IEICE Technical Committee Submission System
Conference Paper's Information
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top Page Go Previous   [Japanese] / [English] 

Paper Abstract and Keywords
Presentation 2016-03-03 13:40
Analyzing Targeted Cyber Attacks by Focusing on Contents of Decoy Documents
Natsuko Kawakami, Ryota kikkawa, Ying Tie, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
Abstract (in Japanese) (See Japanese page) 
(in English) In recent targeted cyberattacks, targeted malware display embedded or downloaded decoy documents upon their execution as a camouflage. In this study, we focus on the contents of the decoy documents obtained from samples used for targeted attacks. We show that we can often infer potential targets of the samples from the contents of the decoy documents. Moreover, we show and confirm that although most of the decoy documents are from publically available information, some decoy documents contain confidential information that is available for only limited group of people implying that at least one of them has been already compromised.
Keyword (in Japanese) (See Japanese page) 
(in English) Targeted attacks / Integrated malware analysis service / Decoy document / / / / /  
Reference Info. IEICE Tech. Rep.
Paper #  
Date of Issue  
ISSN Print edition: ISSN 0913-5685  Online edition: ISSN 2432-6380
Download PDF

Conference Information
Committee ICSS IPSJ-SPT  
Conference Date 2016-03-03 - 2016-03-04 
Place (in Japanese) (See Japanese page) 
Place (in English) Academic Center for Computing and Media Studies, Kyoto University 
Topics (in Japanese) (See Japanese page) 
Topics (in English) Information and Communication System Security, etc. 
Paper Information
Registration To ICSS 
Conference Code 2016-03-ICSS-SPT 
Language Japanese 
Title (in Japanese) (See Japanese page) 
Sub Title (in Japanese) (See Japanese page) 
Title (in English) Analyzing Targeted Cyber Attacks by Focusing on Contents of Decoy Documents 
Sub Title (in English)  
Keyword(1) Targeted attacks  
Keyword(2) Integrated malware analysis service  
Keyword(3) Decoy document  
Keyword(4)  
Keyword(5)  
Keyword(6)  
Keyword(7)  
Keyword(8)  
1st Author's Name Natsuko Kawakami  
1st Author's Affiliation Yokohama National University (YNU)
2nd Author's Name Ryota kikkawa  
2nd Author's Affiliation Yokohama National University (YNU)
3rd Author's Name Ying Tie  
3rd Author's Affiliation Yokohama National University (YNU)
4th Author's Name Rui Tanabe  
4th Author's Affiliation Yokohama National University (YNU)
5th Author's Name Katsunari Yoshioka  
5th Author's Affiliation Yokohama National University (YNU)
6th Author's Name Tsutomu Matsumoto  
6th Author's Affiliation Yokohama National University (YNU)
7th Author's Name  
7th Author's Affiliation ()
8th Author's Name  
8th Author's Affiliation ()
9th Author's Name  
9th Author's Affiliation ()
10th Author's Name  
10th Author's Affiliation ()
11th Author's Name  
11th Author's Affiliation ()
12th Author's Name  
12th Author's Affiliation ()
13th Author's Name  
13th Author's Affiliation ()
14th Author's Name  
14th Author's Affiliation ()
15th Author's Name  
15th Author's Affiliation ()
16th Author's Name  
16th Author's Affiliation ()
17th Author's Name  
17th Author's Affiliation ()
18th Author's Name  
18th Author's Affiliation ()
19th Author's Name  
19th Author's Affiliation ()
20th Author's Name  
20th Author's Affiliation ()
Speaker
Date Time 2016-03-03 13:40:00 
Presentation Time 30 
Registration for ICSS 
Paper #  
Volume (vol) IEICE-115 
Number (no) no.488 
Page  
#Pages IEICE- 
Date of Issue  


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan