Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2022-03-08 10:00 |
Online |
Online |
Input predictive attack by keyboard acoustic emanations using BERT and its countermeasures Masahiro Iida (Teikyo Univ.), Mitsuaki Akiyama (NTT), Masaki Kamizono (DTCY), Takahiro Kasama (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Kyoto Sangyo Univ.), Atsuo Inomata (Osaka Univ.) ICSS2021-67 |
The Keyboard Acoustic Emanations has been proposed to estimate the input key from keystroke sounds as a kind of side-cha... [more] |
ICSS2021-67 pp.49-54 |
ICSS, IPSJ-SPT |
2021-03-01 09:10 |
Online |
Online |
On the Privacy Risk of Exposure Notification Framework: Assessment and Countermeasures Kazuki Nomoto (Waseda Univ.), Mitsuaki Akiyama (NTT), Masashi Eto (NICT), Atsuo Inomata (Osaka Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-34 |
The Exposure Notification Framework uses the Bluetooth Low Energy (BLE) signal generated by a smartphone to determine cl... [more] |
ICSS2020-34 pp.49-54 |
ICSS, IPSJ-SPT |
2021-03-01 14:55 |
Online |
Online |
Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41 |
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] |
ICSS2020-41 pp.90-95 |
ICSS, IPSJ-SPT |
2021-03-02 14:05 |
Online |
Online |
Developing an Interactive Analysis System for Voice Assistant Apps Atsuko Natatsuka (Waseda Univ.), Ryo Iijima (Waseda Univ./NICT), Takuya Watanabe, Mitsuaki Akiyama (NTT), Tetsuya Sakai (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-48 |
In Voice Assistant Services, official or third-party Voice Assistant Apps (VA apps) are provided. Since a VA app works a... [more] |
ICSS2020-48 pp.132-137 |
ICSS, IPSJ-SPT |
2021-03-02 09:10 |
Online |
Online |
A Study on the Adoption of Link Preview by the Phishing Sites Norihito Omori (Waseda Univ.), Satoshi Furutani, Takuya Watanabe, Toshiki Shibahara, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.) ICSS2020-54 |
Search engines are not the only means of accessing online content. The distribution of malicious content has become mor... [more] |
ICSS2020-54 pp.166-171 |
ICSS, IPSJ-SPT |
2020-03-02 13:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
ICSS2019-74 |
(To be available after the conference date) [more] |
ICSS2019-74 pp.37-42 |
ICSS, IPSJ-SPT |
2019-03-07 16:15 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Analyzing Deceptive Internationalized Domain Names Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide (NTT), Yuta Sawabe, Shigeki Goto (Waseda Univ.), Mitsuaki Akiyama (NTT) ICSS2018-76 |
Internationalized domain names (IDNs) are abused to create domain names visually similar to those of legitimate brands. ... [more] |
ICSS2018-76 pp.47-52 |
ICSS, IPSJ-SPT |
2018-03-08 09:45 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Automatically Collecting User-initiated Web-based Attacks Takashi Koide, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT) ICSS2017-66 |
Recently, web content uses social engineering techniques to lure victims into clicking on them, originating malware down... [more] |
ICSS2017-66 pp.91-96 |
ICSS, IPSJ-SPT |
2018-03-08 10:10 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
An Empirical Analysis of Online Advertising Fraud by analyzing User Activities Observed in the Ad Network Fumihiro Kanei, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT) ICSS2017-67 |
With the growth of online advertising market, it has become the target of abuse, such as ad fraud by adware and bots. To... [more] |
ICSS2017-67 pp.97-102 |
ICSS, IPSJ-SPT |
2018-03-08 11:35 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Predicting Website Abuse Using Update Histories Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT), Shigeki Goto (Waseda Univ.) ICSS2017-73 |
Threats of abusing websites that webmasters abandoned updates has increased.
In this paper, we propose a method of pred... [more] |
ICSS2017-73 pp.133-138 |
ICSS, IPSJ-SPT |
2018-03-08 14:15 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
A Survey of Factors Influencing Progress of HTTPS Adoption Tetsuya Okuda, Naoko Chiba, Mitsuaki Akiyama, Yuki Okano (NTT) ICSS2017-80 |
(To be available after the conference date) [more] |
ICSS2017-80 pp.187-192 |
ICSS, IPSJ-SPT |
2017-03-14 11:45 |
Nagasaki |
University of Nagasaki |
Towards finding Code Snippets on a Question and Answer Website causing Mobile App Vulnerabilities Hiroki Nakano (YNU), Fumihiro Kanei, Mitsuaki Akiyama (NTT), Katsunari Yoshioka (YNU) ICSS2016-68 |
Android app developers sometimes copy code snippets posted on a Question and Answer Website and develop their apps. If a... [more] |
ICSS2016-68 pp.171-176 |
IA, ICSS |
2015-06-11 13:45 |
Fukuoka |
Kyushu Institute of Technology Univ. |
[Invited Talk]
Establishment of Cybersecurity Education by Industry-Academia Collaboration Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-2 ICSS2015-2 |
[more] |
IA2015-2 ICSS2015-2 pp.3-8 |
IA, ICSS |
2015-06-12 10:50 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Detecting Malicious Domain Names based on the Time-series Analysis of Attackers Network Resources Daiki Chiba (NTT/Waseda Univ.), Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeshi Yada, Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-10 ICSS2015-10 |
Attackers launching cyber attacks frequently change their malicious websites to evade countermeasures such as blacklisti... [more] |
IA2015-10 ICSS2015-10 pp.51-56 |
ICSS |
2015-03-04 15:05 |
Okinawa |
Meio Univiersity |
Understanding Android apps that are similar to legitimate ones Yuta Ishii, Takuya Watanabe (Waseda Univ.), Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.) ICSS2014-94 |
Because it is not hard to repackage Android apps, there are many repackaged apps in the wild. Previous studies have repo... [more] |
ICSS2014-94 pp.187-192 |
ICSS |
2014-11-28 11:10 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
searching malicious URL from vast webspace Bo Sun (Waseda Univ.), Mitsuaki Akiyama, Takeshi Yagi (NTT), Tatsuya Mori (Waseda Univ.) ICSS2014-61 |
Many Web-based attacks such as Drive-by-download and phishing scam
are easily triggered by accessing landing page URL.... [more] |
ICSS2014-61 pp.61-66 |
ICSS, IA |
2014-06-06 13:00 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Analyzing Dynamic Class Loaded Applications in Android Takaaki Nagumo, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT) IA2014-8 ICSS2014-8 |
[more] |
IA2014-8 ICSS2014-8 pp.39-44 |
ICSS, IPSJ-SPT |
2014-03-27 13:30 |
Okinawa |
Meio Univiersity |
Measuring Lifetime of Malicious Website Based on Redirection from Compromised Websites Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT) ICSS2013-71 |
Attackers continuously generate URLs and FQDNs of malicious websites in order to circumvent security countermeasures
us... [more] |
ICSS2013-71 pp.53-58 |
ICSS, IPSJ-SPT |
2014-03-27 13:55 |
Okinawa |
Meio Univiersity |
An Investigation of Malicious JavaScript Code used in Drive-by Download Yuta Takata, Mitsuaki Akiyama, Takeo Hariu (NTT) ICSS2013-72 |
Malicious website contains JavaScript code that exploits vulnerabilities in the browser or the browser's plugins.Researc... [more] |
ICSS2013-72 pp.59-64 |
ICSS, IPSJ-SPT |
2014-03-28 14:20 |
Okinawa |
Meio Univiersity |
Design of HTTP Communication Profiling for Infected Hosts Detection Daiki Chiba, Kensuke Nakata, Mitsuaki Akiyama, Kazufumi Aoki, Kazunori Kamiya, Takeshi Yagi (NTT) ICSS2013-84 |
Countermeasures against malware should need both prevention and detection of malware infection. Detection of malware-inf... [more] |
ICSS2013-84 pp.155-160 |