Technical Committee on Information and Communication System Security (ICSS) |
[schedule] [select]
|
|
Chair |
|
Masakatsu Morii (Kobe Univ.) |
Vice Chair |
|
Yuu Miyake (KDDI Labs.), Hiroaki Kikuchi (Tokai Univ.) |
Secretary |
|
Shiho Moriai (Sony), Daisuke Inoue (NICT) |
Assistant |
|
Takashi Nishide (Kyushu Univ.) |
|
Conference Date |
Fri, Mar 16, 2012 10:20 - 16:15 |
Topics |
General |
Conference Place |
The Kikai Shinko Kaikan building |
Address |
3-5-8, Shibakoen, Minato-ku, Tokyo 105-0011 |
Transportation Guide |
6-minute walk from Kamiyacho Station, Tokyo Metro Hibiya Line http://www.jspmi.or.jp/english/about/access.html |
Contact Person |
Yutaka Miyake, KDDI R&D Laboratories Inc.
+81-3-3434-8224 |
Fri, Mar 16 AM 10:20 - 16:15 |
(1) |
10:20-10:45 |
Malicious QR Code and its protection |
Yuhei Watanabe, Yuki Kashii, Masakatu Morii (Kobe Univ.) |
(2) |
10:45-11:10 |
Proposal of a Method for Tracing Diffusion of Information and Preventing Information Leakage on Android |
Kenji Okuda, Ryo Nakatsuka, Toshihiro Yamauchi (Okayama Univ.) |
(3) |
11:10-11:35 |
A report on the state of blog publication photograph which can pinpoint the address |
Noriyuki Takada, Atsushi Kanai (Hosei Univ) |
(4) |
11:35-12:00 |
Self-Protectable Secure Name Mapping System (S2NMS) |
Ruidong Li, Ved P. Kafle, Hiroaki Harai (NICT) |
|
12:00-13:20 |
Lunch Break ( 80 min. ) |
(5) |
13:20-13:45 |
Device for Transparent Probabilistic Packet Marking |
Akira Kanaoka (Univ. of Tsukuba), Masayuki Okada (Univ. of Tsukuba/JPNIC), Eiji Okamoto (Univ. of Tsukuba) |
(6) |
13:45-14:10 |
Study of Quantification Method of Security Measures by Consideration of Reachability of Attacks |
Tetsuro Kito, Satoshi Kai, Tomohiro Shigemoto, Satoshi Takemoto, Tadashi Kaji (Hitachi) |
(7) |
14:10-14:35 |
A Behavior-based Detection Method for Outbreaks of Low-rate Attacks |
Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun'ichi Takeuchi (ISIT) |
|
14:35-15:00 |
Break ( 25 min. ) |
(8) |
15:00-15:25 |
A malicious packet visualization in darknet and its application to malware analysis |
Naoto Sone (Naruto Univ.), Tatsuya Syoriki, Akihisa Torii, Taketo Murao, Masakatu Morii (Kobe Univ.) |
(9) |
15:25-15:50 |
A Proposal on Dynamic Decision Making Model for Cyber Attack and Defense Strategy |
Naoshi Sato (IISEC), Hitoshi Watanabe (SUT) |
(10) |
15:50-16:15 |
Evaluation of Anti-Malware User Support System through Field Experiments |
Toshihiko Kasagi (KDDI), Takayuki Yoda, Hiroki Yamaguchi (Hitachi), Yuji Hoshizawa (Securebrain), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ICSS |
Technical Committee on Information and Communication System Security (ICSS) [Latest Schedule]
|
Contact Address |
Yutaka Miyake (KDDI R&D Laboratories, Inc.)
TEL: +81-49-278-7367, FAX: +81-49-278-7510
E-: is-qst |
Announcement |
Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html |
Last modified: 2012-01-20 14:53:49
|