Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS |
2024-03-14 13:40 |
Okinawa |
Okinawa Pref Danjyo-Kyoudou-Sankaku Center (Primary: On-site, Secondary: Online) |
LOIS2023-64 |
Targeted attacks on specific organizations have become a significant issue due to their sophistication and the extensive... [more] |
LOIS2023-64 pp.96-101 |
ICSS, IPSJ-SPT |
2022-03-08 15:30 |
Online |
Online |
Verifying concept of personalized malware by investigating end-user environments Daigo Ichikawa, Rui Tanabe, XU Haoyuan, Yoshioka Katsunari, Matsumoto Tsutomu (YNU) ICSS2021-83 |
Personalized malware conducts malicious activities only when it is running on the target environment. Previous studies h... [more] |
ICSS2021-83 pp.147-152 |
ICSS, IPSJ-SPT |
2021-03-02 10:25 |
Online |
Online |
Proof of concept of sandbox evasion attack using email address stored in target machine Yuta Inoue, Rui Tanabe (YNU), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-57 |
In recent years, malware sandbox appliances that dynamically analyze target files are becoming popular. However, malware... [more] |
ICSS2020-57 pp.184-189 |
ICSS |
2018-11-21 16:05 |
Kagoshima |
|
[Invited Talk]
Security Countermeasure at ShowNet in Interop Tokyo 2018 Kenichiro Hashimoto (Lastline), Masato Jingu (NICT), Takashi Tomine (lepidum) ICSS2018-59 |
Cyber attacks become emerging threats on the Internet.We held an exhibition in ICT called Interop Tokyo every June. In t... [more] |
ICSS2018-59 p.37 |
NS, IN (Joint) |
2018-03-01 09:20 |
Miyazaki |
Phoenix Seagaia Resort |
A distributed security gateway scheme for preventing advanced targeted attacks by cooperated multiple hosts Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-90 |
Recently, cyber attacks that targeting enterprises become serious.The majority of the damage is information leakage.As a... [more] |
IN2017-90 pp.5-10 |
RCS, IN, NV (Joint) |
2017-05-12 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Distributive Analyzing Scheme of Host Operation for Blocking Information Leakage from an Intranet Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-5 |
Recently, damage by targeted attacks is getting worse. These attacks leak corporate information. For preventing such lea... [more] |
IN2017-5 pp.21-24 |
ICSS, IPSJ-SPT |
2017-03-14 11:20 |
Nagasaki |
University of Nagasaki |
Graph based Detection of Advanced Persistent Threat on LAN Hiroki Nagayama, Bo Hu, Takaaki Koyama, Jun Miyoshi (NTT) ICSS2016-65 |
Recently the countermeasures against continuously increasing Advanced Persistent Threats(APT) are urgently necessary.
I... [more] |
ICSS2016-65 pp.153-158 |
IA, IN (Joint) |
2016-12-16 13:20 |
Hiroshima |
Hiroshima city university |
A Study of Resilient Cyber Defense and Network Monitoring System with Exit Measures Koji Sato, Yuji Sekiya (Univ. of Tokyo) IN2016-82 |
Data leakage due to targeted threat is a big problem. Targeted threat are characterized by repeating various attacks aga... [more] |
IN2016-82 pp.91-96 |
IA, ICSS |
2015-06-12 10:30 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Experimental Results on an Attack Detection System for Advanced Persistent Threats Kenichiro Muto, Yasuhiro Okumura, Shinya Kuramoto, Hidemori Ikeda, Mitsuhiro Hatada, Takayuki Watanabe (NTT Communications), Tohru Sato, Kazufumi Aoki (NTT), Junichi Murakami, Kazuyuki Iso, Yasuhiro Kunda (FFRI), Toshio Nawa, Mai Kiuchi (CDI) IA2015-9 ICSS2015-9 |
In this paper, we proposed an attack detection system, which is a component of the model a security model against advanc... [more] |
IA2015-9 ICSS2015-9 pp.45-50 |
IA |
2014-10-07 16:55 |
Osaka |
Grand Front OSAKA Tower-B 10F |
Recent cyber attack methodology and protection
-- The Consideration based on Interop Tokyo 2014 ShowNet Security -- Ken Hashimoto (FireEye), Takashi Tomine (NICT), Yuji Sekiya (Univ. of Tokyo) IA2014-33 |
In social activities and daily life, a share of activities from the Internet has been gotten higher. Due to that changes... [more] |
IA2014-33 pp.51-56 |
ICSS, IPSJ-SPT |
2014-03-28 11:15 |
Okinawa |
Meio Univiersity |
Timeline-Based Event Log Viewer over Multi-Host Environment Takashi Tomine, Yu Tsuda, Masaki Kamizono (NICT), Kazunori Sugiura (Keio Univ.), Daisuke Inoue, Koji Nakao (NICT) ICSS2013-79 |
A cyber attacking becomes clever and complicated.
Recently the number of Advanced Persistent Threat (APT) attacks to ge... [more] |
ICSS2013-79 pp.125-130 |