Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, SITE, LOIS |
2022-11-18 16:55 |
Online |
Online |
Reducing Authentication Data Size in Decentralized Blacklistable Anonymous Credential System Using DualRing Atsuki Iriboshi, Toru Nakanishi, Katsunobu Imai (Hiroshima Univ.) ISEC2022-44 SITE2022-48 LOIS2022-28 |
For privacy protection, blacklistable anonymous credential systems have been proposed, where a user is authenticated wit... [more] |
ISEC2022-44 SITE2022-48 LOIS2022-28 pp.85-91 |
IE, IMQ, MVE, CQ (Joint) [detail] |
2020-03-06 11:05 |
Fukuoka |
Kyushu Institute of Technology (Cancelled but technical report was issued) |
Analyzing Effectiveness of Blacklisting Policy Focusing on ON/OFF Pattern of Scan Activities Takashi Fujita, Naoki Fukushi, Masato Uchida (Waseda Univ.) CQ2019-151 |
A blacklist registers IP addresses and domain names found to be involved in malicious activity. Blacklist providers set ... [more] |
CQ2019-151 pp.87-92 |
NS, IN (Joint) |
2018-03-01 09:20 |
Miyazaki |
Phoenix Seagaia Resort |
A distributed security gateway scheme for preventing advanced targeted attacks by cooperated multiple hosts Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-90 |
Recently, cyber attacks that targeting enterprises become serious.The majority of the damage is information leakage.As a... [more] |
IN2017-90 pp.5-10 |
ISEC, COMP |
2017-12-21 16:15 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
Blacklistable Anonymous Credential System with Reputation Using Accumulator Takeshi Kanatani, Toru Nakanishi (Hiroshima Univ.) ISEC2017-81 COMP2017-35 |
Conventional anonymous authentication such as group signature has a problem that the ID administrator can specify the au... [more] |
ISEC2017-81 COMP2017-35 pp.59-65 |
RCS, IN, NV (Joint) |
2017-05-12 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Distributive Analyzing Scheme of Host Operation for Blocking Information Leakage from an Intranet Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-5 |
Recently, damage by targeted attacks is getting worse. These attacks leak corporate information. For preventing such lea... [more] |
IN2017-5 pp.21-24 |
COMP, ISEC |
2016-12-21 09:30 |
Hiroshima |
Hiroshima University |
Improvements of Blacklistable Anonymous Credential System Using Accumulator Yuu Aikou, Toru Nakanishi (Hiroshima Univ) ISEC2016-70 COMP2016-31 |
In current ID-based user authentication schemes, privacy issues may occur, since users’ behavior histories are collected... [more] |
ISEC2016-70 COMP2016-31 pp.1-7 |
LOIS, ISEC, SITE |
2015-11-06 16:45 |
Kanagawa |
Kanagawa Univ. |
Reducing Authentication Time in Blacklistable Anonymous Credential System Using Accumulator Yuu Aikou, Toru Nakanishi (Hiroshima Univ) ISEC2015-47 SITE2015-34 LOIS2015-41 |
In current ID-based user authentication schemes, privacy issues may occur, since users' behavior histories are collected... [more] |
ISEC2015-47 SITE2015-34 LOIS2015-41 pp.75-80 |
IA, ICSS |
2015-06-12 10:50 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Detecting Malicious Domain Names based on the Time-series Analysis of Attackers Network Resources Daiki Chiba (NTT/Waseda Univ.), Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeshi Yada, Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-10 ICSS2015-10 |
Attackers launching cyber attacks frequently change their malicious websites to evade countermeasures such as blacklisti... [more] |
IA2015-10 ICSS2015-10 pp.51-56 |
ICSS |
2014-11-28 11:10 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
searching malicious URL from vast webspace Bo Sun (Waseda Univ.), Mitsuaki Akiyama, Takeshi Yagi (NTT), Tatsuya Mori (Waseda Univ.) ICSS2014-61 |
Many Web-based attacks such as Drive-by-download and phishing scam
are easily triggered by accessing landing page URL.... [more] |
ICSS2014-61 pp.61-66 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 13:50 |
Hokkaido |
San-Refure Hakodate |
A Case Study on Light-weight URL Blacklist Generation based on Sandbox Analysis Mitsuhiro Hatada, Takanori Inazumi, Jun Arikawa, Yasuyuki Tanaka (NTT Communications) ISEC2014-44 SITE2014-39 ICSS2014-48 EMM2014-44 |
In order to detect the malware infection in internal network, we focus on HTTP traffic to the Internet. URL blacklist is... [more] |
ISEC2014-44 SITE2014-39 ICSS2014-48 EMM2014-44 pp.309-314 |
ICSS, IPSJ-SPT |
2014-03-28 12:05 |
Okinawa |
Meio Univiersity |
Identifying C&C Server by Analyzing Relation between Control Flow and Communications Tomonori Ikuse, Kazufumi Aoki, Takeo Hariu (NTT) ICSS2013-81 |
In recent years, it is difficult to prevent malware infection entirely because of the diversication of attack vectors a... [more] |
ICSS2013-81 pp.137-142 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 11:55 |
Nara |
Todaiji Total Cultural Center |
A proposal of implementation template to facilitate development of Collaborative Intrusion Detection System Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) SITE2012-52 IA2012-90 |
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] |
SITE2012-52 IA2012-90 pp.43-48 |
IA |
2012-11-19 17:10 |
Fukushima |
Kanponoyado Iwaki (Fukushima) |
Consideration of Peer-to-peer Architecture for Collaborative Intrusion Detection Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2012-56 |
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] |
IA2012-56 pp.23-28 |
IN, RCS (Joint) |
2012-05-17 15:50 |
Tokyo |
Kuramae-Kaikan, Tokyo Institute of Technology |
[Invited Talk]
Design of a blacklisting system for Countermeasures against Malware Infection Takeshi Yagi (NTT) IN2012-16 RCS2012-30 |
With the widespread use of the Internet, the number of security problems, such as phishing and spam, continues to steadi... [more] |
IN2012-16 RCS2012-30 pp.25-30(IN), pp.49-54(RCS) |
IN, MoNA (Joint) |
2010-11-18 14:50 |
Fukuoka |
Fukuoka Institute of Technology |
Architecture Design of Web Phantom: Hybrid Web Honeypot Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT) IN2010-85 |
This paper proposes a hybrid web honeypot, namely Web Phantom, which generates a blacklist to prevent malware infection ... [more] |
IN2010-85 pp.25-30 |
ICSS |
2010-11-05 16:00 |
Hiroshima |
Hiroshima City University |
Determining granularity of URL filtering based on tree structure of malicious website URL Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh (NTT) ICSS2010-53 |
A network administrator takes a measure based on the blacklist to prevent end users from accessing unwanted malicious we... [more] |
ICSS2010-53 pp.53-58 |
IT |
2010-01-08 14:50 |
Overseas |
Univ. of Hawaii |
Performance analysis of the blacklist scheme for collusion-secure code Yoshinobu Iriguchi, Brian Kurkoski, Kazuhiko Yamaguchi (Univ. of Electro-Comm.) IT2009-68 |
We have proposed a scheme for collusion-secure code which utilizes a blacklist of colluders in order to improve efficien... [more] |
IT2009-68 pp.93-98 |
ICSS |
2009-11-13 13:55 |
Miyazaki |
University of Miyazaki |
Web Tracking Site Detection and Blacklist Generation Based on Temporal Link Analysis Akira Yamada (KDDI R&D Labs. Inc.,), Masanori Hara (KDDI Corp.), Yutaka Miyake (KDDI R&D Labs. Inc.,), Kazuo Hashimoto (Tohoku Univ.) ICSS2009-58 |
Web tracking sites or Web bugs are potential but serious threats to users' privacy during Web browsing. Web sites and th... [more] |
ICSS2009-58 pp.25-30 |
IA, ICSS |
2009-06-18 11:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
A Study on effective usage of the URL Blacklists Takahiro Matsuki, Yuu Arai (LAC) IA2009-4 ICSS2009-12 |
In these days, various menaces are increasing in the Web. The web-based malware infection become the mainstream. Many we... [more] |
IA2009-4 ICSS2009-12 pp.19-23 |
IT |
2008-07-24 15:40 |
Chiba |
University of Tokyo, Kashiwa Campus |
A usage of collusion-secure codes to enhance their trace back rates Yoshinobu Iriguchi, Kazuhiko Yamaguchi (UEC) IT2008-14 |
Collusion-secure codes are one of countermeasures against collusion attacks, a severe problem in digital fingerprinting.... [more] |
IT2008-14 pp.33-38 |