Thu, Jun 16 PM Anti-spam Technology and Cloud Services Chair: Koji Nakao (KDDI / NICT) 13:00 - 15:00 |
|
13:00-13:05 |
Opening Address ( 5 min. ) |
(1) |
13:05-13:30 |
Combining the outcomes of IP reputation services |
Tatsuya Mori, Kazumichi Sato, Yousuke Takahashi, Tatsuaki Kimura, Keisuke Ishibashi (NTT) |
(2) |
13:30-13:55 |
An Architecture of A Multifactor Authentication Platform for Hybrid Cloud |
Satoshi Yagi, Ryoichi Kasuga, Satoshi Imamura, Jiro Yamada, Hidetoshi Takasugi (NTT Communications) |
(3) |
13:55-14:40 |
[Invited Talk]
IPA's Activities on Cloud Security and Recent Topics of Cloud Security Alliance (CSA) |
Ben T. Katsumi (IPA) |
|
14:40-15:00 |
Break ( 20 min. ) |
Thu, Jun 16 PM Network Monitoring and Analysis Chair: Masahiro Fukumoto (Kochi University of Technology) 15:00 - 16:35 |
(4) |
15:00-15:25 |
An Extension of Hierarchical Automatic Locator Number Allocation Protocol HANA for a Hierarchical Routing Protocol |
Kenji Fujikawa (NICT), Masataka Ohta (TITECH) |
(5) |
15:25-15:50 |
|
(6) |
15:50-16:15 |
|
|
16:15-16:35 |
Break ( 20 min. ) |
Thu, Jun 16 PM Disaster Management Chair: Takeshi Ikenaga (Kyushu Institute of Technology) 16:35 - 17:25 |
(7) |
16:35-17:00 |
A Practical Usage of Large-scale Darknet Monitoring for Disaster Recovery |
Daisuke Inoue, Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Koji Nakao (NICT) |
(8) |
17:00-17:25 |
A study of the information system at the time of earthquake disaster |
Masahiro Hiji (Tohoku Univ./Hitachi East Japan Solutions, Ltd.) |
|
18:00-18:10 |
IA Research Award ( 10 min. ) |
Fri, Jun 17 AM Network Security Chair: Masakatu Morii (Kobe University) 10:00 - 13:00 |
(9) |
10:00-10:25 |
A Profiling Method of Attacking Hosts based on Scan Feature Extraction |
Masashi Eto, Yaichiro Takagi, Jungsuk Song, Daisuke Inoue, Koji Nakao (NICT) |
(10) |
10:25-10:50 |
Secure and Traceable Online Image Sharing Scheme for Service Providers |
Kohei Sugiyama, Masaki Fukushima, Teruyuki Hasegawa (KDDI Labs.) |
(11) |
10:50-11:35 |
[Invited Talk]
Trend on Information Security and Technologies for Solving Issues |
Ryoichi Sasaki (Tokyo Denki Univ.) |
|
11:35-13:00 |
Lunch Break ( 85 min. ) |
Fri, Jun 17 PM Malware Analysis (1) Chair: Yoshihiro Ito (Nagoya Institute of Technology) 13:00 - 14:15 |
(12) |
13:00-13:25 |
Detecting Original Entry Point based on Comparing Runtime Library Codes in Malware Unpacking |
Kazuki Iwamoto, Katsumi Wasaki (Shinshu Univ.) |
(13) |
13:25-13:50 |
|
(14) |
13:50-14:15 |
DenseShip: Virtual Machine Monitor Specialized for Server-Type Honeypot |
Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT) |
|
14:15-14:35 |
Break ( 20 min. ) |
Fri, Jun 17 PM Malware Analysis (2) Chair: Hiroki Takakura (Nagoya University) 14:35 - 15:45 |
(15) |
14:35-15:00 |
Automatically Removing Malware Using Malware Analysis System |
Nobutaka Kawaguchi, Takayuki Yoda, Hiroki Yamaguchi (Hitachi), Toshihiko Kasagi (KDDI), Yuji Hoshizawa (SecureBrain) |
(16) |
15:00-15:25 |
Analysis of Website Infections using Malware |
Takeshi Yagi, Shinta Nakayama, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Mitsutaka Itoh (NTT) |
|
15:25-15:40 |
Student Awards ( 15 min. ) |
|
15:40-15:45 |
Closing Address ( 5 min. ) |