Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2023-03-13 15:00 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
ICSS2022-58 |
(To be available after the conference date) [more] |
ICSS2022-58 pp.61-66 |
ICSS, IPSJ-SPT |
2017-03-13 17:05 |
Nagasaki |
University of Nagasaki |
Effective Analysis of Macro Malware Based on Clustering Toshinori Usui (NTT), Tomonori Ikuse (NTT Security Japan), Makoto Iwamura, Takeshi Yada (NTT) ICSS2016-55 |
[more] |
ICSS2016-55 pp.91-96 |
ICSS, IPSJ-SPT |
2016-03-04 10:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Static Detection of ROP Chain Based on Hidden Markov Model Toshinori Usui, Tomonori Ikuse, Makoto Iwamura, Takeshi Yada (NTT) ICSS2015-59 |
Threats of targeted attacks have been widely observed. The targeted attacks generally utilize malicious documents that c... [more] |
ICSS2015-59 pp.71-76 |
ICSS |
2015-03-04 09:00 |
Okinawa |
Meio Univiersity |
Novel USB Hub against the Malicious USB Devices Tatsuya Takehisa (NICT/Nissin), Makoto Iwamura (NICT/NTT), Hayato Ushimaru (NICT/CDI), Daisuke Inoue (NICT) ICSS2014-73 |
USB devices that adapt USB interfaces (USB keyboards and USB mouses) are prevalent. However, a new attack has been repor... [more] |
ICSS2014-73 pp.61-66 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 13:30 |
Hokkaido |
|
Identifying the Code to be Analyzed with Taint Tags Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu (NTT) ISEC2012-20 SITE2012-16 ICSS2012-22 EMM2012-12 |
[more] |
ISEC2012-20 SITE2012-16 ICSS2012-22 EMM2012-12 pp.77-82 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 15:25 |
Hokkaido |
|
Detecting Invalid Control Flow with Pseudo-Dispersion of Program Code Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu (NTT) ISEC2012-24 SITE2012-20 ICSS2012-26 EMM2012-16 |
Attacks that modify the control flow of a running program by corrupting memory address pointers have been a major threat... [more] |
ISEC2012-24 SITE2012-20 ICSS2012-26 EMM2012-16 pp.103-108 |
IA, ICSS |
2011-06-17 13:50 |
Fukuoka |
Kyushu Institute of Technology |
DenseShip: Virtual Machine Monitor Specialized for Server-Type Honeypot Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT) IA2011-11 ICSS2011-11 |
(To be available after the conference date) [more] |
IA2011-11 ICSS2011-11 pp.63-68 |
ICSS |
2011-03-25 15:10 |
Tokyo |
Suspended |
Automatic Unpacking Based on Entropy of Memory-Access Values Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.) ICSS2010-63 |
Malware executables are often obfuscated with encryption or compression using a technique known as packing, thus perform... [more] |
ICSS2010-63 pp.41-46 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 13:25 |
Aomori |
Hirosaki University |
Evaluating Destination Hosts of Malware Based on Search Engine Results Kazufumi Aoki, Mitsuaki Akiyama, Makoto Iwamura, Mitsutaka Itoh (NTT) ISEC2010-18 SITE2010-14 ICSS2010-24 |
Malware dynamic analysis using isolated environment couldn't obtain enough results because existing malwares (e.g., Bots... [more] |
ISEC2010-18 SITE2010-14 ICSS2010-24 pp.75-80 |
IA, ICSS |
2010-06-17 13:55 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Automatic OEP Finding Method for Malware Unpacking Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT) IA2010-3 ICSS2010-3 |
Malware analysts have to first extract hidden original code from a packed executable to analyze malware functionalities,... [more] |
IA2010-3 ICSS2010-3 pp.13-18 |
IA, ICSS |
2010-06-17 14:20 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
How to Identify Code Region after Detecting Entry Point of Malware Makoto Iwamura, Mitsutaka Itoh (NTT/Waseda Univ.), Yoichi Muraoka (Waseda Univ.) IA2010-4 ICSS2010-4 |
The goal of many existing methods for unpacking was finding OEP (Original Entry Point), not identifying where the origin... [more] |
IA2010-4 ICSS2010-4 pp.19-24 |
IA, ICSS |
2010-06-18 13:55 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
An Empirical Investigation of Gumblar Evolution Mitsuaki Akiyama, Kazumichi Sato, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.) IA2010-13 ICSS2010-13 |
Due to incidents of web-based malware infection lead by a tampered web content, called Gumblar, clarification of
the ac... [more] |
IA2010-13 ICSS2010-13 pp.69-74 |
IA, SITE |
2009-03-05 14:00 |
Kumamoto |
|
Evaluation of Black Domain List by Using DNS Query Graph Keisuke Ishibashi, Tsuyoshi Toyono, Kazumichi Sato, Makoto Iwamura (NTT) SITE2008-47 IA2008-70 |
Botnet hosts, which can be controlled by malicious operators for executing DDoS attacks or spamming,
have been one of t... [more] |
SITE2008-47 IA2008-70 pp.19-24 |