IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 15 of 15  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2023-03-13
17:50
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
URL Warning List Creation and Manage Methods using VirusTotal and Web Access Log
Kyohei Takao, Chika Hiraishi (YNU), Kazuki Takada (SecureBrain), Akira Fujita, Daisuke Inoue (NICT), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-66
Security services such as URL blocklists are widely used to prevent users from accessing malicious websites.
However, ... [more]
ICSS2022-66
pp.109-114
ICSS, IPSJ-SPT 2023-03-14
13:10
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Towards observation of online fraud exploiting multiple SNS
Yamato Kawaguchi (Yokohama National Univ.), Kazuki Takada (SecureBrain), Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2022-77
SNS (Social Networking Service) fraud has been reported in accordance with the increase in SNS users. In this study, we ... [more] ICSS2022-77
pp.175-180
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
10:15
Tokyo   A Proposal on the Actual State Survey Method of RIG Exploit Kit in User Environments
Ichiro Shimada, Toshifumi Oota (KKE), Kouichirou Okada (SecureBrain), Akira Yamada (KDDI Research) ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19
In recent years, web-based cyber attacks, which exploit web browsers and compromise computers, are prevailing. In many c... [more] ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19
pp.33-38
ICSS 2015-03-04
10:50
Okinawa Meio Univiersity Prediction of Malware Activities based on Loopback Address from DNS
Masaki Kamizono (NICT/SecureBrain), Takashi Tomine, Yu Tsuda, Masashi Eto (NICT), Yuji Hoshizawa (Securebrain Corporation), Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (ynu) ICSS2014-80
During malware dynamic analysis, the analysis system often finds the loopback address in responses of DNS name resolutio... [more] ICSS2014-80
pp.103-108
ICSS 2015-03-04
15:30
Okinawa Meio Univiersity A Study on Risk Quantification Techniques for Android Applications with Category Information
Takeshi Takahashi (NICT), Takao Mimura, Masata Nishida (SecureBrain), Koji Nakao (NICT) ICSS2014-95
 [more] ICSS2014-95
pp.193-197
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
14:40
Hokkaido San-Refure Hakodate Analysis of Cyber-attack Infrastructure with Malicious Website focused on Backdoor Shell
Masaki Kamizono (YNU/NICT), Yuji Hoshizawa (SecureBrain), Takahiro Kasama, Masashi Eto, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ISEC2014-46 SITE2014-41 ICSS2014-50 EMM2014-46
 [more] ISEC2014-46 SITE2014-41 ICSS2014-50 EMM2014-46
pp.321-326
ICSS, IA 2014-06-06
10:30
Hyogo Takikawa Memorial Hall, Kobe University Malicious Web Site Detection Based on Redirection Control using Client Environment
Takahiro Kasama, Masashi Eto (NICT), Masaki Kamizono (NICT/SecureBrain), Daisuke Inoue (NICT) IA2014-5 ICSS2014-5
 [more] IA2014-5 ICSS2014-5
pp.21-26
IA, ICSS 2013-06-21
13:25
Niigata Ao-re Nagaoka Generic Unpacking Method Using Data Execution Prevention
Ryoichi Isawa (NICT), Masaki Kamizono (NICT/SecureBrain Corporation), Daisuke Inoue (NICT) IA2013-13 ICSS2013-13
To skip unpacking steps, automated generic unpacking methods are strongly required. The basic idea of the generic unpack... [more] IA2013-13 ICSS2013-13
pp.73-78
ICSS 2013-03-25
14:55
Kanagawa Yokohama National University Network-based classification of remote exploit attacks focusing on UUID
Yusuke Takahashi (Yokohama National Univ.), Masaki Kamizono, Yuji Hoshizawa (Securebrain), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2012-65
Remote exploit attacks, which target vulnerabilities of network services, is the class of most common attacks utilized i... [more] ICSS2012-65
pp.49-54
ICSS 2012-03-16
15:50
Tokyo Kikai-Shinko-Kaikan Bldg. Evaluation of Anti-Malware User Support System through Field Experiments
Toshihiko Kasagi (KDDI), Takayuki Yoda, Hiroki Yamaguchi (Hitachi), Yuji Hoshizawa (Securebrain), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2011-48
 [more] ICSS2011-48
pp.55-60
ICSS 2011-03-25
15:35
Tokyo Suspended Development and evaluation of PDF malware analysis system using dynamic analysis
Masaki Kamizono, Masata Nishida, Yuji Hoshizawa (Securebrain Corp.) ICSS2010-64
Several Adobe Reader zero-day vulnerabilities have been discovered recently, and the threat of PDF malware continues to ... [more] ICSS2010-64
pp.47-52
IA, ICSS 2009-06-18
11:10
Tokyo Kikai-Shinko-Kaikan Bldg A proposal for autonomous crawling client honeypot
Yuji Hoshizawa, Kazuo Kawamorita, Tsuyoshi Tachikawa, Masaki Kamizono (SecureBrain Corp.) IA2009-3 ICSS2009-11
In recent years, the trend in attack techniques of malware is changing from active attack targeting vulnerabilities, to ... [more] IA2009-3 ICSS2009-11
pp.13-17
ISEC, SITE, IPSJ-CSEC 2007-07-20
11:10
Hokkaido Future University-Hakodate Exploring the required condtions for malware to run for behavior analysis
Yuji Hoshizawa, Kouichirou Okada, Motoaki Yamamura (SecureBrain Corp.), Takayoshi Shiigi (JPCERT) ISEC2007-53
As a way of knowing host or behavior of malware on the network, we run malware in an isolated environment that doesn't a... [more] ISEC2007-53
pp.57-61
ISEC, SITE, IPSJ-CSEC 2007-07-20
11:35
Hokkaido Future University-Hakodate Automatic malware classification
Yuji Hoshizawa, Tsuyoshi Tachikawa, Motoaki Yamamura (SecureBrain Corp.) ISEC2007-54
It is determined by engineers of Antivirus companies whether the detected malware is new or variant based on past experi... [more] ISEC2007-54
pp.63-70
ISEC, SITE, IPSJ-CSEC 2006-07-20
15:45
Okayama Okayama Univ. A Study on Bot Detection using Response Time
Yuji Hoshizawa, Motoaki Yamamura (SecureBrain)
 [more]
 Results 1 - 15 of 15  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan