Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-21 11:20 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Analyzing Attackers and Victims Actions via LockBit3.0 Website Data Dynamics Yuji Sekine, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-70 |
LockBit3.0 is one of the top ransomware groups that has been active since July 2022, targeting over 1,000 companies. In ... [more] |
ICSS2023-70 pp.9-16 |
ICSS, IPSJ-SPT |
2024-03-22 11:45 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Impact of ChatGPT Assisted Polymorphic Malware on Antivirus Detection Huang Zhewei, Yinn Minn Pa pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-89 |
With the rapid implementation of large-scale language models (LLMs), there are concerns about their misuse in cyberattac... [more] |
ICSS2023-89 pp.145-152 |
RCC, ISEC, IT, WBS |
2024-03-14 09:30 |
Osaka |
Osaka Univ. (Suita Campus) |
A Study on Malicious Communication Detection Using Attack Characteristics of Malware on an Internal Network. Ken Aono, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95 |
Recently, targeted attacks have been increasing.
Malicious attackers use malware to gain access to the organization's ... [more] |
IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95 pp.249-253 |
RCC, ISEC, IT, WBS |
2024-03-14 09:55 |
Osaka |
Osaka Univ. (Suita Campus) |
Comparison of accuracy of classification methods using machine learning for imaged malware Kenta Usui, Hiroki Tanioka, Masahiko Sano, Kenji Matsuura, Tetsushi Ueta (Tokushima Univ.) IT2023-114 ISEC2023-113 WBS2023-102 RCC2023-96 |
In recent years, the damage caused by malware has become more serious, and the increase in the number of variants of exi... [more] |
IT2023-114 ISEC2023-113 WBS2023-102 RCC2023-96 pp.254-258 |
RCC, ISEC, IT, WBS |
2024-03-14 10:20 |
Osaka |
Osaka Univ. (Suita Campus) |
Improving classification accuracy of imaged malware through data expansion Kaoru Yokobori, Hiroki Tanioka, Masahiko Sano, Kenji Matsuura, Tetsushi Ueta (Tokushima Univ.) IT2023-115 ISEC2023-114 WBS2023-103 RCC2023-97 |
Although malware-based attacks have existed for years,
malware infections increased in 2019 and 2020.
One of the reaso... [more] |
IT2023-115 ISEC2023-114 WBS2023-103 RCC2023-97 pp.259-264 |
IA, SITE, IPSJ-IOT [detail] |
2024-03-12 16:00 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
Improvement of Unknown Malicious Domain Detection Based on DNS Query History Analysis Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech) SITE2023-83 IA2023-89 |
Network users are increasing and there is concern about the malware infection.
In some cases, malware-infected terminal... [more] |
SITE2023-83 IA2023-89 pp.92-97 |
NS, IN (Joint) |
2024-03-01 13:50 |
Okinawa |
Okinawa Convention Center |
Evaluation experiment on a route server function for maintaining dynamic routes in metabolic routers Yuya Suga, Hiroki Saruta, Rei Ishioka, Junichi Murayama (Tokai Univ.) IN2023-112 |
As a measure against malware infecting routers, we are studying metabolic routers. This router can delete even undetecta... [more] |
IN2023-112 pp.279-282 |
MIKA (3rd) |
2023-10-10 15:35 |
Okinawa |
Okinawa Jichikaikan (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Two-Stage Malware Detection Using Calling API Sequences Kohei Tsunewaki, Tomotaka Kimura, Jun Cheng (Doshisha Univ.) |
We propose a two-step malware detection method based on intrinsic features of calling API (Application Programming Inter... [more] |
|
IA |
2023-09-21 14:15 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Studies on Malicious Domain Detection Method based on Feature of DNS Communication History by using DNS Traffic Analysis Toshiki Koga, Daiki Nobayashi, Takeshi Ikenaga (KIT) IA2023-12 |
Malware on the Internet is causing increasing damage, and countermeasures are needed. In some cases, malware-infected te... [more] |
IA2023-12 pp.6-10 |
NS, IN, CS, NV (Joint) |
2023-09-07 14:30 |
Miyagi |
Tohoku University (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
Approximate modeling of malware propagation on wireless mobile devices Hideyoshi Miura, Shoya Abukawa (Kansai Univ.), Tomotaka Kimura (Doshisha Univ.), Kouji Hirata (Kansai Univ.) NS2023-52 |
In this paper, we propose an approximate epidemic model representing the behavior of malware propagation on mobile devic... [more] |
NS2023-52 pp.7-12 |
RCS, IN, NV (Joint) |
2023-05-25 10:00 |
Kanagawa |
Keio University (Hiyoshi Campus), and online (Primary: On-site, Secondary: Online) |
Designing a suppressing scheme of spreading malware infection within a metabolic router Rei Ishioka, Haruto Hirose, Junichi Murayama (Tokai Univ.) IN2023-1 |
As a countermeasure against malware infection on routers, we have been studying a metabolic-type router. Inside this rou... [more] |
IN2023-1 pp.1-4 |
ICSS, IPSJ-SPT |
2023-03-14 13:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Assessment Method for Persistent Malware Infection on IoT Devices Shunki Soeda, Takahiro Inoue, Rui Tanabe, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-78 |
Malware targeting IoT devices has become a growing threat in recent years. Some of them continue to infect devices perma... [more] |
ICSS2022-78 pp.181-186 |
IA |
2022-11-21 16:20 |
Niigata |
Bandai Civic Hall (Niigata) (Primary: On-site, Secondary: Online) |
Outsourcing Malware Dynamic Analysis without Disclosing File Contents Keisuke Hamajima, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2022-44 |
Malware dynamic analysis requires specialized skills. If there are no security experts in the organization and it is dif... [more] |
IA2022-44 pp.47-51 |
RISING (3rd) |
2022-10-31 14:00 |
Kyoto |
Kyoto Terrsa (Day 1), and Online (Day 2, 3) |
[Poster Presentation]
Machine Learning Analyze for Undiscovered Malicious Domain Detection by using DNS Query Analysis Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech) |
Network users is increasing in recently and there is concern about the malware infection.
Malware exist various types a... [more] |
|
R |
2022-10-07 14:50 |
Fukuoka |
(Primary: On-site, Secondary: Online) |
A Note on A Transformer Encoder-Based Malware Classification Using API Calls Chen Li (Kyutech), Junjun Zheng (Osaka Univ.) R2022-36 |
Malware is a major security threat to computer systems and significantly impacts system reliability. Recurrent neural ne... [more] |
R2022-36 pp.25-30 |
NS |
2022-10-05 16:40 |
Hokkaido |
Hokkaidou University + Online (Primary: On-site, Secondary: Online) |
Modeling of malware diffusion with mobile devices in intermittently connected networks Hideyoshi Miura, Syoya Abukawa (Kansai Univ.), Tomotaka Kimura (Doshisha Univ.), Kouji Hirata (Kansai Univ.) NS2022-86 |
In this paper, we introduce an epidemic model of malware with mobile devices in intermittently connected networks. In re... [more] |
NS2022-86 pp.24-28 |
IA, ICSS |
2022-06-23 14:30 |
Nagasaki |
Univ. of Nagasaki (Primary: On-site, Secondary: Online) |
Discussion about improving a detection accuracy of malware variants using time series differences in latent representation. Atsushi Shinoda, Hajime Shimada, Yukiko Yamaguti (Nagoya Univ.), Hirokazu Hasegawa (NII) IA2022-4 ICSS2022-4 |
Today, computers are used for various purposes to support people's daily lives. Therefore, the existence of malware that... [more] |
IA2022-4 ICSS2022-4 pp.19-24 |
IA, ICSS |
2022-06-24 11:50 |
Nagasaki |
Univ. of Nagasaki (Primary: On-site, Secondary: Online) |
Studies on Blacklists based DNS Query Analysis for Malicious Domain Detection Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (Kyutech) IA2022-14 ICSS2022-14 |
Malware infection of network users is one of the critical threats on the Internet. Users have a risk of being infected w... [more] |
IA2022-14 ICSS2022-14 pp.76-80 |
ICSS, IPSJ-SPT |
2022-03-08 13:20 |
Online |
Online |
Analyzing network status of IoT malware by dynamic analysis with bare-metal device Kota Ogawa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2021-74 |
In this study, we first investigate the network state changes caused by IoT malware infection by executing malware sampl... [more] |
ICSS2021-74 pp.93-98 |
ICSS, IPSJ-SPT |
2022-03-08 13:40 |
Online |
Online |
ML-based detection of C&C communications for sandbox analysis of IoT malware Yuki Endo, Kaichi Sameshima, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2021-75 |
In order to analyze the behavior of malware, dynamic analysis has been widely utilized. Among various communication of m... [more] |
ICSS2021-75 pp.99-104 |