Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2024-03-22 15:45 |
Nagasaki |
Ikinoshima Hall (Primary: On-site, Secondary: Online) |
Software Vulnerability Risk Growth Model for CVSS 4 Metrics Sora Okada, Takashi Minohara, Masaya Shimakawa (Takushoku Univ.) CPSY2023-47 DC2023-113 |
Information system administrators must pay attention to system vulnerability information and take appropriate measures a... [more] |
CPSY2023-47 DC2023-113 pp.53-58 |
NS, IN (Joint) |
2024-02-29 11:35 |
Okinawa |
Okinawa Convention Center |
Identification Method of Vulnerable Target Areas for Crossfire Attacks Tianyu Wang, Noriaki Kamiyama (Ritsumeikan Univ.) NS2023-195 |
CFA(Crossfire Attack)is distinguished from other DDoS(Distributed Denial of Service)attacks by its characteristic of tar... [more] |
NS2023-195 pp.137-142 |
ICSS |
2023-11-17 14:20 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Proposal for a Test Tool Enabling Programmatic Description of Test Scenarios in OpenID Connect Junki Yuasa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) ICSS2023-66 |
Single sign-on (SSO) is a mechanism that allows users to log in to multiple web services with single-user authentication... [more] |
ICSS2023-66 pp.108-113 |
SS, KBSE, IPSJ-SE [detail] |
2023-07-21 11:00 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
A tool for vulnerability assessment and checksum verification using SPDX documents Rio Kishimoto, Tetsuya Kanda (Osaka Univ.), Yuki Manabe (The Univ. of Fukuchiyama), Katsuro Inoue (Nanzan Univ.), Yoshiki Higo (Osaka Univ.) SS2023-8 KBSE2023-19 |
Libraries are widely used in recent software development, but their management is insufficient, and there are problems s... [more] |
SS2023-8 KBSE2023-19 pp.43-48 |
IA, ICSS |
2023-06-21 09:30 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
A Precise Approach of Software Vulnerability Detection Using Set Similarity Calculation Algorithm Reika Arakawa, Yo Kanemoto, Eitaro Shioji, Mitsuaki Akiyama (NTT) IA2023-7 ICSS2023-7 |
(To be available after the conference date) [more] |
IA2023-7 ICSS2023-7 pp.32-39 |
ISEC |
2023-05-17 15:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities (from BRAIN 2023) Chihiro Kado, Naoto Yanai, Jason Paul Cruz (Osaka Univ.), Shingo Okamura (NIT, Nara College) ISEC2023-11 |
Vulnerabilities are an important issue in Ethereum smart contracts. Although various vulnerability analysis tools have b... [more] |
ISEC2023-11 pp.62-64 |
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2023-03-24 09:00 |
Kagoshima |
Amagi Town Disaster Prevention Center (Tokunoshima) (Primary: On-site, Secondary: Online) |
A preliminary study on time-dependency of cyber security vulnerability assessment Takashi Minohara, Naohiro Kubota (Takushoku Univ.) CPSY2022-42 DC2022-101 |
Information system administrators must pay attention to system vulnerability information and take appropriate measures a... [more] |
CPSY2022-42 DC2022-101 pp.49-54 |
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2023-03-24 09:25 |
Kagoshima |
Amagi Town Disaster Prevention Center (Tokunoshima) (Primary: On-site, Secondary: Online) |
Cai Wenxi, Tatsuhiro Tsuchiya (Osaka Univ.) CPSY2022-43 DC2022-102 |
(To be available after the conference date) [more] |
CPSY2022-43 DC2022-102 pp.55-59 |
IA, SITE, IPSJ-IOT [detail] |
2023-03-17 10:25 |
Gunma |
Maebashi Institute of Technology (Primary: On-site, Secondary: Online) |
[Invited Talk]
Dual-Use of Cybersecurity
-- From the Threat Landscape in Cyberspace with a Focus on IoT Security -- Tsukasa Ogino (CCDS) SITE2022-62 IA2022-85 |
The Internet of Things (IoT), in which automobiles, drones, home appliances, and other devices are connected via the Int... [more] |
SITE2022-62 IA2022-85 pp.45-52 |
NS, IN (Joint) |
2022-03-10 10:20 |
Online |
Online |
Implementation and Evaluation of Real-Time Threat Detection System at the Network Edge Kota Tsuchie, Nobuyuki Nakamura, Toshihiko Matsunaga, Taketsugu Yao (OKI) IN2021-31 |
Data leakages and malware infections from the network edge have become to a social issue. NDR is an expected technology ... [more] |
IN2021-31 pp.1-6 |
IN, IA (Joint) |
2021-12-17 18:25 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
[Short Paper]
Developing vulnerability assessment system considering the severity Yamakoshi Taiga, Tashima Koichi, Kondo Tohru, Watanabe Hidenobu, Kishiba Seigo, Nishimura Koji, Aibara Reiji (Hiroshima Univ.) IA2021-52 |
However, there are many points that need to be improved in order to effectively utilize the results of the vulnerability... [more] |
IA2021-52 pp.104-105 |
R |
2021-11-30 13:25 |
Online |
Online |
Predicting Vulnerability Discovery Processes in Support Periods for an Operating System Kento Kubota, Tadashi Dohi, Hiroyuki Okamura (Hiroshima Univ.) R2021-35 |
In this note, we classify the severity level of software vulnerabilities founded in Debian Linux Version 8.0, which is a... [more] |
R2021-35 pp.7-12 |
ICSS |
2021-11-29 13:50 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Automation of Security Vulnerability Analysis by Auto-generated DFD Shun Miyazaki, Junpei Kamimura (NEC) ICSS2021-48 |
System vulnerabilities can be caused by bugs such as buffer overflow, misconfigurations such as improper permission cont... [more] |
ICSS2021-48 pp.13-18 |
ICSS, IPSJ-SPT |
2021-03-01 10:25 |
Online |
Online |
Construction of Vulnerability Evaluation System with Machine Learning Methods Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota (KDDIR), Junpei Urakawa (KDS/KDDIR) ICSS2020-29 |
Recently, the cyberattacks aimed at software vulnerabilities are more popular and powerful. Therefore, various incidents... [more] |
ICSS2020-29 pp.19-24 |
CPSY, RECONF, VLD, IPSJ-ARC, IPSJ-SLDM [detail] |
2021-01-26 15:05 |
Online |
Online |
Detection of Vulnerability Inducing Code Optimization Based on Binary Code Yuka Azuma, Nagisa Ishiura (Kwansei Gakuin Univ.) VLD2020-65 CPSY2020-48 RECONF2020-84 |
In this paper, we propose a method to detect vulnerability inducing code elimination by compiler optimization. It is re... [more] |
VLD2020-65 CPSY2020-48 RECONF2020-84 pp.148-153 |
IN |
2021-01-18 15:50 |
Online |
Online |
[Invited Talk]
Risk Analysis Methods and Actual Conditions in Cyber Security Kentaro Sonoda, Haruka Nakashima (NEC) IN2020-49 |
Risks in corporations mean business risks, and a cyber security (cyber attack) is positioned as one of the important bus... [more] |
IN2020-49 p.37 |
IA |
2020-11-09 14:57 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Development and evaluation of efficient vulnerability scanning system for IoT networks Kazusyoshi Watanabe, Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ) IA2020-19 |
In recent years, a security incident called DRDoS attack, which is a kind of DoS attack using reflections and amplificat... [more] |
IA2020-19 pp.7-12 |
IN, ICTSSL, NWS |
2020-10-22 11:45 |
Online |
Online |
Vulnerability analysis of paths in backbone communication networks Hiroya Kitagawa, Yukio Hayashi (JAIST) IN2020-31 |
Infrastructure networks such as communication networks are necessary in modern society. They become larger and more comp... [more] |
IN2020-31 pp.7-11 |
ICSS, IPSJ-SPT |
2020-03-02 14:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
A Study on Fuzzing for Device Drivers with AddressSanitizer Kentaro Ishii (Kove Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kove Univ.) ICSS2019-76 |
A device driver is a program which runs with higher privilege in an operating system. If a device driver is compromised,... [more] |
ICSS2019-76 pp.49-53 |
ICSS, IPSJ-SPT |
2020-03-03 09:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Preliminary Study of WAF Signature Generation by Utilizing Real-time Information on the Web Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-84 |
Zero-day attacks and attacks based on publicly disclosed vulnerability information are one of the major threats in netwo... [more] |
ICSS2019-84 pp.97-102 |