Fri, Nov 25 PM 13:00 - 13:40 |
(1) |
13:00-13:40 |
[Invited Talk]
Analyses of social needs and training programs of security human resources in Japan |
Masashi Eto (NICT), Masaki Kamizono (PwC Cyber Services LLC) |
|
13:40-13:50 |
Break ( 10 min. ) |
Fri, Nov 25 PM 13:50 - 15:05 |
(2) |
13:50-14:15 |
Software-based Modification Detection of ECU for Automotive Network System Attestation |
Takuma Koyama, Junko Takahashi, Fumitaka Hoshino, Masashi Tanaka (NTT) |
(3) |
14:15-14:40 |
Study of behavior each malware function from the API calls |
Nobuki Suetsugu, Masaki Hashimoto (IISEC) |
(4) |
14:40-15:05 |
A fuzz testing method cooperated with threat modeling |
Yasuhiko Nishio, Tadashi Shiroma (CCDS), Hiroyuki Inoue (CCDS/HCU) |
|
15:05-15:20 |
Break ( 15 min. ) |
Fri, Nov 25 PM 15:20 - 17:00 |
(5) |
15:20-15:45 |
Discussion and Evaluation on Regeneration of New Kyoto 2006+ Data Set |
Ryunosuke Tada, Ryotaro Kobayashi (Toyohashi Univ. of Tech.), Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) |
(6) |
15:45-16:10 |
Report on WhibOx 2016 White-Box Cryptography and Obfuscation |
Kazuomi Oishi (SIST) |
(7) |
16:10-16:35 |
Performance of link-mining techniques to detect malicious websites |
Yasuhiro Takano, Daiki Ito, Tatsuya Nagai (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) |
(8) |
16:35-17:00 |
Clustering of Attacking Devices using Active Monitoring |
Takahiro Kasama, Daisuke Inoue (NICT) |