Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-14 09:30 |
Osaka |
Osaka Univ. (Suita Campus) |
A Study on Malicious Communication Detection Using Attack Characteristics of Malware on an Internal Network. Ken Aono, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95 |
Recently, targeted attacks have been increasing.
Malicious attackers use malware to gain access to the organization's ... [more] |
IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95 pp.249-253 |
IA, SITE, IPSJ-IOT [detail] |
2024-03-12 16:00 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
Improvement of Unknown Malicious Domain Detection Based on DNS Query History Analysis Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech) SITE2023-83 IA2023-89 |
Network users are increasing and there is concern about the malware infection.
In some cases, malware-infected terminal... [more] |
SITE2023-83 IA2023-89 pp.92-97 |
IA |
2023-09-21 14:15 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Studies on Malicious Domain Detection Method based on Feature of DNS Communication History by using DNS Traffic Analysis Toshiki Koga, Daiki Nobayashi, Takeshi Ikenaga (KIT) IA2023-12 |
Malware on the Internet is causing increasing damage, and countermeasures are needed. In some cases, malware-infected te... [more] |
IA2023-12 pp.6-10 |
ICSS, IPSJ-SPT |
2023-03-14 13:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Assessment Method for Persistent Malware Infection on IoT Devices Shunki Soeda, Takahiro Inoue, Rui Tanabe, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-78 |
Malware targeting IoT devices has become a growing threat in recent years. Some of them continue to infect devices perma... [more] |
ICSS2022-78 pp.181-186 |
IA |
2022-11-21 16:20 |
Niigata |
Bandai Civic Hall (Niigata) (Primary: On-site, Secondary: Online) |
Outsourcing Malware Dynamic Analysis without Disclosing File Contents Keisuke Hamajima, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2022-44 |
Malware dynamic analysis requires specialized skills. If there are no security experts in the organization and it is dif... [more] |
IA2022-44 pp.47-51 |
RISING (3rd) |
2022-10-31 14:00 |
Kyoto |
Kyoto Terrsa (Day 1), and Online (Day 2, 3) |
[Poster Presentation]
Machine Learning Analyze for Undiscovered Malicious Domain Detection by using DNS Query Analysis Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech) |
Network users is increasing in recently and there is concern about the malware infection.
Malware exist various types a... [more] |
|
IA, ICSS |
2022-06-24 11:50 |
Nagasaki |
Univ. of Nagasaki (Primary: On-site, Secondary: Online) |
Studies on Blacklists based DNS Query Analysis for Malicious Domain Detection Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (Kyutech) IA2022-14 ICSS2022-14 |
Malware infection of network users is one of the critical threats on the Internet. Users have a risk of being infected w... [more] |
IA2022-14 ICSS2022-14 pp.76-80 |
ICSS, IPSJ-SPT |
2022-03-08 13:20 |
Online |
Online |
Analyzing network status of IoT malware by dynamic analysis with bare-metal device Kota Ogawa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2021-74 |
In this study, we first investigate the network state changes caused by IoT malware infection by executing malware sampl... [more] |
ICSS2021-74 pp.93-98 |
ICSS, IPSJ-SPT |
2022-03-08 13:40 |
Online |
Online |
ML-based detection of C&C communications for sandbox analysis of IoT malware Yuki Endo, Kaichi Sameshima, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2021-75 |
In order to analyze the behavior of malware, dynamic analysis has been widely utilized. Among various communication of m... [more] |
ICSS2021-75 pp.99-104 |
ICSS, IPSJ-SPT |
2022-03-08 14:20 |
Online |
Online |
Behavior Analysis of IoT Malware Using Function Call Sequence Graphs and Clustering Satoshi Takada, Tianxiang He (Kyushu Univ), Chansu Han, Akira Tanaka (NICT), Jun'ichi Takeuchi (Kyushu Univ) ICSS2021-77 |
Most IoT Malware is variants generated by editing and reusing a part of the functions based on publicly available source... [more] |
ICSS2021-77 pp.111-116 |
ICSS |
2021-11-30 09:55 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Comparison of CNN padding method using a part of malware API call sequence data with RNN. Shugo Asai, Yuichi Futa (TUT) ICSS2021-55 |
In recent years, as society has become more information-oriented, malware for information has been increasing. In such a... [more] |
ICSS2021-55 pp.55-60 |
ICSS, IPSJ-SPT |
2021-03-01 14:30 |
Online |
Online |
Analyzing the Transition of Vulnerabilities Targeted by IoT Malware Kaichi Sameshima, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-40 |
While the popularity of IoT devices are rapidly growing, vulnerable IoT devices have been the target of cyber-attacks. I... [more] |
ICSS2020-40 pp.84-89 |
ICSS, IPSJ-SPT |
2021-03-01 14:55 |
Online |
Online |
Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41 |
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] |
ICSS2020-41 pp.90-95 |
ICSS, IPSJ-SPT |
2021-03-02 10:00 |
Online |
Online |
Evaluation of Uncertain Reports by Multiple Anti-virus Engines Kazuya Nomura (Waseda Univ.), Mistuaki Akiyama (NTT), Masaki Kamizono (Deloitte Tohmatsu Cyber LLC), Takahiro Kasama (NICT) ICSS2020-56 |
VirusTotal is an online service that provides detection results from multiple anti-virus engines. It is used in a wide r... [more] |
ICSS2020-56 pp.178-183 |
ICSS, IPSJ-SPT |
2021-03-02 11:30 |
Online |
Online |
Detecting unknown malware families by anomaly detection using deep learning Ren Takeuchi, Shintaro Mizuno, Vo Ngoc Khoi Nguyen, Jun Tsuchiya, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.) ICSS2020-59 |
The analysis of malware has become an indispensable process for anti-malware. Malware is diversifying day by day, so tha... [more] |
ICSS2020-59 pp.195-200 |
ICSS |
2020-11-26 14:25 |
Online |
Online |
Function Estimation for Malwares based on Similarity and Its Effectiveness Kohei Kodama, Hiroshi Kai (Ehime Univ.), Masakatu Morii (Kobe Univ.) ICSS2020-21 |
In this paper, we consider about a method which estimates malware functions using the results of malware dynamic analysi... [more] |
ICSS2020-21 pp.13-16 |
ICSS, IPSJ-SPT |
2020-03-02 16:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2019-81 |
While IoT malware such as Mirai have been targeting Telnet services, there are still many devices that are still running... [more] |
ICSS2019-81 pp.79-84 |
ICSS |
2019-11-13 13:30 |
Miyazaki |
MRT Terrace(Miyazaki) |
Recovery method of execution environment infected with ransomware by analyzing time series data of system calls Hirotaka Hiraki, Hideya Ochiai, Hiroshi Esaki (Tokyo Univ.) ICSS2019-60 |
Today, keeping the computer environment safe is a very important issue. Among the malware, it is often difficult in prac... [more] |
ICSS2019-60 pp.1-5 |
ICSS, IPSJ-SPT |
2019-03-07 14:20 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
How to build malware sandbox using real IoT devices Jia Xiong, Tatsuya Tamai, Kazuki Tamiya (Yokohama National Univ.), Satoshi Hara (Yokohama National Univ./Fujisoft), Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2018-69 |
In spite of their increasing importance in the battle against evolving IoT threats, construction of IoT malware sandboxe... [more] |
ICSS2018-69 pp.7-12 |
IN, NS (Joint) |
2019-03-05 11:50 |
Okinawa |
Okinawa Convention Center |
Proposal of malicious device detection method by DNS query/response log analysis using machine learning Issei Nakasone, Kitaguchi Yoshiaki, Yamaoka Katsunori (Tokyo Tech) IN2018-129 |
One common way for detecting malware devices in a network is to use a blacklist based on signature detection.However, in... [more] |
IN2018-129 pp.271-276 |