Mon, Mar 2 AM 10:00 - 11:00 |
(1) ICSS |
10:00-10:20 |
Improvement of the Backup Method Dealing with 2 Types of Damages |
Taiga Hasuike, Masahiro Mambo (Kanazawa Univ.) |
(2) ICSS |
10:20-10:40 |
Estimation method of information asset security attributes using design mode |
Takeshi Ueda, Koichi Shimizu, Shun Hinatsu, Fumio Omatsu (Mitsubishi Electric Corp.) |
(3) ICSS |
10:40-11:00 |
Information Rates for Multiple Assignment Schemes on Five Participants |
Yutaro Shimma, Kouya Tochikubo (Nihon Univ.) |
|
11:00-11:10 |
Break ( 10 min. ) |
Mon, Mar 2 AM 11:10 - 12:10 |
(4) ICSS |
11:10-11:30 |
A Verification Method of Infrastructure as Code using Alloy Analyzer |
Ryo Hase, Yohei Matsuura (Mitsubishi Electric) |
(5) ICSS |
11:30-11:50 |
Effect of Environmental Temperature Change in LED Fingerprinting |
Ayaka Tsuchiya, Akiko Toh, Yang Li, Kazuo Sakiyama, Takeshi Sugawara (UEC) |
(6) ICSS |
11:50-12:10 |
Log Storing System Using Blockchain |
Takashi Ikeda, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) |
|
12:10-13:30 |
Lunch Break ( 80 min. ) |
Mon, Mar 2 PM 13:30 - 14:50 |
(7) ICSS |
13:30-13:50 |
|
|
(8) ICSS |
13:50-14:10 |
Search for Similar Binary Code in Cross-Architecture Using Neural Machine Translation Model |
Moritoshi Aoyanagi, Hidenori Tsuji, Masaki Hashimoto (IISEC) |
(9) ICSS |
14:10-14:30 |
A Study on Fuzzing for Device Drivers with AddressSanitizer |
Kentaro Ishii (Kove Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kove Univ.) |
(10) ICSS |
14:30-14:50 |
Development of a recovery tool for a ransomware infected PC |
Ryosuke Kokado (Kobe Univ.), Masato Ikegami, Tomohisa Hasegawa, Takafumi Harada, Hiroshi Kitani (Canon MJ), Masakatu Morii (Kobe Univ.) |
|
14:50-15:00 |
Break ( 10 min. ) |
Mon, Mar 2 PM 15:00 - 16:40 |
(11) ICSS |
15:00-15:20 |
Backdoor Detection Based On Network Functions For IoT Devices |
Minami Yoda, Shuji Sakuraba, Junichi Yamamoto (UEC), Yuichi Sei (UEC/JST PRESTO), Yasuyuki Tahara, Akihiko Ohsuga (UEC) |
(12) ICSS |
15:20-15:40 |
Evaluating Effectiveness of a Timing Attack on Android Devices in JavaScript |
Keisuke Sugita (Kobe Univ.), Ryoichi Isawa (NICT), Masakatsu Morii (Kobe Univ.) |
(13) ICSS |
15:40-16:00 |
Proposing Criteria for Detecting Internet-Wide Scanners for Darknet Monitoring |
Yukiko Endo, Yoshiki Mori (NICT), Jumpei Shimamura (Clwit), Masaki Kubo (NICT) |
(14) ICSS |
16:00-16:20 |
An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation |
Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
(15) ICSS |
16:20-16:40 |
Mirai may detect that you talk to smart speaker
-- On privacy violation by attackers who compromised home router -- |
Shoya Okuda, Tatsuya Tamai, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
Tue, Mar 3 AM 09:10 - 10:30 |
(16) ICSS |
09:10-09:30 |
A research of HTTP request and an identification method of fake User-Agent values |
Masato Inoue, Masaki Hashimoto (IISEC) |
(17) ICSS |
09:30-09:50 |
Preliminary Study of WAF Signature Generation by Utilizing Real-time Information on the Web |
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) |
(18) ICSS |
09:50-10:10 |
Analysis of Cyber-attacks Observed by a Simple TLS Honeypot Listening on All Ports |
Daisuke Makita (NICT), Jumpei Shimamura (clwit), Masaki Kubo, Daisuke Inoue (NICT) |
(19) ICSS |
10:10-10:30 |
Local survey on transitioning of TLS version and EV Certificates Usage (FY2019 4Q) |
Yuji Suga (IIJ) |
|
10:30-10:40 |
Break ( 10 min. ) |
Tue, Mar 3 AM 10:40 - 12:00 |
(20) ICSS |
10:40-11:00 |
Development of an expert system for automatic classification of illegal and harmful information on the dark web |
Hanae Kobayashi, Masaki Hashimoto (IISEC) |
(21) ICSS |
11:00-11:20 |
Model checking RNNs with modal μ-calculus |
Tatsuhiro Aoshima, Toshinori Usui (NTT) |
(22) ICSS |
11:20-11:40 |
Adversarial Attack against Neural Machine Translation Systems |
Takeshi Sakamoto, Tatsuya Mori (Waseda Univ.) |
(23) ICSS |
11:40-12:00 |
Adversarial Attacks against Electrocardiograms |
Taiga Ono (Waseda Univ.), Takeshi Sugawara (UEC), Tatsuya Mori (Waseda Univ.) |
|
12:00-13:10 |
Lunch Break ( 70 min. ) |
Tue, Mar 3 PM 13:10 - 15:10 |
(24) |
13:10-15:10 |
|
|
15:10-15:20 |
Break ( 10 min. ) |
Tue, Mar 3 PM 15:20 - 16:20 |
(25) |
15:20-15:40 |
|
(26) ICSS |
15:40-16:00 |
Effective single-sided RAMBleed |
Hiroki Nagahama (Kobe Univ), Makoto Takita (Univ of Hyogo), Masanori Hirotomo (Saga Univ), Masakatsu Morii (Kobe Univ) |
(27) ICSS |
16:00-16:20 |
|
|
Mon, Mar 2 AM 09:40 - 11:00 |
(28) |
09:40-10:00 |
|
(29) |
10:00-10:20 |
|
(30) |
10:20-10:40 |
|
(31) |
10:40-11:00 |
|
|
11:00-11:10 |
Break ( 10 min. ) |
Mon, Mar 2 AM 11:10 - 12:10 |
(32) ICSS |
11:10-11:30 |
A Technique for Issuing Security Alerts and Filtering Traffic based on Vulnerability Information Monitoring |
Takeshi Takahashi, Ryutaro Ushigome, Mio Suzuki, Daisuke Inoue (NICT) |
(33) ICSS |
11:30-11:50 |
An Evaluation of Contact Points for Security Notifications |
Miori Saito, Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
(34) ICSS |
11:50-12:10 |
Generating Adversarial Videos that Bypass Content Filtering |
Norihito Omori, Tatsuya Mori (Waseda Univ.) |
|
12:10-13:30 |
Lunch Break ( 80 min. ) |
Mon, Mar 2 PM 13:30 - 14:50 |
(35) ICSS |
13:30-13:50 |
Implementation of aggregate message authentication and its evaluation |
Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takehisa, Hidekazu Nishiura, Zoa Jiafa (NISSIN), Yu Imamura (JDC), Junji Sikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC) |
(36) ICSS |
13:50-14:10 |
Extension of authentication method using hash chain aggregation |
Hirai Shinta, Soshi Masakazu (Hiroshima City Univ.) |
(37) ICSS |
14:10-14:30 |
Securty Analysis of Salsa20 and ChaCha Using Inverse Function's Properties |
Yusuke Matsuoka, Atsuko Miyaji (Osaka Univ.) |
(38) ICSS |
14:30-14:50 |
The efficient and high level of commitment scheme with low output locality |
Hideaki Miyaji, Atsuko Miyaji (OU) |
|
14:50-15:00 |
Break ( 10 min. ) |
Mon, Mar 2 PM 15:00 - 16:40 |
(39) |
15:00-15:20 |
|
(40) |
15:20-15:40 |
|
(41) |
15:40-16:00 |
|
(42) |
16:00-16:20 |
|
(43) |
16:20-16:40 |
|
Tue, Mar 3 AM 09:10 - 10:30 |
(44) |
09:10-09:30 |
|
(45) |
09:30-09:50 |
|
(46) |
09:50-10:10 |
|
(47) ICSS |
10:10-10:30 |
|
|
|
10:30-10:40 |
Break ( 10 min. ) |
Tue, Mar 3 AM 10:40 - 12:00 |
(48) ICSS |
10:40-11:00 |
A Secure Second-price Sealed-Bid Auction using smart contract |
Yuki Sugitani, Atsuko Miyaji (Osaka Univ.) |
(49) ICSS |
11:00-11:20 |
Performance Evaluation of an Access Control Mechanism with Session Types |
Tomoya Nishiguchi, Yuuki Takano, Atsuko Miyaji (Osaka Univ.) |
(50) ICSS |
11:20-11:40 |
Realization of Privacy Policy with Attribute-Based Encryption and Its Applications |
Motoi Hayashi, Atsuko Miyaji (Osaka Univ.) |
(51) ICSS |
11:40-12:00 |
|
|
|
12:00-13:10 |
Lunch Break ( 70 min. ) |
|
13:10-15:20 |
( 130 min. ) |
Tue, Mar 3 PM 15:20 - 16:40 |
(52) |
15:20-15:40 |
|
(53) ICSS |
15:40-16:00 |
Secure and Compact Elliptic Curve Scalar Multiplication based on Affine |
Jin Yaoan, Atsuko Miyaji (Osaka Univ.) |
(54) ICSS |
16:00-16:20 |
|
|
(55) ICSS |
16:20-16:40 |
Study on Implementation of Anonymous Public-Key Certificates based on Elliptic Curve |
Kazuomi Oishi (SIST) |