Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2025-03-06 12:15 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
Linking IoT Attacks to Cybercrime-as-a-Service Offerings Using LLM and DNS Data Qingxin Mao (YNU), Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka (IAS/YNU) |
[more] |
|
ICSS, IPSJ-SPT |
2025-03-06 14:25 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
How to Win the Battle Within:Towards Remotely Neutralize IoT Malware to Defend Devices Shun Ikeda (YNU), Rui Tanabe (YNU/Juntendo Univ), Katsunari Yoshioka (YNU) |
(To be available after the conference date) [more] |
|
ICSS, IPSJ-SPT |
2025-03-07 15:30 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
Evaluating the Classification Accuracy of an LLM for Sandbox Evasion Proof-of-Concept Code Yukihiro Higashi, Hikaru Matsuzawa (YOKOHAMA National Univ.), Rui Tanabe (YOKOHAMA National Univ./Juntendo Univ.), Yin Minn Pa Pa, Katsunari Yoshioka (YOKOHAMA National Univ.) |
(To be available after the conference date) [more] |
|
ICSS, IPSJ-SPT |
2024-03-21 15:20 |
Okinawa |
OIST (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Investigating the functionalities of IoT malware to disrupt the activities of other intruders Shun Ikeda, Hiroki Yasui, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-76 |
[more] |
ICSS2023-76 pp.51-56 |
ICSS, IPSJ-SPT |
2024-03-21 15:45 |
Okinawa |
OIST (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Enhanced Analysis of IoT Botnet Activity by Fusing Honeypots, Malware Dynamic Analysis, and C&C Observation Yuki Endo, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-77 |
[more] |
ICSS2023-77 pp.57-62 |
ICSS, IPSJ-SPT |
2023-03-13 17:50 |
Okinawa |
Okinawaken Seinenkaikan (Okinawa, Online) (Primary: On-site, Secondary: Online) |
URL Warning List Creation and Manage Methods using VirusTotal and Web Access Log Kyohei Takao, Chika Hiraishi (YNU), Kazuki Takada (SecureBrain), Akira Fujita, Daisuke Inoue (NICT), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-66 |
Security services such as URL blocklists are widely used to prevent users from accessing malicious websites.
However, ... [more] |
ICSS2022-66 pp.109-114 |
ICSS, IPSJ-SPT |
2023-03-14 13:10 |
Okinawa |
Okinawaken Seinenkaikan (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Towards observation of online fraud exploiting multiple SNS Yamato Kawaguchi (Yokohama National Univ.), Kazuki Takada (SecureBrain), Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2022-77 |
SNS (Social Networking Service) fraud has been reported in accordance with the increase in SNS users. In this study, we ... [more] |
ICSS2022-77 pp.175-180 |
ICSS, IPSJ-SPT |
2023-03-14 13:30 |
Okinawa |
Okinawaken Seinenkaikan (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Assessment Method for Persistent Malware Infection on IoT Devices Shunki Soeda, Takahiro Inoue, Rui Tanabe, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-78 |
Malware targeting IoT devices has become a growing threat in recent years. Some of them continue to infect devices perma... [more] |
ICSS2022-78 pp.181-186 |
ICSS |
2022-11-07 15:00 |
Hokkaido |
Hokkaido Jichiro Kaikan (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
Observation of Attack Infrastructures by Scripts that Mimic C&C Communications of IoT Bots Kaichi Sameshima, Yuki Endo, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2022-44 |
(To be available after the conference date) [more] |
ICSS2022-44 pp.37-42 |
ICSS |
2022-11-07 15:25 |
Hokkaido |
Hokkaido Jichiro Kaikan (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
Analysis of Environmental Sensitivity of Persistent IoT Malware using Sandboxes with File Systems from Various IoT Devices Takahiro Inoue (YNU), Eizo Okada, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2022-45 |
(To be available after the conference date) [more] |
ICSS2022-45 pp.43-48 |
ICSS, IPSJ-SPT |
2022-03-08 13:20 |
Online |
Online (Online) |
Analyzing network status of IoT malware by dynamic analysis with bare-metal device Kota Ogawa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2021-74 |
In this study, we first investigate the network state changes caused by IoT malware infection by executing malware sampl... [more] |
ICSS2021-74 pp.93-98 |
ICSS, IPSJ-SPT |
2022-03-08 13:40 |
Online |
Online (Online) |
ML-based detection of C&C communications for sandbox analysis of IoT malware Yuki Endo, Kaichi Sameshima, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2021-75 |
In order to analyze the behavior of malware, dynamic analysis has been widely utilized. Among various communication of m... [more] |
ICSS2021-75 pp.99-104 |
ICSS, IPSJ-SPT |
2022-03-08 15:30 |
Online |
Online (Online) |
Verifying concept of personalized malware by investigating end-user environments Daigo Ichikawa, Rui Tanabe, XU Haoyuan, Yoshioka Katsunari, Matsumoto Tsutomu (YNU) ICSS2021-83 |
Personalized malware conducts malicious activities only when it is running on the target environment. Previous studies h... [more] |
ICSS2021-83 pp.147-152 |
IA, ICSS |
2021-06-22 09:25 |
Online |
Online (Online) |
Analtsis of cost-effectiveness in malicious site detection using VirusTotal Kyohei Takao (YNU), Hiroshi Mori (Deloitte Tohmatsu Cyber LLC), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) IA2021-10 ICSS2021-10 |
VirusTotal receives to-be-tested files and URLs and provides scan results by more than 70 security software.
Its incre... [more] |
IA2021-10 ICSS2021-10 pp.50-55 |
ICSS, IPSJ-SPT |
2021-03-01 14:30 |
Online |
Online (Online) |
Analyzing the Transition of Vulnerabilities Targeted by IoT Malware Kaichi Sameshima, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-40 |
While the popularity of IoT devices are rapidly growing, vulnerable IoT devices have been the target of cyber-attacks. I... [more] |
ICSS2020-40 pp.84-89 |
ICSS, IPSJ-SPT |
2021-03-01 14:55 |
Online |
Online (Online) |
Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41 |
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] |
ICSS2020-41 pp.90-95 |
ICSS, IPSJ-SPT |
2021-03-02 09:35 |
Online |
Online (Online) |
An Efficient Discovery of Malicious URL Using VirusTotal and Web Access Log Chika Hiraishi, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-55 |
The threats of malicious websites are increasing that, urgent countermeasures are needed. Using a block list of known ma... [more] |
ICSS2020-55 pp.172-177 |
ICSS, IPSJ-SPT |
2021-03-02 10:25 |
Online |
Online (Online) |
Proof of concept of sandbox evasion attack using email address stored in target machine Yuta Inoue, Rui Tanabe (YNU), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-57 |
In recent years, malware sandbox appliances that dynamically analyze target files are becoming popular. However, malware... [more] |
ICSS2020-57 pp.184-189 |
ICSS, IPSJ-SPT |
2020-03-02 16:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Okinawa) (Cancelled but technical report was issued) |
An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2019-81 |
While IoT malware such as Mirai have been targeting Telnet services, there are still many devices that are still running... [more] |
ICSS2019-81 pp.79-84 |
ICSS, IPSJ-SPT |
2020-03-02 11:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Okinawa) (Cancelled but technical report was issued) |
An Evaluation of Contact Points for Security Notifications Miori Saito, Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2019-94 |
With the evolving threat of cyber attacks, the importance of security notifications is increasing. In general, informati... [more] |
ICSS2019-94 pp.195-200 |