Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Comparison of accuracy of classification methods using machine learning for imaged malware Kenta Usui, Hiroki Tanioka, Masahiko Sano, Kenji Matsuura, Tetsushi Ueta (Tokushima Univ.) IT2023-114 ISEC2023-113 WBS2023-102 RCC2023-96 |
In recent years, the damage caused by malware has become more serious, and the increase in the number of variants of exi... [more] |
IT2023-114 ISEC2023-113 WBS2023-102 RCC2023-96 pp.254-258 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Improving The Classification Accuracy of Imaged Malware through Data Expansion Kaoru Yokobori, Hiroki Tanioka, Masahiko Sano, Kenji Matsuura, Tetsushi Ueta (Tokushima Univ.) IT2023-115 ISEC2023-114 WBS2023-103 RCC2023-97 |
Although malware-based attacks have existed for years,
malware infections increased in 2019 and 2020.
One of the reaso... [more] |
IT2023-115 ISEC2023-114 WBS2023-103 RCC2023-97 pp.259-264 |
IA |
2023-09-21 14:15 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Studies on Malicious Domain Detection Method based on Feature of DNS Communication History by using DNS Traffic Analysis Toshiki Koga, Daiki Nobayashi, Takeshi Ikenaga (KIT) IA2023-12 |
Malware on the Internet is causing increasing damage, and countermeasures are needed. In some cases, malware-infected te... [more] |
IA2023-12 pp.6-10 |
R |
2022-10-07 14:50 |
Fukuoka |
(Primary: On-site, Secondary: Online) |
A Note on A Transformer Encoder-Based Malware Classification Using API Calls Chen Li (Kyutech), Junjun Zheng (Osaka Univ.) R2022-36 |
Malware is a major security threat to computer systems and significantly impacts system reliability. Recurrent neural ne... [more] |
R2022-36 pp.25-30 |
ICSS |
2021-11-30 09:55 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Comparison of CNN padding method using a part of malware API call sequence data with RNN. Shugo Asai, Yuichi Futa (TUT) ICSS2021-55 |
In recent years, as society has become more information-oriented, malware for information has been increasing. In such a... [more] |
ICSS2021-55 pp.55-60 |
ICSS, IPSJ-SPT |
2021-03-02 11:05 |
Online |
Online |
Accuracy evaluation of CNNs and random forests with Malware API call sequences Shugo Asai, Futa Yuichi (TUT) ICSS2020-58 |
In this paper, we compare the accuracy of the results of classifying each malware family by Random Forest and CNN using ... [more] |
ICSS2020-58 pp.190-194 |
ICSS |
2018-11-22 14:20 |
Kagoshima |
|
Part II: Calculating Similarity between IoT Malware over CPU Architectures Ryoichi Isawa, Tao Ban (NICT), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2018-66 |
At the ICSS workshop held in June, 2018, we proposed a method for calculating
similarity between IoT malware samples ov... [more] |
ICSS2018-66 pp.73-78 |
ICSS, IPSJ-SPT |
2018-03-08 09:20 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Considering Opcode-based Similarity between IoT Malware Samples Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2017-69 |
In this paper, we generate a similarity matrix between IoT (Internet of Things) malware samples based on their disassemb... [more] |
ICSS2017-69 pp.109-114 |
ICSS, IPSJ-SPT |
2018-03-08 10:35 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
A Malware Detection Method by Machine Learning Focused on Malignant Activity Tadashi Shimomura, Nobuki Suetsugu, Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2017-71 |
In recent years, many researches on detection and classification of malware have been done. Among them, researches on te... [more] |
ICSS2017-71 pp.121-126 |
ICSS |
2017-11-20 15:15 |
Oita |
Beppu International Convention Center |
Preliminary Evaluation on the Program Classification at the Processor Level using Machine Learning Ryotaro Kobayashi (Kogakuin Univ.), Hayate Takase, Genki Otani, Ren Ohmura (Toyohashi Univ. of Tech.), Masahiko Kato (Univ. of Nagasaki) ICSS2017-39 |
As use of IoT devices becomes widespread, a lot of things are connected to the Internet, and the convenience of everyday... [more] |
ICSS2017-39 pp.5-10 |
ICSS |
2017-11-21 10:55 |
Oita |
Beppu International Convention Center |
Subspecies Classification for Malwares based on Visualization of Dynamic Analysis result Taiki Gouda, Korehito Kashiki, Keisuke Furumoto, Masakatu Morii (Kobe Univ.) ICSS2017-45 |
Along with the activation of malware infection activity, the appearance frequency of new subspecies also tends to increa... [more] |
ICSS2017-45 pp.41-45 |
ICSS, IPSJ-SPT |
2017-03-13 15:15 |
Nagasaki |
University of Nagasaki |
Supervised Classification for Detecting Malware Infected Host in HTTP Traffic and Long-time Evaluation for Detection Performance using Mixed Data Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT) ICSS2016-51 |
The importance of post-infection countermeasures has greatly increased. Such countermeasures include generating blacklis... [more] |
ICSS2016-51 pp.43-48 |
ICSS |
2016-11-25 14:15 |
Kanagawa |
Institute of Information Security |
Study of behavior each malware function from the API calls Nobuki Suetsugu, Masaki Hashimoto (IISEC) ICSS2016-40 |
In recent years, there are various studies to malicious behavior detection. In particular, for the detection, much techn... [more] |
ICSS2016-40 pp.9-14 |
ICSS |
2015-03-04 13:40 |
Okinawa |
Meio Univiersity |
The Geographical Origin Estimation of Malware Using Language Information Masaru Kawakita, Shigeyoshi Shima (NEC) ICSS2014-88 |
Cyber attack using malware has become a social problem, it had an impact on the decision in the nation. In the conventio... [more] |
ICSS2014-88 pp.151-156 |
ICSS |
2015-03-04 15:55 |
Okinawa |
Meio Univiersity |
Evaluation on Malware Classification by Combining Traffic Analysis and Fuzzy Hashing of Malware Binary Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) ICSS2014-96 |
Recent cyber attacks frequently use variants of malware programs where existing functions are drastically improved and n... [more] |
ICSS2014-96 pp.199-204 |
LOIS |
2013-03-08 14:50 |
Okinawa |
|
A Study on Malware Traffic Detection by Using N-gram Probability Density Kenji Kawamoto (Waseda Univ.), Masatsugu Ichino, Yusuke Otsuki (Univ. of Electro-Comm.), Mitsuhiro Hatada (NTT), Hiroshi Yoshiura (Univ. of Electro-Comm.), Jiro Katto (Waseda Univ.) LOIS2012-102 |
The threat of malware is increasing.
Malware detection has thus become important for the safety of the Internet usage.
... [more] |
LOIS2012-102 pp.191-196 |
ICSS, IA |
2012-06-22 09:50 |
Tokyo |
Room 1206, 1st bldg, Takanawa Campus, Tokai University |
A High-Speed Classification Method based on Opcode of Malware Yang Zong, Hirofumi Yamaki, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) IA2012-8 ICSS2012-8 |
Malicious software in form of Internet worms, computer viruses, and trojan horses poses a major threat to the security o... [more] |
IA2012-8 ICSS2012-8 pp.43-48 |
NC |
2011-07-26 14:05 |
Hyogo |
Graduate School of Engineering, Kobe University |
A visualization method of Windows OS malware using SOM Ruo Ando (NICT) NC2011-40 |
As commodity OS has compound funcions and utilities, malware's behavisor has become complicated. In security incident an... [more] |
NC2011-40 pp.109-114 |
ICSS |
2009-11-13 16:45 |
Miyazaki |
University of Miyazaki |
A classification method for packet generation logic of darknet traffic based on characteristics of packet header Junji Nakazato (NICT), Jumpei Shimamura (ForSchooner), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2009-61 |
A large-scae darknet monitoring is an effective approach to grasp a global trend of malicious activities such as the pre... [more] |
ICSS2009-61 pp.43-48 |
IA, ICSS |
2009-06-19 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Study on Classification of Malware and it Applications Soma Katsute (Kobe Univ.), Kouki Yasumoto (NEC), Ryoichi Isawa (Kobe Univ./CRYPTO), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-19 ICSS2009-27 |
Recently, the increasing and spreading of the malwares become a big problem. Most of the malwares are subspieces and pa... [more] |
IA2009-19 ICSS2009-27 pp.103-108 |