Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 13:00 |
Hokkaido |
Sapporo Convention Center (Hokkaido) |
Honeypot for Long-term Observation of Cyber Attacks Exploiting Insecure Routers Masataka Mizokuchi, Takayuki Sasaki, Katsunari Yoshioka (Yokohama National Univ.) ISEC2024-16 SITE2024-13 BioX2024-26 HWS2024-16 ICSS2024-20 EMM2024-22 |
Although routers installed at the boundaries between external and internal networks in enterprises and homes are importa... [more] |
ISEC2024-16 SITE2024-13 BioX2024-26 HWS2024-16 ICSS2024-20 EMM2024-22 pp.50-57 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 13:25 |
Hokkaido |
Sapporo Convention Center (Hokkaido) |
Survey of OSS vulnerabilities in router firmware using an SCA tool Momoka Kihara, Sasaki Takayuki, Katsunari Yoshioka (Yokohama National Univ.) ISEC2024-17 SITE2024-14 BioX2024-27 HWS2024-17 ICSS2024-21 EMM2024-23 |
In recent years, cyber attacks targeting vulnerabilities in IoT devices have become widespread, and responses to these v... [more] |
ISEC2024-17 SITE2024-14 BioX2024-27 HWS2024-17 ICSS2024-21 EMM2024-23 pp.58-65 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 14:50 |
Hokkaido |
Sapporo Convention Center (Hokkaido) |
Building a Dataset for Accelerating Researches against Fraudulent DeFi Tokens Iori Suzuki, Yin Minn Pa Pa, Katsunari Yoshioka (YNU) ISEC2024-23 SITE2024-20 BioX2024-33 HWS2024-23 ICSS2024-27 EMM2024-29 |
[more] |
ISEC2024-23 SITE2024-20 BioX2024-33 HWS2024-23 ICSS2024-27 EMM2024-29 pp.104-111 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 15:15 |
Hokkaido |
Sapporo Convention Center (Hokkaido) |
Detection of Web3 Phishing Sites Focused on Permission Requests After Wallet Connection Riku Aoto, Yin Minn Pa Pa, Katsunari Yoshioka (YNU) ISEC2024-24 SITE2024-21 BioX2024-34 HWS2024-24 ICSS2024-28 EMM2024-30 |
Web3 is a decentralized ecosystem based on blockchain technology, where digital assets such as cryptocurrencies and NFTs... [more] |
ISEC2024-24 SITE2024-21 BioX2024-34 HWS2024-24 ICSS2024-28 EMM2024-30 pp.112-119 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 17:55 |
Hokkaido |
Sapporo Convention Center (Hokkaido) |
A Machine Learning-Based Clone Detection Approach in Nano-Artifact Metrics Naoki Yoshida, Iwaki Miyamoto, Katsunari Yoshioka (YNU), Tsutomu Matsumoto (AIST) ISEC2024-37 SITE2024-34 BioX2024-47 HWS2024-37 ICSS2024-41 EMM2024-43 |
Artifact metrics is a technology that uses the physical characteristics of an artifact for authentication, and it is nec... [more] |
ISEC2024-37 SITE2024-34 BioX2024-47 HWS2024-37 ICSS2024-41 EMM2024-43 pp.188-193 |
ICSS, IPSJ-SPT |
2024-03-21 11:20 |
Okinawa |
OIST (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Analyzing Attackers and Victims Actions via LockBit3.0 Website Data Dynamics Yuji Sekine, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-70 |
LockBit3.0 is one of the top ransomware groups that has been active since July 2022, targeting over 1,000 companies. In ... [more] |
ICSS2023-70 pp.9-16 |
ICSS, IPSJ-SPT |
2024-03-21 12:10 |
Okinawa |
OIST (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Unveiling the Shadows: Analyzing Cryptocurrency Address Management and Fund Movement of Darknet Markets Aiman Syazwan Bin Abdul Razak, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-72 |
Darknet markets use cryptocurrencies like Bitcoin for anonymous transactions in exchanging illicit goods and services. T... [more] |
ICSS2023-72 pp.25-32 |
ICSS, IPSJ-SPT |
2024-03-21 15:20 |
Okinawa |
OIST (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Investigating the functionalities of IoT malware to disrupt the activities of other intruders Shun Ikeda, Hiroki Yasui, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-76 |
[more] |
ICSS2023-76 pp.51-56 |
ICSS, IPSJ-SPT |
2024-03-21 15:45 |
Okinawa |
OIST (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Enhanced Analysis of IoT Botnet Activity by Fusing Honeypots, Malware Dynamic Analysis, and C&C Observation Yuki Endo, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-77 |
[more] |
ICSS2023-77 pp.57-62 |
ICSS, IPSJ-SPT |
2024-03-22 10:10 |
Okinawa |
OIST (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Study of keyword-based search method for IoT devices deployed at important facilities Mami Kawaguchi, Takayuki Sasaki, Kihara Momoka, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-86 |
IoT devices are increasingly deployed in various systems, including remote monitoring systems.Some of these IoT devices ... [more] |
ICSS2023-86 pp.123-128 |
ICSS, IPSJ-SPT |
2024-03-22 11:45 |
Okinawa |
OIST (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Impact of ChatGPT Assisted Polymorphic Malware on Antivirus Detection Huang Zhewei, Yinn Minn Pa pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-89 |
With the rapid implementation of large-scale language models (LLMs), there are concerns about their misuse in cyberattac... [more] |
ICSS2023-89 pp.145-152 |
VLD, HWS, ICD |
2024-02-29 14:00 |
Okinawa |
(Okinawa, Online) (Primary: On-site, Secondary: Online) |
Nano Artifact Metric Systems Resistant Against Clones Produced by Scanning Probe Lithography Akira Iwahashi, Naoki Yoshida, Katsunari Yoshioka (YNU), Tsutomu Matsumoto (AIST) VLD2023-113 HWS2023-73 ICD2023-102 |
[more] |
VLD2023-113 HWS2023-73 ICD2023-102 pp.83-88 |
ICSS, IPSJ-SPT |
2023-03-13 17:50 |
Okinawa |
Okinawaken Seinenkaikan (Okinawa, Online) (Primary: On-site, Secondary: Online) |
URL Warning List Creation and Manage Methods using VirusTotal and Web Access Log Kyohei Takao, Chika Hiraishi (YNU), Kazuki Takada (SecureBrain), Akira Fujita, Daisuke Inoue (NICT), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-66 |
Security services such as URL blocklists are widely used to prevent users from accessing malicious websites.
However, ... [more] |
ICSS2022-66 pp.109-114 |
ICSS, IPSJ-SPT |
2023-03-14 13:10 |
Okinawa |
Okinawaken Seinenkaikan (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Towards observation of online fraud exploiting multiple SNS Yamato Kawaguchi (Yokohama National Univ.), Kazuki Takada (SecureBrain), Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2022-77 |
SNS (Social Networking Service) fraud has been reported in accordance with the increase in SNS users. In this study, we ... [more] |
ICSS2022-77 pp.175-180 |
ICSS, IPSJ-SPT |
2023-03-14 13:30 |
Okinawa |
Okinawaken Seinenkaikan (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Assessment Method for Persistent Malware Infection on IoT Devices Shunki Soeda, Takahiro Inoue, Rui Tanabe, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-78 |
Malware targeting IoT devices has become a growing threat in recent years. Some of them continue to infect devices perma... [more] |
ICSS2022-78 pp.181-186 |
ICSS |
2022-11-07 15:00 |
Hokkaido |
Hokkaido Jichiro Kaikan (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
Observation of Attack Infrastructures by Scripts that Mimic C&C Communications of IoT Bots Kaichi Sameshima, Yuki Endo, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2022-44 |
(To be available after the conference date) [more] |
ICSS2022-44 pp.37-42 |
ICSS |
2022-11-07 15:25 |
Hokkaido |
Hokkaido Jichiro Kaikan (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
Analysis of Environmental Sensitivity of Persistent IoT Malware using Sandboxes with File Systems from Various IoT Devices Takahiro Inoue (YNU), Eizo Okada, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2022-45 |
(To be available after the conference date) [more] |
ICSS2022-45 pp.43-48 |
ICSS, IPSJ-SPT |
2022-03-07 12:50 |
Online |
Online (Online) |
am I infected? A New Web Service to Inspect End Users' IoT Devices for Malware Infection and Vulnerabilities Songwei He, Takaya Noma, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2021-58 |
IoT devices have become prevalent in recent years, but unfortunately, many devices are infected by malware due to their ... [more] |
ICSS2021-58 pp.1-6 |
ICSS, IPSJ-SPT |
2022-03-07 13:50 |
Online |
Online (Online) |
Internet-wide discovery of IoT devices deployed at important facilities Mizuki Hiraku, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ) ICSS2021-61 |
Previous study has revealed that there are a number of IoT devices used at important facilities, such as water treatment... [more] |
ICSS2021-61 pp.14-19 |
ICSS, IPSJ-SPT |
2022-03-08 13:20 |
Online |
Online (Online) |
Analyzing network status of IoT malware by dynamic analysis with bare-metal device Kota Ogawa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2021-74 |
In this study, we first investigate the network state changes caused by IoT malware infection by executing malware sampl... [more] |
ICSS2021-74 pp.93-98 |