Thu, Jun 5 PM Opening Remarks 13:30 - 13:35 |
|
13:30-13:35 |
Opening remarks ( 5 min. ) |
Thu, Jun 5 PM Invited Talk 13:35 - 16:15 |
(1) |
13:35-14:25 |
[Invited Talk]
A two-path authentication for protecting net banking against illegal access
-- How to prevent Man-In-The-Middle/Browser Attack -- |
Haruhiko Fujii (NTT) |
(2) |
14:25-15:15 |
[Invited Talk]
How did we arrive at the top |
Tsunehiko Suzuki (Chukyo Univ.), Toshinori Maeno |
(3) |
15:15-16:05 |
[Invited Talk]
Threat and Countermeasure Against the Targeted Attack |
Satoru Torii (Fujitsu Labs.) |
|
16:05-16:15 |
Break ( 10 min. ) |
Thu, Jun 5 PM ICSS1 16:15 - 17:05 |
(4) |
16:15-16:40 |
Attack on Knapsack Cryptography by Using Intermediary Plaintext |
Yoshihiro Kusanagi, Atsushi Nagao, Masakatu Morii (Kobe Univ.) |
(5) |
16:40-17:05 |
Higher Order Monomial Attack to FEAL-4 |
Toshinobu Kaneko (TUS) |
|
17:05-17:20 |
IA Research Award Ceremony ( 15 min. ) |
|
18:30-20:30 |
( 120 min. ) |
Fri, Jun 6 AM ICSS2 10:30 - 11:45 |
(6) |
10:30-10:55 |
Malicious Web Site Detection Based on Redirection Control using Client Environment |
Takahiro Kasama, Masashi Eto (NICT), Masaki Kamizono (NICT/SecureBrain), Daisuke Inoue (NICT) |
(7) |
10:55-11:20 |
Development of an Environment-independent Dynamic Analysis System for Document Malware |
Masaki Kamizono (NICT/SecureBrain), Kazuki Iwamoto (SecureBrain), Takahiro Kasama, Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) |
(8) |
11:20-11:45 |
Ransomware: Threat Analysis and Countermeasures |
Akira Kanaoka (Toho Univ.), Toshihiro Ohigashi (Hiroshima Univ.) |
|
11:45-13:00 |
Break ( 75 min. ) |
Fri, Jun 6 PM IA 13:00 - 14:15 |
(9) |
13:00-13:25 |
Analyzing Dynamic Class Loaded Applications in Android |
Takaaki Nagumo, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT) |
(10) |
13:25-13:50 |
Study on Comparison Regarding Schemes of Information-centric Networking |
Daisuke Matsubara (Hitachi), Satoru Okamoto, Naoaki Yamanaka (Keio Univ.), Tatsuro Takahashi (Kyoto Univ.) |
(11) |
13:50-14:15 |
Implementation of the Administration Policy Description Method on Automatic Network Organization System |
Minori Shiota, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) |
|
14:15-14:25 |
Break ( 10 min. ) |
Fri, Jun 6 PM ICSS3 14:25 - 15:50 |
(12) |
14:25-14:50 |
Shared Nothing Secure Programming in Erlang/OTP |
Kenji Rikitake |
(13) |
14:50-15:15 |
List Representation Using Succinct Data Structure for Packet Filtering |
Yuta Kitamura (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) |
(14) |
15:15-15:40 |
A Web-based Encrypted File Sending and Receiving System and Applying OpenID Authentication |
Kohei Isobe (Nagoya Inst. of Tech.), Masanori Hirotomo (Saga Univ.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) |
|
15:40-15:45 |
( 5 min. ) |
|
15:45-15:50 |
Closing remarks ( 5 min. ) |