Mon, Jun 25 PM 13:00 - 14:25 |
(1) |
13:00-13:25 |
A Study on the structure and Its Classification |
Naoya Nitta, Masakatu Morii (Kobe Univ.) |
(2) |
13:25-13:50 |
Calculating Similarity between IoT Malware Samples over CPU Architectures |
Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) |
(3) |
13:50-14:15 |
Malware Classification Based on Data Compression Algorithm and Its Evaluation |
Sohei Takechi, Hiroshi Kai (Ehime Univ.), Masakatu Morii (Kobe Univ) |
|
14:15-14:25 |
Break ( 10 min. ) |
Mon, Jun 25 PM 14:25 - 15:25 |
(4) |
14:25-14:50 |
Designing network control system for industrial IoT security |
Yutaka Oiwa (AIST), Ray Atarashi (IIJ-II), Yoshifumi Atarashi, Toru Asahina (Alaxala) |
(5) |
14:50-15:15 |
Survey on current situation of incorrect setting of DNS server |
Akira Sato (Univ. of Tsukuba), Kazunori Fujiwara (JPRS), Takaho Omuro, Kodai Watanabe, Kenichi Yoshida (Univ. of Tsukuba) |
|
15:15-15:25 |
Break ( 10 min. ) |
Mon, Jun 25 PM 15:25 - 16:20 |
(6) |
15:25-15:50 |
The Existence of the QR Code Guiding to a Malicious Web Site and a Counterfeit Attack Using It |
Okuma Hiroya, Makoto Takita, Masakatu Morii (Kobe Univ.) |
(7) |
15:50-16:15 |
|
|
|
16:15-16:20 |
Break ( 5 min. ) |
Mon, Jun 25 PM 16:20 - 17:10 |
(8) |
16:20-17:10 |
|
|
|
17:10-17:20 |
( 10 min. ) |
|
17:20-17:30 |
( 10 min. ) |
Tue, Jun 26 AM 09:00 - 09:50 |
(9) |
09:00-09:25 |
|
|
(10) |
09:25-09:50 |
A consideration on the possibility of automatic classifying for anomalous posts on Twitter |
Ryutaro Ushigome (NICT/Chuo Univ), Takeshi Matsuda (Univ of Nagasaki), Michio Sonoda, Takeshi Takahashi, Mio Suzuki (NICT), Jinhui Chao (Chuo Univ) |
Tue, Jun 26 AM 09:50 - 10:45 |
(11) |
09:50-10:15 |
Proposal of Sparse-Modeling based Approach for Betweenness Centrality Estimation |
Ryotaro Matsuo, Ryo Nakamura, Hiroyuki Ohsaki (Kwansei Gakuin Univ.) |
(12) |
10:15-10:40 |
A study of applying SDN to the operational challenges of multi-service wide-area IP network |
Aki Fukuda, Hitoshi Irino, Yoshinori Koike, Hirotaka Yoshioka (NTT) |
|
10:40-10:45 |
Break ( 5 min. ) |
Tue, Jun 26 AM 10:45 - 11:40 |
(13) |
10:45-11:35 |
[Invited Talk]
Security Analysis with Formal Methods |
Naoto Yanai (Osaka Univ.) |
|
11:35-11:40 |
Break ( 5 min. ) |
Tue, Jun 26 AM 11:40 - 12:55 |
(14) |
11:40-12:05 |
A Study on Extraction Method of Characteristics of Malware Using Generative Adversalial Networks |
Keisuke Furumoto, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue (NICT) |
(15) |
12:05-12:30 |
|
Sho Minami, Takashi Nishide (The Univ. of Tsukuba) |
(16) |
12:30-12:55 |
Datagram TLS extensions for multipath communication |
Seiya Nuta, Takashi Nishide (Univ. of Tsukuba) |
|
12:55-13:05 |
( 10 min. ) |