IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 79  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-14
09:30
Osaka Osaka Univ. (Suita Campus) A Study on Malicious Communication Detection Using Attack Characteristics of Malware on an Internal Network.
Ken Aono, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95
Recently, targeted attacks have been increasing.
Malicious attackers use malware to gain access to the organization's ... [more]
IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95
pp.249-253
IA, SITE, IPSJ-IOT [detail] 2024-03-12
16:00
Okinawa Miyakojima City Future Creation Center
(Primary: On-site, Secondary: Online)
Improvement of Unknown Malicious Domain Detection Based on DNS Query History Analysis
Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech) SITE2023-83 IA2023-89
Network users are increasing and there is concern about the malware infection.
In some cases, malware-infected terminal... [more]
SITE2023-83 IA2023-89
pp.92-97
IA 2023-09-21
14:15
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
Studies on Malicious Domain Detection Method based on Feature of DNS Communication History by using DNS Traffic Analysis
Toshiki Koga, Daiki Nobayashi, Takeshi Ikenaga (KIT) IA2023-12
Malware on the Internet is causing increasing damage, and countermeasures are needed. In some cases, malware-infected te... [more] IA2023-12
pp.6-10
ICSS, IPSJ-SPT 2023-03-14
13:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Assessment Method for Persistent Malware Infection on IoT Devices
Shunki Soeda, Takahiro Inoue, Rui Tanabe, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-78
Malware targeting IoT devices has become a growing threat in recent years. Some of them continue to infect devices perma... [more] ICSS2022-78
pp.181-186
IA 2022-11-21
16:20
Niigata Bandai Civic Hall (Niigata)
(Primary: On-site, Secondary: Online)
Outsourcing Malware Dynamic Analysis without Disclosing File Contents
Keisuke Hamajima, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2022-44
Malware dynamic analysis requires specialized skills. If there are no security experts in the organization and it is dif... [more] IA2022-44
pp.47-51
RISING
(3rd)
2022-10-31
14:00
Kyoto Kyoto Terrsa (Day 1), and Online (Day 2, 3) [Poster Presentation] Machine Learning Analyze for Undiscovered Malicious Domain Detection by using DNS Query Analysis
Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech)
Network users is increasing in recently and there is concern about the malware infection.
Malware exist various types a... [more]

IA, ICSS 2022-06-24
11:50
Nagasaki Univ. of Nagasaki
(Primary: On-site, Secondary: Online)
Studies on Blacklists based DNS Query Analysis for Malicious Domain Detection
Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (Kyutech) IA2022-14 ICSS2022-14
Malware infection of network users is one of the critical threats on the Internet. Users have a risk of being infected w... [more] IA2022-14 ICSS2022-14
pp.76-80
ICSS, IPSJ-SPT 2022-03-08
13:20
Online Online Analyzing network status of IoT malware by dynamic analysis with bare-metal device
Kota Ogawa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2021-74
In this study, we first investigate the network state changes caused by IoT malware infection by executing malware sampl... [more] ICSS2021-74
pp.93-98
ICSS, IPSJ-SPT 2022-03-08
13:40
Online Online ML-based detection of C&C communications for sandbox analysis of IoT malware
Yuki Endo, Kaichi Sameshima, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2021-75
In order to analyze the behavior of malware, dynamic analysis has been widely utilized. Among various communication of m... [more] ICSS2021-75
pp.99-104
ICSS, IPSJ-SPT 2022-03-08
14:20
Online Online Behavior Analysis of IoT Malware Using Function Call Sequence Graphs and Clustering
Satoshi Takada, Tianxiang He (Kyushu Univ), Chansu Han, Akira Tanaka (NICT), Jun'ichi Takeuchi (Kyushu Univ) ICSS2021-77
Most IoT Malware is variants generated by editing and reusing a part of the functions based on publicly available source... [more] ICSS2021-77
pp.111-116
ICSS 2021-11-30
09:55
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Comparison of CNN padding method using a part of malware API call sequence data with RNN.
Shugo Asai, Yuichi Futa (TUT) ICSS2021-55
In recent years, as society has become more information-oriented, malware for information has been increasing. In such a... [more] ICSS2021-55
pp.55-60
ICSS, IPSJ-SPT 2021-03-01
14:30
Online Online Analyzing the Transition of Vulnerabilities Targeted by IoT Malware
Kaichi Sameshima, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-40
While the popularity of IoT devices are rapidly growing, vulnerable IoT devices have been the target of cyber-attacks. I... [more] ICSS2020-40
pp.84-89
ICSS, IPSJ-SPT 2021-03-01
14:55
Online Online Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox
Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] ICSS2020-41
pp.90-95
ICSS, IPSJ-SPT 2021-03-02
10:00
Online Online Evaluation of Uncertain Reports by Multiple Anti-virus Engines
Kazuya Nomura (Waseda Univ.), Mistuaki Akiyama (NTT), Masaki Kamizono (Deloitte Tohmatsu Cyber LLC), Takahiro Kasama (NICT) ICSS2020-56
VirusTotal is an online service that provides detection results from multiple anti-virus engines. It is used in a wide r... [more] ICSS2020-56
pp.178-183
ICSS, IPSJ-SPT 2021-03-02
11:30
Online Online Detecting unknown malware families by anomaly detection using deep learning
Ren Takeuchi, Shintaro Mizuno, Vo Ngoc Khoi Nguyen, Jun Tsuchiya, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.) ICSS2020-59
The analysis of malware has become an indispensable process for anti-malware. Malware is diversifying day by day, so tha... [more] ICSS2020-59
pp.195-200
ICSS 2020-11-26
14:25
Online Online Function Estimation for Malwares based on Similarity and Its Effectiveness
Kohei Kodama, Hiroshi Kai (Ehime Univ.), Masakatu Morii (Kobe Univ.) ICSS2020-21
In this paper, we consider about a method which estimates malware functions using the results of malware dynamic analysi... [more] ICSS2020-21
pp.13-16
ICSS, IPSJ-SPT 2020-03-02
16:00
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation
Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2019-81
While IoT malware such as Mirai have been targeting Telnet services, there are still many devices that are still running... [more] ICSS2019-81
pp.79-84
ICSS 2019-11-13
13:30
Miyazaki MRT Terrace(Miyazaki) Recovery method of execution environment infected with ransomware by analyzing time series data of system calls
Hirotaka Hiraki, Hideya Ochiai, Hiroshi Esaki (Tokyo Univ.) ICSS2019-60
Today, keeping the computer environment safe is a very important issue. Among the malware, it is often difficult in prac... [more] ICSS2019-60
pp.1-5
ICSS, IPSJ-SPT 2019-03-07
14:20
Okinawa NICT Okinawa Electromagnetic Technology Center How to build malware sandbox using real IoT devices
Jia Xiong, Tatsuya Tamai, Kazuki Tamiya (Yokohama National Univ.), Satoshi Hara (Yokohama National Univ./Fujisoft), Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2018-69
In spite of their increasing importance in the battle against evolving IoT threats, construction of IoT malware sandboxe... [more] ICSS2018-69
pp.7-12
IN, NS
(Joint)
2019-03-05
11:50
Okinawa Okinawa Convention Center Proposal of malicious device detection method by DNS query/response log analysis using machine learning
Issei Nakasone, Kitaguchi Yoshiaki, Yamaoka Katsunori (Tokyo Tech) IN2018-129
One common way for detecting malware devices in a network is to use a blacklist based on signature detection.However, in... [more] IN2018-129
pp.271-276
 Results 1 - 20 of 79  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan