kind of cybercrime that uses disguised websites to trick people into providing personally sensitive inform... [more] |
IA2021-9 ICSS2021-9 pp.44-49 |
ICSS, IPSJ-SPT |
2021-03-02 09:10 |
Online |
Online |
A Study on the Adoption of Link Preview by the Phishing Sites Norihito Omori (Waseda Univ.), Satoshi Furutani, Takuya Watanabe, Toshiki Shibahara, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.) ICSS2020-54 |
Search engines are not the only means of accessing online content. The distribution of malicious content has become mor... [more] |
ICSS2020-54 pp.166-171 |
CQ, CBE (Joint) |
2021-01-21 16:00 |
Online |
Online |
[Poster Presentation]
Vulnerability Assessment for Deep-Learning Based Phishing Detection System Yuji Ogawa, Tomotaka Kimura, Jun Cheng (Doshisha Univ.) CQ2020-83 |
[more] |
CQ2020-83 pp.84-85 |
KBSE |
2020-09-19 10:45 |
Online |
Online |
Analysis of smishing messages focusing on delivery notices Tatsuo Fujii, Takako Nakatani (OUJ) KBSE2020-8 |
There are a lot of phishing scams using SMS. They are named "smishing." Though SMS fooling couriers have been sending me... [more] |
KBSE2020-8 pp.43-48 |
KBSE |
2020-03-06 16:30 |
Okinawa |
Tenbusu-Naha (Cancelled but technical report was issued) |
Information analysis from images of Smishing mail posted on the Internet Tatsuo Fujii, Takako Nakatani (Open Univ.) KBSE2019-51 |
In recent years, phishing scams using a short message service (SMS) is called “smishing” and has been increasing. Since ... [more] |
KBSE2019-51 pp.31-36 |
ICSS |
2019-11-13 14:55 |
Miyazaki |
MRT Terrace(Miyazaki) |
ICSS2019-63 |
E-mail has been one of the most widely used tools for computer-based communication since the early days of the Internet.... [more] |
ICSS2019-63 pp.19-23 |
CS |
2019-07-04 09:00 |
Kagoshima |
Amami City Social Welfare Center |
A Novel Visual Similarity-based Phishing Detection Methodology Using Hue Information with Auto Updating Database Shuichiro Haruta, Fumitaka Yamazaki, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2019-14 |
In this paper, we propose a novel visual similarity-based phishing detection methodology using hue information with aut... [more] |
CS2019-14 pp.7-12 |
IA |
2017-11-15 13:50 |
Overseas |
KMITL, Bangkok, Thailand |
Machine Learning Approach for Phishing Detection in SDN Networking Yu-Hung Chen, Jiun-Yu Yang, Po-Chun Hou, Jiann-Liang Chen (National Taiwan University of Science & Technology) IA2017-30 |
People have become increasingly dependent on information technology since the emergence of the Internet. Therefore, many... [more] |
IA2017-30 pp.1-6 |
ICSS, IPSJ-SPT |
2017-03-14 09:30 |
Nagasaki |
University of Nagasaki |
Visual Similarity-based Phishing Websites Detection Scheme using Image and CSS with Target Website Finder Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ) ICSS2016-58 |
Recently, detecting phishing websites and identifying their target are imperative. In several phishing detection schemes... [more] |
ICSS2016-58 pp.111-116 |
ICSS |
2014-11-28 11:10 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
searching malicious URL from vast webspace Bo Sun (Waseda Univ.), Mitsuaki Akiyama, Takeshi Yagi (NTT), Tatsuya Mori (Waseda Univ.) ICSS2014-61 |
Many Web-based attacks such as Drive-by-download and phishing scam
are easily triggered by accessing landing page URL.... [more] |
ICSS2014-61 pp.61-66 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 11:05 |
Nara |
Todaiji Total Cultural Center |
Design and implementation of mutual authentication based on PAKE in the Web SSO Kouhei Sugiyama, Toyokazu Akiyama (Kyoto Sangyo Univ.) SITE2012-50 IA2012-88 |
Recently, large amount of Web services exist, such as file sharing, Web mail and so on. When we use Web services, usuall... [more] |
SITE2012-50 IA2012-88 pp.31-36 |
ICSS, IA |
2012-06-22 09:00 |
Tokyo |
Room 1206, 1st bldg, Takanawa Campus, Tokai University |
Proposed phishing countermeasures based on URL information analysis Shingo Matsugaya, Naoshi Sato (IISEC) IA2012-6 ICSS2012-6 |
Although phishing has been conducted from various countermeasures already, the number of victims are still more likely t... [more] |
IA2012-6 ICSS2012-6 pp.31-36 |
SP |
2011-06-24 10:30 |
Aichi |
Nagoya Univ. |
A study of psychological stress detection based on the non-verbal information Naoshi Matsuo, Nobuyuki Washio, Shouji Harada, Akira Kamano (FUJITSU), Shoji Hayakawa (FUJITSU LABORATORIES), Kazuya Takeda (Nagoya University) SP2011-35 |
We study the detection of a phone phishing scam from non-verbal information of victim’s voice to prevent the remittance ... [more] |
SP2011-35 pp.29-33 |