|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2025-03-06 11:00 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
Early Detection of Ports Exploited in DRDoS Attacks by Focusing on Reflector Discovery Scans Ryuji Kurashige, Ryu Kuki (Yokohama National Univ.), Daisuke Makita (NICT), Takayuki Sasaki, Katsunari Yoshioka (Yokohama National Univ.) |
[more] |
|
ICSS, IPSJ-SPT |
2025-03-06 14:45 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
Checking Software Build Environment for Acceptable Differences from Master: A Consideration Yoshitada Fujiwara, Satoshi Mimura, Tatsuya Takehisa, Daisuke Makita, Ryoichi Isawa, Takahiro Kasama (NICT) |
[more] |
|
BioX |
2022-10-03 16:30 |
Okinawa |
(Okinawa) |
A proposal on Reflective Pseudo Blood Volume Pulse Presentation Attack against PPG Sensor Tatsuya Takehisa (NICT/Nissin), Hayato Ushimaru (NICT/CDI), Daisuke Makita, Dai Arisue (NICT), Satoshi Mimura (NICT/Ierae), Ryo Iijima (Waseda), Ryouichi Isawa, Daisuke Inoue (NICT) BioX2022-59 |
The authors study an attack that presents a pseudo pulse wave signal to a photoplethysmography (PPG) sensor. A previous ... [more] |
BioX2022-59 pp.20-25 |
VLD, HWS [detail] |
2022-03-08 11:25 |
Online |
Online (Online) |
A Method for Automatic Test Pattern Generation using an SMT Solver for HDL Code Ryoichi Isawa, Nobuyuki Kanaya, Yoshitada Fujiwara, Tatsuta Takehisa, Hayato Ushimaru, Dai Arisue, Daisuke Makita, Satoshi Mimura, Daisuke Inoue (NICT) VLD2021-95 HWS2021-72 |
(To be available after the conference date) [more] |
VLD2021-95 HWS2021-72 pp.105-110 |
ICSS, IPSJ-SPT |
2021-03-02 11:05 |
Online |
Online (Online) |
Study on analyzing Memcached DRDoS attacks and their infrastructures Mizuki Kondo, Natsuo Shintani (YNU), Daisuke Makita (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-45 |
Internet-facing Memcached services are known to have been misused as powerful reflectors of DRDoS attacks. In this paper... [more] |
ICSS2020-45 pp.114-119 |
ICSS, IPSJ-SPT |
2020-03-03 09:50 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Okinawa) (Cancelled but technical report was issued) |
Analysis of Cyber-attacks Observed by a Simple TLS Honeypot Listening on All Ports Daisuke Makita (NICT), Jumpei Shimamura (clwit), Masaki Kubo, Daisuke Inoue (NICT) ICSS2019-85 |
As various devices have been connected to the Internet, cyber-attacks targeting them have also been increasing. Since va... [more] |
ICSS2019-85 pp.103-108 |
ICSS, IPSJ-SPT |
2018-03-08 15:40 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center (Hokkaido) |
Analyzing Victims of DRDoS Attacks Observed by Honeypots Kazuya Watanabe (Yokohama National Univ.), Tomomi Nishizoe (NTT Com), Daisuke Makita (NICT), Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2017-83 |
In recent years, Distributed Reflection Denial-of-Service (DRDoS) Attack are increasing. We have been observing DRDoS at... [more] |
ICSS2017-83 pp.205-210 |
ICSS, IPSJ-SPT |
2017-03-13 13:50 |
Nagasaki |
University of Nagasaki (Nagasaki) |
Early Detection of New DRDoS Attack with Protocol-Agnostic Honeypot Tomomi Nishizoe (Yokohama National Univ.), Daisuke Makita (Yokohama National Univ./NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2016-48 |
In DRDoS attacks, attackers abuse UDP-based protocols that can amplify traffic. It's essential that we find such protoco... [more] |
ICSS2016-48 pp.13-18 |
ICSS |
2015-11-26 15:00 |
Fukushima |
AIST, Fukushima Renewable Energy Institute (Fukushima) |
tkiwa: A Detection Tool for Packets with Characteristic Network Protocol Header Takashi Koide (Yokohama National Univ.), Daisuke Makita (Yokohama National Univ./NICT), Takahiro Kasama, Mio Suzuki, Daisuke Inoue, Koji Nakao (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2015-38 |
The packets from malware and network tools that have their own implementation of network stack may have character-istic ... [more] |
ICSS2015-38 pp.19-24 |
ICSS |
2013-03-25 13:00 |
Kanagawa |
Yokohama National University (Kanagawa) |
Finding Malicious Authoritative DNS Servers Yin Minn Pa Pa, Daisuke Makita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2012-61 |
This study proposes an approach to find authoritative DNS servers that are heavily involved with
malicious online activ... [more] |
ICSS2012-61 pp.25-30 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|