IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 53  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS, IN
(Joint)
2022-03-10
10:20
Online Online Implementation and Evaluation of Real-Time Threat Detection System at the Network Edge
Kota Tsuchie, Nobuyuki Nakamura, Toshihiko Matsunaga, Taketsugu Yao (OKI) IN2021-31
Data leakages and malware infections from the network edge have become to a social issue. NDR is an expected technology ... [more] IN2021-31
pp.1-6
IN, IA
(Joint)
2021-12-17
18:25
Hiroshima Higashi-Senda campus, Hiroshima Univ.
(Primary: On-site, Secondary: Online)
[Short Paper] Developing vulnerability assessment system considering the severity
Yamakoshi Taiga, Tashima Koichi, Kondo Tohru, Watanabe Hidenobu, Kishiba Seigo, Nishimura Koji, Aibara Reiji (Hiroshima Univ.) IA2021-52
However, there are many points that need to be improved in order to effectively utilize the results of the vulnerability... [more] IA2021-52
pp.104-105
R 2021-11-30
13:25
Online Online Predicting Vulnerability Discovery Processes in Support Periods for an Operating System
Kento Kubota, Tadashi Dohi, Hiroyuki Okamura (Hiroshima Univ.) R2021-35
In this note, we classify the severity level of software vulnerabilities founded in Debian Linux Version 8.0, which is a... [more] R2021-35
pp.7-12
ICSS 2021-11-29
13:50
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Automation of Security Vulnerability Analysis by Auto-generated DFD
Shun Miyazaki, Junpei Kamimura (NEC) ICSS2021-48
System vulnerabilities can be caused by bugs such as buffer overflow, misconfigurations such as improper permission cont... [more] ICSS2021-48
pp.13-18
ICSS, IPSJ-SPT 2021-03-01
10:25
Online Online Construction of Vulnerability Evaluation System with Machine Learning Methods
Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota (KDDIR), Junpei Urakawa (KDS/KDDIR) ICSS2020-29
Recently, the cyberattacks aimed at software vulnerabilities are more popular and powerful. Therefore, various incidents... [more] ICSS2020-29
pp.19-24
CPSY, RECONF, VLD, IPSJ-ARC, IPSJ-SLDM [detail] 2021-01-26
15:05
Online Online Detection of Vulnerability Inducing Code Optimization Based on Binary Code
Yuka Azuma, Nagisa Ishiura (Kwansei Gakuin Univ.) VLD2020-65 CPSY2020-48 RECONF2020-84
In this paper, we propose a method to detect vulnerability inducing code elimination by compiler optimization. It is re... [more] VLD2020-65 CPSY2020-48 RECONF2020-84
pp.148-153
IN 2021-01-18
15:50
Online Online [Invited Talk] Risk Analysis Methods and Actual Conditions in Cyber Security
Kentaro Sonoda, Haruka Nakashima (NEC) IN2020-49
Risks in corporations mean business risks, and a cyber security (cyber attack) is positioned as one of the important bus... [more] IN2020-49
p.37
IA 2020-11-09
14:57
Hokkaido
(Primary: On-site, Secondary: Online)
Development and evaluation of efficient vulnerability scanning system for IoT networks
Kazusyoshi Watanabe, Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ) IA2020-19
In recent years, a security incident called DRDoS attack, which is a kind of DoS attack using reflections and amplificat... [more] IA2020-19
pp.7-12
IN, ICTSSL, NWS 2020-10-22
11:45
Online Online Vulnerability analysis of paths in backbone communication networks
Hiroya Kitagawa, Yukio Hayashi (JAIST) IN2020-31
Infrastructure networks such as communication networks are necessary in modern society. They become larger and more comp... [more] IN2020-31
pp.7-11
ICSS, IPSJ-SPT 2020-03-02
14:10
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
A Study on Fuzzing for Device Drivers with AddressSanitizer
Kentaro Ishii (Kove Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kove Univ.) ICSS2019-76
A device driver is a program which runs with higher privilege in an operating system. If a device driver is compromised,... [more] ICSS2019-76
pp.49-53
ICSS, IPSJ-SPT 2020-03-03
09:30
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Preliminary Study of WAF Signature Generation by Utilizing Real-time Information on the Web
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-84
Zero-day attacks and attacks based on publicly disclosed vulnerability information are one of the major threats in netwo... [more] ICSS2019-84
pp.97-102
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
09:55
Kochi Kochi University of Technology Implementation of gathering system configuration and design vulnerability assessment for zero-day attack countermeasure using vulnerability information
Motoki Kusume, Koji Kida, Keizo Saisho (Kagawa Univ.) ISEC2019-12 SITE2019-6 BioX2019-4 HWS2019-7 ICSS2019-10 EMM2019-15
The damage caused by zero day attack performed between the time vulnerabilities are found in the software and the time t... [more] ISEC2019-12 SITE2019-6 BioX2019-4 HWS2019-7 ICSS2019-10 EMM2019-15
pp.1-6
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
10:20
Kochi Kochi University of Technology Server Configuration Training Including Vulnerability Assessment and Remediation process
Daisuke Suzuki (Hokuriku Univ.) ISEC2019-44 SITE2019-38 BioX2019-36 HWS2019-39 ICSS2019-42 EMM2019-47
Penetration testing exercise as a part of the information security education for undergraduate students is effective on ... [more] ISEC2019-44 SITE2019-38 BioX2019-36 HWS2019-39 ICSS2019-42 EMM2019-47
pp.259-263
SANE 2018-08-24
11:10
Tokyo Electric Navigation Research Institute GPS Spoofing and Anti-Spoofing -- Demonstration of Prototype Systems --
Dinesh Manandhar, Ryosuke Shibasaki (Tokyo Univ.) SANE2018-36
GPS spoofing has become a new threat to GNSS applications and users. A GPS receiver can be easily spoofed by using a com... [more] SANE2018-36
pp.19-23
ASN, ICTSSL 2018-05-14
16:00
Hiroshima Hiroshima City Univ. [Special Talk] Security check for campus-wide network using vulnerability diagnosis software
Kenji Ishida, Susumu Idenoue (Hiroshima City Univ.) ICTSSL2018-6 ASN2018-6
Security management is important in operation and management of campus wide network. For this security management, it is... [more] ICTSSL2018-6 ASN2018-6
pp.29-33
ICSS, IPSJ-SPT 2018-03-08
12:00
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Analyzing web application vulnerability reports by machine learning
Takaaki Nagumo, Yuusuke Kubo, Yasuhiro Kobayashi, Wataru Hasegawa, Takahiro Hamada (NTT Com) ICSS2017-74
Web application vulnerability testing is important for preventing cyberattacks. However, it is difficult to test all URL... [more] ICSS2017-74
pp.139-144
ICSS 2017-11-20
14:15
Oita Beppu International Convention Center [Invited Talk] Case Study and Future Perspective on Security Assessment of Connected Car
Masaki Kamizono (PwC) ICSS2017-38
Various cyber security threats and vulnerabilities are reported in accordance with the remarkable rise of the connected ... [more] ICSS2017-38
pp.1-4
SSS 2017-08-22
13:00
Tokyo   Risk and Vulnerability Concerning Occupational Accidents Caused by Industrial Machines
Kyoko Hamajima, Shigeo Umezaki, Shoken Shimizu (JNIOSH) SSS2017-13
In the field of occupational safety, risks assessed for the users of machines and facilities may be residual risks. Such... [more] SSS2017-13
pp.1-4
NS, IN
(Joint)
2017-03-02
11:40
Okinawa OKINAWA ZANPAMISAKI ROYAL HOTEL A Study of Vulnerability of Campus-wide Information Communication Networks Considering Dependency on Power Distribution Networks
Yukio Ogawa (Muroran IT), Go Hasegawa, Masayuki Murata (Osaka Univ.) IN2016-104
Information communication networks depend on power delivery from power distribution networks. We therefore evaluate vuln... [more] IN2016-104
pp.43-48
ICSS, IPSJ-SPT 2016-03-03
13:10
Kyoto Academic Center for Computing and Media Studies, Kyoto University An Actual Survey on Web Scanning by URI Co-occurrence Detection
Yang Zhong, Shingo Orihara, Masaki Tanikawa (NTT), Hajime Shimada, Tutomu Murase (Nagoya Univ), Hiroki Takakura (NII), Yoshihito Oshima (NTT) ICSS2015-51
Attackers often try to scan vulnerable servers before actual attacks.
Detecting vulnerability scans previously is effec... [more]
ICSS2015-51
pp.25-30
 Results 1 - 20 of 53  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan