Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2023-11-16 13:25 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Real time detection for replay-attack communication in control system Koushi Nishi, Yuichi Futa (TUT), Hiroyuki Okazaki (Shinshu University) ICSS2023-52 |
Attacks on control system in factory and power plant are increasing every year. Therefore, System that monitor communica... [more] |
ICSS2023-52 pp.7-14 |
ICSS |
2023-11-16 13:50 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Device identification and attribute values consideration with browser fingerprint Takashi Tsukazaki, Yuichi Futa (TUT), Hiroyuki Okazaki (Shinshu Univ.), Hikofumi Suzuki (NII) ICSS2023-53 |
Browser fingerprinting is to identify website users by collecting information about device. Browser fingerprinting is us... [more] |
ICSS2023-53 pp.15-21 |
ICSS |
2023-11-16 15:20 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Attack Verification and Evaluation of Incremental Fault Analysis against AES Encryption Processing Device Miran Tamagawa, Yuichi Futa (TUT), Takehiko Mieno (AVASYS), Hiroyuki Okazaki (Shinshu University) ICSS2023-56 |
In recent years,there has been a growing concern about the impact of fault analysis attack,which use hardware failures a... [more] |
ICSS2023-56 pp.35-41 |
ICSS |
2023-11-17 13:30 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Simulation of DNS cache poisoning attack detection method using DNS logs Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyui Okazaki (Shinshu Univ.), Hikofumi Suzuki (NII) ICSS2023-64 |
DNS cache poisoning attacks exist as an attack that exploits the DNS cache function. Takahashi et al. proposed a method ... [more] |
ICSS2023-64 pp.93-100 |
ICSS |
2023-11-17 13:55 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Analysis of the influence of DDoS attacks on Snort and legitimate users Yuki Kano, Yuichi Futa (TUT), Hikofumi Suzuki (NII), Hiroyuki Okazaki (Shinshu University) ICSS2023-65 |
(To be available after the conference date) [more] |
ICSS2023-65 pp.101-107 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 16:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Analysis of effective attribute values on risk-based authentication with browser fingerprint Takashi Tsukazaki, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) ISEC2023-19 SITE2023-13 BioX2023-22 HWS2023-19 ICSS2023-16 EMM2023-19 |
Browser fingerprinting is to identify website users by collecting information about device. Browser fingerprint is used ... [more] |
ISEC2023-19 SITE2023-13 BioX2023-22 HWS2023-19 ICSS2023-16 EMM2023-19 pp.30-36 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 16:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Analysis of Snort's impact due to DDoS attacks Kano Yuki, Yuichi Futa (TUT), Okazaki Hiroyuki, Suzuki Hikofumi (SHINSYU UNIVERSITY) ISEC2023-33 SITE2023-27 BioX2023-36 HWS2023-33 ICSS2023-30 EMM2023-33 |
In recent years, the number of DDoS attacks has been increasing.Tokuyama et al.[1][2] constructed an environment in whic... [more] |
ISEC2023-33 SITE2023-27 BioX2023-36 HWS2023-33 ICSS2023-30 EMM2023-33 pp.127-132 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 14:50 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Anomaly detection with dataset including replay-attack communication Koushi Nishi, Futa Yuichi (TUT), Okazaki Hiroyuki (Shinshu University) ISEC2023-52 SITE2023-46 BioX2023-55 HWS2023-52 ICSS2023-49 EMM2023-52 |
General-purpose devices and communications are increasingly introduced to control systems in factories and power plants ... [more] |
ISEC2023-52 SITE2023-46 BioX2023-55 HWS2023-52 ICSS2023-49 EMM2023-52 pp.247-254 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 18:05 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Proposal of Kaminsky Attack Detection Method Using Blockchain Technology Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (SU) NS2022-116 |
The Kaminsky attack is known as an efficient and successful method for DNS cache poisoning attacks. Takahashi et al. pro... [more] |
NS2022-116 pp.91-96 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 16:15 |
Online |
Online |
Identification and tracking of website users in consideration of privacy in browser fingerprinting Takashi Tsukazaki, Yuichi Futa (TUT), Tomomichi Suzuki (PitApp), Hiroyuki Okazaki (Shinshu Univ.) ISEC2022-28 SITE2022-32 BioX2022-53 HWS2022-28 ICSS2022-36 EMM2022-36 |
Browser fingerprinting is to identify website users by collecting information about device. In our previous research, we... [more] |
ISEC2022-28 SITE2022-32 BioX2022-53 HWS2022-28 ICSS2022-36 EMM2022-36 pp.124-130 |
ICSS, IPSJ-SPT |
2022-03-07 15:20 |
Online |
Online |
Evaluation of Detection System of DNS Cache Poisoning Using Blockchain Technology Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) ICSS2021-65 |
DNS cache poisoning is an attack on DNS essential to use of Internet communications. Takahashi et al. proposed a detecti... [more] |
ICSS2021-65 pp.38-43 |
ICSS, IPSJ-SPT |
2022-03-07 15:00 |
Online |
Online |
Identification of website users using browser fingerprinting and network packet Takashi Tsukazaki, Yuichi Futa (TUT), Taku Yazawa (Dotexp) ICSS2021-66 |
Browser fingerprinting is gaining attention as a means of identifying website users. Browser fingerprinting is to identi... [more] |
ICSS2021-66 pp.44-48 |
ICSS |
2021-11-30 09:30 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Real-time detection of Distributed Slow HTTP DoS attacks using communication analysis Koki Tamura, Yuichi Futa (TUT), Tomomichi Suzuki (PitApp) ICSS2021-54 |
At ICSS in this March, we proposed a detection method of Slow HTTP DoS Attacks with
distinguishment between communicat... [more] |
ICSS2021-54 pp.49-54 |
ICSS |
2021-11-30 09:55 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Comparison of CNN padding method using a part of malware API call sequence data with RNN. Shugo Asai, Yuichi Futa (TUT) ICSS2021-55 |
In recent years, as society has become more information-oriented, malware for information has been increasing. In such a... [more] |
ICSS2021-55 pp.55-60 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-19 11:20 |
Online |
Online |
Fake Command Attack Detection of industrial Control System with SVM Yuki Harada, Yuichi Futa (TUT), Hiroyuki Okazaki (Shinshu Univ.) ISEC2021-15 SITE2021-9 BioX2021-16 HWS2021-15 ICSS2021-20 EMM2021-20 |
Recently, industrial control systems (ICS) are introduced TCP/IP protocol and connect internet via office network. Secur... [more] |
ISEC2021-15 SITE2021-9 BioX2021-16 HWS2021-15 ICSS2021-20 EMM2021-20 pp.35-40 |
ICSS, IPSJ-SPT |
2021-03-02 10:00 |
Online |
Online |
Authentication and authorization of IoT devices using blockchain and fog nodes Takahiro Igarashi, Yuichi Futa (TUT) ICSS2020-43 |
In this paper, we propose a system for authentication / authorization of IoT devices using blockchain. With reference to... [more] |
ICSS2020-43 pp.102-107 |
ICSS, IPSJ-SPT |
2021-03-02 11:30 |
Online |
Online |
Distributed Slow HTTP DoS Attack Detection by Combining Multiple Schemes Koki Tamura, Yuichi Futa (TUT) ICSS2020-46 |
In this paper, We propose an attack detection system using multiple thresholds in order to increase the detection rate o... [more] |
ICSS2020-46 pp.120-125 |
ICSS, IPSJ-SPT |
2021-03-02 11:05 |
Online |
Online |
Accuracy evaluation of CNNs and random forests with Malware API call sequences Shugo Asai, Futa Yuichi (TUT) ICSS2020-58 |
In this paper, we compare the accuracy of the results of classifying each malware family by Random Forest and CNN using ... [more] |
ICSS2020-58 pp.190-194 |
NS, NWS (Joint) |
2020-01-23 13:30 |
Okinawa |
|
Electricity transaction system using smart contract Youta Tatsuke, Yuichi Futa, Yoshihiro Kita (TUT) NS2019-161 |
Electricity transaction, which is an important infrastructure of industrial activity, often targeted by cyber-terrorists... [more] |
NS2019-161 pp.1-6 |
ISEC, SITE, LOIS |
2019-11-02 10:50 |
Osaka |
Osaka Univ. |
Detection System of DNS Cache Poisoning Using Blockchain Technology Tomohiro Takahashi, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (SU) ISEC2019-78 SITE2019-72 LOIS2019-37 |
Recently we enjoy the benefits of the Internet.
Internet is working by various network services.
The Domain Name Syst... [more] |
ISEC2019-78 SITE2019-72 LOIS2019-37 pp.107-112 |