IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev ICSS Conf / Next ICSS Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Information and Communication System Security (ICSS) [schedule] [select]
Chair Hiroaki Kikuchi (Meiji Univ.)
Vice Chair Yutaka Miyake (KDDI R&D Labs.), Takashi Nishide (Univ. of Tsukuba)
Secretary Yoshiaki Shiraishi (Kobe Univ.), Takeshi Ueda (Mitsubishi Electric)
Assistant Hiroki Takakura (Nagoya Univ.), Katsunari Yoshioka (Yokohama National Univ.)

Conference Date Tue, Mar 3, 2015 13:00 - 18:20
Wed, Mar 4, 2015 09:00 - 16:20
Topics Communication Security, etc. 
Conference Place Meio University 
Address 1220-1 Biimata, Nago City, Okinawa Japan.
Transportation Guide http://www.meio-u.ac.jp/access.html
Contact
Person
0980-51-1100
Announcement Please join the reception banquet.
2015/3/3 19:00-
Restaurant Name: Kaisen Shijo
http://r.gnavi.co.jp/6p4utj100000/
TEL: 0980-54-1216
5 mins drive from the workshop venue.
Charge: 3,500 yen
Please email y if you would like to join the banquet.

Tue, Mar 3 PM 
13:00 - 14:40
(1) 13:00-13:25 A detection system which uses DNS traffic features to detect domains which are related to botnets Wataru Tsuda, Youki Kadobayashi, Takeshi Okuda, Hiroaki Hazeyama (NAIST)
(2) 13:25-13:50 Anomaly Detection Based on Clustering of Network Traffic Characteristics Considering Results of Signature Based IDS Evaluation Kohei Imai, Shigeki Aoki, Takao Miyamoto (Osaka Prefecture Univ.)
(3) 13:50-14:15 Measures to Prevent Cyber-Attack Using Multi-Layer-Binding (MLB) Router
-- A Proposal of Dropping Request Protocol, and its Implementation and Evaluation Using OpenFlow --
Ken Eguchi, Shota Nagatomo, Yuji Yokoyama, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno (Tokyo Denki Univ.), Hiroshi Kobayashi (Tokyo Denki Univ)
(4) 14:15-14:40 Implementation and Evaluation of Botnet Detection System with Temporal Locality of DGA Teppei Fukuda, Tomohiro Ishihara (UTokyo), Akira Kato (Keio Univ.)
  14:40-14:50 Break ( 10 min. )
Tue, Mar 3 PM 
14:50 - 16:05
(5) 14:50-15:15 A trial of network security tests over federated testbeds Masatoshi Enomoto, Hiroaki Hazeyama (NAIST), Kazumasa Kobayashi (KUSA), Suguru Yamaguchi (NAIST)
(6) 15:15-15:40 A Pluggable and Programmable Flamework for Analyzing Security Logs Yu Tsuda, Takashi Tomine, Masaki Kamizono, Masashi Eto, Daisuke Inoue (NICT)
(7) 15:40-16:05 A Study on the Effectiveness of Correlation Analysis of Cyber Attack Information by means of Tagging Technique Taichi Hata (JDC/Nissin), Manabu Inuma (Josai Univ.), Junji Shikata (Yokohama National Univ.), Shin Takeuchi (JDC/Nissin), Koji Nakao (NICT)
  16:05-16:15 Break ( 10 min. )
Tue, Mar 3 PM 
16:15 - 17:30
(8) 16:15-16:40 Link Structural Analysis of Drive-by-Download Attacks Yuji Dairiki (Kobe Univ.), Masaki Kamizono (SecureBrain), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.)
(9) 16:40-17:05 Implementation and evaluation of Drive by Download Attack detection using the features of the obfuscation Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama (NAIST), Takuji Iimura (UT), Youki Kadobayashi (NAIST)
(10) 17:05-17:30 A Study on CAPTCHA System Using Differential Awkwardness-Objects Michitomo Yamguchi (Meiji Univ.), Takeshi Okamoto (Tsukuba Univ. of Tech.), Hiroaki Kikuchi (Meiji Univ.)
  17:30-17:40 Break ( 10 min. )
Tue, Mar 3 PM 
17:40 - 18:20
(11) 17:40-18:20 [Invited Talk]
Cyber Security Management
Koji Nakao (NICT/KDDI)
Wed, Mar 4 AM 
09:00 - 10:15
(12) 09:00-09:25 Novel USB Hub against the Malicious USB Devices Tatsuya Takehisa (NICT/Nissin), Makoto Iwamura (NICT/NTT), Hayato Ushimaru (NICT/CDI), Daisuke Inoue (NICT)
(13) 09:25-09:50 Yet Another Electrical Forgery Attack on CAN using Strong Recessive Takeshi Sugawara, Minoru Saeki, Manabu Misawa (Mitsubishi Electric Corp.)
(14) 09:50-10:15 A study on the safety of the pseudo-random number generator in RFID Hiroyuki Sato (JAIST), Atsuko Miyaji (JAIST/JST CREST), Chunhua Su (JAIST)
Wed, Mar 4 AM 
09:00 - 10:15
(15) 09:00-09:25 A New Explicit Relation Between Trace, Definition Field, and Embedding Degree Atsuko Miyaji, Satoru Tanaka (JAIST)
(16) 09:25-09:50 Scalar Multiplication Algorithm with Resistance for Side-channel Attacks Keisuke Kito (JAIST), Atsuko Miyaji (JAIST/JST CREST), Ryota Takahashi (JAIST)
(17) 09:50-10:15 An Estimation of Signature Schemes for Multiple Signers Kenta Muranaka, Naoto Yanai (Osaka Univ.), Shingo Okamura (NITNC), Toru Fujiwara (Osaka Univ.)
  10:15-10:25 Break ( 10 min. )
Wed, Mar 4 AM 
10:25 - 12:30
(18) 10:25-10:50 Estimation of Vulnerability Score based on Annual Analysis with Supervised Latent Dirichlet Allocation Yasuhiro Yamamoto, Daisuke Miyamoto, Masaya Nakayama (Tokyo Univ.)
(19) 10:50-11:15 Prediction of Malware Activities based on Loopback Address from DNS Masaki Kamizono (NICT/SecureBrain), Takashi Tomine, Yu Tsuda, Masashi Eto (NICT), Yuji Hoshizawa (Securebrain Corporation), Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (ynu)
(20) 11:15-11:40 A Cyber Attack Information Gathering Method That Adopts Integrated Malware Detection Service and Dynamic Analysis Shuta Morishima, Takuya Tsutsumi, Rui Tanabe, Yusuke Takahashi, Masaaki Kobayashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
(21) 11:40-12:05 Internet Alive Monitoring Method around Disaster Areas Using Large-scale Darknet, Autonomous System Information, and Geographical Information Mio Suzuki (NICT), Jumpei Shimamura (Clwit), Junji Nakazato, Daisuke Inoue, Masashi Eto, Koji Nakao (NICT)
(22) 12:05-12:30 Finding Network Address Blocks Intensively Used for Cyber Attacks Takuya Tsutsumi, Shuta Morishima, Shogo Suzuki, Kenichi Shibahara, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
  12:30-13:40 Lunch Break ( 70 min. )
Wed, Mar 4 AM 
10:25 - 12:05
(23) 10:25-10:50 Improving certificate validation function in SSL/TLS implementations of web browser Satoshi Kamekawa (JAIST), Atsuko Miyaji (JAIST/JST CREST), Yuichi Futa (JAIST)
(24) 10:50-11:15 New Linear Correlations and Analysis Method for Key Recovery Attack of RC4 in WPA Daiki Michihiro (JAIST), Atsuko Miyaji (JAIST/JST CREST), Ryoma Ito (JAIST)
(25) 11:15-11:40 A Multi-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme For Line Topology Hitoshi Miyazaki (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.)
(26) 11:40-12:05 Consideration for Path Authentication for VANET with Group One-Way Cross-Networks Shoma Kitayama, Masakazu Soshi (Hiroshima City Univ.)
  12:05-13:40 Lunch Break ( 95 min. )
Wed, Mar 4 PM 
13:40 - 14:55
(27) 13:40-14:05 The Geographical Origin Estimation of Malware Using Language Information Masaru Kawakita, Shigeyoshi Shima (NEC)
(28) 14:05-14:30 Targeted Malware Detection Focused on Dummy Document Display Yusuke Takahashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
(29) 14:30-14:55 Visualization of Various DoS Attacks Observed by Malware Sandbox Analysis Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
Wed, Mar 4 PM 
13:40 - 14:55
(30) 13:40-14:05 Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.)
(31) 14:05-14:30 A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function Koji Tomida (Nagoya Inst. of Tech.), Hiroshi Doi (IISEC), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.)
(32) 14:30-14:55 Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data Takeru Naruse (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.)
  14:55-15:05 Break ( 10 min. )
Wed, Mar 4 PM 
15:05 - 16:20
(33) 15:05-15:30 Understanding Android apps that are similar to legitimate ones Yuta Ishii, Takuya Watanabe (Waseda Univ.), Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.)
(34) 15:30-15:55 A Study on Risk Quantification Techniques for Android Applications with Category Information Takeshi Takahashi (NICT), Takao Mimura, Masata Nishida (SecureBrain), Koji Nakao (NICT)
(35) 15:55-16:20 Evaluation on Malware Classification by Combining Traffic Analysis and Fuzzy Hashing of Malware Binary Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.)
Wed, Mar 4 PM 
15:05 - 16:20
(36) 15:05-15:30 A Message authentication scheme with variable-length MAC Yumiko Murakami, Nobuhiro Kobayashi (MELCO)
(37) 15:30-15:55 Flexible Constructions of Hash Chains and Their Key Generation Shouki Nishiyama, Masakazu Soshi (Hiroshima City Univ.)
(38) 15:55-16:20 An Experimental Implementation of Self Destructive Tamper Resistant Software and Its Evaluation Kazuomi Oishi (SIST), Naoki Yoshida, Naoki Watanabe, Jun'ichi Sakamoto, Tsutomu Matsumoto (YNU)

Announcement for Speakers
General TalkEach speech will have 20 minutes for presentation and 5 minutes for discussion.
Invited TalkEach speech will have 35 minutes for presentation and 5 minutes for discussion.

Contact Address and Latest Schedule Information
ICSS Technical Committee on Information and Communication System Security (ICSS)   [Latest Schedule]
Contact Address Yutaka Miyake (KDDI R&D Laboratories, Inc.)
TEL: +81-49-278-7367, FAX: +81-49-278-7510
E--mail: is-qst 
Announcement Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html


Last modified: 2015-02-21 03:24:41


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ICSS Schedule Page]   /  
 
 Go Top  Go Back   Prev ICSS Conf / Next ICSS Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan