IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev IPSJ-SPT Conf / Next IPSJ-SPT Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 

===============================================
Special Interest Group on Security Psychology and Trust (IPSJ-SPT)


===============================================
Technical Committee on Information and Communication System Security (ICSS)
Chair: Katsunari Yoshioka (Yokohama National Univ.) Vice Chair: Takahiro Kasama (NICT), Akira Yamada (KDDI labs.)
Secretary: Toshihiro Yamauchi (Okayama Univ.), Keisuke Kito (Mitsubishi Electric)
Assistant: Takeshi Sugawara (Univ. of Electro-Comm.), Yo Kanemoto (NTT)

DATE:
Mon, Mar 13, 2023 12:30 - 18:10
Tue, Mar 14, 2023 10:30 - 16:00

PLACE:


TOPICS:
Security, Trust, etc.

----------------------------------------
Mon, Mar 13 PM (12:30 - 14:10)
----------------------------------------

(1) 12:30 - 12:50


(2) 12:50 - 13:10


(3) 13:10 - 13:30


(4) 13:30 - 13:50


(5) 13:50 - 14:10


----- Break ( 10 min. ) -----

----------------------------------------
Mon, Mar 13 PM (12:30 - 13:50)
----------------------------------------

(6)/ICSS 12:30 - 12:50
Developing a Hand Gesture Recognition System for VR Devices
Mei Suzuki, Ryo Iijima, Kazuki Nomoto (Waseda Univ.), Tetsushi Ohki (Shizuoka Univ./AIP), Tatsuya Mori (Waseda Univ./NICT/AIP)

(7)/ICSS 12:50 - 13:10
Dynamic Fake QR Code using Invisible Laser Irradiation
Yuki Kamata, Shuya Kawaguchi, Toshihiro Ohigashi, Yoshihisa Takayama (Tokai Univ.)

(8)/ICSS 13:10 - 13:30
sEMG-based Gesture Authentication for Smartwatch
Akihisa Watanabe, Ryo Iijima, Tatsuya Mori (Waseda Univ.,)

(9)/ICSS 13:30 - 13:50
Basic Study on IoT Security Using Robot Arm
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Mon, Mar 13 PM (14:20 - 16:00)
----------------------------------------

(10)/ICSS 14:20 - 14:40
Dynamic Analysis of Adversarial Attacks
Kentaro Goto (JPNIC), Masato Uchida (Waseda Univ.)

(11)/ICSS 14:40 - 15:00
Consideration of a Packet Level Anomaly Communication Classification Model Using Word Embedding and LSTM
Yoshikatsu Kashiwabara, Kohei Miyamoto, Iida Masazumi, Shota Kawanaka (Kyushu Univ), Han Chansu, Ban Tao, Kenshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ)

(12)/ICSS 15:00 - 15:20
Disabling Adversarial Examples through Color Conversion using CMYK Defense Model
Ryo Soeda, Masato Uchida (Waseda Univ.)

(13)/ICSS 15:20 - 15:40
Multimodal Feature Integration Toward High-Accuracy Network Intrusion Detection
Masazumi Iida, Kohei Miyamoto, Yoshinari Takeishi, Shota Kawanaka (Kyushu Univ.), Chansu Han, Tao Ban, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.)

(14)/ICSS 15:40 - 16:00
Generating Attack Trace Dataset Focusing on Attack Techniques and the Damage Caused by Each.
Masahito Kumazaki, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Mon, Mar 13 PM (14:20 - 16:00)
----------------------------------------

(15)/ICSS 14:20 - 14:40
A Study of Security Control Schemes in Fog Computing Based on TPO Conditions
Yushi Hosokawa, Kanai Atushi, qian wu (Hosei Univ.), hatasima ryu (NTT), tanimoto sigeaki (ChibaTech Univ.)

(16)/ICSS 14:40 - 15:00
Preservation Techniques of Fileless Attack Artifacts using Customized PowerShell
Masahito Kimura (Ritsumeikan Univ.), Chris Liu (DTCY), Tetsutaro Uehara (Ritsumeikan Univ.)

(17)/ICSS 15:00 - 15:20
(See Japanese page.)

(18)/ICSS 15:20 - 15:40
(See Japanese page.)

(19)/ICSS 15:40 - 16:00
Proposal and evaluation of visualization method for understanding security risks based on software dependencies
Tomohiko Yano (SECOM), Hiroki Kuzuno (Kobe Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Mon, Mar 13 PM (16:10 - 18:10)
----------------------------------------

(20)/ICSS 16:10 - 16:30
Evaluation of Copy Protection Technology Using Web Font
Kazuki Nomoto (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT/RIKEN AIP)

(21)/ICSS 16:30 - 16:50
Evaluation and countermeasures of notification destination restoration attacks using password recovery functions of multiple web services
Ryusei Ishikawa, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ., Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.)

(22)/ICSS 16:50 - 17:10
An Analysis of the Risk of Unauthorized Access to the WebUI of IoT Devices
Kosuke Murakami (NICT/KDDIR), Takahiro Kasama, Daisuke Inoue (NICT)

(23)/ICSS 17:10 - 17:30
A Study on Effectiveness of Malware Infection Notification based on Role-playing Type Survey
Akira Fujita, Misato Matsuda, Takahiro Kasama, Daisuke Inoue (NICT)

(24)/ICSS 17:30 - 17:50
Lessons Learned from Construction of the Security Technical Term Dictionary
Misato Matsuda, Akira Fujita, Yu Tsuda, piyokango, Daisuke Inoue (NICT)

(25)/ICSS 17:50 - 18:10
URL Warning List Creation and Manage Methods using VirusTotal and Web Access Log
Kyohei Takao, Chika Hiraishi (YNU), Kazuki Takada (SecureBrain), Akira Fujita, Daisuke Inoue (NICT), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)

----------------------------------------
Mon, Mar 13 PM (16:10 - 18:10)
----------------------------------------

(26)/ICSS 16:10 - 16:30
Implementation and Evaluation for Remote-Control Security System of IoT Devices
Masaru Takeuchi (JDC), Yohei Watanabe (UEC/JDC), Naoto Yanai (OU/JDC), Akira Takeuchi (JDC), Tatsuya Takehisa (Nisshin), Yukitoshi Sanada (KU/JDC), Junji Shikata (YNU), Koji Nakao (NICT)

(27)/ICSS 16:30 - 16:50
A Study on Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities
Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU)

(28)/ICSS 16:50 - 17:10
New linear approximation and improved bias of ChaCha in differential linear analysis
Ryo Watanabe (Osaka Univ..), Atsuko Miyaji (Osaka Univ./JAIST)

(29)/ICSS 17:10 - 17:30
Improvement of Linear Approximations in Differential Linear Analysis of Stream Cipher ChaCha
Atsuki Nagai (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST)

(30)/ICSS 17:30 - 17:50
Expanding Underlying Number Fields Reducing from Module-LWE to Ring-LWE
Sosuke Funatsu, Atsuko Miyaji, Shinya Okumura (OU)

(31)/ICSS 17:50 - 18:10
On a Threshold Ring Signature Scheme for Generating Efficiently Sized Signatures
Ryunosuke Higashi, Yuta Maeno, Hideaki Miyaji, Atsuko Miyaji (OU)

----------------------------------------
Tue, Mar 14 AM (10:30 - 11:50)
----------------------------------------

(32) 10:30 - 10:50


(33) 10:50 - 11:10


(34) 11:10 - 11:30


(35) 11:30 - 11:50


----- Lunch Break ( 80 min. ) -----

----------------------------------------
Tue, Mar 14 AM (10:30 - 11:50)
----------------------------------------

(36)/ICSS 10:30 - 10:50
Port-aware IPv6 Scanning and Large-scale Security Surveys
Tatsuya Takemura, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama (NTT)

(37)/ICSS 10:50 - 11:10
Discussion about Privacy-aware Anonymization of Traffic Logs for Malicious Activity Detection
Takeshi Ogawa (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.)

(38)/ICSS 11:10 - 11:30
Investigating Server Fingerprints and Their Identifiability in Onion Service
Yuuki Kimura, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ./Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.)

(39)/ICSS 11:30 - 11:50
An Empirical Study on Opting out of Internet-wide Scanning
Takahiro Kasama, Yukiko Endo, Masaki Kubo, Daisuke Inoue (NICT)

----- Lunch Break ( 80 min. ) -----

----------------------------------------
Tue, Mar 14 PM (13:10 - 14:30)
----------------------------------------

(40) 13:10 - 13:30


(41) 13:30 - 13:50


(42) 13:50 - 14:10


(43) 14:10 - 14:30


----- Break ( 10 min. ) -----

----------------------------------------
Tue, Mar 14 PM (13:10 - 14:10)
----------------------------------------

(44)/ICSS 13:10 - 13:30
Towards observation of online fraud exploiting multiple SNS
Yamato Kawaguchi (Yokohama National Univ.), Kazuki Takada (SecureBrain), Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)

(45)/ICSS 13:30 - 13:50
Assessment Method for Persistent Malware Infection on IoT Devices
Shunki Soeda, Takahiro Inoue, Rui Tanabe, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)

(46)/ICSS 13:50 - 14:10
An Edge Computing Platform based on Modular Architecture using Intel SGX and its Evaluation
Yuma Nishihira, Tomoya Suzuki, Takuya Ishibashi, Yoshio Kakizaki, Toshihiro Ohigashi (Tokai Univ.), Hidenobu Watanabe, Tohru Kondo, Reiji Aibara (Hiroshima Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Tue, Mar 14 PM (14:40 - 16:00)
----------------------------------------

(47) 14:40 - 15:20


(48) 15:20 - 16:00


# Information for speakers
General Talk will have 15 minutes for presentation and 5 minutes for discussion.


=== Special Interest Group on Security Psychology and Trust (IPSJ-SPT) ===
# FUTURE SCHEDULE:

Fri, May 26, 2023: [Thu, Mar 16]

=== Technical Committee on Information and Communication System Security (ICSS) ===
# FUTURE SCHEDULE:

Tue, Jun 20, 2023 - Wed, Jun 21, 2023: Saga Univ. [Wed, Apr 19], Topics: Internet Security, etc.

# SECRETARY:
ICSS Technical Committee
E-mail: is-adm-q

# ANNOUNCEMENT:
# Latest information will be presented on the homepage:
https://www.ieice.org/iss/icss/index-en.html


Last modified: 2023-03-14 09:59:03


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ICSS Schedule Page]   /   [Return to IPSJ-SPT Schedule Page]   /  
 
 Go Top  Go Back   Prev IPSJ-SPT Conf / Next IPSJ-SPT Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan