IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 13 of 13  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2023-03-13
15:00
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
ICSS2022-58 (To be available after the conference date) [more] ICSS2022-58
pp.61-66
ICSS, IPSJ-SPT 2017-03-13
17:05
Nagasaki University of Nagasaki Effective Analysis of Macro Malware Based on Clustering
Toshinori Usui (NTT), Tomonori Ikuse (NTT Security Japan), Makoto Iwamura, Takeshi Yada (NTT) ICSS2016-55
 [more] ICSS2016-55
pp.91-96
ICSS, IPSJ-SPT 2016-03-04
10:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University Static Detection of ROP Chain Based on Hidden Markov Model
Toshinori Usui, Tomonori Ikuse, Makoto Iwamura, Takeshi Yada (NTT) ICSS2015-59
Threats of targeted attacks have been widely observed. The targeted attacks generally utilize malicious documents that c... [more] ICSS2015-59
pp.71-76
ICSS 2015-03-04
09:00
Okinawa Meio Univiersity Novel USB Hub against the Malicious USB Devices
Tatsuya Takehisa (NICT/Nissin), Makoto Iwamura (NICT/NTT), Hayato Ushimaru (NICT/CDI), Daisuke Inoue (NICT) ICSS2014-73
USB devices that adapt USB interfaces (USB keyboards and USB mouses) are prevalent. However, a new attack has been repor... [more] ICSS2014-73
pp.61-66
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
13:30
Hokkaido   Identifying the Code to be Analyzed with Taint Tags
Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu (NTT) ISEC2012-20 SITE2012-16 ICSS2012-22 EMM2012-12
 [more] ISEC2012-20 SITE2012-16 ICSS2012-22 EMM2012-12
pp.77-82
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
15:25
Hokkaido   Detecting Invalid Control Flow with Pseudo-Dispersion of Program Code
Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu (NTT) ISEC2012-24 SITE2012-20 ICSS2012-26 EMM2012-16
Attacks that modify the control flow of a running program by corrupting memory address pointers have been a major threat... [more] ISEC2012-24 SITE2012-20 ICSS2012-26 EMM2012-16
pp.103-108
IA, ICSS 2011-06-17
13:50
Fukuoka Kyushu Institute of Technology DenseShip: Virtual Machine Monitor Specialized for Server-Type Honeypot
Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT) IA2011-11 ICSS2011-11
(To be available after the conference date) [more] IA2011-11 ICSS2011-11
pp.63-68
ICSS 2011-03-25
15:10
Tokyo Suspended Automatic Unpacking Based on Entropy of Memory-Access Values
Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.) ICSS2010-63
Malware executables are often obfuscated with encryption or compression using a technique known as packing, thus perform... [more] ICSS2010-63
pp.41-46
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
13:25
Aomori Hirosaki University Evaluating Destination Hosts of Malware Based on Search Engine Results
Kazufumi Aoki, Mitsuaki Akiyama, Makoto Iwamura, Mitsutaka Itoh (NTT) ISEC2010-18 SITE2010-14 ICSS2010-24
Malware dynamic analysis using isolated environment couldn't obtain enough results because existing malwares (e.g., Bots... [more] ISEC2010-18 SITE2010-14 ICSS2010-24
pp.75-80
IA, ICSS 2010-06-17
13:55
Kyoto Academic Center for Computing and Media Studies, Kyoto University Automatic OEP Finding Method for Malware Unpacking
Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT) IA2010-3 ICSS2010-3
Malware analysts have to first extract hidden original code from a packed executable to analyze malware functionalities,... [more] IA2010-3 ICSS2010-3
pp.13-18
IA, ICSS 2010-06-17
14:20
Kyoto Academic Center for Computing and Media Studies, Kyoto University How to Identify Code Region after Detecting Entry Point of Malware
Makoto Iwamura, Mitsutaka Itoh (NTT/Waseda Univ.), Yoichi Muraoka (Waseda Univ.) IA2010-4 ICSS2010-4
The goal of many existing methods for unpacking was finding OEP (Original Entry Point), not identifying where the origin... [more] IA2010-4 ICSS2010-4
pp.19-24
IA, ICSS 2010-06-18
13:55
Kyoto Academic Center for Computing and Media Studies, Kyoto University An Empirical Investigation of Gumblar Evolution
Mitsuaki Akiyama, Kazumichi Sato, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.) IA2010-13 ICSS2010-13
Due to incidents of web-based malware infection lead by a tampered web content, called Gumblar, clarification of
the ac... [more]
IA2010-13 ICSS2010-13
pp.69-74
IA, SITE 2009-03-05
14:00
Kumamoto   Evaluation of Black Domain List by Using DNS Query Graph
Keisuke Ishibashi, Tsuyoshi Toyono, Kazumichi Sato, Makoto Iwamura (NTT) SITE2008-47 IA2008-70
Botnet hosts, which can be controlled by malicious operators for executing DDoS attacks or spamming,
have been one of t... [more]
SITE2008-47 IA2008-70
pp.19-24
 Results 1 - 13 of 13  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan