Fri, Mar 25 AM 10:20 - 12:00 |
(1) |
10:20-10:45 |
On a Data Sensitivity Diagnosis |
Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.) |
(2) |
10:45-11:10 |
Proposal of an Order Preserving Encryption for Anonymity |
Ryoichi Isawa (Kobe Univ./Crypto), Masakatu Morii (Kobe Univ.) |
(3) |
11:10-11:35 |
Security Level Evaluation of Quaternion Based Hash Function |
Tomohiro Suto, Tomoyuki Nagase (Hirosaki Unv.) |
(4) |
11:35-12:00 |
On Security Model of Cryptographic Protocols for Mobile Devices |
Shin'ichiro Matsuo (NICT) |
|
12:00-13:25 |
Lunch Break ( 85 min. ) |
Fri, Mar 25 PM 13:25 - 14:40 |
(5) |
13:25-13:50 |
Consideration on hidden-communication channel in the Internet communication device. |
Tomoki Murota (Univ. of Tokyo), Khin Thida Latt (JAIST), Katsuhiro Horiba (Keio Univ.), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.) |
(6) |
13:50-14:15 |
Authentication and Certificate Managements of Unauthorized Intrusion in Ad-Hoc Networks, Problems and Solutions |
Norihito Yosaka, Tomoyuki Nagase (Hirosaki Unv.) |
(7) |
14:15-14:40 |
Secure Clustering for Building Certificate Management Nodes in Ad-Hoc Networks |
Iichiro Nishimura, Tomoyuki Nagase (Hirosaki Unv.) |
Fri, Mar 25 PM 15:10 - 16:50 |
(8) |
15:10-15:35 |
Automatic Unpacking Based on Entropy of Memory-Access Values |
Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.) |
(9) |
15:35-16:00 |
Development and evaluation of PDF malware analysis system using dynamic analysis |
Masaki Kamizono, Masata Nishida, Yuji Hoshizawa (Securebrain Corp.) |
(10) |
16:00-16:25 |
Network Observation and Analysis Report on nicter
-- Transition Analysis of Cyber Attacks Based on Long-term Observation -- |
Junji Nakazato (NICT), Jumpei Shimamura (For Schooner), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) |
(11) |
16:25-16:50 |
Implementation and Operation of an Alert System Based on Large-scale Darknet Monitoring |
Mio Suzuki, Daisuke Inoue, Masashi Eto (NICT), Satoshi Uda (JAIST), Koji Nakao (NICT) |