Mon, Nov 29 PM 13:00 - 14:40 |
(1) |
13:00-13:25 |
Current status, issues, and research trends of user authentication in mobile networks |
Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) |
(2) |
13:25-13:50 |
A Study on Tamper Resistance of Trusted Execution Environment |
Kazuomi Oishi (SIST) |
(3) |
13:50-14:15 |
Automation of Security Vulnerability Analysis by Auto-generated DFD |
Shun Miyazaki, Junpei Kamimura (NEC) |
(4) |
14:15-14:40 |
Ring Signature scheme based on prime-order bilinear group |
Masato Uehara, Tian Yangguang, Atsuko Miyaji (OU) |
|
14:40-15:00 |
Break ( 20 min. ) |
Mon, Nov 29 PM 15:00 - 16:40 |
(5) |
15:00-15:25 |
Design and Implementation of a Session Types-based Secure Communication Protocol for Processes |
Xiaolong, Yuuki Takano, Atsuko Miyaji (OU) |
(6) |
15:25-15:50 |
Masquerade Detection using command log of Honeypot |
Ryusei Higuchi, Hideya Ochiai, Hiroshi Esaki (UTokyo) |
(7) |
15:50-16:15 |
A SDN-based Honeypot System: Attracting Suspicious Traffic in Local Area Networks |
Koki Ito, Hideya Ochiai, Esaki Hiroshi (The Univ. of Tokyo) |
(8) |
16:15-16:40 |
Automating the collection of malware behavior captured by honeypots |
Eisuke Tomiyama, Hideya Ochiai, Hiroshi Esaki (UTokyo) |
Tue, Nov 30 AM 09:30 - 11:10 |
(9) |
09:30-09:55 |
Real-time detection of Distributed Slow HTTP DoS attacks using communication analysis |
Koki Tamura, Yuichi Futa (TUT), Tomomichi Suzuki (PitApp) |
(10) |
09:55-10:20 |
Comparison of CNN padding method using a part of malware API call sequence data with RNN. |
Shugo Asai, Yuichi Futa (TUT) |
(11) |
10:20-10:45 |
Monitoring IPv6 packets by dynamic routing in a LAN configured with IPv4 |
Yuki Yagi, Hideya Ochiai, Hiroshi Esaki (the Univ. of Tokyo) |
(12) |
10:45-11:10 |
Detection of spoofing attacks in RS-485/Modbus communication by non-contact current measurement |
Tatsuya Arisawa, Hideya Ochiai, Hiroshi Esaki (Tokyo Univ.) |