|
|
All Technical Committee Conferences (Searched in: Recent 10 Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2024-11-21 14:00 |
Kanagawa |
MUZA Kawasaki Symphony Hall (Kanagawa) |
How to Utilize The LLVM Compiler Infrastructure for Self Destructive Tamper Resistant Software Kazuomi Oishi (SIST) ICSS2024-66 |
Self destructive tamper resistant software can protect program from analysis and attacks. After the concept was proposed... [more] |
ICSS2024-66 pp.1-7 |
ICSS |
2023-11-16 14:55 |
Ishikawa |
IT Business Plaza Musashi and Online (Ishikawa, Online) (Primary: On-site, Secondary: Online) |
A Study on Self Destructive Tamper Resistant Software utilizing Return-Oriented Programming (Part 3) Kazuomi Oishi (SIST) ICSS2023-55 |
Self destructive tamper resistant software (SDTRS) is a tamper resistance technology that can protect a program by itsel... [more] |
ICSS2023-55 pp.30-34 |
MSS, NLP |
2022-03-29 15:45 |
Online |
Online (Online) |
Proposal of work end time estimation technology using PC operation logs Rina Yamamoto, Yoshiyuki Sakamaki, Tadanobu Tsunoda, Junpei Yamaguchi, Hisashi Kojima (Fujitsu Ltd.) MSS2021-80 NLP2021-151 |
In conventional working style in offices, employees communicated each other in break time of work. However, it’s difficu... [more] |
MSS2021-80 NLP2021-151 pp.133-138 |
ICSS, IPSJ-SPT |
2022-03-08 10:40 |
Online |
Online (Online) |
A Study on Self Destructive Tamper Resistant Software utilizing Return-Oriented Programming (Part 2) Kazuomi Oishi (SIST) ICSS2021-69 |
Taking into account CPU-level ROP (Return-Oriented Programming) defenses such as Intel CET, we study implementation feas... [more] |
ICSS2021-69 pp.61-65 |
ISEC, WBS, IT |
2017-03-10 11:20 |
Tokyo |
TOKAI University (Tokyo) |
Software Protection by Hash-Table-Based Interlocking of Self Integrity Verification Naoki Watanabe, Naoki Yoshida, Tsutomu Matsumoto (YNU) IT2016-120 ISEC2016-110 WBS2016-96 |
In order to detect unauthorized modification, tamper-resistant software often adopts self integrity verification mechani... [more] |
IT2016-120 ISEC2016-110 WBS2016-96 pp.137-144 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|