Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2025-03-06 10:40 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
Long-term Analysis of DoS Attack Commands in Multiple Mirai Variants Yuki Umemura (NICT/Kobe Univ.), Masaki Kubo, Takahiro Kasama (NICT), Yoshiaki Shiraishi (Kobe Univ.) |
(To be available after the conference date) [more] |
|
ICSS, IPSJ-SPT |
2025-03-06 14:45 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
A Large-Scale Investigation of Security Risks in Medical IoT Devices Kosuke Tanizaki (Kobe Univ./NICT), Keisuke Furumoto, Kohei Masumi, Takeshi Takahashi (NICT), Yoshiaki Shiraishi (Kobe Univ.) |
[more] |
|
ICSS, IPSJ-SPT |
2025-03-07 09:50 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
|
(To be available after the conference date) [more] |
|
ICSS, IPSJ-SPT |
2025-03-07 10:10 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
|
(To be available after the conference date) [more] |
|
ICSS, IPSJ-SPT |
2025-03-07 10:30 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
Proposal for Detection and Visualization Method of Vulnerability Fixes for Open Source Software Considering Dependencies Tomohiko Yano (SECOM), Hiroki Kuzuno, Yoshiaki Shiraishi (Kobe Univ.) |
(To be available after the conference date) [more] |
|
ICSS, IPSJ-SPT |
2025-03-07 12:05 |
Okinawa |
Okinawa Prefectural Museum & Art Museum (Okinawa) |
Study on Man-in-the-Middle Attacks Abusing Power-Saving Mode and Authentication Vulnerabilities in Bluetooth Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) |
(To be available after the conference date) [more] |
|
ICM, LOIS |
2025-01-17 14:15 |
Kumamoto |
Kumamoto City International Center (Kumamoto, Online) (Primary: On-site, Secondary: Online) |
Automating the Deployment of Access Control and WAF System in Cloud Environment Shota Fujii (Kobe Univ.), Shohei Kakei (Nagoya Inst. of Tech.), Makoto Takita (Kobe Univ.), Masami Mohri (Kindai Univ.), Hiroki Kuzuno, Yoshiaki Shiraishi (Kobe Univ.) ICM2024-36 LOIS2024-69 |
Cyber-attacks exploiting vulnerabilities, such as SQL injection and cross-site scripting, threaten businesses, causing d... [more] |
ICM2024-36 LOIS2024-69 pp.100-105 |
LOIS, IPSJ-DC |
2024-07-11 13:00 |
Hyogo |
Mikage Kokaido (Hyogo) |
Expansion of Hologram QR codes by filling in modules
-- Including how QR codes can be used to lead to phishing sites -- Rikuto Mitui, Yoshiaki Shiraishi, Masakatu Morii (Graduate school of Kobe Univ) LOIS2024-1 |
The QR code is widely used worldwide as an automatic recognition technology and is employed in various applications such... [more] |
LOIS2024-1 pp.1-6 |
LOIS, IPSJ-DC |
2024-07-11 13:25 |
Hyogo |
Mikage Kokaido (Hyogo) |
LOIS2024-2 |
Domain names, which are indispensable for accessing Internet services, are also exploited by attackers to direct users t... [more] |
LOIS2024-2 pp.7-12 |
LOIS, IPSJ-DC |
2024-07-11 13:50 |
Hyogo |
Mikage Kokaido (Hyogo) |
LOIS2024-3 |
Domain names, indispensable for web access and other internet communications, can also be used to direct users to phishi... [more] |
LOIS2024-3 pp.13-18 |
LOIS, IPSJ-DC |
2024-07-11 14:15 |
Hyogo |
Mikage Kokaido (Hyogo) |
On Development of Cyber Training Contents using MITRE CALDERA Shingo Ujita, Youji Fukuta (Kindai Univ.), Yoshiaki Shiraishi (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Ichiro Suji, Masami Mohri (Kindai Univ.) LOIS2024-4 |
In developing cybersecurity personnel, it is effective to use an experiential security training system, but the cost of ... [more] |
LOIS2024-4 pp.19-24 |
LOIS, IPSJ-DC |
2024-07-12 09:30 |
Hyogo |
Mikage Kokaido (Hyogo) |
Security Ontology for Representing the Knowledge of Risk Assessment Masanori Hirotomo, Ryusuke Ogawa (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ.) LOIS2024-5 |
In order to conduct implement security measures effectively, risk assessment is necessary to correctly analyze and evalu... [more] |
LOIS2024-5 pp.25-30 |
LOIS |
2024-03-14 13:40 |
Okinawa |
Okinawa Pref Danjyo-Kyoudou-Sankaku Center (Okinawa, Online) (Primary: On-site, Secondary: Online) |
LOIS2023-64 |
Targeted attacks on specific organizations have become a significant issue due to their sophistication and the extensive... [more] |
LOIS2023-64 pp.96-101 |
LOIS, SITE, ISEC |
2023-11-10 14:25 |
Hiroshima |
Satellite Campus Hiroshima (Hiroshima, Online) (Primary: On-site, Secondary: Online) |
A Proposed Link Key Hijacking Attack Using the Power-Saving Mode against Bluetooth BR/EDR Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ISEC2023-70 SITE2023-64 LOIS2023-28 |
With the growing demand for Bluetooth devices, the power-saving mode of Bluetooth, which reduces the power consumption o... [more] |
ISEC2023-70 SITE2023-64 LOIS2023-28 pp.103-109 |
RCC, ISEC, IT, WBS |
2023-03-15 14:15 |
Yamaguchi |
(Yamaguchi, Online) (Primary: On-site, Secondary: Online) |
Design of Adaptively Decodable Visual Secret Sharing Scheme on Background Color Atsushi Marui, Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ) IT2022-138 ISEC2022-117 WBS2022-135 RCC2022-135 |
[more] |
IT2022-138 ISEC2022-117 WBS2022-135 RCC2022-135 pp.445-450 |
LOIS, ICM |
2023-01-20 10:55 |
Fukuoka |
Kitakyushu International Conference Center (Fukuoka, Online) (Primary: On-site, Secondary: Online) |
Displaying Maps on Smart Phone using two-dimensional code and its implementation Rikuto Mitui (Kobe Univ), Yuto Murai, Shogo Nakajima, Yoshiaki Shiraishi, Masakatu Morii (Graduate school of Kobe Univ) ICM2022-42 LOIS2022-42 |
Generally, QR Codes contain a URL, and information is obtained by accessing the web server indicated by the URL. Therefo... [more] |
ICM2022-42 LOIS2022-42 pp.65-70 |
ICSS |
2022-11-07 13:55 |
Hokkaido |
Hokkaido Jichiro Kaikan (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
Blockchain-Based Cloud Storage Data Auditing Scheme for Identifying Data Provenance Yuichi Kado (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ), Masakatu Morii (Kobe Univ.) ICSS2022-39 |
[more] |
ICSS2022-39 pp.7-12 |
ICSS |
2022-11-08 10:30 |
Hokkaido |
Hokkaido Jichiro Kaikan (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
Design and Implementation of a Task Scheduler for Delaying Ransomware Shuhei Enomoto (TUAT), Hiroki Kuzuno (Kobe Univ.), Hiroshi Yamada (TUAT), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2022-46 |
(To be available after the conference date) [more] |
ICSS2022-46 pp.49-54 |
ICSS |
2022-11-08 10:55 |
Hokkaido |
Hokkaido Jichiro Kaikan (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
An Efficient Method of Finding Flippable Bits for RAMBleed Haruka Okuda (Kobe Univ.), Makoto Takita (Univ. of Hyogo), Kazuhide Fukushima, Yuto Nakano (KDDI Research, Inc.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2022-47 |
Rowhammer is an attack that repeatedly accesses the same row in DRAM (Dynamic Random Access Memory) to cause bit flippin... [more] |
ICSS2022-47 pp.55-60 |
ICM, LOIS |
2021-01-21 17:50 |
Online |
Online (Online) |
Reproduction of Malware Behavior by Using Windows API Call Logs
-- Support for Major Win32 APIs and State Restoration After the Reproduction -- Naoya Matsuda, Youji Fukuta (Kindai Univ.), Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICM2020-47 LOIS2020-35 |
The authors have been developing a prototype tool to reproduce of malware behavior by using Windows API call logs so th... [more] |
ICM2020-47 LOIS2020-35 pp.75-80 |