IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: Recent 10 Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 72  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2025-03-06
10:40
Okinawa Okinawa Prefectural Museum & Art Museum (Okinawa) Long-term Analysis of DoS Attack Commands in Multiple Mirai Variants
Yuki Umemura (NICT/Kobe Univ.), Masaki Kubo, Takahiro Kasama (NICT), Yoshiaki Shiraishi (Kobe Univ.)
(To be available after the conference date) [more]
ICSS, IPSJ-SPT 2025-03-06
14:45
Okinawa Okinawa Prefectural Museum & Art Museum (Okinawa) A Large-Scale Investigation of Security Risks in Medical IoT Devices
Kosuke Tanizaki (Kobe Univ./NICT), Keisuke Furumoto, Kohei Masumi, Takeshi Takahashi (NICT), Yoshiaki Shiraishi (Kobe Univ.)
 [more]
ICSS, IPSJ-SPT 2025-03-07
09:50
Okinawa Okinawa Prefectural Museum & Art Museum (Okinawa) (To be available after the conference date) [more]
ICSS, IPSJ-SPT 2025-03-07
10:10
Okinawa Okinawa Prefectural Museum & Art Museum (Okinawa) (To be available after the conference date) [more]
ICSS, IPSJ-SPT 2025-03-07
10:30
Okinawa Okinawa Prefectural Museum & Art Museum (Okinawa) Proposal for Detection and Visualization Method of Vulnerability Fixes for Open Source Software Considering Dependencies
Tomohiko Yano (SECOM), Hiroki Kuzuno, Yoshiaki Shiraishi (Kobe Univ.)
(To be available after the conference date) [more]
ICSS, IPSJ-SPT 2025-03-07
12:05
Okinawa Okinawa Prefectural Museum & Art Museum (Okinawa) Study on Man-in-the-Middle Attacks Abusing Power-Saving Mode and Authentication Vulnerabilities in Bluetooth
Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.)
(To be available after the conference date) [more]
ICM, LOIS 2025-01-17
14:15
Kumamoto Kumamoto City International Center (Kumamoto, Online)
(Primary: On-site, Secondary: Online)
Automating the Deployment of Access Control and WAF System in Cloud Environment
Shota Fujii (Kobe Univ.), Shohei Kakei (Nagoya Inst. of Tech.), Makoto Takita (Kobe Univ.), Masami Mohri (Kindai Univ.), Hiroki Kuzuno, Yoshiaki Shiraishi (Kobe Univ.) ICM2024-36 LOIS2024-69
Cyber-attacks exploiting vulnerabilities, such as SQL injection and cross-site scripting, threaten businesses, causing d... [more] ICM2024-36 LOIS2024-69
pp.100-105
LOIS, IPSJ-DC 2024-07-11
13:00
Hyogo Mikage Kokaido (Hyogo) Expansion of Hologram QR codes by filling in modules -- Including how QR codes can be used to lead to phishing sites --
Rikuto Mitui, Yoshiaki Shiraishi, Masakatu Morii (Graduate school of Kobe Univ) LOIS2024-1
The QR code is widely used worldwide as an automatic recognition technology and is employed in various applications such... [more] LOIS2024-1
pp.1-6
LOIS, IPSJ-DC 2024-07-11
13:25
Hyogo Mikage Kokaido (Hyogo) LOIS2024-2 Domain names, which are indispensable for accessing Internet services, are also exploited by attackers to direct users t... [more] LOIS2024-2
pp.7-12
LOIS, IPSJ-DC 2024-07-11
13:50
Hyogo Mikage Kokaido (Hyogo) LOIS2024-3 Domain names, indispensable for web access and other internet communications, can also be used to direct users to phishi... [more] LOIS2024-3
pp.13-18
LOIS, IPSJ-DC 2024-07-11
14:15
Hyogo Mikage Kokaido (Hyogo) On Development of Cyber Training Contents using MITRE CALDERA
Shingo Ujita, Youji Fukuta (Kindai Univ.), Yoshiaki Shiraishi (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Ichiro Suji, Masami Mohri (Kindai Univ.) LOIS2024-4
In developing cybersecurity personnel, it is effective to use an experiential security training system, but the cost of ... [more] LOIS2024-4
pp.19-24
LOIS, IPSJ-DC 2024-07-12
09:30
Hyogo Mikage Kokaido (Hyogo) Security Ontology for Representing the Knowledge of Risk Assessment
Masanori Hirotomo, Ryusuke Ogawa (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ.) LOIS2024-5
In order to conduct implement security measures effectively, risk assessment is necessary to correctly analyze and evalu... [more] LOIS2024-5
pp.25-30
LOIS 2024-03-14
13:40
Okinawa Okinawa Pref Danjyo-Kyoudou-Sankaku Center (Okinawa, Online)
(Primary: On-site, Secondary: Online)
LOIS2023-64 Targeted attacks on specific organizations have become a significant issue due to their sophistication and the extensive... [more] LOIS2023-64
pp.96-101
LOIS, SITE, ISEC 2023-11-10
14:25
Hiroshima Satellite Campus Hiroshima (Hiroshima, Online)
(Primary: On-site, Secondary: Online)
A Proposed Link Key Hijacking Attack Using the Power-Saving Mode against Bluetooth BR/EDR
Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ISEC2023-70 SITE2023-64 LOIS2023-28
With the growing demand for Bluetooth devices, the power-saving mode of Bluetooth, which reduces the power consumption o... [more] ISEC2023-70 SITE2023-64 LOIS2023-28
pp.103-109
RCC, ISEC, IT, WBS 2023-03-15
14:15
Yamaguchi (Yamaguchi, Online)
(Primary: On-site, Secondary: Online)
Design of Adaptively Decodable Visual Secret Sharing Scheme on Background Color
Atsushi Marui, Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ) IT2022-138 ISEC2022-117 WBS2022-135 RCC2022-135
 [more] IT2022-138 ISEC2022-117 WBS2022-135 RCC2022-135
pp.445-450
LOIS, ICM 2023-01-20
10:55
Fukuoka Kitakyushu International Conference Center (Fukuoka, Online)
(Primary: On-site, Secondary: Online)
Displaying Maps on Smart Phone using two-dimensional code and its implementation
Rikuto Mitui (Kobe Univ), Yuto Murai, Shogo Nakajima, Yoshiaki Shiraishi, Masakatu Morii (Graduate school of Kobe Univ) ICM2022-42 LOIS2022-42
Generally, QR Codes contain a URL, and information is obtained by accessing the web server indicated by the URL. Therefo... [more] ICM2022-42 LOIS2022-42
pp.65-70
ICSS 2022-11-07
13:55
Hokkaido Hokkaido Jichiro Kaikan (Hokkaido, Online)
(Primary: On-site, Secondary: Online)
Blockchain-Based Cloud Storage Data Auditing Scheme for Identifying Data Provenance
Yuichi Kado (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ), Masakatu Morii (Kobe Univ.) ICSS2022-39
 [more] ICSS2022-39
pp.7-12
ICSS 2022-11-08
10:30
Hokkaido Hokkaido Jichiro Kaikan (Hokkaido, Online)
(Primary: On-site, Secondary: Online)
Design and Implementation of a Task Scheduler for Delaying Ransomware
Shuhei Enomoto (TUAT), Hiroki Kuzuno (Kobe Univ.), Hiroshi Yamada (TUAT), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2022-46
(To be available after the conference date) [more] ICSS2022-46
pp.49-54
ICSS 2022-11-08
10:55
Hokkaido Hokkaido Jichiro Kaikan (Hokkaido, Online)
(Primary: On-site, Secondary: Online)
An Efficient Method of Finding Flippable Bits for RAMBleed
Haruka Okuda (Kobe Univ.), Makoto Takita (Univ. of Hyogo), Kazuhide Fukushima, Yuto Nakano (KDDI Research, Inc.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2022-47
Rowhammer is an attack that repeatedly accesses the same row in DRAM (Dynamic Random Access Memory) to cause bit flippin... [more] ICSS2022-47
pp.55-60
ICM, LOIS 2021-01-21
17:50
Online Online (Online) Reproduction of Malware Behavior by Using Windows API Call Logs -- Support for Major Win32 APIs and State Restoration After the Reproduction --
Naoya Matsuda, Youji Fukuta (Kindai Univ.), Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICM2020-47 LOIS2020-35
The authors have been developing a prototype tool to reproduce of malware behavior by using Windows API call logs so th... [more] ICM2020-47 LOIS2020-35
pp.75-80
 Results 1 - 20 of 72  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan