IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 64  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] 2024-03-22
15:45
Nagasaki Ikinoshima Hall
(Primary: On-site, Secondary: Online)
Software Vulnerability Risk Growth Model for CVSS 4 Metrics
Sora Okada, Takashi Minohara, Masaya Shimakawa (Takushoku Univ.) CPSY2023-47 DC2023-113
Information system administrators must pay attention to system vulnerability information and take appropriate measures a... [more] CPSY2023-47 DC2023-113
pp.53-58
NS, IN
(Joint)
2024-02-29
11:35
Okinawa Okinawa Convention Center Identification Method of Vulnerable Target Areas for Crossfire Attacks
Tianyu Wang, Noriaki Kamiyama (Ritsumeikan Univ.) NS2023-195
CFA(Crossfire Attack)is distinguished from other DDoS(Distributed Denial of Service)attacks by its characteristic of tar... [more] NS2023-195
pp.137-142
ICSS 2023-11-17
14:20
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Proposal for a Test Tool Enabling Programmatic Description of Test Scenarios in OpenID Connect
Junki Yuasa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) ICSS2023-66
Single sign-on (SSO) is a mechanism that allows users to log in to multiple web services with single-user authentication... [more] ICSS2023-66
pp.108-113
SS, KBSE, IPSJ-SE [detail] 2023-07-21
11:00
Hokkaido
(Primary: On-site, Secondary: Online)
A tool for vulnerability assessment and checksum verification using SPDX documents
Rio Kishimoto, Tetsuya Kanda (Osaka Univ.), Yuki Manabe (The Univ. of Fukuchiyama), Katsuro Inoue (Nanzan Univ.), Yoshiki Higo (Osaka Univ.) SS2023-8 KBSE2023-19
Libraries are widely used in recent software development, but their management is insufficient, and there are problems s... [more] SS2023-8 KBSE2023-19
pp.43-48
IA, ICSS 2023-06-21
09:30
Saga Saga Univ.
(Primary: On-site, Secondary: Online)
A Precise Approach of Software Vulnerability Detection Using Set Similarity Calculation Algorithm
Reika Arakawa, Yo Kanemoto, Eitaro Shioji, Mitsuaki Akiyama (NTT) IA2023-7 ICSS2023-7
(To be available after the conference date) [more] IA2023-7 ICSS2023-7
pp.32-39
ISEC 2023-05-17
15:25
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities (from BRAIN 2023)
Chihiro Kado, Naoto Yanai, Jason Paul Cruz (Osaka Univ.), Shingo Okamura (NIT, Nara College) ISEC2023-11
Vulnerabilities are an important issue in Ethereum smart contracts. Although various vulnerability analysis tools have b... [more] ISEC2023-11
pp.62-64
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] 2023-03-24
09:00
Kagoshima Amagi Town Disaster Prevention Center (Tokunoshima)
(Primary: On-site, Secondary: Online)
A preliminary study on time-dependency of cyber security vulnerability assessment
Takashi Minohara, Naohiro Kubota (Takushoku Univ.) CPSY2022-42 DC2022-101
Information system administrators must pay attention to system vulnerability information and take appropriate measures a... [more] CPSY2022-42 DC2022-101
pp.49-54
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] 2023-03-24
09:25
Kagoshima Amagi Town Disaster Prevention Center (Tokunoshima)
(Primary: On-site, Secondary: Online)

Cai Wenxi, Tatsuhiro Tsuchiya (Osaka Univ.) CPSY2022-43 DC2022-102
(To be available after the conference date) [more] CPSY2022-43 DC2022-102
pp.55-59
IA, SITE, IPSJ-IOT [detail] 2023-03-17
10:25
Gunma Maebashi Institute of Technology
(Primary: On-site, Secondary: Online)
[Invited Talk] Dual-Use of Cybersecurity -- From the Threat Landscape in Cyberspace with a Focus on IoT Security --
Tsukasa Ogino (CCDS) SITE2022-62 IA2022-85
The Internet of Things (IoT), in which automobiles, drones, home appliances, and other devices are connected via the Int... [more] SITE2022-62 IA2022-85
pp.45-52
NS, IN
(Joint)
2022-03-10
10:20
Online Online Implementation and Evaluation of Real-Time Threat Detection System at the Network Edge
Kota Tsuchie, Nobuyuki Nakamura, Toshihiko Matsunaga, Taketsugu Yao (OKI) IN2021-31
Data leakages and malware infections from the network edge have become to a social issue. NDR is an expected technology ... [more] IN2021-31
pp.1-6
IN, IA
(Joint)
2021-12-17
18:25
Hiroshima Higashi-Senda campus, Hiroshima Univ.
(Primary: On-site, Secondary: Online)
[Short Paper] Developing vulnerability assessment system considering the severity
Yamakoshi Taiga, Tashima Koichi, Kondo Tohru, Watanabe Hidenobu, Kishiba Seigo, Nishimura Koji, Aibara Reiji (Hiroshima Univ.) IA2021-52
However, there are many points that need to be improved in order to effectively utilize the results of the vulnerability... [more] IA2021-52
pp.104-105
R 2021-11-30
13:25
Online Online Predicting Vulnerability Discovery Processes in Support Periods for an Operating System
Kento Kubota, Tadashi Dohi, Hiroyuki Okamura (Hiroshima Univ.) R2021-35
In this note, we classify the severity level of software vulnerabilities founded in Debian Linux Version 8.0, which is a... [more] R2021-35
pp.7-12
ICSS 2021-11-29
13:50
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Automation of Security Vulnerability Analysis by Auto-generated DFD
Shun Miyazaki, Junpei Kamimura (NEC) ICSS2021-48
System vulnerabilities can be caused by bugs such as buffer overflow, misconfigurations such as improper permission cont... [more] ICSS2021-48
pp.13-18
ICSS, IPSJ-SPT 2021-03-01
10:25
Online Online Construction of Vulnerability Evaluation System with Machine Learning Methods
Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota (KDDIR), Junpei Urakawa (KDS/KDDIR) ICSS2020-29
Recently, the cyberattacks aimed at software vulnerabilities are more popular and powerful. Therefore, various incidents... [more] ICSS2020-29
pp.19-24
CPSY, RECONF, VLD, IPSJ-ARC, IPSJ-SLDM [detail] 2021-01-26
15:05
Online Online Detection of Vulnerability Inducing Code Optimization Based on Binary Code
Yuka Azuma, Nagisa Ishiura (Kwansei Gakuin Univ.) VLD2020-65 CPSY2020-48 RECONF2020-84
In this paper, we propose a method to detect vulnerability inducing code elimination by compiler optimization. It is re... [more] VLD2020-65 CPSY2020-48 RECONF2020-84
pp.148-153
IN 2021-01-18
15:50
Online Online [Invited Talk] Risk Analysis Methods and Actual Conditions in Cyber Security
Kentaro Sonoda, Haruka Nakashima (NEC) IN2020-49
Risks in corporations mean business risks, and a cyber security (cyber attack) is positioned as one of the important bus... [more] IN2020-49
p.37
IA 2020-11-09
14:57
Hokkaido
(Primary: On-site, Secondary: Online)
Development and evaluation of efficient vulnerability scanning system for IoT networks
Kazusyoshi Watanabe, Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ) IA2020-19
In recent years, a security incident called DRDoS attack, which is a kind of DoS attack using reflections and amplificat... [more] IA2020-19
pp.7-12
IN, ICTSSL, NWS 2020-10-22
11:45
Online Online Vulnerability analysis of paths in backbone communication networks
Hiroya Kitagawa, Yukio Hayashi (JAIST) IN2020-31
Infrastructure networks such as communication networks are necessary in modern society. They become larger and more comp... [more] IN2020-31
pp.7-11
ICSS, IPSJ-SPT 2020-03-02
14:10
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
A Study on Fuzzing for Device Drivers with AddressSanitizer
Kentaro Ishii (Kove Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kove Univ.) ICSS2019-76
A device driver is a program which runs with higher privilege in an operating system. If a device driver is compromised,... [more] ICSS2019-76
pp.49-53
ICSS, IPSJ-SPT 2020-03-03
09:30
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Preliminary Study of WAF Signature Generation by Utilizing Real-time Information on the Web
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-84
Zero-day attacks and attacks based on publicly disclosed vulnerability information are one of the major threats in netwo... [more] ICSS2019-84
pp.97-102
 Results 1 - 20 of 64  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan