IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev IPSJ-SPT Conf / Next IPSJ-SPT Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 

===============================================
Special Interest Group on Security Psychology and Trust (IPSJ-SPT)


===============================================
Technical Committee on Information and Communication System Security (ICSS)
Chair: Yoshiaki Shiraishi (Kobe Univ.) Vice Chair: Takeshi Ueda (Mitsubishi Electric), Hiroki Takakura (NII)
Secretary: Katsunari Yoshioka (Yokohama National Univ.), Kazunori Kamiya (NTT)
Assistant: Takahiro Kasama (NICT), Akira Yamada (KDDI labs.)

DATE:
Wed, Mar 7, 2018 13:00 - 16:30
Thu, Mar 8, 2018 09:20 - 16:05

PLACE:
沖縄北部雇用能力開発総合センター(〒905-2172 名護市字豊原224-3. (バスの場合は77系統「豊原」か「豊原入り口」が最寄りです。). http://www3.jeed.or.jp/okinawa/poly/center.html)

TOPICS:
Security, Trust, etc.

----------------------------------------
Wed, Mar 7 PM Network Security 1(A) (13:00 - 14:40)
----------------------------------------

(1)/ICSS 13:00 - 13:25
A Study on Malware Activity Detection Based on Real-time Analysis of Darknet Data Using Graphical Lasso
Chansu Han (Kyushu Univ.), Jumpei Shimamura (Clwit Inc.), Takeshi Takahashi, Daisuke Inoue (NICT), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT)

(2)/ICSS 13:25 - 13:50
Combining Local and Global Graph-based Features for Stealth Scan Detection on LAN
Hiroki Nagayama, Bo HU, Kazunori Kamiya, Masaki Tanikawa (NTT)

(3)/ICSS 13:50 - 14:15
Malware Detection by Anomaly of Traffic Data for IoT Devices
Kana Sakano, Tetsutaro Uehara (Ritsumeikan Univ.)

(4)/ICSS 14:15 - 14:40
Modeling Worm Propagation using Dynamic Patching
Sugitani Yuki, Francois Bonnet, Miyaji Atsuko (Osaka Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Wed, Mar 7 PM Cryptography 1 (B) (13:00 - 14:15)
----------------------------------------

(5)/ICSS 13:00 - 13:25
On the effectiveness of solving ECDLP using Characteristic set methods
Tomoya Nishiguchi, Chen Mou, Kenta kodera, Atuko Miyaji (Osaka Univ.)

(6)/ICSS 13:25 - 13:50
Application of Multi-Party Private Set-Intersection
Motoi Hayashi, Katsunari Shishido, Atsuko Miyaji (Osaka Univ.)

(7)/ICSS 13:50 - 14:15
An analysis of the Guo-Johansson-Stankovski attack against QC-MDPC codes
Yohei Maezawa, Tung Chou, Atsuko Miyaji (Osaka Univ,)

----- Break ( 35 min. ) -----

----------------------------------------
Wed, Mar 7 PM Network Security 2(A) (14:50 - 16:30)
----------------------------------------

(8)/ICSS 14:50 - 15:15
A study of decentralized IoT Security Controller
Iifan Tyou, Hiroki Nagayama, Takuya Saeki, Yukio Nagafuchi, Masaki Tanikawa (NTT)

(9)/ICSS 15:15 - 15:40
A study of security requirements and function implementation for home networks in a period of IoT expansion
Shingo Kashima, Tsuyoshi Kondoh, Tetsuhiko Murata, Masami Ueno (NTT)

(10)/ICSS 15:40 - 16:05
A Preliminary Study on Defining Malignant Activity by Linking in-System Elements
Takuya Koike (IISEC), Miyuu Okubo (IRI), Hidenori Tsuji, Masaki Hashimoto (IISEC)

(11)/ICSS 16:05 - 16:30
The spread and the containment of virus in random network model
Taichi Nishino, Francois Bonnet, Atsuko Miyaji (Osaka Univ.)

----------------------------------------
Wed, Mar 7 PM Cryptography 2(B) (14:50 - 16:05)
----------------------------------------

(12)/ICSS 14:50 - 15:15
Safety evaluation of stream cipher, Salsa20/ChaCha20 by redesign of diffusion
Yusuke Matsuoka, Atsuko Miyaji (Osaka Univ.)

(13)/ICSS 15:15 - 15:40
Evaluation of HIBE based on Universal Sampler
Shunsuke Otsuka, Akinori Kawachi, Atsuko Miyaji (Osaka Univ.)

(14)/ICSS 15:40 - 16:05
(See Japanese page.)

----------------------------------------
Thu, Mar 8 AM Web Security 1(A) (09:20 - 11:00)
----------------------------------------

(15)/ICSS 09:20 - 09:45
Estimate of Malicious Web Sites Based on Users' Web Access Behavior and Destination AS Numbers
Kosuke Murakami, Jumpei Urakawa, Akira Yamada, Ayumu Kubota (KDDI Research)

(16)/ICSS 09:45 - 10:10
Automatically Collecting User-initiated Web-based Attacks
Takashi Koide, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT)

(17)/ICSS 10:10 - 10:35
An Empirical Analysis of Online Advertising Fraud by analyzing User Activities Observed in the Ad Network
Fumihiro Kanei, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT)

(18)/ICSS 10:35 - 11:00
Darkweb Analysis System by Combining HSDir's Snooping and Active Scanning
Akito Ono (Ritsumeikan Univ.), Masaki Kamizono (PwC Cyber Services), Takahiro Kasama (NICT), Tetsutaro Uehara (Ritsumeikan Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Thu, Mar 8 AM Malware(B) (09:20 - 11:00)
----------------------------------------

(19)/ICSS 09:20 - 09:45
Considering Opcode-based Similarity between IoT Malware Samples
Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT)

(20)/ICSS 09:45 - 10:10
Evaluation of malware sandbox using evasive test samples
Kou Ishii, Wateru Ueno, Rui Tanabe (Yokohama National Univ.), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)

(21)/ICSS 10:10 - 10:35
Research on an Evaluation Method for Memory Forensics Tools
Makoto Ashitsu, Ikuo Tanaka, Hidenori Tsuji, Masaki Hashimoto (IISEC)

(22)/ICSS 10:35 - 11:00
A Malware Detection Method by Machine Learning Focused on Malignant Activity
Tadashi Shimomura, Nobuki Suetsugu, Hidenori Tsuji, Masaki Hashimoto (IISEC)

----- Break ( 10 min. ) -----

----------------------------------------
Thu, Mar 8 AM Web Security 2(A) (11:10 - 12:25)
----------------------------------------

(23)/ICSS 11:10 - 11:35
Classification for Important Decoy Documents Based on Supervised Learning
Yao Xiao, Shuta Morishima (Yokohama National Univ.), Tsuyufumi Watanabe (Yokohama National Univ./Fujisoft), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)

(24)/ICSS 11:35 - 12:00
Predicting Website Abuse Using Update Histories
Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT), Shigeki Goto (Waseda Univ.)

(25)/ICSS 12:00 - 12:25
Analyzing web application vulnerability reports by machine learning
Takaaki Nagumo, Yuusuke Kubo, Yasuhiro Kobayashi, Wataru Hasegawa, Takahiro Hamada (NTT Com)

----- Lunch Break ( 60 min. ) -----

----------------------------------------
Thu, Mar 8 AM Threat Intelligence(B) (11:10 - 12:00)
----------------------------------------

(26)/ICSS 11:10 - 11:35
(See Japanese page.)

(27)/ICSS 11:35 - 12:00
(See Japanese page.)

----- Lunch Break ( 60 min. ) -----

----------------------------------------
Thu, Mar 8 PM Network Security 3(A) (13:25 - 14:40)
----------------------------------------

(28)/ICSS 13:25 - 13:50
Response Signature Generation method for Detecting Malicious Destinations
Kazuma Shinomiya, Iifan Tyou, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT)

(29)/ICSS 13:50 - 14:15
Investigation of Inferability of IP addresses for Clients in Organizations
Miori Saito, Wataru Ueno, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)

(30)/ICSS 14:15 - 14:40
Subspace Clustering Method with Semantic Interpretability for Bot Behavior Classification
Shohei Araki, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT)

----- Break ( 10 min. ) -----

----------------------------------------
Thu, Mar 8 PM SPT/Authentication(B) (13:25 - 15:05)
----------------------------------------

(31) 13:25 - 13:50
(IPSJ-SPT) PINWrite:A New Smartphone Authentication Scheme Using Handwriting Recognition

(32) 13:50 - 14:15


(33)/ICSS 14:15 - 14:40
A Survey of Factors Influencing Progress of HTTPS Adoption
Tetsuya Okuda, Naoko Chiba, Mitsuaki Akiyama, Yuki Okano (NTT)

(34)/ICSS 14:40 - 15:05
A countermeasure against camrip using the phase modulation
Toshiki Sasazaki, Tatsuya Mori (Waseda Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Thu, Mar 8 PM Network Security 4(A) (15:15 - 16:05)
----------------------------------------

(35)/ICSS 15:15 - 15:40
Empirical Analysis of Reflectors in DRDoS attacks based on Large-Scale Network Data
Jumpei Urakawa, Kosuke Murakami, Akira Yamada, Ayumu Kubota (KDDI Research)

(36)/ICSS 15:40 - 16:05
Analyzing Victims of DRDoS Attacks Observed by Honeypots
Kazuya Watanabe (Yokohama National Univ.), Tomomi Nishizoe (NTT Com), Daisuke Makita (NICT), Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)

----------------------------------------
Thu, Mar 8 PM Cryptography 3(B) (15:15 - 16:05)
----------------------------------------

(37)/ICSS 15:15 - 15:40
On the Ring Signature Scheme Using LDPC Codes
Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.)

(38)/ICSS 15:40 - 16:05
On a Method to Implement White-box Cryptography (No Presentation)
Tomonari Ozeki, Masakazu Soshi (Hiroshima City Univ.)

# Information for speakers
General Talk will have 20 minutes for presentation and 5 minutes for discussion.


=== Special Interest Group on Security Psychology and Trust (IPSJ-SPT) ===
# FUTURE SCHEDULE:

Thu, May 10, 2018 - Fri, May 11, 2018: Tsuda Univ. [Fri, Mar 9]

=== Technical Committee on Information and Communication System Security (ICSS) ===
# FUTURE SCHEDULE:

Mon, Jun 25, 2018 - Tue, Jun 26, 2018: Ehime University [Wed, Apr 18], Topics: Internet Security, etc.

# SECRETARY:
Yoshiaki Shiraishi (Kobe University)
E-mail: is-adm-q

# ANNOUNCEMENT:
# Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html


Last modified: 2018-03-07 13:17:00


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ICSS Schedule Page]   /   [Return to IPSJ-SPT Schedule Page]   /  
 
 Go Top  Go Back   Prev IPSJ-SPT Conf / Next IPSJ-SPT Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan