IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 

===============================================
Technical Committee on Information and Communication System Security (ICSS)
Chair: Yutaka Miyake (KDDI R&D Labs.)
Vice Chair: Yoshiaki Shiraishi (Kobe Univ.), Takeshi Ueda (Mitsubishi Electric)
Secretary: Hiroki Takakura (NII), Katsunari Yoshioka (Yokohama National Univ.)
Assistant: Kazunori Kamiya (NTT), Takahiro Kasama (NICT)

===============================================
Special Interest Group on Security Psychology and Trust (IPSJ-SPT)


DATE:
Mon, Mar 13, 2017 13:00 - 18:25
Tue, Mar 14, 2017 09:30 - 13:10

PLACE:
University of Nagasaki(-1-1 Manabino, Nagayo-cho, Nishi-Sonogi-gun, Nagasaki 851-2195,JAPAN. http://sun.ac.jp/e/campus/siebold/. Prof. Ayako Komatsu)

TOPICS:
System Security, etc.

----------------------------------------
Mon, Mar 13 PM Network Security 1 (13:00 - 14:15)
----------------------------------------

(1)/ICSS 13:00 - 13:25
Clustering of Bot Port Scan and Brute-force Activities
Shohei Araki, Bo Hu, Yukio Nagafuchi, Takaaki Koyama, Jun Miyoshi (NTT), Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII)

(2)/ICSS 13:25 - 13:50
Modeling of Attack Activity for Integrated Analysis of Threat Information
Kenta Nomura, Daiki Ito (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.)

(3)/ICSS 13:50 - 14:15
Early Detection of New DRDoS Attack with Protocol-Agnostic Honeypot
Tomomi Nishizoe (Yokohama National Univ.), Daisuke Makita (Yokohama National Univ./NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)

----------------------------------------
Mon, Mar 13 PM (13:00 - 13:50)
----------------------------------------

(4) 13:00 - 13:25


(5) 13:25 - 13:50


----- Break ( 10 min. ) -----

----------------------------------------
Mon, Mar 13 PM Network Security 2 (14:25 - 16:05)
----------------------------------------

(6)/ICSS 14:25 - 14:50
Feature Extraction for Identifying High Yielding Investment Programs Related Transactions in Bitcoin
Kentaroh Toyoda, Tomoaki Ohtsuki (Keio Univ.), P. Takis Mathiopoulos (UoA)

(7)/ICSS 14:50 - 15:15
A Brief Review on Anomaly Detection and its Applications to Cybersecurity
Danilo Vasconcellos Vargas, Kouichi Sakurai (Kyudai)

(8)/ICSS 15:15 - 15:40
Supervised Classification for Detecting Malware Infected Host in HTTP Traffic and Long-time Evaluation for Detection Performance using Mixed Data
Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT)

(9)/ICSS 15:40 - 16:05
Deep Learning Approach for Detecting Malware Infected Host and Detection Performance Evaluation with HTTP Traffic
Taishi Nishiyama, Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT), Kazuya Okada, Yuji Sekiya (University of Tokyo)

----------------------------------------
Mon, Mar 13 PM (14:25 - 16:05)
----------------------------------------

(10) 14:25 - 14:50


(11) 14:50 - 15:15


(12) 15:15 - 15:40


(13) 15:40 - 16:05


----- Break ( 10 min. ) -----

----------------------------------------
Mon, Mar 13 PM Malware Countermeasure (16:15 - 17:30)
----------------------------------------

(14)/ICSS 16:15 - 16:40
Evaluation of memory image acquisition/analysis function in forensics tools
Ikuo Tanaka, Masaki Hashimoto (IISEC)

(15)/ICSS 16:40 - 17:05
Malicious PDF Detection Scheme using Keywords Feature based on Fuzzy inference
Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.)

(16)/ICSS 17:05 - 17:30
Effective Analysis of Macro Malware Based on Clustering
Toshinori Usui (NTT), Tomonori Ikuse (NTT Security Japan), Makoto Iwamura, Takeshi Yada (NTT)

----------------------------------------
Mon, Mar 13 PM IoT Security 1 (16:15 - 17:05)
----------------------------------------

(17)/ICSS 16:15 - 16:40
A Study on Parameter Adjustment of Whitelist Detection Rule
Takeshi Ueda (Mitsubishi Electric Corp.), Kobayashi Nobuhiro (Mitsubishi Electric Corp./ Shizuoka Univ.), Masakatsu Nishigaki (Shizuoka Univ)

(18)/ICSS 16:40 - 17:05
Primary Discussion about a Honeypot System for IoT Aimed Protocols
Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Mon, Mar 13 PM (17:40 - 18:25)
----------------------------------------

(19) 17:40 - 18:25


----------------------------------------
Tue, Mar 14 AM Web Security (09:30 - 10:45)
----------------------------------------

(20)/ICSS 09:30 - 09:55
Visual Similarity-based Phishing Websites Detection Scheme using Image and CSS with Target Website Finder
Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ)

(21)/ICSS 09:55 - 10:20
Towards Reducing False Positives of Host based Intrusion Detection by Static Code Analysis of Web Applications
Yang Zhong, Tohru Sato, Masaki Tanikawa (NTT)

(22)/ICSS 10:20 - 10:45
Attack Pattern Extraction by Clustering Parameters
Shingo Orihara, Tohru Sato, Masaki Tanikawa (NTT)

----------------------------------------
Tue, Mar 14 AM IoT Security 2 (09:30 - 10:45)
----------------------------------------

(23)/ICSS 09:30 - 09:55
(See Japanese page.)

(24)/ICSS 09:55 - 10:20
(See Japanese page.)

(25)/ICSS 10:20 - 10:45
Assignment and Solution regarding Access Control of a Camera on a Computer
Yuri Yoshino, Masaki Inamura (TDU)

----- Break ( 10 min. ) -----

----------------------------------------
Tue, Mar 14 AM Network Security 3 (10:55 - 12:10)
----------------------------------------

(26)/ICSS 10:55 - 11:20
Low rate attack detection method based on duration of burst state by using quick packet matching function
Yuhei Hayashi, Jia Yong Zhen, Satoshi Nishiyama, Akira Misawa (NTT)

(27)/ICSS 11:20 - 11:45
Graph based Detection of Advanced Persistent Threat on LAN
Hiroki Nagayama, Bo Hu, Takaaki Koyama, Jun Miyoshi (NTT)

(28)/ICSS 11:45 - 12:10
Representation for Attack Activity to Associate Threat Information
Daiki Ito, Kenta Nomura (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.)

----------------------------------------
Tue, Mar 14 AM Malware Countermeasure (10:55 - 12:10)
----------------------------------------

(29)/ICSS 10:55 - 11:20
A Vulnerability Analysis of Android Applications from the View of Framework
Ryoya Furukawa, Tatsuya Nagai (Kobe Univ.), Hiroshi Kumagai, Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.)

(30)/ICSS 11:20 - 11:45
Ransomware Detection Focused on Encryption Processing
Shigeta Takanari, Morii Masakatu (Kobe Univ.), Hasegawa Tomohisa, Ikegami Masato, Ishikawa Teiichi (Canon IT Solutions)

(31)/ICSS 11:45 - 12:10
Towards finding Code Snippets on a Question and Answer Website causing Mobile App Vulnerabilities
Hiroki Nakano (YNU), Fumihiro Kanei, Mitsuaki Akiyama (NTT), Katsunari Yoshioka (YNU)

----- Break ( 10 min. ) -----

----------------------------------------
Tue, Mar 14 PM Network Security 4 (12:20 - 13:10)
----------------------------------------

(32)/ICSS 12:20 - 12:45
Evaluation of Host Independent and Distributed Detection System of the Network Attack by Using OpenFlow
Ryosuke Miyazaki (ISIT/Kyushu Univ.), Junpei Kawamoto (), Shinichi Matsumoto (Kyushu Univ.), Kouichi Sakurai (ISIT/Kyushu Univ.)

(33)/ICSS 12:45 - 13:10
A Study of Security Evaluation for Composite Systems
Kobayashi Nobuhiro (Mitsubishi Electric Corp./ Shizuoka Univ.), Takeshi Ueda (Mitsubishi Electric Corp.), Masakatsu Nishigaki (Shizuoka Univ.)

----------------------------------------
Tue, Mar 14 PM Authenticaion, Cryptography (12:20 - 13:10)
----------------------------------------

(34)/ICSS 12:20 - 12:45
Vibration-based Key Exchange among Multiple Smart Devices on the Desk
Alisa Arno, Kentaroh Toyoda (Keio Univ.), Yuji Watanabe (IBM Japan), Iwao Sasase (Keio Univ.), P. Takis Mathiopoulos (Athens Univ.)

(35)/ICSS 12:45 - 13:10
A system architecture that prevents fraud issue using third parties to issue authentication information
Masahiro Matsui, Akira Nagai, Tetsutaro Kobayashi, Hironobu Okuyama (NTT)

# Information for speakers
General Talk will have 20 minutes for presentation and 5 minutes for discussion.


=== Technical Committee on Information and Communication System Security (ICSS) ===
# FUTURE SCHEDULE:

Thu, Jun 8, 2017 - Fri, Jun 9, 2017: Kochi University of Technolo, Eikokuji Campus [Wed, Apr 19], Topics: Internet Security, etc.

# SECRETARY:
Yutaka Miyake (KDDI R&D Laboratories, Inc.)
TEL: +81-49-278-7367, FAX: +81-49-278-7510
E-mail: is-qst

# ANNOUNCEMENT:
# Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html

=== Special Interest Group on Security Psychology and Trust (IPSJ-SPT) ===
# FUTURE SCHEDULE:

Thu, May 11, 2017 - Fri, May 12, 2017: Oval Hall, Nihon University [Tue, Mar 21]


Last modified: 2017-03-11 17:11:27


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ICSS Schedule Page]   /   [Return to IPSJ-SPT Schedule Page]   /  
 
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan