IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 69  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2022-11-08
09:00
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
Observation of DoS attack commands by scripts that mimic C&C communications of IoT bots
Kaichi Sameshima, Yuki Endo, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU)
 [more]
ICSS 2022-11-08
09:25
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
Analysis of Environmental Sensitivity of Persistent IoT Malware using Sandboxes with File Systems from various IoT Devices
Takahiro Inoue (YNU), Eizo Okada, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU)
 [more]
ICSS, IPSJ-SPT 2022-03-08
13:00
Online Online Remote-Control System for Securing IoT Devices
Masaru Takeuchi (JDC), Yohei Watanabe (UEC/ジャパンデータコム), Naoto Yanai (OU/ジャパンデータコム), Tatsuya Takehisa (Nisshin), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2021-73
The number of malwares targeting IoT devices increases, and security issues in many systems such as critical infrastruct... [more] ICSS2021-73
pp.87-92
ICSS, IPSJ-SPT 2021-03-01
14:30
Online Online Analyzing the Transition of Vulnerabilities Targeted by IoT Malware
Kaichi Sameshima, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-40
While the popularity of IoT devices are rapidly growing, vulnerable IoT devices have been the target of cyber-attacks. I... [more] ICSS2020-40
pp.84-89
ICSS, IPSJ-SPT 2021-03-01
14:55
Online Online Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox
Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] ICSS2020-41
pp.90-95
ICSS, IPSJ-SPT 2020-03-02
13:30
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Implementation of aggregate message authentication and its evaluation
Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takehisa, Hidekazu Nishiura, Zoa Jiafa (NISSIN), Yu Imamura (JDC), Junji Sikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC) ICSS2019-96
 [more] ICSS2019-96
pp.207-212
ICSS 2019-11-13
13:55
Miyazaki MRT Terrace(Miyazaki) A Fast Algorithm for Constructing Phylogenetic Trees and Its Evaluation
Tianxiang He (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Shuji Kijima, Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT) ICSS2019-61
 [more] ICSS2019-61
pp.7-12
ICSS 2019-11-13
16:45
Miyazaki MRT Terrace(Miyazaki) Study on evaluation system for aggregate message authentication and its application to IoT systems
Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takeuchi, Hidekazu Nishiura (Nissin), Yu Imamura (JDC), Junji Shikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC) ICSS2019-67
Utilization of Internet of things (IoT) devices has widely spread, and suppressing the increasing amount of data due to ... [more] ICSS2019-67
pp.41-46
ICSS, IPSJ-SPT 2019-03-07
14:45
Okinawa NICT Okinawa Electromagnetic Technology Center Implementation and evaluation of aggregate message authentication method
Atsuhiro Yamagishi (JDC), Tatsuya Takehisa, Eiichi Nishiura (NISSIN), Shouichi Hirose, Yu Imamura (JDC), Kazuhiko Minematsu (nec), Junji Shikata, Koji Nakao (YNU) ICSS2018-73
 [more] ICSS2018-73
pp.29-33
ICSS, IPSJ-SPT 2018-03-07
13:00
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center A Study on Malware Activity Detection Based on Real-time Analysis of Darknet Data Using Graphical Lasso
Chansu Han (Kyushu Univ.), Jumpei Shimamura (Clwit Inc.), Takeshi Takahashi, Daisuke Inoue (NICT), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT) ICSS2017-51
In this study, we considered a method to detect malignant activity (especially botnet) in cyber space automatically and ... [more] ICSS2017-51
pp.1-6
ICSS, IA 2016-06-06
14:10
Saga Saga University Method to Locate Cryptographic Functions from Malware
Ryoya Furukawa (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT)
 [more]
ICSS, IPSJ-SPT 2016-03-04
11:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University A Suspicious Processes Detection Scheme using Process Frequency and Network State
Junji Nakazato, Yu Tsuda, Eto Masashi, Daisuke Inoue, Koji Nakao (NICT) ICSS2015-60
Many serious security incidents caused by the targeted attacks have been occurred. The targeted attacks can not be preve... [more] ICSS2015-60
pp.77-82
ICSS 2015-11-26
15:00
Fukushima AIST, Fukushima Renewable Energy Institute tkiwa: A Detection Tool for Packets with Characteristic Network Protocol Header
Takashi Koide (Yokohama National Univ.), Daisuke Makita (Yokohama National Univ./NICT), Takahiro Kasama, Mio Suzuki, Daisuke Inoue, Koji Nakao (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2015-38
The packets from malware and network tools that have their own implementation of network stack may have character-istic ... [more] ICSS2015-38
pp.19-24
ICSS 2015-11-27
14:40
Fukushima AIST, Fukushima Renewable Energy Institute A Suspicious Processes Detection Scheme using Process Frequency
Junji Nakazato, Yu Tsuda, Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2015-45
Many serious security incidents caused by the targeted attacks have been occurred. The targeted attacks can not be preve... [more] ICSS2015-45
pp.61-66
IA, ICSS 2015-06-11
14:55
Fukuoka Kyushu Institute of Technology Univ. An Empirical Evaluation of Locating Cryptographic Functions on the Memory
Ryoya Furukawa (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT) IA2015-4 ICSS2015-4
This paper presents a simple and effective idea to locate cryptographic functions on the memory for malware analysis.
... [more]
IA2015-4 ICSS2015-4
pp.15-20
IA, ICSS 2015-06-11
16:05
Fukuoka Kyushu Institute of Technology Univ. Traffic Data Analysis for Multiple Darknet and its Applications
Kensho Murai, Keisuke Furumoto (Kobe Univ.), Kosuke Murakami (KDDI), Koji Nakao (KDDI/NICT), Masakatu Morii (Kobe Univ.) IA2015-7 ICSS2015-7
The Internet is transcending national boundaries to become an important and essential communication approach in the worl... [more] IA2015-7 ICSS2015-7
pp.33-38
IA, ICSS 2015-06-12
15:20
Fukuoka Kyushu Institute of Technology Univ. A study on a Tool for Automated Vulnerability Monitoring and Alerting on Software Assets inside Organizations
Takeshi Takahashi, Daisuke Miyamoto, Bhola Panta, Koji Nakao (NICT) IA2015-18 ICSS2015-18
Each organization needs to manage its IT assets and related vulnerabilities in order to maintain its security level.
Ne... [more]
IA2015-18 ICSS2015-18
pp.99-104
ICSS 2015-03-03
15:40
Okinawa Meio Univiersity A Study on the Effectiveness of Correlation Analysis of Cyber Attack Information by means of Tagging Technique
Taichi Hata (JDC/Nissin), Manabu Inuma (Josai Univ.), Junji Shikata (Yokohama National Univ.), Shin Takeuchi (JDC/Nissin), Koji Nakao (NICT) ICSS2014-69
Recently, cyber-attacks caused by malwares are steadily increasing.
Since the attack techniques are also diversified, c... [more]
ICSS2014-69
pp.37-42
ICSS 2015-03-03
17:40
Okinawa Meio Univiersity [Invited Talk] Cyber Security Management
Koji Nakao (NICT/KDDI)
 [more]
ICSS 2015-03-04
11:40
Okinawa Meio Univiersity Internet Alive Monitoring Method around Disaster Areas Using Large-scale Darknet, Autonomous System Information, and Geographical Information
Mio Suzuki (NICT), Jumpei Shimamura (Clwit), Junji Nakazato, Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) ICSS2014-82
At the time of large natural disaster, the Internet could lost its functionalities caused by power outage and physical d... [more] ICSS2014-82
pp.115-120
 Results 1 - 20 of 69  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan