Wed, Mar 7 PM Network Security 1(A) 13:00 - 14:40 |
(1) ICSS |
13:00-13:25 |
A Study on Malware Activity Detection Based on Real-time Analysis of Darknet Data Using Graphical Lasso |
Chansu Han (Kyushu Univ.), Jumpei Shimamura (Clwit Inc.), Takeshi Takahashi, Daisuke Inoue (NICT), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT) |
(2) ICSS |
13:25-13:50 |
Combining Local and Global Graph-based Features for Stealth Scan Detection on LAN |
Hiroki Nagayama, Bo HU, Kazunori Kamiya, Masaki Tanikawa (NTT) |
(3) ICSS |
13:50-14:15 |
Malware Detection by Anomaly of Traffic Data for IoT Devices |
Kana Sakano, Tetsutaro Uehara (Ritsumeikan Univ.) |
(4) ICSS |
14:15-14:40 |
Modeling Worm Propagation using Dynamic Patching |
Sugitani Yuki, Francois Bonnet, Miyaji Atsuko (Osaka Univ.) |
|
14:40-14:50 |
Break ( 10 min. ) |
Wed, Mar 7 PM Cryptography 1 (B) 13:00 - 14:15 |
(5) ICSS |
13:00-13:25 |
On the effectiveness of solving ECDLP using Characteristic set methods |
Tomoya Nishiguchi, Chen Mou, Kenta kodera, Atuko Miyaji (Osaka Univ.) |
(6) ICSS |
13:25-13:50 |
Application of Multi-Party Private Set-Intersection |
Motoi Hayashi, Katsunari Shishido, Atsuko Miyaji (Osaka Univ.) |
(7) ICSS |
13:50-14:15 |
An analysis of the Guo-Johansson-Stankovski attack against QC-MDPC codes |
Yohei Maezawa, Tung Chou, Atsuko Miyaji (Osaka Univ,) |
|
14:15-14:50 |
Break ( 35 min. ) |
Wed, Mar 7 PM Network Security 2(A) 14:50 - 16:30 |
(8) ICSS |
14:50-15:15 |
A study of decentralized IoT Security Controller |
Iifan Tyou, Hiroki Nagayama, Takuya Saeki, Yukio Nagafuchi, Masaki Tanikawa (NTT) |
(9) ICSS |
15:15-15:40 |
A study of security requirements and function implementation for home networks in a period of IoT expansion |
Shingo Kashima, Tsuyoshi Kondoh, Tetsuhiko Murata, Masami Ueno (NTT) |
(10) ICSS |
15:40-16:05 |
A Preliminary Study on Defining Malignant Activity by Linking in-System Elements |
Takuya Koike (IISEC), Miyuu Okubo (IRI), Hidenori Tsuji, Masaki Hashimoto (IISEC) |
(11) ICSS |
16:05-16:30 |
The spread and the containment of virus in random network model |
Taichi Nishino, Francois Bonnet, Atsuko Miyaji (Osaka Univ.) |
Wed, Mar 7 PM Cryptography 2(B) 14:50 - 16:05 |
(12) ICSS |
14:50-15:15 |
Safety evaluation of stream cipher, Salsa20/ChaCha20 by redesign of diffusion |
Yusuke Matsuoka, Atsuko Miyaji (Osaka Univ.) |
(13) ICSS |
15:15-15:40 |
Evaluation of HIBE based on Universal Sampler |
Shunsuke Otsuka, Akinori Kawachi, Atsuko Miyaji (Osaka Univ.) |
(14) ICSS |
15:40-16:05 |
|
|
Thu, Mar 8 AM Web Security 1(A) 09:20 - 11:00 |
(15) ICSS |
09:20-09:45 |
Estimate of Malicious Web Sites Based on Users' Web Access Behavior and Destination AS Numbers |
Kosuke Murakami, Jumpei Urakawa, Akira Yamada, Ayumu Kubota (KDDI Research) |
(16) ICSS |
09:45-10:10 |
Automatically Collecting User-initiated Web-based Attacks |
Takashi Koide, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT) |
(17) ICSS |
10:10-10:35 |
An Empirical Analysis of Online Advertising Fraud by analyzing User Activities Observed in the Ad Network |
Fumihiro Kanei, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT) |
(18) ICSS |
10:35-11:00 |
Darkweb Analysis System by Combining HSDir's Snooping and Active Scanning |
Akito Ono (Ritsumeikan Univ.), Masaki Kamizono (PwC Cyber Services), Takahiro Kasama (NICT), Tetsutaro Uehara (Ritsumeikan Univ.) |
|
11:00-11:10 |
Break ( 10 min. ) |
Thu, Mar 8 AM Malware(B) 09:20 - 11:00 |
(19) ICSS |
09:20-09:45 |
Considering Opcode-based Similarity between IoT Malware Samples |
Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) |
(20) ICSS |
09:45-10:10 |
Evaluation of malware sandbox using evasive test samples |
Kou Ishii, Wateru Ueno, Rui Tanabe (Yokohama National Univ.), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
(21) ICSS |
10:10-10:35 |
Research on an Evaluation Method for Memory Forensics Tools |
Makoto Ashitsu, Ikuo Tanaka, Hidenori Tsuji, Masaki Hashimoto (IISEC) |
(22) ICSS |
10:35-11:00 |
A Malware Detection Method by Machine Learning Focused on Malignant Activity |
Tadashi Shimomura, Nobuki Suetsugu, Hidenori Tsuji, Masaki Hashimoto (IISEC) |
|
11:00-11:10 |
Break ( 10 min. ) |
Thu, Mar 8 AM Web Security 2(A) 11:10 - 12:25 |
(23) ICSS |
11:10-11:35 |
Classification for Important Decoy Documents Based on Supervised Learning |
Yao Xiao, Shuta Morishima (Yokohama National Univ.), Tsuyufumi Watanabe (Yokohama National Univ./Fujisoft), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
(24) ICSS |
11:35-12:00 |
Predicting Website Abuse Using Update Histories |
Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT), Shigeki Goto (Waseda Univ.) |
(25) ICSS |
12:00-12:25 |
Analyzing web application vulnerability reports by machine learning |
Takaaki Nagumo, Yuusuke Kubo, Yasuhiro Kobayashi, Wataru Hasegawa, Takahiro Hamada (NTT Com) |
|
12:25-13:25 |
Lunch Break ( 60 min. ) |
Thu, Mar 8 AM Threat Intelligence(B) 11:10 - 12:00 |
(26) ICSS |
11:10-11:35 |
|
|
(27) ICSS |
11:35-12:00 |
|
|
|
12:00-13:00 |
Lunch Break ( 60 min. ) |
Thu, Mar 8 PM Network Security 3(A) 13:25 - 14:40 |
(28) ICSS |
13:25-13:50 |
Response Signature Generation method for Detecting Malicious Destinations |
Kazuma Shinomiya, Iifan Tyou, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT) |
(29) ICSS |
13:50-14:15 |
Investigation of Inferability of IP addresses for Clients in Organizations |
Miori Saito, Wataru Ueno, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
(30) ICSS |
14:15-14:40 |
Subspace Clustering Method with Semantic Interpretability for Bot Behavior Classification |
Shohei Araki, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT) |
|
14:40-14:50 |
Break ( 10 min. ) |
Thu, Mar 8 PM SPT/Authentication(B) 13:25 - 15:05 |
(31) |
13:25-13:50 |
(IPSJ-SPT) PINWrite:A New Smartphone Authentication Scheme Using Handwriting Recognition |
(32) |
13:50-14:15 |
|
(33) ICSS |
14:15-14:40 |
A Survey of Factors Influencing Progress of HTTPS Adoption |
Tetsuya Okuda, Naoko Chiba, Mitsuaki Akiyama, Yuki Okano (NTT) |
(34) ICSS |
14:40-15:05 |
A countermeasure against camrip using the phase modulation |
Toshiki Sasazaki, Tatsuya Mori (Waseda Univ.) |
|
15:05-15:15 |
Break ( 10 min. ) |
Thu, Mar 8 PM Network Security 4(A) 15:15 - 16:05 |
(35) ICSS |
15:15-15:40 |
Empirical Analysis of Reflectors in DRDoS attacks based on Large-Scale Network Data |
Jumpei Urakawa, Kosuke Murakami, Akira Yamada, Ayumu Kubota (KDDI Research) |
(36) ICSS |
15:40-16:05 |
Analyzing Victims of DRDoS Attacks Observed by Honeypots |
Kazuya Watanabe (Yokohama National Univ.), Tomomi Nishizoe (NTT Com), Daisuke Makita (NICT), Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
Thu, Mar 8 PM Cryptography 3(B) 15:15 - 16:05 |
(37) ICSS |
15:15-15:40 |
On the Ring Signature Scheme Using LDPC Codes |
Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) |
(38) ICSS |
15:40-16:05 |
On a Method to Implement White-box Cryptography (No Presentation) |
Tomonari Ozeki, Masakazu Soshi (Hiroshima City Univ.) |