Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-21 16:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
One Million Routers Under Control: Vulnerabilities in DDNS of IoT Devices Kanta Okugawa (Ritsumei/NICT), Yoshiki Mori, Masaki Kubo, Takahiro Kasama (NICT), Koichi Mouri (Ritsumei), Daisuke Inoue (NICT) ICSS2023-78 |
IoT devices such as routers and webcams have dynamic DNS (DDNS) functions as one of the methods to remotely manage devic... [more] |
ICSS2023-78 pp.63-70 |
ICSS |
2023-11-17 11:05 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Exploring the Feasibility of Guessing Default Wi-Fi Passwords for Consumer Routers Takahiro Kasama (NICT), Ryo Kamino, Yuichi Hagiwara (00One), Daisuke Inoue (NICT) ICSS2023-62 |
(To be available after the conference date) [more] |
ICSS2023-62 pp.77-84 |
ICSS |
2023-11-17 11:30 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Investigation of Technical Support Scams Targeting Japan Hiroyuki Ito (NICT), Kosuke Kajimoto, Tetsuya Kageyama, Taichi Aoki (JC3), Takahiro Kasama, Daisuke Inoue (NICT) ICSS2023-63 |
(To be available after the conference date) [more] |
ICSS2023-63 pp.85-92 |
ICSS, IPSJ-SPT |
2023-03-13 16:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
An Analysis of the Risk of Unauthorized Access to the WebUI of IoT Devices Kosuke Murakami (NICT/KDDIR), Takahiro Kasama, Daisuke Inoue (NICT) ICSS2022-63 |
(To be available after the conference date) [more] |
ICSS2022-63 pp.91-96 |
ICSS, IPSJ-SPT |
2023-03-13 17:10 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
A Study on Effectiveness of Malware Infection Notification based on Role-playing Type Survey Akira Fujita, Misato Matsuda, Takahiro Kasama, Daisuke Inoue (NICT) ICSS2022-64 |
(To be available after the conference date) [more] |
ICSS2022-64 pp.97-102 |
ICSS, IPSJ-SPT |
2023-03-14 11:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
An Empirical Study on Opting out of Internet-wide Scanning Takahiro Kasama, Yukiko Endo, Masaki Kubo, Daisuke Inoue (NICT) ICSS2022-76 |
(To be available after the conference date) [more] |
ICSS2022-76 pp.169-174 |
ICSS |
2022-11-08 09:00 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Survey of Support Policy Settings and Publication for Consumer IoT Devices Takahiro Kasama (NICT), Kosuke Murakami (NICT/KDDI Research, Inc.), Akira Fujita, Daisuke Inoue (NICT) ICSS2022-41 |
There have been many cases of IoT devices that are in the End of Life (EoL) state, in which the vendor's support period ... [more] |
ICSS2022-41 pp.19-24 |
ICSS |
2022-11-08 09:25 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Analysis of Weak Password Settings for IoT Devices and Results of User Notifications Kosuke Murakami (NICT/KDDIR), Takahiro Kasama, Daisuke Inoue (NICT) ICSS2022-42 |
IoT devices with weak ID/Password settings that are accessible from the Internet by services that enable password authen... [more] |
ICSS2022-42 pp.25-30 |
IA, ICSS |
2022-06-23 15:20 |
Nagasaki |
Univ. of Nagasaki (Primary: On-site, Secondary: Online) |
An Investigation of Abuse Possibility of IoT Devices After Unauthorized Login Kosuke Murakami (NICT/KDDIR), Takahiro Kasama, Daisuke Inoue (NICT) IA2022-6 ICSS2022-6 |
IoT devices with weak ID/Password settings and accessible from the Internet by Telnet and SSH services are infected with... [more] |
IA2022-6 ICSS2022-6 pp.31-36 |
ICSS, IPSJ-SPT |
2022-03-07 13:10 |
Online |
Online |
A Method for Identifying IoT Devices Using Features from WebUI Contents and Images Kosuke Murakami (NICT/KDDI), Takahiro Kasama, Akira Fujita (NICT), Jumpei Urakawa (KDS), Daisuke Inoue (NICT) ICSS2021-59 |
Cyber attacks on IoT devices have caused damage such as information theft and malware infection.
In order to identify I... [more] |
ICSS2021-59 pp.7-12 |
ICSS, IPSJ-SPT |
2022-03-08 10:00 |
Online |
Online |
Input predictive attack by keyboard acoustic emanations using BERT and its countermeasures Masahiro Iida (Teikyo Univ.), Mitsuaki Akiyama (NTT), Masaki Kamizono (DTCY), Takahiro Kasama (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Kyoto Sangyo Univ.), Atsuo Inomata (Osaka Univ.) ICSS2021-67 |
The Keyboard Acoustic Emanations has been proposed to estimate the input key from keystroke sounds as a kind of side-cha... [more] |
ICSS2021-67 pp.49-54 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 11:45 |
Online |
Online |
A Large-scale Investigation into the Possibility of Malware Infection of IoT Devices with Weak Credentials Kosuke Murakami, Takahiro Kasama, Daisuke Inoue (NICT) ISEC2021-34 SITE2021-28 BioX2021-35 HWS2021-34 ICSS2021-39 EMM2021-39 |
[more] |
ISEC2021-34 SITE2021-28 BioX2021-35 HWS2021-34 ICSS2021-39 EMM2021-39 pp.147-152 |
ICSS, IPSJ-SPT |
2021-03-02 10:00 |
Online |
Online |
Evaluation of Uncertain Reports by Multiple Anti-virus Engines Kazuya Nomura (Waseda Univ.), Mistuaki Akiyama (NTT), Masaki Kamizono (Deloitte Tohmatsu Cyber LLC), Takahiro Kasama (NICT) ICSS2020-56 |
VirusTotal is an online service that provides detection results from multiple anti-virus engines. It is used in a wide r... [more] |
ICSS2020-56 pp.178-183 |
ICSS, IPSJ-SPT |
2021-03-02 10:25 |
Online |
Online |
Proof of concept of sandbox evasion attack using email address stored in target machine Yuta Inoue, Rui Tanabe (YNU), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-57 |
In recent years, malware sandbox appliances that dynamically analyze target files are becoming popular. However, malware... [more] |
ICSS2020-57 pp.184-189 |
ICSS, IPSJ-SPT |
2019-03-08 13:25 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Proposal of a Non-Technical Skills Map for Computer Security Incident Responses Takahiro Kasama, Shingo Yasuda, Hironobu Satoh (NICT), Masaki Kamizono, Emi Kojima (PwC), Takao Yamaguchi, Kazuharu Nara (JAMSS) ICSS2018-90 |
[more] |
ICSS2018-90 pp.185-190 |
ICSS, IPSJ-SPT |
2018-03-08 10:35 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Darkweb Analysis System by Combining HSDir's Snooping and Active Scanning Akito Ono (Ritsumeikan Univ.), Masaki Kamizono (PwC Cyber Services), Takahiro Kasama (NICT), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2017-68 |
[more] |
ICSS2017-68 pp.103-108 |
ICSS, IPSJ-SPT |
2018-03-08 09:45 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Evaluation of malware sandbox using evasive test samples Kou Ishii, Wateru Ueno, Rui Tanabe (Yokohama National Univ.), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
[more] |
|
ICSS |
2016-11-25 16:35 |
Kanagawa |
Institute of Information Security |
Clustering of Attacking Devices using Active Monitoring Takahiro Kasama, Daisuke Inoue (NICT) ICSS2016-45 |
(To be available after the conference date) [more] |
ICSS2016-45 pp.37-42 |
ICSS |
2015-11-26 15:00 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
tkiwa: A Detection Tool for Packets with Characteristic Network Protocol Header Takashi Koide (Yokohama National Univ.), Daisuke Makita (Yokohama National Univ./NICT), Takahiro Kasama, Mio Suzuki, Daisuke Inoue, Koji Nakao (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2015-38 |
The packets from malware and network tools that have their own implementation of network stack may have character-istic ... [more] |
ICSS2015-38 pp.19-24 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 14:40 |
Hokkaido |
San-Refure Hakodate |
Analysis of Cyber-attack Infrastructure with Malicious Website focused on Backdoor Shell Masaki Kamizono (YNU/NICT), Yuji Hoshizawa (SecureBrain), Takahiro Kasama, Masashi Eto, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ISEC2014-46 SITE2014-41 ICSS2014-50 EMM2014-46 |
[more] |
ISEC2014-46 SITE2014-41 ICSS2014-50 EMM2014-46 pp.321-326 |