Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2012-03-16 13:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Study of Quantification Method of Security Measures by Consideration of Reachability of Attacks Tetsuro Kito, Satoshi Kai, Tomohiro Shigemoto, Satoshi Takemoto, Tadashi Kaji (Hitachi) ICSS2011-44 |
There are many users who feel uneasy about security to use cloud computing environment. To provide the cloud computing e... [more] |
ICSS2011-44 pp.31-36 |
KBSE |
2012-01-23 15:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Cause-Oriented Vulnerability Analysis of Security Requirements for Web Applications Hironori Nishino, Junya Sakai, Haruhiko Kaiya, Kenji Kaijiri (SU) KBSE2011-58 |
Use case models are frequently used to specify requirements for an information system, but such models do not permit us ... [more] |
KBSE2011-58 pp.31-36 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 13:25 |
Shizuoka |
Shizuoka University |
On Usage of Practical Web Application Source Code for Learning Support on Secure Coding Ryosuke Miyaji, Seikoh Nishita (Takushoku Univ) ISEC2011-22 SITE2011-19 ICSS2011-27 EMM2011-21 |
Security holes (vulnerabilities) in web applications causes security
incidents like personal information leakage and vi... [more] |
ISEC2011-22 SITE2011-19 ICSS2011-27 EMM2011-21 pp.123-129 |
ICM, LOIS |
2011-01-21 13:30 |
Nagasaki |
|
A Multi-Platform Vulnerability Management System Based on the Standard Protocol and Public Contents Akihito Nakamura (AIST) ICM2010-51 LOIS2010-62 |
Continuous vulnerability management is one of critical and effective controls to block security attacks. However, the ad... [more] |
ICM2010-51 LOIS2010-62 pp.105-110 |
SS |
2010-12-14 17:00 |
Gunma |
Ikaho-Onsen Hotel Tenbo |
An Injection Vulnerability Analysis of Web Applications using String-Taint Analysis Tatsunori Houan, Kazuya Onai, Seikoh Nishita (Takushoku Univ.) SS2010-45 |
String analysis is a static analysis of dynamically generated
strings in a target program. This paper presents a method... [more] |
SS2010-45 pp.37-42 |
DC |
2010-10-14 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Evaluation of Automated Testing Tools for Web Application Vulnerability Detection Ryosuke Nakai, Tatsuhiro Tsuchiya, Tohru Kikuno (Osaka Univ) DC2010-21 |
This paper reports an evaluation of some automatic testing tools for web
applications. These testing tools are intende... [more] |
DC2010-21 pp.19-23 |
IN |
2009-12-10 16:50 |
Hyogo |
KOBE UNIVERSITY |
[Invited Talk]
On Wireless LAN Security
-- Vulnerability on Cryptosystem -- Masakatu Morii (Kobe Univ.) IN2009-98 |
This paper presents some problem of the cryptosystem for Information Networks, Especially, it is noted for vulnerability... [more] |
IN2009-98 pp.65-68 |
LOIS, IE, ITE-ME, IEE-CMN |
2009-09-25 15:50 |
Hiroshima |
Hiroshima Univ. |
The Vulnerability Scanner for Client using Existing Vulnerability Databases Yosuke Todo, Yasuo Asakura, Masakatu Morii (Kobe Univ.) LOIS2009-37 IE2009-78 |
The threats of the attacks that exploit vulnerabilities in software are amazingly increased in recent years. Because of ... [more] |
LOIS2009-37 IE2009-78 pp.107-112 |
IA, ICSS |
2009-06-19 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Design and Evaluation of NGN/IPv6 Security Test System Kenji Rikitake, Masashi Eto, Mio Suzuki, Daisuke Inoue (NICT), Koji Nakao (NICT/KDDI), Satoshi Kobayashi, Suminobu Akiba (DIT) IA2009-18 ICSS2009-26 |
In this paper, we propose a system design methodology for performing
vulnerability tests of NGN and IPv6 protocol suite... [more] |
IA2009-18 ICSS2009-26 pp.97-102 |
SWIM |
2009-03-27 14:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
[Special Talk]
Power and braking of mashup Nobuhiro Kataoka (Tokai Univ.) SWIM2008-27 |
Mashup calls service of other web sites and builds a new web site. Service is a self-conclusion function that is realize... [more] |
SWIM2008-27 pp.9-14 |
SITE, IPSJ-EIP |
2008-05-30 13:50 |
Tochigi |
Utsunomiya University |
Legal analysis between error and vulnerability Ikuo Takahashi (lawyer) |
Some vulnerability fall into the “defect” for which developer is responsible legally and the other is nothing more than ... [more] |
SITE2008-3 pp.11-16 |
VLD, IPSJ-SLDM |
2008-05-09 15:00 |
Hyogo |
Kobe Univ. |
On Synthesizing a Heterogeneous Multiprocessor System under Real-Time and SEU Vulnerability Constraints Makoto Sugihara (Toyohashi Univ. of Tech./JST-CREST) VLD2008-13 |
Utilizing a heterogeneous multiprocessor system has become a popular design paradigm to build an embedded
system at a c... [more] |
VLD2008-13 pp.37-42 |
DC, CPSY, IPSJ-SLDM, IPSJ-EMB |
2008-03-27 10:30 |
Kagoshima |
|
String-Aware Information Flow Tracking to Detect Injection Attacks Satoshi Katsunuma, Ryota Shioya (Univ. of Tokyo), Hidetsugu Irie (JST), Masahiro Goshima, Shuichi Sakai (Univ. of Tokyo) DC2007-88 CPSY2007-84 |
High-level injection attacks, which exploit SQL injection and cross-site scripting, have a significant effect on compute... [more] |
DC2007-88 CPSY2007-84 pp.25-30 |
VLD, ICD |
2008-03-05 13:25 |
Okinawa |
TiRuRu |
Task Scheduling Technique for Mitigating SEU Vulnerability of Heterogeneous Multiprocessor Systems Makoto Sugihara (TUT) VLD2007-138 ICD2007-161 |
Utilizing a heterogeneous multiprocessor system has become a popular
design paradigm to build an embedded system at a c... [more] |
VLD2007-138 ICD2007-161 pp.7-12 |
SS |
2008-03-04 09:55 |
Nagasaki |
Nagasaki Univ. |
A Proposal of The Secure Software Engineering Noriaki Saito, Satoshi Oda, Toshiyuki Miyazawa, Sakae Chikara, Toru Kawamura, Atsushi Kanai (NTT) SS2007-71 |
At the recent software design and development, a necessity of the security is increasing, though a developing term is sh... [more] |
SS2007-71 pp.85-90 |
SITE |
2007-11-02 15:05 |
Tokyo |
University of Electro-Communications |
Legal consideration on cryptographic research-groups' actions in case of finding vulnerability Yusuke Inomata, Kazuo Ohta, Noboru Kunihiro (UEC) SITE2007-42 |
We consider a research-group’s action in a case of finding a vulnerability of cryptographic protocol and/or products. W... [more] |
SITE2007-42 pp.15-20 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 16:10 |
Hokkaido |
Future University-Hakodate |
Evaluation of a library against injection attacks Takao Okubo (Fujitsu Labs./IISEC), Hidehiko Tanaka (IISEC) |
Injection vulnerabilities, which enable attacks done by injecting command string into input data, have big percentage of... [more] |
ISEC2007-41 SITE2007-35 pp.177-184 |
SS, KBSE |
2006-10-26 13:15 |
Ehime |
Ehime University |
Detecting Web Application Vulnerabilities with Static Analysis Seikoh Nishita (Takushoku Univ.) |
This paper describes a technique for detecting vulnerability of Web applications such as SQL injection and cross-site sc... [more] |
SS2006-40 KBSE2006-16 pp.1-6 |
ISEC |
2006-05-19 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Liveness Detection and Failure to Enroll in Biometrics (3)
-- A Research on Vein Pattern Based Authentication, Part 2 -- Tsutomu Matsumoto, Tomoki Morishita, Li Wen (Yokohama Nat'l Univ.) |
This paper reports a method to evaluate the security of vein pattern based biometric authentication systems by using art... [more] |
ISEC2006-8 pp.53-60 |
IN, ICM, LOIS (Joint) |
2006-01-20 10:15 |
Kyoto |
Kyoto Univ. |
An Automatically Vulnerability Detection System of Network Resources for Supporting the Administrator Ryoji Hasui, Masami Mohri (The Univ. of Tokushima), Masakatu Morii (Kobe Univ.) |
Illegal computer access and the DoS attack using the vulnerability of software are problems. For this problem, the inspe... [more] |
OIS2005-82 pp.17-22 |