Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2015-03-04 11:40 |
Okinawa |
Meio Univiersity |
Internet Alive Monitoring Method around Disaster Areas Using Large-scale Darknet, Autonomous System Information, and Geographical Information Mio Suzuki (NICT), Jumpei Shimamura (Clwit), Junji Nakazato, Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) ICSS2014-82 |
At the time of large natural disaster, the Internet could lost its functionalities caused by power outage and physical d... [more] |
ICSS2014-82 pp.115-120 |
ICSS |
2015-03-04 12:05 |
Okinawa |
Meio Univiersity |
Finding Network Address Blocks Intensively Used for Cyber Attacks Takuya Tsutsumi, Shuta Morishima, Shogo Suzuki, Kenichi Shibahara, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2014-83 |
Recently, cyber attacks have diversified on Internet, so immediate actions are required for them. In this report, we poi... [more] |
ICSS2014-83 pp.121-126 |
ICSS |
2015-03-04 10:25 |
Okinawa |
Meio Univiersity |
Improving certificate validation function in SSL/TLS implementations of web browser Satoshi Kamekawa (JAIST), Atsuko Miyaji (JAIST/JST CREST), Yuichi Futa (JAIST) ICSS2014-84 |
Secure Socket Layer(SSL)/Transport Layer Security(TLS) is a secure communication channel between a server and a client. ... [more] |
ICSS2014-84 pp.127-132 |
ICSS |
2015-03-04 10:50 |
Okinawa |
Meio Univiersity |
New Linear Correlations and Analysis Method for Key Recovery Attack of RC4 in WPA Daiki Michihiro (JAIST), Atsuko Miyaji (JAIST/JST CREST), Ryoma Ito (JAIST) ICSS2014-85 |
The first three bytes of the RC4 key in WPA are derived from the public parameter IV, and also the attacker can obtain t... [more] |
ICSS2014-85 pp.133-138 |
ICSS |
2015-03-04 11:15 |
Okinawa |
Meio Univiersity |
A Multi-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme For Line Topology Hitoshi Miyazaki (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-86 |
While many two-party fair exchange protocols have been proposed, more than three-party fair exchange protocol is require... [more] |
ICSS2014-86 pp.139-144 |
ICSS |
2015-03-04 11:40 |
Okinawa |
Meio Univiersity |
Consideration for Path Authentication for VANET with Group One-Way Cross-Networks Shoma Kitayama, Masakazu Soshi (Hiroshima City Univ.) ICSS2014-87 |
VANET (Vehicular Ad-hoc Network) is a wireless ad hoc network which interconnects many moving vehicles along roads.
The... [more] |
ICSS2014-87 pp.145-150 |
ICSS |
2015-03-04 13:40 |
Okinawa |
Meio Univiersity |
The Geographical Origin Estimation of Malware Using Language Information Masaru Kawakita, Shigeyoshi Shima (NEC) ICSS2014-88 |
Cyber attack using malware has become a social problem, it had an impact on the decision in the nation. In the conventio... [more] |
ICSS2014-88 pp.151-156 |
ICSS |
2015-03-04 14:05 |
Okinawa |
Meio Univiersity |
Targeted Malware Detection Focused on Dummy Document Display Yusuke Takahashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2014-89 |
In recent years, targeted attacks have become a bigger threat. Attackers usually try to intrude into targeted organizati... [more] |
ICSS2014-89 pp.157-161 |
ICSS |
2015-03-04 14:30 |
Okinawa |
Meio Univiersity |
Visualization of Various DoS Attacks Observed by Malware Sandbox Analysis Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2014-90 |
Nowadays, large-scaled DoS attacks from malware, such as bots, have become a big problem. There are several types of DoS... [more] |
ICSS2014-90 pp.163-168 |
ICSS |
2015-03-04 13:40 |
Okinawa |
Meio Univiersity |
Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-91 |
Information Centric Networking (ICN) is a promising paradigm for future architecture of the Internet. Content Centric Ne... [more] |
ICSS2014-91 pp.169-174 |
ICSS |
2015-03-04 14:05 |
Okinawa |
Meio Univiersity |
A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function Koji Tomida (Nagoya Inst. of Tech.), Hiroshi Doi (IISEC), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-92 |
Combining the concept of PEKS and IBE, the Identity-Based Encryption with Keyword Search (IBEKS) has been proposed. In I... [more] |
ICSS2014-92 pp.175-179 |
ICSS |
2015-03-04 14:30 |
Okinawa |
Meio Univiersity |
Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data Takeru Naruse (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-93 |
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for data access control on a cloud storage system. In ... [more] |
ICSS2014-93 pp.181-186 |
ICSS |
2015-03-04 15:05 |
Okinawa |
Meio Univiersity |
Understanding Android apps that are similar to legitimate ones Yuta Ishii, Takuya Watanabe (Waseda Univ.), Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.) ICSS2014-94 |
Because it is not hard to repackage Android apps, there are many repackaged apps in the wild. Previous studies have repo... [more] |
ICSS2014-94 pp.187-192 |
ICSS |
2015-03-04 15:30 |
Okinawa |
Meio Univiersity |
A Study on Risk Quantification Techniques for Android Applications with Category Information Takeshi Takahashi (NICT), Takao Mimura, Masata Nishida (SecureBrain), Koji Nakao (NICT) ICSS2014-95 |
[more] |
ICSS2014-95 pp.193-197 |
ICSS |
2015-03-04 15:55 |
Okinawa |
Meio Univiersity |
Evaluation on Malware Classification by Combining Traffic Analysis and Fuzzy Hashing of Malware Binary Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) ICSS2014-96 |
Recent cyber attacks frequently use variants of malware programs where existing functions are drastically improved and n... [more] |
ICSS2014-96 pp.199-204 |
ICSS |
2015-03-04 15:05 |
Okinawa |
Meio Univiersity |
A Message authentication scheme with variable-length MAC Yumiko Murakami, Nobuhiro Kobayashi (MELCO) ICSS2014-97 |
[more] |
ICSS2014-97 pp.205-210 |
ICSS |
2015-03-04 15:30 |
Okinawa |
Meio Univiersity |
Flexible Constructions of Hash Chains and Their Key Generation Shouki Nishiyama, Masakazu Soshi (Hiroshima City Univ.) ICSS2014-98 |
We have proposed simple and efficient authentication schemes with several
novel elaborate hash chains. In this paper... [more] |
ICSS2014-98 pp.211-216 |
ICSS |
2015-03-04 15:55 |
Okinawa |
Meio Univiersity |
An Experimental Implementation of Self Destructive Tamper Resistant Software and Its Evaluation Kazuomi Oishi (SIST), Naoki Yoshida, Naoki Watanabe, Jun'ichi Sakamoto, Tsutomu Matsumoto (YNU) ICSS2014-99 |
Self destructive tamper resistant software (SDTRS) has strong resistance
against attacker's analysis or modification
... [more] |
ICSS2014-99 pp.217-222 |