Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS |
2023-04-14 16:10 |
Oita |
|
An Application of Information Flow Tracking for Detecting Hardware Trojans Ryoichi Isawa, Nobuyuki Kanaya, Daisuke Inoue (NICT) |
[more] |
|
VLD, HWS [detail] |
2022-03-08 11:25 |
Online |
Online |
A Method for Automatic Test Pattern Generation using an SMT Solver for HDL Code Ryoichi Isawa, Nobuyuki Kanaya, Yoshitada Fujiwara, Tatsuta Takehisa, Hayato Ushimaru, Dai Arisue, Daisuke Makita, Satoshi Mimura, Daisuke Inoue (NICT) VLD2021-95 HWS2021-72 |
(To be available after the conference date) [more] |
VLD2021-95 HWS2021-72 pp.105-110 |
ICSS, IPSJ-SPT |
2021-03-01 13:40 |
Online |
Online |
An Evaluation of Scalable Clustering in Fast Construction Algorithm of Phylogenetic Tree Tianxiang He (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Shuji Kijima, Jun'ichi Takeuchi (Kyushu Univ.) ICSS2020-38 |
[more] |
ICSS2020-38 pp.72-77 |
ICSS, IPSJ-SPT |
2021-03-01 14:05 |
Online |
Online |
Improvement of Functional Difference Investigation Method and Analyzing for Clusters of IoT Malware Reo Kawasoe (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.) ICSS2020-39 |
[more] |
ICSS2020-39 pp.78-83 |
ICSS, IPSJ-SPT |
2020-03-02 14:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
A Study on Fuzzing for Device Drivers with AddressSanitizer Kentaro Ishii (Kove Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kove Univ.) ICSS2019-76 |
A device driver is a program which runs with higher privilege in an operating system. If a device driver is compromised,... [more] |
ICSS2019-76 pp.49-53 |
ICSS, IPSJ-SPT |
2020-03-02 15:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Evaluating Effectiveness of a Timing Attack on Android Devices in JavaScript Keisuke Sugita (Kobe Univ.), Ryoichi Isawa (NICT), Masakatsu Morii (Kobe Univ.) ICSS2019-79 |
(To be available after the conference date) [more] |
ICSS2019-79 pp.67-71 |
ICSS |
2019-11-13 13:55 |
Miyazaki |
MRT Terrace(Miyazaki) |
A Fast Algorithm for Constructing Phylogenetic Trees and Its Evaluation Tianxiang He (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Shuji Kijima, Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT) ICSS2019-61 |
[more] |
ICSS2019-61 pp.7-12 |
ICSS |
2018-11-21 15:15 |
Kagoshima |
|
Malware Analysis Method Using Conditional Generative Adversarial Network Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) ICSS2018-57 |
Many schemes combining deep learning with methods for imaging malware have been proposed. These methods are considered t... [more] |
ICSS2018-57 pp.25-30 |
ICSS |
2018-11-22 14:20 |
Kagoshima |
|
Part II: Calculating Similarity between IoT Malware over CPU Architectures Ryoichi Isawa, Tao Ban (NICT), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2018-66 |
At the ICSS workshop held in June, 2018, we proposed a method for calculating
similarity between IoT malware samples ov... [more] |
ICSS2018-66 pp.73-78 |
ICSS, IA |
2018-06-25 13:25 |
Ehime |
Ehime University |
Calculating Similarity between IoT Malware Samples over CPU Architectures Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) IA2018-2 ICSS2018-2 |
Malware samples infecting IoT (Internet of Things) devices such as Web cameras and
home routers have spread over the In... [more] |
IA2018-2 ICSS2018-2 pp.7-12 |
ICSS, IA |
2018-06-26 11:40 |
Ehime |
Ehime University |
A Study on Extraction Method of Characteristics of Malware Using Generative Adversalial Networks Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) IA2018-13 ICSS2018-13 |
To classify malware families including many subspecies, several methods have been proposed for acquiring malware feature... [more] |
IA2018-13 ICSS2018-13 pp.77-82 |
ICSS, IPSJ-SPT |
2018-03-08 09:20 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Considering Opcode-based Similarity between IoT Malware Samples Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2017-69 |
In this paper, we generate a similarity matrix between IoT (Internet of Things) malware samples based on their disassemb... [more] |
ICSS2017-69 pp.109-114 |
IA, ICSS |
2017-06-08 14:25 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
A First Trend Review of Runtime Packers for IoT Malware Ryoichi Isawa (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Tao Ban, Daisuke Inoue (NICT) IA2017-4 ICSS2017-4 |
Malicious software (malware) specimens that infect IoT (Internet of Things) devices rapidly increase. If those specimens... [more] |
IA2017-4 ICSS2017-4 pp.19-24 |
ICSS, IA |
2016-06-06 14:10 |
Saga |
Saga University |
Method to Locate Cryptographic Functions from Malware Ryoya Furukawa (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT) |
[more] |
|
IA, ICSS |
2015-06-11 14:55 |
Fukuoka |
Kyushu Institute of Technology Univ. |
An Empirical Evaluation of Locating Cryptographic Functions on the Memory Ryoya Furukawa (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT) IA2015-4 ICSS2015-4 |
This paper presents a simple and effective idea to locate cryptographic functions on the memory for malware analysis.
... [more] |
IA2015-4 ICSS2015-4 pp.15-20 |
ICSS |
2013-11-12 15:10 |
Fukuoka |
Nishijin Plaza |
An OEP Identifying Method based on the Order of Opcodes Noriaki Nakamura, Masakatu Morii (Kobe Univ.), Ryoichi Isawa, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-59 |
To skip unpacking steps, automated generic unpacking methods are strongly required.Most of generic unpackers extract mem... [more] |
ICSS2013-59 pp.13-18 |
IA, ICSS |
2013-06-20 14:35 |
Niigata |
Ao-re Nagaoka |
Three Party Secure Anonymous Authentication Scheme with Hard Learning Problems Kotaro Kishibe (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.) IA2013-3 ICSS2013-3 |
In late years, with the spread of RFID, the lightweight certification protocol between RFID tag and readers attracts att... [more] |
IA2013-3 ICSS2013-3 pp.13-18 |
IA, ICSS |
2013-06-21 13:25 |
Niigata |
Ao-re Nagaoka |
Generic Unpacking Method Using Data Execution Prevention Ryoichi Isawa (NICT), Masaki Kamizono (NICT/SecureBrain Corporation), Daisuke Inoue (NICT) IA2013-13 ICSS2013-13 |
To skip unpacking steps, automated generic unpacking methods are strongly required. The basic idea of the generic unpack... [more] |
IA2013-13 ICSS2013-13 pp.73-78 |
ICSS |
2012-11-22 13:15 |
Hiroshima |
Miyajima Mori-no-Yado |
Packer Identification Based on Binary Code of Malware Using Machine Learning Ryoichi Isawa, Tao Ban, Daisuke Inoue (NICT) ICSS2012-48 |
PEiD is a well-known packer identication tool. However, it often fails to identify a packer name of the target le beca... [more] |
ICSS2012-48 pp.19-24 |
ICSS |
2011-11-18 13:30 |
Tokushima |
Naruto University of Education |
Feature Estimation Method for Malwares based on a Histogram of Bytecode Ryo Okubo, Ryoichi Isawa, Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT) ICSS2011-33 |
[more] |
ICSS2011-33 pp.7-12 |