Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2023-03-13 17:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
URL Warning List Creation and Manage Methods using VirusTotal and Web Access Log Kyohei Takao, Chika Hiraishi (YNU), Kazuki Takada (SecureBrain), Akira Fujita, Daisuke Inoue (NICT), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-66 |
Security services such as URL blocklists are widely used to prevent users from accessing malicious websites.
However, ... [more] |
ICSS2022-66 pp.109-114 |
ICSS, IPSJ-SPT |
2023-03-14 13:10 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Towards observation of online fraud exploiting multiple SNS Yamato Kawaguchi (Yokohama National Univ.), Kazuki Takada (SecureBrain), Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2022-77 |
SNS (Social Networking Service) fraud has been reported in accordance with the increase in SNS users. In this study, we ... [more] |
ICSS2022-77 pp.175-180 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 10:15 |
Tokyo |
|
A Proposal on the Actual State Survey Method of RIG Exploit Kit in User Environments Ichiro Shimada, Toshifumi Oota (KKE), Kouichirou Okada (SecureBrain), Akira Yamada (KDDI Research) ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19 |
In recent years, web-based cyber attacks, which exploit web browsers and compromise computers, are prevailing. In many c... [more] |
ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19 pp.33-38 |
ICSS |
2015-03-03 16:15 |
Okinawa |
Meio Univiersity |
Link Structural Analysis of Drive-by-Download Attacks Yuji Dairiki (Kobe Univ.), Masaki Kamizono (SecureBrain), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2014-70 |
In analyzing Drive-by-Download (DBD) attack, it is basic and essential to analysis the link structure through tracking t... [more] |
ICSS2014-70 pp.43-48 |
ICSS |
2015-03-04 10:50 |
Okinawa |
Meio Univiersity |
Prediction of Malware Activities based on Loopback Address from DNS Masaki Kamizono (NICT/SecureBrain), Takashi Tomine, Yu Tsuda, Masashi Eto (NICT), Yuji Hoshizawa (Securebrain Corporation), Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (ynu) ICSS2014-80 |
During malware dynamic analysis, the analysis system often finds the loopback address in responses of DNS name resolutio... [more] |
ICSS2014-80 pp.103-108 |
ICSS |
2015-03-04 15:30 |
Okinawa |
Meio Univiersity |
A Study on Risk Quantification Techniques for Android Applications with Category Information Takeshi Takahashi (NICT), Takao Mimura, Masata Nishida (SecureBrain), Koji Nakao (NICT) ICSS2014-95 |
[more] |
ICSS2014-95 pp.193-197 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 14:40 |
Hokkaido |
San-Refure Hakodate |
Analysis of Cyber-attack Infrastructure with Malicious Website focused on Backdoor Shell Masaki Kamizono (YNU/NICT), Yuji Hoshizawa (SecureBrain), Takahiro Kasama, Masashi Eto, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ISEC2014-46 SITE2014-41 ICSS2014-50 EMM2014-46 |
[more] |
ISEC2014-46 SITE2014-41 ICSS2014-50 EMM2014-46 pp.321-326 |
ICSS, IA |
2014-06-06 10:30 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Malicious Web Site Detection Based on Redirection Control using Client Environment Takahiro Kasama, Masashi Eto (NICT), Masaki Kamizono (NICT/SecureBrain), Daisuke Inoue (NICT) IA2014-5 ICSS2014-5 |
[more] |
IA2014-5 ICSS2014-5 pp.21-26 |
ICSS, IA |
2014-06-06 10:55 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Development of an Environment-independent Dynamic Analysis System for Document Malware Masaki Kamizono (NICT/SecureBrain), Kazuki Iwamoto (SecureBrain), Takahiro Kasama, Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) IA2014-6 ICSS2014-6 |
[more] |
IA2014-6 ICSS2014-6 pp.27-32 |
IA, ICSS |
2013-06-21 13:25 |
Niigata |
Ao-re Nagaoka |
Generic Unpacking Method Using Data Execution Prevention Ryoichi Isawa (NICT), Masaki Kamizono (NICT/SecureBrain Corporation), Daisuke Inoue (NICT) IA2013-13 ICSS2013-13 |
To skip unpacking steps, automated generic unpacking methods are strongly required. The basic idea of the generic unpack... [more] |
IA2013-13 ICSS2013-13 pp.73-78 |
ICSS |
2013-03-25 14:55 |
Kanagawa |
Yokohama National University |
Network-based classification of remote exploit attacks focusing on UUID Yusuke Takahashi (Yokohama National Univ.), Masaki Kamizono, Yuji Hoshizawa (Securebrain), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2012-65 |
Remote exploit attacks, which target vulnerabilities of network services, is the class of most common attacks utilized i... [more] |
ICSS2012-65 pp.49-54 |
ICSS |
2012-03-16 15:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Evaluation of Anti-Malware User Support System through Field Experiments Toshihiko Kasagi (KDDI), Takayuki Yoda, Hiroki Yamaguchi (Hitachi), Yuji Hoshizawa (Securebrain), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2011-48 |
[more] |
ICSS2011-48 pp.55-60 |
IA, ICSS |
2011-06-17 14:35 |
Fukuoka |
Kyushu Institute of Technology |
Automatically Removing Malware Using Malware Analysis System Nobutaka Kawaguchi, Takayuki Yoda, Hiroki Yamaguchi (Hitachi), Toshihiko Kasagi (KDDI), Yuji Hoshizawa (SecureBrain) IA2011-12 ICSS2011-12 |
[more] |
IA2011-12 ICSS2011-12 pp.69-74 |
ICSS |
2011-03-25 15:35 |
Tokyo |
Suspended |
Development and evaluation of PDF malware analysis system using dynamic analysis Masaki Kamizono, Masata Nishida, Yuji Hoshizawa (Securebrain Corp.) ICSS2010-64 |
Several Adobe Reader zero-day vulnerabilities have been discovered recently, and the threat of PDF malware continues to ... [more] |
ICSS2010-64 pp.47-52 |
IA, ICSS |
2009-06-18 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
A proposal for autonomous crawling client honeypot Yuji Hoshizawa, Kazuo Kawamorita, Tsuyoshi Tachikawa, Masaki Kamizono (SecureBrain Corp.) IA2009-3 ICSS2009-11 |
In recent years, the trend in attack techniques of malware is changing from active attack targeting vulnerabilities, to ... [more] |
IA2009-3 ICSS2009-11 pp.13-17 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 11:10 |
Hokkaido |
Future University-Hakodate |
Exploring the required condtions for malware to run for behavior analysis Yuji Hoshizawa, Kouichirou Okada, Motoaki Yamamura (SecureBrain Corp.), Takayoshi Shiigi (JPCERT) ISEC2007-53 |
As a way of knowing host or behavior of malware on the network, we run malware in an isolated environment that doesn't a... [more] |
ISEC2007-53 pp.57-61 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 11:35 |
Hokkaido |
Future University-Hakodate |
Automatic malware classification Yuji Hoshizawa, Tsuyoshi Tachikawa, Motoaki Yamamura (SecureBrain Corp.) ISEC2007-54 |
It is determined by engineers of Antivirus companies whether the detected malware is new or variant based on past experi... [more] |
ISEC2007-54 pp.63-70 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 15:45 |
Okayama |
Okayama Univ. |
A Study on Bot Detection using Response Time Yuji Hoshizawa, Motoaki Yamamura (SecureBrain) |
[more] |
|