Thu, Mar 27 PM Session 1A - ICSS Chair: Hiroaki Kikuchi (Meiji Univ.) 13:05 - 14:45 |
(1) ICSS |
13:05-13:30 |
The countermeasures against extraction of AES keys from memory dumping. |
Michiyoshi Satoh (TSH) |
(2) ICSS |
13:30-13:55 |
An Active Attack on RC4 in SSL/TLS |
Toshihiro Ohigashi (Hiroshima Univ.), Takanori Isobe (Sony), Yuhei Watanabe (Kobe Univ.), Ryo Nojima (NICT), Masakatu Morii (Kobe Univ.) |
(3) ICSS |
13:55-14:20 |
Implementation and Evaluation of a Distributed Secure Multi-party Computation System |
Koki Hamada (NTT) |
(4) ICSS |
14:20-14:45 |
General Construction of Certified Data Transmission Protocol Using ID-Based Encryption and ID-Based Signature |
Hitoshi Miyazaki (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) |
|
14:45-14:55 |
Break ( 10 min. ) |
Thu, Mar 27 PM Session 2A - ICSS Chair: Daisuke Inoue(NICT) 14:55 - 16:35 |
(5) ICSS |
14:55-15:20 |
SSL Client Authentication with TPM
-- Issuance of Public Key Certificate with OpenID and Terminal Authentication with SSL Client Certificate -- |
Akihito Shinoda (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) |
(6) ICSS |
15:20-15:45 |
An authenticated key exchange protocol for the network between a server and terminals |
Yumiko Murakami, Yutaka Kawai, Nobuhiro Kobayashi (Mitsubishi Electric) |
(7) ICSS |
15:45-16:10 |
On Threats of Impersonation and Man-In-The-Middle Attack on Network Printers |
Yuka Enomoto, Akira Kanaoka (Toho Univ.) |
(8) ICSS |
16:10-16:35 |
Applying Identity-based Cryptography to Mutual Authentication between OpenFlow Devices |
Tomoko Kazama, Akira Kanaoka (Toho Univ.) |
Thu, Mar 27 PM Session 1B - ICSS Chair: Yoshiaki Shiraishi (Kobe Univ.) 13:05 - 14:45 |
(9) ICSS |
13:05-13:30 |
Practical Password Management System against password-list-attacks
-- Proposal of protection of Master Password -- |
Hironao Teruya, Wataru Nakamura (Meio Univ.), Keisuke Furumoto (Kobe Univ.), Takeshi Tengan, Katsuyoshi Tanabe (Meio Univ.), Masakatu Morii (Kobe Univ.) |
(10) ICSS |
13:30-13:55 |
Measuring Lifetime of Malicious Website Based on Redirection from Compromised Websites |
Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT) |
(11) ICSS |
13:55-14:20 |
An Investigation of Malicious JavaScript Code used in Drive-by Download |
Yuta Takata, Mitsuaki Akiyama, Takeo Hariu (NTT) |
(12) ICSS |
14:20-14:45 |
Implementation and Evaluation of Web Phantom: Hybrid Web Honeypot |
Takeshi Yagi, Takeo Hariu (NTT) |
|
14:45-14:55 |
Break ( 10 min. ) |
Thu, Mar 27 PM Session 2B - SPT Chair: Shigeyoshi Shima(NEC) 14:55 - 16:35 |
(13) |
14:55-15:20 |
STP(2) |
(14) |
15:20-15:45 |
STP(2) |
(15) |
15:45-16:10 |
SPT(3) |
(16) |
16:10-16:35 |
SPT(4) |
Fri, Mar 28 AM Session 3A - ICSS Chair: Takeshi Ueda (Mitsubishi Electric) 09:00 - 10:40 |
(17) ICSS |
09:00-09:25 |
Ruleset Optimization for Detecting Malware-Derived Traffic Based on Network-Dependent Log Analysis |
Kensuke Nakata, Kazunori Kamiya, Hiroshi Kurakami, Kazufumi Aoki, Takeshi Yagi (NTT) |
(18) ICSS |
09:25-09:50 |
Spam Analysis based on Mail Relay Routing |
Junji Nakazato, Tao Ban (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) |
(19) ICSS |
09:50-10:15 |
Implementation and Evaluation of a Proactive Cyber Attack Monitoring Platform |
Masashi Eto (NICT), Tomohide Tanaka (clwit), Koei Suzuki, Daisuke Inoue, Koji Nakao (NICT) |
(20) ICSS |
10:15-10:40 |
MATATABI: Multi-layer Threat Analysis Platform with Hadoop |
Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Yuji Sekiya (Univ. of Tokyo), Youki Kadobayashi (NAIST) |
|
10:40-10:50 |
Break ( 10 min. ) |
Fri, Mar 28 AM Session 4A - ICSS Chair: Hiroki Takakura (Nagoya Univ.) 10:50 - 12:30 |
(21) ICSS |
10:50-11:15 |
Detection of Android apps that secretly abuse the camera |
Takuya Watanabe, Tatsuya Mori, Tetsuya Sakai (Waseda Univ.) |
(22) ICSS |
11:15-11:40 |
Timeline-Based Event Log Viewer over Multi-Host Environment |
Takashi Tomine, Yu Tsuda, Masaki Kamizono (NICT), Kazunori Sugiura (Keio Univ.), Daisuke Inoue, Koji Nakao (NICT) |
(23) ICSS |
11:40-12:05 |
DNS Traffic Analysis Platform with Hadoop Framework |
Tomohiro Ishihara, Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Daisuke Miyamoto, Yuji Sekiya (Univ. of Tokyo) |
(24) ICSS |
12:05-12:30 |
Identifying C&C Server by Analyzing Relation between Control Flow and Communications |
Tomonori Ikuse, Kazufumi Aoki, Takeo Hariu (NTT) |
|
12:30-13:30 |
Lunch Break ( 60 min. ) |
Fri, Mar 28 PM Session 5A - ICSS Chair: Masakatu Morii (Kobe Univ.) 13:30 - 15:10 |
(25) ICSS |
13:30-13:55 |
A Method To Detect Android Privilege Escalation |
Wataru Hasegawa, Lujo Bauer (Carnegie Mellon Univ.), Kilho Shin (Univ. of Hyogo) |
(26) ICSS |
13:55-14:20 |
Proposal of malware classification method based on pattern similarity of traffic |
Hyoyoung Lim, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) |
(27) ICSS |
14:20-14:45 |
Design of HTTP Communication Profiling for Infected Hosts Detection |
Daiki Chiba, Kensuke Nakata, Mitsuaki Akiyama, Kazufumi Aoki, Kazunori Kamiya, Takeshi Yagi (NTT) |
(28) ICSS |
14:45-15:10 |
Supporting Effect Assessment of Accessing Malicious Web Sites with Multi-Environment Analysis |
Takayuki Yoshinori, Akihito Shinoda (Nagoya Inst. of Tech), Masaki Kamizono (NICT), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech) |
Fri, Mar 28 AM Session 3B - ICSS Chair: Yoshiro Wataguchi(FUJITSU labs) 09:00 - 10:40 |
(29) ICSS |
09:00-09:25 |
A Study on the Formulation of Re-identification of Anonymized Personal Information |
Hiroko Akiyama, Akira Kato, Hideki Sunahara (Keio Univ.) |
(30) ICSS |
09:25-09:50 |
Comparison of Privacy Policies in Different Domains |
Toru Nakamura (KDDI Lab.), Milena Tasic (Univ. of Belgrade), Shinsaku Kiyomoto, Yutaka Miyake (KDDI Lab.) |
(31) ICSS |
09:50-10:15 |
Shortening of High Load Virtual Machine Live Migration Time by Controlling CPU Resource |
Yasuhiro Teramoto, Toshiharu Kishi, Yukio Nagafuchi, Takaaki Koyama, Hideo Kitazume (NTT) |
(32) ICSS |
10:15-10:40 |
Evaluation of user average delay reducing method in the live migration environment between datacenters |
Yukio Nagafuchi, Yasuhiro Teramoto, Toshiharu Kishi, Takaaki Koyama, Hideo Kitazume (NTT) |
|
10:40-10:50 |
Break ( 10 min. ) |
Fri, Mar 28 AM Session4B - SPT Chair: Yukiyasu Tsunoo(NEC) 10:50 - 12:05 |
(33) |
10:50-11:15 |
SPT(5) |
(34) |
11:15-11:40 |
SPT(6) |
(35) |
11:40-12:05 |
SPT(7) |
|
12:05-13:35 |
Lunch Break ( 90 min. ) |
Fri, Mar 28 PM セッション5B - ICSS Chair: Yutaka Miyake (KDDI R&D Labs.) 13:30 - 15:35 |
(36) ICSS |
13:30-13:55 |
A Speculation of Operating an Integrated Service for Manifatures on Public Clouds and Issues Regarding Security |
Takashi Sakakura (Mitsubishi Electric) |
(37) ICSS |
13:55-14:20 |
Evaluation of hash tree construction on P2P networks |
Tomoyuki Asaeda, Taihei Higuchi, Masakazu Soshi (Hiroshima City Univ.) |
(38) ICSS |
14:20-14:45 |
Path Authentication for VANET with Group One-Way Cross-Networks |
Shoma Kitayama, Masakazu Soshi (Hiroshima City Univ.) |
(39) ICSS |
14:45-15:10 |
System Security Analysis using Dependency Relationship on Cloud |
Yoshiro Wataguchi, Nobuyuki Kanaya (FUJITSU labs), Takao Okubo (IISEC) |
(40) ICSS |
15:10-15:35 |
Higher Order Differential Property of LBlock(II) |
Naoki Shibayama (Japan Air Self-Defense Force), Toshinobu Kaneko (Tokyo Univ. of Science) |