Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2019-03-08 11:15 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Threat Information Analysis Using Conditional Generative Adversarial Network Keisuke Furumoto, Hideaki Kanehara, Takeshi Takahashi (NICT), Yoshiaki Shiraishi (Kobe Univ.), Daisuke Inoue (NICT) ICSS2018-81 |
[more] |
ICSS2018-81 pp.105-110 |
ICSS, IPSJ-SPT |
2019-03-08 14:50 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
A Trouble Ticket System Specialized for Incident Response Yu Tsuda, Takashi Tomine (NICT), Masato Jingu (NICT/HISYS), Keisuke Iwasaki (NTT-AT), Kenjiro Terada, Daisuke Inoue (NICT) ICSS2018-92 |
In case that an organization has damaged by a cyberattack, it is crucial to minimize the damage by rapid security incide... [more] |
ICSS2018-92 pp.197-202 |
ICSS |
2018-11-21 15:15 |
Kagoshima |
|
Malware Analysis Method Using Conditional Generative Adversarial Network Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) ICSS2018-57 |
Many schemes combining deep learning with methods for imaging malware have been proposed. These methods are considered t... [more] |
ICSS2018-57 pp.25-30 |
ICSS |
2018-11-22 14:20 |
Kagoshima |
|
Part II: Calculating Similarity between IoT Malware over CPU Architectures Ryoichi Isawa, Tao Ban (NICT), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2018-66 |
At the ICSS workshop held in June, 2018, we proposed a method for calculating
similarity between IoT malware samples ov... [more] |
ICSS2018-66 pp.73-78 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 11:45 |
Hokkaido |
Sapporo Convention Center |
Real-time Botnet Detection Using Nonnegative Tucker Decomposition Hideaki Kanehara, Yuma Murakami (Waseda Univ.), Jumpei Shimamura (Clwit), Takeshi Takahashi (NICT), Noboru Murata (Waseda Univ.), Daisuke Inoue (NICT) ISEC2018-38 SITE2018-30 HWS2018-35 ICSS2018-41 EMM2018-37 |
This study focuses on darknet traffic analysis and applies tensor factorization in order to detect coordinated group act... [more] |
ISEC2018-38 SITE2018-30 HWS2018-35 ICSS2018-41 EMM2018-37 pp.297-304 |
ICSS, IA |
2018-06-25 13:25 |
Ehime |
Ehime University |
Calculating Similarity between IoT Malware Samples over CPU Architectures Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) IA2018-2 ICSS2018-2 |
Malware samples infecting IoT (Internet of Things) devices such as Web cameras and
home routers have spread over the In... [more] |
IA2018-2 ICSS2018-2 pp.7-12 |
ICSS, IA |
2018-06-26 11:40 |
Ehime |
Ehime University |
A Study on Extraction Method of Characteristics of Malware Using Generative Adversalial Networks Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) IA2018-13 ICSS2018-13 |
To classify malware families including many subspecies, several methods have been proposed for acquiring malware feature... [more] |
IA2018-13 ICSS2018-13 pp.77-82 |
ICSS, IPSJ-SPT |
2018-03-07 13:00 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
A Study on Malware Activity Detection Based on Real-time Analysis of Darknet Data Using Graphical Lasso Chansu Han (Kyushu Univ.), Jumpei Shimamura (Clwit Inc.), Takeshi Takahashi, Daisuke Inoue (NICT), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT) ICSS2017-51 |
In this study, we considered a method to detect malignant activity (especially botnet) in cyber space automatically and ... [more] |
ICSS2017-51 pp.1-6 |
ICSS, IPSJ-SPT |
2018-03-08 09:20 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Considering Opcode-based Similarity between IoT Malware Samples Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2017-69 |
In this paper, we generate a similarity matrix between IoT (Internet of Things) malware samples based on their disassemb... [more] |
ICSS2017-69 pp.109-114 |
ICSS, IPSJ-SPT |
2018-03-08 09:45 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Evaluation of malware sandbox using evasive test samples Kou Ishii, Wateru Ueno, Rui Tanabe (Yokohama National Univ.), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
[more] |
|
IA, ICSS |
2017-06-08 14:25 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
A First Trend Review of Runtime Packers for IoT Malware Ryoichi Isawa (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Tao Ban, Daisuke Inoue (NICT) IA2017-4 ICSS2017-4 |
Malicious software (malware) specimens that infect IoT (Internet of Things) devices rapidly increase. If those specimens... [more] |
IA2017-4 ICSS2017-4 pp.19-24 |
OPE |
2016-12-09 13:50 |
Okinawa |
|
Laser scanner based on beam switching methode on a silicon photonics integrated circuit Daisuke Inoue, Tadashi Ichikawa, Akari Kawasaki, Tatsuya Yamashita (TCRDL) OPE2016-114 |
We demonstrated an optical solid state scanner based on photonics integrated circuit. This solid state scanner has no me... [more] |
OPE2016-114 pp.57-58 |
ICSS |
2016-11-25 16:35 |
Kanagawa |
Institute of Information Security |
Clustering of Attacking Devices using Active Monitoring Takahiro Kasama, Daisuke Inoue (NICT) ICSS2016-45 |
(To be available after the conference date) [more] |
ICSS2016-45 pp.37-42 |
ICSS, IA |
2016-06-06 14:10 |
Saga |
Saga University |
Method to Locate Cryptographic Functions from Malware Ryoya Furukawa (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT) |
[more] |
|
ICSS, IPSJ-SPT |
2016-03-04 11:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A Suspicious Processes Detection Scheme using Process Frequency and Network State Junji Nakazato, Yu Tsuda, Eto Masashi, Daisuke Inoue, Koji Nakao (NICT) ICSS2015-60 |
Many serious security incidents caused by the targeted attacks have been occurred. The targeted attacks can not be preve... [more] |
ICSS2015-60 pp.77-82 |
IA, SITE, IPSJ-IOT [detail] |
2016-03-04 11:35 |
Saga |
Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) |
A Proposal of Timeline-Based Event Log Management Method Takashi Tomine, Yu Tsuda (NICT), Akira Kato, Hideki Sunahara (Keio Univ.), Daisuke Inoue (NICT) SITE2015-74 IA2015-106 |
When a network trouble is happen, network operators are surveying information such as logs and statistics, from close ne... [more] |
SITE2015-74 IA2015-106 pp.227-232 |
LQE, EST, OPE, EMT, PN, MWP, IEE-EMT, PEM [detail] |
2016-01-29 09:00 |
Hyogo |
|
Optical modulator using phase-shifter based on multimode-interference-based waveguide Daisuke Inoue, Tadashi Ichikawa, Akari Kawasaki, Tatsuya Ichikawa (Toyota Central R&D Lab. Inc.) PN2015-96 EMT2015-147 OPE2015-209 LQE2015-196 EST2015-153 MWP2015-122 |
We fabricated optical modulators using electrode of phase shifter based on multimode interference based waveguide. Propa... [more] |
PN2015-96 EMT2015-147 OPE2015-209 LQE2015-196 EST2015-153 MWP2015-122 pp.379-382 |
ICSS |
2015-11-26 15:00 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
tkiwa: A Detection Tool for Packets with Characteristic Network Protocol Header Takashi Koide (Yokohama National Univ.), Daisuke Makita (Yokohama National Univ./NICT), Takahiro Kasama, Mio Suzuki, Daisuke Inoue, Koji Nakao (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2015-38 |
The packets from malware and network tools that have their own implementation of network stack may have character-istic ... [more] |
ICSS2015-38 pp.19-24 |
ICSS |
2015-11-27 14:40 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
A Suspicious Processes Detection Scheme using Process Frequency Junji Nakazato, Yu Tsuda, Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2015-45 |
Many serious security incidents caused by the targeted attacks have been occurred. The targeted attacks can not be preve... [more] |
ICSS2015-45 pp.61-66 |
IA, ICSS |
2015-06-11 14:55 |
Fukuoka |
Kyushu Institute of Technology Univ. |
An Empirical Evaluation of Locating Cryptographic Functions on the Memory Ryoya Furukawa (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT) IA2015-4 ICSS2015-4 |
This paper presents a simple and effective idea to locate cryptographic functions on the memory for malware analysis.
... [more] |
IA2015-4 ICSS2015-4 pp.15-20 |