IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 17 of 17  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA, ICSS 2011-06-17
13:50
Fukuoka Kyushu Institute of Technology DenseShip: Virtual Machine Monitor Specialized for Server-Type Honeypot
Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT) IA2011-11 ICSS2011-11
(To be available after the conference date) [more] IA2011-11 ICSS2011-11
pp.63-68
IA, ICSS 2011-06-17
15:00
Fukuoka Kyushu Institute of Technology Analysis of Website Infections using Malware
Takeshi Yagi, Shinta Nakayama, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Mitsutaka Itoh (NTT) IA2011-13 ICSS2011-13
This paper reports the actual situation of website infections using malware. Recently, with the widespread of the web, m... [more] IA2011-13 ICSS2011-13
pp.75-80
ICSS 2011-03-25
15:10
Tokyo Suspended Automatic Unpacking Based on Entropy of Memory-Access Values
Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.) ICSS2010-63
Malware executables are often obfuscated with encryption or compression using a technique known as packing, thus perform... [more] ICSS2010-63
pp.41-46
IN, MoNA
(Joint)
2010-11-18
14:50
Fukuoka Fukuoka Institute of Technology Architecture Design of Web Phantom: Hybrid Web Honeypot
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT) IN2010-85
This paper proposes a hybrid web honeypot, namely Web Phantom, which generates a blacklist to prevent malware infection ... [more] IN2010-85
pp.25-30
ICSS 2010-11-05
16:00
Hiroshima Hiroshima City University Determining granularity of URL filtering based on tree structure of malicious website URL
Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh (NTT) ICSS2010-53
A network administrator takes a measure based on the blacklist to prevent end users from accessing unwanted malicious we... [more] ICSS2010-53
pp.53-58
IN 2010-07-08
15:25
Hokkaido Hokkaido Univ. Investigation and Evaluation of Attack Monitoring Methods Using Web Honeypots
Takeshi Yagi (NTT Corp.), Alberto Chan (Univ. of British Columbia), Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IN2010-29
 [more] IN2010-29
pp.37-42
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
13:25
Aomori Hirosaki University Evaluating Destination Hosts of Malware Based on Search Engine Results
Kazufumi Aoki, Mitsuaki Akiyama, Makoto Iwamura, Mitsutaka Itoh (NTT) ISEC2010-18 SITE2010-14 ICSS2010-24
Malware dynamic analysis using isolated environment couldn't obtain enough results because existing malwares (e.g., Bots... [more] ISEC2010-18 SITE2010-14 ICSS2010-24
pp.75-80
IA, ICSS 2010-06-17
13:55
Kyoto Academic Center for Computing and Media Studies, Kyoto University Automatic OEP Finding Method for Malware Unpacking
Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT) IA2010-3 ICSS2010-3
Malware analysts have to first extract hidden original code from a packed executable to analyze malware functionalities,... [more] IA2010-3 ICSS2010-3
pp.13-18
IA, ICSS 2010-06-17
14:20
Kyoto Academic Center for Computing and Media Studies, Kyoto University How to Identify Code Region after Detecting Entry Point of Malware
Makoto Iwamura, Mitsutaka Itoh (NTT/Waseda Univ.), Yoichi Muraoka (Waseda Univ.) IA2010-4 ICSS2010-4
The goal of many existing methods for unpacking was finding OEP (Original Entry Point), not identifying where the origin... [more] IA2010-4 ICSS2010-4
pp.19-24
IA, ICSS 2010-06-18
13:55
Kyoto Academic Center for Computing and Media Studies, Kyoto University An Empirical Investigation of Gumblar Evolution
Mitsuaki Akiyama, Kazumichi Sato, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.) IA2010-13 ICSS2010-13
Due to incidents of web-based malware infection lead by a tampered web content, called Gumblar, clarification of
the ac... [more]
IA2010-13 ICSS2010-13
pp.69-74
IA, ICSS 2010-06-18
14:20
Kyoto Academic Center for Computing and Media Studies, Kyoto University A Life-cycle Monitoring Method of Malware Download Sites for Websites
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IA2010-14 ICSS2010-14
This paper proposes a method to monitor life-cycle of malware download sites for websites and reports the actual life-cy... [more] IA2010-14 ICSS2010-14
pp.75-80
ICSS 2010-03-26
15:30
Fukuoka The University of Kitakyushu Investigation of Attacks to Websites using Multi-domain Web-based Honeypots
Naoto Tanimoto, Takeshi Yagi, Takeo Hariu, Mitsutaka Itoh (NTT Corporation) ICSS2009-66
Recently, a large number of websites are under attacks from attackers. Many compromised websites are used by attackers a... [more] ICSS2009-66
pp.25-28
NS, IN
(Joint)
2010-03-05
11:40
Miyazaki Miyazaki Phoenix Seagaia Resort (Miyazaki) A Scheme of Detecting Malware for Websites
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IN2009-200
This paper reports the actual situation of malware distributed to websites by constructing web honeypots, which carries ... [more] IN2009-200
pp.337-342
IN 2009-07-10
11:25
Hokkaido HOKKAIDO UNIVERSITY A Provider Provisioned Websites Protection Scheme against Malware Distribution
Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) IN2009-34
This paper proposes a website protection scheme for service providers by analyzing accesses to web honeynets, which carr... [more] IN2009-34
pp.55-60
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
13:25
Akita Akita University Investigation about Malware Distribution to Websites
Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) ISEC2009-32 SITE2009-24 ICSS2009-46
This paper reports the actual situation of malware distribution to websites by constructing web honeynets, which carries... [more] ISEC2009-32 SITE2009-24 ICSS2009-46
pp.175-180
ICSS 2009-05-15
15:10
Hyogo Kobe University Investigation of Spam Mail Driven Web-Based Passive Attack
Yuhei Kawakoya, Mitsuaki Akiyama, Kazufumi Aoki, Mitsutaka Itoh (NTT), Hiroki Takakura (Kyoto Univ) ICSS2009-5
In recent years, the number of web-based passive attacks which are driven by URLs included in spam mail is increasing. B... [more] ICSS2009-5
pp.21-26
ISEC 2007-12-19
17:25
Tokyo Kikai-Shinko-Kaikan Bldg. Evaluation of a Detection System against Fuzzing Attacks on the SIP Protocol
Masaya Ozawa (Chuo Univ.), Eric Y. Chen, Mitsutaka Itoh (NTT PF Lab.), Mitsutoshi Hatori (Chuo Univ.) ISEC2007-128
As the number of VoIP users grows rapidly in recent years, the available attack vectors against VoIP systems also increa... [more] ISEC2007-128
pp.115-121
 Results 1 - 17 of 17  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan