IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 82 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2022-03-08
15:10
Online Online Simulation of security notification by ISP to malware-infected users
Xuping Huang (AIIT/YNU), Shunsuke Mochizuki (NTT Data Mathematical Systems Inc), Akira Fujita (NICT/YNU), Katsunari Yoshioka (YNU) ICSS2021-82
(To be available after the conference date) [more] ICSS2021-82
pp.141-146
ICSS, IPSJ-SPT 2022-03-08
15:30
Online Online Verifying concept of personalized malware by investigating end-user environments
Daigo Ichikawa, Rui Tanabe, XU Haoyuan, Yoshioka Katsunari, Matsumoto Tsutomu (YNU) ICSS2021-83
Personalized malware conducts malicious activities only when it is running on the target environment. Previous studies h... [more] ICSS2021-83
pp.147-152
IA, ICSS 2021-06-22
09:25
Online Online Analtsis of cost-effectiveness in malicious site detection using VirusTotal
Kyohei Takao (YNU), Hiroshi Mori (Deloitte Tohmatsu Cyber LLC), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) IA2021-10 ICSS2021-10
VirusTotal receives to-be-tested files and URLs and provides scan results by more than 70 security software.
Its incre... [more]
IA2021-10 ICSS2021-10
pp.50-55
IA, ICSS 2021-06-22
09:50
Online Online Etherpot: A honeypot for observing cyberattacks on Ethereum client
Wang Jia, Sasaki Takayuki (Yokohama National Univ.), Omote Kazumasa (Univ. of Tsukuba), Yoshioka Katsunari, Matsumoto Tsutomu (Yokohama National Univ.) IA2021-11 ICSS2021-11
In recent years, Ethereum has received a great deal of attention with the functionality to perform arbitrary programmabl... [more] IA2021-11 ICSS2021-11
pp.56-61
ICSS, IPSJ-SPT 2021-03-01
14:30
Online Online Analyzing the Transition of Vulnerabilities Targeted by IoT Malware
Kaichi Sameshima, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-40
While the popularity of IoT devices are rapidly growing, vulnerable IoT devices have been the target of cyber-attacks. I... [more] ICSS2020-40
pp.84-89
ICSS, IPSJ-SPT 2021-03-01
14:55
Online Online Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox
Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] ICSS2020-41
pp.90-95
ICSS, IPSJ-SPT 2021-03-02
11:05
Online Online Study on analyzing Memcached DRDoS attacks and their infrastructures
Mizuki Kondo, Natsuo Shintani (YNU), Daisuke Makita (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-45
Internet-facing Memcached services are known to have been misused as powerful reflectors of DRDoS attacks. In this paper... [more] ICSS2020-45
pp.114-119
ICSS, IPSJ-SPT 2021-03-02
09:35
Online Online An Efficient Discovery of Malicious URL Using VirusTotal and Web Access Log
Chika Hiraishi, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-55
The threats of malicious websites are increasing that, urgent countermeasures are needed. Using a block list of known ma... [more] ICSS2020-55
pp.172-177
ICSS, IPSJ-SPT 2021-03-02
10:25
Online Online Proof of concept of sandbox evasion attack using email address stored in target machine
Yuta Inoue, Rui Tanabe (YNU), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-57
In recent years, malware sandbox appliances that dynamically analyze target files are becoming popular. However, malware... [more] ICSS2020-57
pp.184-189
ICSS, IPSJ-SPT 2020-03-02
16:00
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation
Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2019-81
While IoT malware such as Mirai have been targeting Telnet services, there are still many devices that are still running... [more] ICSS2019-81
pp.79-84
ICSS, IPSJ-SPT 2020-03-02
16:20
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Mirai may detect that you talk to smart speaker -- On privacy violation by attackers who compromised home router --
Shoya Okuda, Tatsuya Tamai, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2019-82
In this study, we analyze the traffic of four popular smart speakers to assess the risk of privacy invasion by attackers... [more] ICSS2019-82
pp.85-90
ICSS, IPSJ-SPT 2020-03-02
11:30
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
An Evaluation of Contact Points for Security Notifications
Miori Saito, Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2019-94
With the evolving threat of cyber attacks, the importance of security notifications is increasing. In general, informati... [more] ICSS2019-94
pp.195-200
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
10:20
Kochi Kochi University of Technology An Approach to Attack Scenario Generation for Simulation of Targeted Attacks
Yusuke Takahashi, Shigeyoshi Shima, Atsunori Naito (NEC), Rui Tanabe, Katsunari Yoshioka (YNU) ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16
Cyber exercise is implemented by security organizations for the purpose of development of human re-sources against targe... [more] ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16
pp.7-14
ICSS, IPSJ-SPT 2019-03-07
14:20
Okinawa NICT Okinawa Electromagnetic Technology Center How to build malware sandbox using real IoT devices
Jia Xiong, Tatsuya Tamai, Kazuki Tamiya (Yokohama National Univ.), Satoshi Hara (Yokohama National Univ./Fujisoft), Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2018-69
In spite of their increasing importance in the battle against evolving IoT threats, construction of IoT malware sandboxe... [more] ICSS2018-69
pp.7-12
ICSS, IPSJ-SPT 2019-03-07
14:45
Okinawa NICT Okinawa Electromagnetic Technology Center Discrimination of IoT devices by clustering their responses to network scan
Takuya Hoizumi, Shin Nishida, Keisuke Uchida, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
 [more]
ICSS, IPSJ-SPT 2019-03-07
15:50
Okinawa NICT Okinawa Electromagnetic Technology Center An experiment design of security notification to users of IoT devices through dedicated client software
Shin Nishida, Takuya Hoizumi, Keisuke Uchida, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2018-75
Notification of vulnerability and malware infection of IoT devices to the stakeholders is becoming increasingly importan... [more] ICSS2018-75
pp.41-46
ICSS 2018-11-22
14:20
Kagoshima   Part II: Calculating Similarity between IoT Malware over CPU Architectures
Ryoichi Isawa, Tao Ban (NICT), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2018-66
At the ICSS workshop held in June, 2018, we proposed a method for calculating
similarity between IoT malware samples ov... [more]
ICSS2018-66
pp.73-78
ICSS, IA 2018-06-25
13:25
Ehime Ehime University Calculating Similarity between IoT Malware Samples over CPU Architectures
Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) IA2018-2 ICSS2018-2
Malware samples infecting IoT (Internet of Things) devices such as Web cameras and
home routers have spread over the In... [more]
IA2018-2 ICSS2018-2
pp.7-12
ICSS, IPSJ-SPT 2018-03-08
09:20
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Considering Opcode-based Similarity between IoT Malware Samples
Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2017-69
In this paper, we generate a similarity matrix between IoT (Internet of Things) malware samples based on their disassemb... [more] ICSS2017-69
pp.109-114
ICSS, IPSJ-SPT 2018-03-08
09:45
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Evaluation of malware sandbox using evasive test samples
Kou Ishii, Wateru Ueno, Rui Tanabe (Yokohama National Univ.), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
 [more]
 Results 21 - 40 of 82 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan