Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-21 16:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
One Million Routers Under Control: Vulnerabilities in DDNS of IoT Devices Kanta Okugawa (Ritsumei/NICT), Yoshiki Mori, Masaki Kubo, Takahiro Kasama (NICT), Koichi Mouri (Ritsumei), Daisuke Inoue (NICT) ICSS2023-78 |
IoT devices such as routers and webcams have dynamic DNS (DDNS) functions as one of the methods to remotely manage devic... [more] |
ICSS2023-78 pp.63-70 |
ICSS |
2023-11-17 11:05 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Exploring the Feasibility of Guessing Default Wi-Fi Passwords for Consumer Routers Takahiro Kasama (NICT), Ryo Kamino, Yuichi Hagiwara (00One), Daisuke Inoue (NICT) ICSS2023-62 |
(To be available after the conference date) [more] |
ICSS2023-62 pp.77-84 |
ICSS |
2023-11-17 11:30 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Investigation of Technical Support Scams Targeting Japan Hiroyuki Ito (NICT), Kosuke Kajimoto, Tetsuya Kageyama, Taichi Aoki (JC3), Takahiro Kasama, Daisuke Inoue (NICT) ICSS2023-63 |
(To be available after the conference date) [more] |
ICSS2023-63 pp.85-92 |
HWS |
2023-04-14 16:10 |
Oita |
(Primary: On-site, Secondary: Online) |
An Application of Information Flow Tracking to Support Detection of Hardware Trojans Ryoichi Isawa, Nobuyuki Kanaya, Daisuke Inoue (NICT) HWS2023-7 |
(To be available after the conference date) [more] |
HWS2023-7 pp.26-31 |
ICSS, IPSJ-SPT |
2023-03-13 16:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
An Analysis of the Risk of Unauthorized Access to the WebUI of IoT Devices Kosuke Murakami (NICT/KDDIR), Takahiro Kasama, Daisuke Inoue (NICT) ICSS2022-63 |
(To be available after the conference date) [more] |
ICSS2022-63 pp.91-96 |
ICSS, IPSJ-SPT |
2023-03-13 17:10 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
A Study on Effectiveness of Malware Infection Notification based on Role-playing Type Survey Akira Fujita, Misato Matsuda, Takahiro Kasama, Daisuke Inoue (NICT) ICSS2022-64 |
(To be available after the conference date) [more] |
ICSS2022-64 pp.97-102 |
ICSS, IPSJ-SPT |
2023-03-13 17:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Lessons Learned from Construction of the Security Technical Term Dictionary Misato Matsuda, Akira Fujita, Yu Tsuda, piyokango, Daisuke Inoue (NICT) ICSS2022-65 |
In order to do OSINT, natural language processing technology for processing documents is an important elemental technolo... [more] |
ICSS2022-65 pp.103-108 |
ICSS, IPSJ-SPT |
2023-03-13 17:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
URL Warning List Creation and Manage Methods using VirusTotal and Web Access Log Kyohei Takao, Chika Hiraishi (YNU), Kazuki Takada (SecureBrain), Akira Fujita, Daisuke Inoue (NICT), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-66 |
Security services such as URL blocklists are widely used to prevent users from accessing malicious websites.
However, ... [more] |
ICSS2022-66 pp.109-114 |
ICSS, IPSJ-SPT |
2023-03-14 11:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
An Empirical Study on Opting out of Internet-wide Scanning Takahiro Kasama, Yukiko Endo, Masaki Kubo, Daisuke Inoue (NICT) ICSS2022-76 |
(To be available after the conference date) [more] |
ICSS2022-76 pp.169-174 |
ICSS |
2022-11-08 09:00 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Survey of Support Policy Settings and Publication for Consumer IoT Devices Takahiro Kasama (NICT), Kosuke Murakami (NICT/KDDI Research, Inc.), Akira Fujita, Daisuke Inoue (NICT) ICSS2022-41 |
There have been many cases of IoT devices that are in the End of Life (EoL) state, in which the vendor's support period ... [more] |
ICSS2022-41 pp.19-24 |
ICSS |
2022-11-08 09:25 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Analysis of Weak Password Settings for IoT Devices and Results of User Notifications Kosuke Murakami (NICT/KDDIR), Takahiro Kasama, Daisuke Inoue (NICT) ICSS2022-42 |
IoT devices with weak ID/Password settings that are accessible from the Internet by services that enable password authen... [more] |
ICSS2022-42 pp.25-30 |
BioX |
2022-10-03 16:30 |
Okinawa |
|
A proposal on Reflective Pseudo Blood Volume Pulse Presentation Attack against PPG Sensor Tatsuya Takehisa (NICT/Nissin), Hayato Ushimaru (NICT/CDI), Daisuke Makita, Dai Arisue (NICT), Satoshi Mimura (NICT/Ierae), Ryo Iijima (Waseda), Ryouichi Isawa, Daisuke Inoue (NICT) BioX2022-59 |
The authors study an attack that presents a pseudo pulse wave signal to a photoplethysmography (PPG) sensor. A previous ... [more] |
BioX2022-59 pp.20-25 |
IA, ICSS |
2022-06-23 15:20 |
Nagasaki |
Univ. of Nagasaki (Primary: On-site, Secondary: Online) |
An Investigation of Abuse Possibility of IoT Devices After Unauthorized Login Kosuke Murakami (NICT/KDDIR), Takahiro Kasama, Daisuke Inoue (NICT) IA2022-6 ICSS2022-6 |
IoT devices with weak ID/Password settings and accessible from the Internet by Telnet and SSH services are infected with... [more] |
IA2022-6 ICSS2022-6 pp.31-36 |
ICSS, IPSJ-SPT |
2022-03-07 13:10 |
Online |
Online |
A Method for Identifying IoT Devices Using Features from WebUI Contents and Images Kosuke Murakami (NICT/KDDI), Takahiro Kasama, Akira Fujita (NICT), Jumpei Urakawa (KDS), Daisuke Inoue (NICT) ICSS2021-59 |
Cyber attacks on IoT devices have caused damage such as information theft and malware infection.
In order to identify I... [more] |
ICSS2021-59 pp.7-12 |
VLD, HWS [detail] |
2022-03-08 11:25 |
Online |
Online |
A Method for Automatic Test Pattern Generation using an SMT Solver for HDL Code Ryoichi Isawa, Nobuyuki Kanaya, Yoshitada Fujiwara, Tatsuta Takehisa, Hayato Ushimaru, Dai Arisue, Daisuke Makita, Satoshi Mimura, Daisuke Inoue (NICT) VLD2021-95 HWS2021-72 |
(To be available after the conference date) [more] |
VLD2021-95 HWS2021-72 pp.105-110 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 11:45 |
Online |
Online |
A Large-scale Investigation into the Possibility of Malware Infection of IoT Devices with Weak Credentials Kosuke Murakami, Takahiro Kasama, Daisuke Inoue (NICT) ISEC2021-34 SITE2021-28 BioX2021-35 HWS2021-34 ICSS2021-39 EMM2021-39 |
[more] |
ISEC2021-34 SITE2021-28 BioX2021-35 HWS2021-34 ICSS2021-39 EMM2021-39 pp.147-152 |
ICSS, IPSJ-SPT |
2021-03-02 10:25 |
Online |
Online |
Proof of concept of sandbox evasion attack using email address stored in target machine Yuta Inoue, Rui Tanabe (YNU), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-57 |
In recent years, malware sandbox appliances that dynamically analyze target files are becoming popular. However, malware... [more] |
ICSS2020-57 pp.184-189 |
ICSS, IPSJ-SPT |
2020-03-03 09:50 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Analysis of Cyber-attacks Observed by a Simple TLS Honeypot Listening on All Ports Daisuke Makita (NICT), Jumpei Shimamura (clwit), Masaki Kubo, Daisuke Inoue (NICT) ICSS2019-85 |
As various devices have been connected to the Internet, cyber-attacks targeting them have also been increasing. Since va... [more] |
ICSS2019-85 pp.103-108 |
ICSS, IPSJ-SPT |
2020-03-02 11:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
A Technique for Issuing Security Alerts and Filtering Traffic based on Vulnerability Information Monitoring Takeshi Takahashi, Ryutaro Ushigome, Mio Suzuki, Daisuke Inoue (NICT) ICSS2019-93 |
[more] |
ICSS2019-93 pp.189-194 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 11:20 |
Kochi |
Kochi University of Technology |
Automatic Node Manipulation System for Active Monitoring Environment Shingo Yasuda, Nobuyuki Kanaya, Yu Tsuda, Satoshi Ohta, Ryosuke Miura, Daisuke Inoue (NICT) ISEC2019-46 SITE2019-40 BioX2019-38 HWS2019-41 ICSS2019-44 EMM2019-49 |
[more] |
ISEC2019-46 SITE2019-40 BioX2019-38 HWS2019-41 ICSS2019-44 EMM2019-49 pp.299-304 |