Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 14:25 |
Online |
Online |
Cryptocurrency Analysis System for Investigating Cyber Crime Economy Hiroshi Mori, Hiroshi Kumagai, Yin Minn Pa Pa, Yuta Takata, Ryoya Furukawa, Yuji Sakurai, Masaki Kamizono (DTCY) ISEC2022-24 SITE2022-28 BioX2022-49 HWS2022-24 ICSS2022-32 EMM2022-32 |
[more] |
ISEC2022-24 SITE2022-28 BioX2022-49 HWS2022-24 ICSS2022-32 EMM2022-32 pp.98-103 |
ICSS, IPSJ-SPT |
2022-03-08 10:00 |
Online |
Online |
Input predictive attack by keyboard acoustic emanations using BERT and its countermeasures Masahiro Iida (Teikyo Univ.), Mitsuaki Akiyama (NTT), Masaki Kamizono (DTCY), Takahiro Kasama (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Kyoto Sangyo Univ.), Atsuo Inomata (Osaka Univ.) ICSS2021-67 |
The Keyboard Acoustic Emanations has been proposed to estimate the input key from keystroke sounds as a kind of side-cha... [more] |
ICSS2021-67 pp.49-54 |
ICSS, IPSJ-SPT |
2021-03-02 10:00 |
Online |
Online |
Evaluation of Uncertain Reports by Multiple Anti-virus Engines Kazuya Nomura (Waseda Univ.), Mistuaki Akiyama (NTT), Masaki Kamizono (Deloitte Tohmatsu Cyber LLC), Takahiro Kasama (NICT) ICSS2020-56 |
VirusTotal is an online service that provides detection results from multiple anti-virus engines. It is used in a wide r... [more] |
ICSS2020-56 pp.178-183 |
ICSS, IPSJ-SPT |
2019-03-08 13:25 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Proposal of a Non-Technical Skills Map for Computer Security Incident Responses Takahiro Kasama, Shingo Yasuda, Hironobu Satoh (NICT), Masaki Kamizono, Emi Kojima (PwC), Takao Yamaguchi, Kazuharu Nara (JAMSS) ICSS2018-90 |
[more] |
ICSS2018-90 pp.185-190 |
ICSS, IPSJ-SPT |
2018-03-08 10:35 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Darkweb Analysis System by Combining HSDir's Snooping and Active Scanning Akito Ono (Ritsumeikan Univ.), Masaki Kamizono (PwC Cyber Services), Takahiro Kasama (NICT), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2017-68 |
[more] |
ICSS2017-68 pp.103-108 |
ICSS, IPSJ-SPT |
2018-03-08 11:10 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
ICSS2017-75 |
[more] |
ICSS2017-75 pp.145-150 |
ICSS |
2017-11-20 14:15 |
Oita |
Beppu International Convention Center |
[Invited Talk]
Case Study and Future Perspective on Security Assessment of Connected Car Masaki Kamizono (PwC) ICSS2017-38 |
Various cyber security threats and vulnerabilities are reported in accordance with the remarkable rise of the connected ... [more] |
ICSS2017-38 pp.1-4 |
ICSS |
2017-11-20 16:05 |
Oita |
Beppu International Convention Center |
* Emi Kojima (PwC), Kazuharu Nara (JAMSS), Masaki Kamizono (PwC) ICSS2017-41 |
(To be available after the conference date) [more] |
ICSS2017-41 pp.17-22 |
ICSS |
2017-11-21 14:00 |
Oita |
Beppu International Convention Center |
ICSS2017-50 |
[more] |
ICSS2017-50 pp.71-76 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 14:15 |
Tokyo |
|
ISEC2017-20 SITE2017-12 ICSS2017-19 EMM2017-23 |
[more] |
ISEC2017-20 SITE2017-12 ICSS2017-19 EMM2017-23 pp.93-98 |
ICSS, IPSJ-SPT |
2017-03-13 13:25 |
Nagasaki |
University of Nagasaki |
Modeling of Attack Activity for Integrated Analysis of Threat Information Kenta Nomura, Daiki Ito (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-47 |
Cyber attacks targeting specific victims use multiple intrusion routes and various attack methods. In order to combat su... [more] |
ICSS2016-47 pp.7-12 |
ICSS, IPSJ-SPT |
2017-03-14 11:45 |
Nagasaki |
University of Nagasaki |
Representation for Attack Activity to Associate Threat Information Daiki Ito, Kenta Nomura (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-64 |
As sophisticated and complicated cyber attacks become a social problem, Threat Intelligence, in which new knowledge obta... [more] |
ICSS2016-64 pp.147-152 |
ICSS, IPSJ-SPT |
2017-03-14 10:55 |
Nagasaki |
University of Nagasaki |
A Vulnerability Analysis of Android Applications from the View of Framework Ryoya Furukawa, Tatsuya Nagai (Kobe Univ.), Hiroshi Kumagai, Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) |
[more] |
|
ICSS |
2016-11-25 13:00 |
Kanagawa |
Institute of Information Security |
[Invited Talk]
Analyses of social needs and training programs of security human resources in Japan Masashi Eto (NICT), Masaki Kamizono (PwC Cyber Services LLC) ICSS2016-38 |
In response to the serious shortage of cybersecurity human resources in the domestic industry, a number of training prog... [more] |
ICSS2016-38 p.1 |
ICSS |
2016-11-25 16:10 |
Kanagawa |
Institute of Information Security |
Performance of link-mining techniques to detect malicious websites Yasuhiro Takano, Daiki Ito, Tatsuya Nagai (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-44 |
Conventional techniques to avoid malicious websites techniques by referring URL's keywords reported in black lists have ... [more] |
ICSS2016-44 pp.31-35 |
ICSS, IA |
2016-06-07 13:25 |
Saga |
Saga University |
Tatsuya Nagai (Kobe Univ.), Masaki Kamizono (PwC Cyber Services LLCPwC Cyber Services), Yoshiaki Shiraishi (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services LLCPwC Cyber Services), Masakatu Morii (Kobe Univ.) IA2016-12 ICSS2016-12 |
(To be available after the conference date) [more] |
IA2016-12 ICSS2016-12 pp.63-68 |
ICSS |
2015-03-03 15:15 |
Okinawa |
Meio Univiersity |
A Pluggable and Programmable Flamework for Analyzing Security Logs Yu Tsuda, Takashi Tomine, Masaki Kamizono, Masashi Eto, Daisuke Inoue (NICT) ICSS2014-68 |
SIEM (Security Information and Event Management) systems can unify a lot of security logs from various security applianc... [more] |
ICSS2014-68 pp.31-36 |
ICSS |
2015-03-03 16:15 |
Okinawa |
Meio Univiersity |
Link Structural Analysis of Drive-by-Download Attacks Yuji Dairiki (Kobe Univ.), Masaki Kamizono (SecureBrain), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2014-70 |
In analyzing Drive-by-Download (DBD) attack, it is basic and essential to analysis the link structure through tracking t... [more] |
ICSS2014-70 pp.43-48 |
ICSS |
2015-03-04 10:50 |
Okinawa |
Meio Univiersity |
Prediction of Malware Activities based on Loopback Address from DNS Masaki Kamizono (NICT/SecureBrain), Takashi Tomine, Yu Tsuda, Masashi Eto (NICT), Yuji Hoshizawa (Securebrain Corporation), Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (ynu) ICSS2014-80 |
During malware dynamic analysis, the analysis system often finds the loopback address in responses of DNS name resolutio... [more] |
ICSS2014-80 pp.103-108 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 14:40 |
Hokkaido |
San-Refure Hakodate |
Analysis of Cyber-attack Infrastructure with Malicious Website focused on Backdoor Shell Masaki Kamizono (YNU/NICT), Yuji Hoshizawa (SecureBrain), Takahiro Kasama, Masashi Eto, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ISEC2014-46 SITE2014-41 ICSS2014-50 EMM2014-46 |
[more] |
ISEC2014-46 SITE2014-41 ICSS2014-50 EMM2014-46 pp.321-326 |