Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 13:25 |
Hokkaido |
Sapporo Convention Center (Hokkaido) |
Survey of OSS vulnerabilities in router firmware using an SCA tool Momoka Kihara, Sasaki Takayuki, Katsunari Yoshioka (Yokohama National Univ.) ISEC2024-17 SITE2024-14 BioX2024-27 HWS2024-17 ICSS2024-21 EMM2024-23 |
In recent years, cyber attacks targeting vulnerabilities in IoT devices have become widespread, and responses to these v... [more] |
ISEC2024-17 SITE2024-14 BioX2024-27 HWS2024-17 ICSS2024-21 EMM2024-23 pp.58-65 |
R |
2021-11-30 13:25 |
Online |
Online (Online) |
Predicting Vulnerability Discovery Processes in Support Periods for an Operating System Kento Kubota, Tadashi Dohi, Hiroyuki Okamura (Hiroshima Univ.) R2021-35 |
In this note, we classify the severity level of software vulnerabilities founded in Debian Linux Version 8.0, which is a... [more] |
R2021-35 pp.7-12 |
CPSY, RECONF, VLD, IPSJ-ARC, IPSJ-SLDM [detail] |
2021-01-26 15:05 |
Online |
Online (Online) |
Detection of Vulnerability Inducing Code Optimization Based on Binary Code Yuka Azuma, Nagisa Ishiura (Kwansei Gakuin Univ.) VLD2020-65 CPSY2020-48 RECONF2020-84 |
In this paper, we propose a method to detect vulnerability inducing code elimination by compiler optimization. It is re... [more] |
VLD2020-65 CPSY2020-48 RECONF2020-84 pp.148-153 |
ASN, ICTSSL |
2018-05-14 16:00 |
Hiroshima |
Hiroshima City Univ. (Hiroshima) |
[Special Talk]
Security check for campus-wide network using vulnerability diagnosis software Kenji Ishida, Susumu Idenoue (Hiroshima City Univ.) ICTSSL2018-6 ASN2018-6 |
Security management is important in operation and management of campus wide network. For this security management, it is... [more] |
ICTSSL2018-6 ASN2018-6 pp.29-33 |
ISEC |
2015-09-04 11:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Tokyo) |
An extension of cryptographic protocol in distributed in-memory caching system Ruo Ando (NICT) ISEC2015-28 |
Recent distributed system adopts object caching subsystem in order to achieve scalability. In many cases, its transactio... [more] |
ISEC2015-28 pp.21-26 |
R |
2010-05-28 16:35 |
Tottori |
(Tottori) |
Security evaluation of software system with security patch maintenance Masataka Tokuzane, Hiroyuki Okamura, Tadashi Dohi (Hiroshima Univ.) R2010-16 |
This paper proposes software security criterion based
on a stochastic model. Especially we consider the software syste... [more] |
R2010-16 pp.55-60 |
R |
2008-05-30 15:00 |
Hyogo |
Kobe Gakuin Univ. (Hyogo) |
Quantitative Security Analysis of an IMS-based VoIP Network System Toshikazu Uemura, Tadashi Dohi, Naoto Kaio (Hiroshima Univ.) R2008-12 |
In multimedia wireless networks, the VoIP (voice of internet protocol) technology is commonly used to compress the voice... [more] |
R2008-12 pp.19-24 |
SS |
2008-03-04 09:55 |
Nagasaki |
Nagasaki Univ. (Nagasaki) |
A Proposal of The Secure Software Engineering Noriaki Saito, Satoshi Oda, Toshiyuki Miyazawa, Sakae Chikara, Toru Kawamura, Atsushi Kanai (NTT) SS2007-71 |
At the recent software design and development, a necessity of the security is increasing, though a developing term is sh... [more] |
SS2007-71 pp.85-90 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 16:10 |
Hokkaido |
Future University-Hakodate (Hokkaido) |
Evaluation of a library against injection attacks Takao Okubo (Fujitsu Labs./IISEC), Hidehiko Tanaka (IISEC) |
Injection vulnerabilities, which enable attacks done by injecting command string into input data, have big percentage of... [more] |
ISEC2007-41 SITE2007-35 pp.177-184 |