Mon, Mar 13 PM Network Security 1 13:00 - 14:15 |
(1) ICSS |
13:00-13:25 |
Clustering of Bot Port Scan and Brute-force Activities |
Shohei Araki, Bo Hu, Yukio Nagafuchi, Takaaki Koyama, Jun Miyoshi (NTT), Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) |
(2) ICSS |
13:25-13:50 |
Modeling of Attack Activity for Integrated Analysis of Threat Information |
Kenta Nomura, Daiki Ito (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) |
(3) ICSS |
13:50-14:15 |
Early Detection of New DRDoS Attack with Protocol-Agnostic Honeypot |
Tomomi Nishizoe (Yokohama National Univ.), Daisuke Makita (Yokohama National Univ./NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
Mon, Mar 13 PM 13:00 - 13:50 |
(4) |
13:00-13:25 |
|
(5) |
13:25-13:50 |
|
|
14:15-14:25 |
Break ( 10 min. ) |
Mon, Mar 13 PM Network Security 2 14:25 - 16:05 |
(6) ICSS |
14:25-14:50 |
Feature Extraction for Identifying High Yielding Investment Programs Related Transactions in Bitcoin |
Kentaroh Toyoda, Tomoaki Ohtsuki (Keio Univ.), P. Takis Mathiopoulos (UoA) |
(7) ICSS |
14:50-15:15 |
A Brief Review on Anomaly Detection and its Applications to Cybersecurity |
Danilo Vasconcellos Vargas, Kouichi Sakurai (Kyudai) |
(8) ICSS |
15:15-15:40 |
Supervised Classification for Detecting Malware Infected Host in HTTP Traffic and Long-time Evaluation for Detection Performance using Mixed Data |
Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT) |
(9) ICSS |
15:40-16:05 |
Deep Learning Approach for Detecting Malware Infected Host and Detection Performance Evaluation with HTTP Traffic |
Taishi Nishiyama, Atsutoshi Kumagai, Yasushi Okano, Kazunori Kamiya, Masaki Tanikawa (NTT), Kazuya Okada, Yuji Sekiya (University of Tokyo) |
Mon, Mar 13 PM 14:25 - 16:05 |
(10) |
14:25-14:50 |
|
(11) |
14:50-15:15 |
|
(12) |
15:15-15:40 |
|
(13) |
15:40-16:05 |
|
|
16:05-16:15 |
Break ( 10 min. ) |
Mon, Mar 13 PM Malware Countermeasure 16:15 - 17:30 |
(14) ICSS |
16:15-16:40 |
Evaluation of memory image acquisition/analysis function in forensics tools |
Ikuo Tanaka, Masaki Hashimoto (IISEC) |
(15) ICSS |
16:40-17:05 |
Malicious PDF Detection Scheme using Keywords Feature based on Fuzzy inference |
Hiroya Kato, Shuichiro Haruta, Iwao Sasase (Keio Univ.) |
(16) ICSS |
17:05-17:30 |
Effective Analysis of Macro Malware Based on Clustering |
Toshinori Usui (NTT), Tomonori Ikuse (NTT Security Japan), Makoto Iwamura, Takeshi Yada (NTT) |
Mon, Mar 13 PM IoT Security 1 16:15 - 17:05 |
(17) ICSS |
16:15-16:40 |
A Study on Parameter Adjustment of Whitelist Detection Rule |
Takeshi Ueda (Mitsubishi Electric Corp.), Kobayashi Nobuhiro (Mitsubishi Electric Corp./ Shizuoka Univ.), Masakatsu Nishigaki (Shizuoka Univ) |
(18) ICSS |
16:40-17:05 |
Primary Discussion about a Honeypot System for IoT Aimed Protocols |
Katsutaka Ito, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) |
|
17:30-17:40 |
Break ( 10 min. ) |
Mon, Mar 13 PM 17:40 - 18:25 |
(19) |
17:40-18:25 |
|
Tue, Mar 14 AM Web Security 09:30 - 10:45 |
(20) ICSS |
09:30-09:55 |
Visual Similarity-based Phishing Websites Detection Scheme using Image and CSS with Target Website Finder |
Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ) |
(21) ICSS |
09:55-10:20 |
Towards Reducing False Positives of Host based Intrusion Detection by Static Code Analysis of Web Applications |
Yang Zhong, Tohru Sato, Masaki Tanikawa (NTT) |
(22) ICSS |
10:20-10:45 |
Attack Pattern Extraction by Clustering Parameters |
Shingo Orihara, Tohru Sato, Masaki Tanikawa (NTT) |
Tue, Mar 14 AM IoT Security 2 09:30 - 10:45 |
(23) ICSS |
09:30-09:55 |
|
|
(24) ICSS |
09:55-10:20 |
|
|
(25) ICSS |
10:20-10:45 |
Assignment and Solution regarding Access Control of a Camera on a Computer |
Yuri Yoshino, Masaki Inamura (TDU) |
|
10:45-10:55 |
Break ( 10 min. ) |
Tue, Mar 14 AM Network Security 3 10:55 - 12:10 |
(26) ICSS |
10:55-11:20 |
Low rate attack detection method based on duration of burst state by using quick packet matching function |
Yuhei Hayashi, Jia Yong Zhen, Satoshi Nishiyama, Akira Misawa (NTT) |
(27) ICSS |
11:20-11:45 |
Graph based Detection of Advanced Persistent Threat on LAN |
Hiroki Nagayama, Bo Hu, Takaaki Koyama, Jun Miyoshi (NTT) |
(28) ICSS |
11:45-12:10 |
Representation for Attack Activity to Associate Threat Information |
Daiki Ito, Kenta Nomura (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) |
Tue, Mar 14 AM Malware Countermeasure 10:55 - 12:10 |
(29) ICSS |
10:55-11:20 |
A Vulnerability Analysis of Android Applications from the View of Framework |
Ryoya Furukawa, Tatsuya Nagai (Kobe Univ.), Hiroshi Kumagai, Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) |
(30) ICSS |
11:20-11:45 |
Ransomware Detection Focused on Encryption Processing |
Shigeta Takanari, Morii Masakatu (Kobe Univ.), Hasegawa Tomohisa, Ikegami Masato, Ishikawa Teiichi (Canon IT Solutions) |
(31) ICSS |
11:45-12:10 |
Towards finding Code Snippets on a Question and Answer Website causing Mobile App Vulnerabilities |
Hiroki Nakano (YNU), Fumihiro Kanei, Mitsuaki Akiyama (NTT), Katsunari Yoshioka (YNU) |
|
12:10-12:20 |
Break ( 10 min. ) |
Tue, Mar 14 PM Network Security 4 12:20 - 13:10 |
(32) ICSS |
12:20-12:45 |
Evaluation of Host Independent and Distributed Detection System of the Network Attack by Using OpenFlow |
Ryosuke Miyazaki (ISIT/Kyushu Univ.), Junpei Kawamoto (), Shinichi Matsumoto (Kyushu Univ.), Kouichi Sakurai (ISIT/Kyushu Univ.) |
(33) ICSS |
12:45-13:10 |
A Study of Security Evaluation for Composite Systems |
Kobayashi Nobuhiro (Mitsubishi Electric Corp./ Shizuoka Univ.), Takeshi Ueda (Mitsubishi Electric Corp.), Masakatsu Nishigaki (Shizuoka Univ.) |
Tue, Mar 14 PM Authenticaion, Cryptography 12:20 - 13:10 |
(34) ICSS |
12:20-12:45 |
Vibration-based Key Exchange among Multiple Smart Devices on the Desk |
Alisa Arno, Kentaroh Toyoda (Keio Univ.), Yuji Watanabe (IBM Japan), Iwao Sasase (Keio Univ.), P. Takis Mathiopoulos (Athens Univ.) |
(35) ICSS |
12:45-13:10 |
A system architecture that prevents fraud issue using third parties to issue authentication information |
Masahiro Matsui, Akira Nagai, Tetsutaro Kobayashi, Hironobu Okuyama (NTT) |