IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 64 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2012-03-16
13:45
Tokyo Kikai-Shinko-Kaikan Bldg. Study of Quantification Method of Security Measures by Consideration of Reachability of Attacks
Tetsuro Kito, Satoshi Kai, Tomohiro Shigemoto, Satoshi Takemoto, Tadashi Kaji (Hitachi) ICSS2011-44
There are many users who feel uneasy about security to use cloud computing environment. To provide the cloud computing e... [more] ICSS2011-44
pp.31-36
KBSE 2012-01-23
15:00
Tokyo Kikai-Shinko-Kaikan Bldg. Cause-Oriented Vulnerability Analysis of Security Requirements for Web Applications
Hironori Nishino, Junya Sakai, Haruhiko Kaiya, Kenji Kaijiri (SU) KBSE2011-58
Use case models are frequently used to specify requirements for an information system, but such models do not permit us ... [more] KBSE2011-58
pp.31-36
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2011-07-13
13:25
Shizuoka Shizuoka University On Usage of Practical Web Application Source Code for Learning Support on Secure Coding
Ryosuke Miyaji, Seikoh Nishita (Takushoku Univ) ISEC2011-22 SITE2011-19 ICSS2011-27 EMM2011-21
Security holes (vulnerabilities) in web applications causes security
incidents like personal information leakage and vi... [more]
ISEC2011-22 SITE2011-19 ICSS2011-27 EMM2011-21
pp.123-129
ICM, LOIS 2011-01-21
13:30
Nagasaki   A Multi-Platform Vulnerability Management System Based on the Standard Protocol and Public Contents
Akihito Nakamura (AIST) ICM2010-51 LOIS2010-62
Continuous vulnerability management is one of critical and effective controls to block security attacks. However, the ad... [more] ICM2010-51 LOIS2010-62
pp.105-110
SS 2010-12-14
17:00
Gunma Ikaho-Onsen Hotel Tenbo An Injection Vulnerability Analysis of Web Applications using String-Taint Analysis
Tatsunori Houan, Kazuya Onai, Seikoh Nishita (Takushoku Univ.) SS2010-45
String analysis is a static analysis of dynamically generated
strings in a target program. This paper presents a method... [more]
SS2010-45
pp.37-42
DC 2010-10-14
14:40
Tokyo Kikai-Shinko-Kaikan Bldg Evaluation of Automated Testing Tools for Web Application Vulnerability Detection
Ryosuke Nakai, Tatsuhiro Tsuchiya, Tohru Kikuno (Osaka Univ) DC2010-21
This paper reports an evaluation of some automatic testing tools for web
applications. These testing tools are intende... [more]
DC2010-21
pp.19-23
IN 2009-12-10
16:50
Hyogo KOBE UNIVERSITY [Invited Talk] On Wireless LAN Security -- Vulnerability on Cryptosystem --
Masakatu Morii (Kobe Univ.) IN2009-98
This paper presents some problem of the cryptosystem for Information Networks, Especially, it is noted for vulnerability... [more] IN2009-98
pp.65-68
LOIS, IE, ITE-ME, IEE-CMN 2009-09-25
15:50
Hiroshima Hiroshima Univ. The Vulnerability Scanner for Client using Existing Vulnerability Databases
Yosuke Todo, Yasuo Asakura, Masakatu Morii (Kobe Univ.) LOIS2009-37 IE2009-78
The threats of the attacks that exploit vulnerabilities in software are amazingly increased in recent years. Because of ... [more] LOIS2009-37 IE2009-78
pp.107-112
IA, ICSS 2009-06-19
13:25
Tokyo Kikai-Shinko-Kaikan Bldg Design and Evaluation of NGN/IPv6 Security Test System
Kenji Rikitake, Masashi Eto, Mio Suzuki, Daisuke Inoue (NICT), Koji Nakao (NICT/KDDI), Satoshi Kobayashi, Suminobu Akiba (DIT) IA2009-18 ICSS2009-26
In this paper, we propose a system design methodology for performing
vulnerability tests of NGN and IPv6 protocol suite... [more]
IA2009-18 ICSS2009-26
pp.97-102
SWIM 2009-03-27
14:00
Tokyo Kikai-Shinko-Kaikan Bldg [Special Talk] Power and braking of mashup
Nobuhiro Kataoka (Tokai Univ.) SWIM2008-27
Mashup calls service of other web sites and builds a new web site. Service is a self-conclusion function that is realize... [more] SWIM2008-27
pp.9-14
SITE, IPSJ-EIP 2008-05-30
13:50
Tochigi Utsunomiya University Legal analysis between error and vulnerability
Ikuo Takahashi (lawyer)
Some vulnerability fall into the “defect” for which developer is responsible legally and the other is nothing more than ... [more] SITE2008-3
pp.11-16
VLD, IPSJ-SLDM 2008-05-09
15:00
Hyogo Kobe Univ. On Synthesizing a Heterogeneous Multiprocessor System under Real-Time and SEU Vulnerability Constraints
Makoto Sugihara (Toyohashi Univ. of Tech./JST-CREST) VLD2008-13
Utilizing a heterogeneous multiprocessor system has become a popular design paradigm to build an embedded
system at a c... [more]
VLD2008-13
pp.37-42
DC, CPSY, IPSJ-SLDM, IPSJ-EMB 2008-03-27
10:30
Kagoshima   String-Aware Information Flow Tracking to Detect Injection Attacks
Satoshi Katsunuma, Ryota Shioya (Univ. of Tokyo), Hidetsugu Irie (JST), Masahiro Goshima, Shuichi Sakai (Univ. of Tokyo) DC2007-88 CPSY2007-84
High-level injection attacks, which exploit SQL injection and cross-site scripting, have a significant effect on compute... [more] DC2007-88 CPSY2007-84
pp.25-30
VLD, ICD 2008-03-05
13:25
Okinawa TiRuRu Task Scheduling Technique for Mitigating SEU Vulnerability of Heterogeneous Multiprocessor Systems
Makoto Sugihara (TUT) VLD2007-138 ICD2007-161
Utilizing a heterogeneous multiprocessor system has become a popular
design paradigm to build an embedded system at a c... [more]
VLD2007-138 ICD2007-161
pp.7-12
SS 2008-03-04
09:55
Nagasaki Nagasaki Univ. A Proposal of The Secure Software Engineering
Noriaki Saito, Satoshi Oda, Toshiyuki Miyazawa, Sakae Chikara, Toru Kawamura, Atsushi Kanai (NTT) SS2007-71
At the recent software design and development, a necessity of the security is increasing, though a developing term is sh... [more] SS2007-71
pp.85-90
SITE 2007-11-02
15:05
Tokyo University of Electro-Communications Legal consideration on cryptographic research-groups' actions in case of finding vulnerability
Yusuke Inomata, Kazuo Ohta, Noboru Kunihiro (UEC) SITE2007-42
We consider a research-group’s action in a case of finding a vulnerability of cryptographic protocol and/or products. W... [more] SITE2007-42
pp.15-20
ISEC, SITE, IPSJ-CSEC 2007-07-19
16:10
Hokkaido Future University-Hakodate Evaluation of a library against injection attacks
Takao Okubo (Fujitsu Labs./IISEC), Hidehiko Tanaka (IISEC)
Injection vulnerabilities, which enable attacks done by injecting command string into input data, have big percentage of... [more] ISEC2007-41 SITE2007-35
pp.177-184
SS, KBSE 2006-10-26
13:15
Ehime Ehime University Detecting Web Application Vulnerabilities with Static Analysis
Seikoh Nishita (Takushoku Univ.)
This paper describes a technique for detecting vulnerability of Web applications such as SQL injection and cross-site sc... [more] SS2006-40 KBSE2006-16
pp.1-6
ISEC 2006-05-19
16:35
Tokyo Kikai-Shinko-Kaikan Bldg. Liveness Detection and Failure to Enroll in Biometrics (3) -- A Research on Vein Pattern Based Authentication, Part 2 --
Tsutomu Matsumoto, Tomoki Morishita, Li Wen (Yokohama Nat'l Univ.)
This paper reports a method to evaluate the security of vein pattern based biometric authentication systems by using art... [more] ISEC2006-8
pp.53-60
IN, ICM, LOIS
(Joint)
2006-01-20
10:15
Kyoto Kyoto Univ. An Automatically Vulnerability Detection System of Network Resources for Supporting the Administrator
Ryoji Hasui, Masami Mohri (The Univ. of Tokushima), Masakatu Morii (Kobe Univ.)
Illegal computer access and the DoS attack using the vulnerability of software are problems. For this problem, the inspe... [more] OIS2005-82
pp.17-22
 Results 41 - 60 of 64 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan