Thu, Mar 7 PM ICSS(1-1) 13:30 - 15:10 |
(1) |
13:30-13:55 |
|
(2) ICSS |
13:55-14:20 |
Period Analysis for Visualization of Industrial Network |
Hiroki Nagayama, Hu Bo, Kazunori Kamiya, Shingo Kashima, Masaki Tanikawa (NTT) |
(3) ICSS |
14:20-14:45 |
How to build malware sandbox using real IoT devices |
Jia Xiong, Tatsuya Tamai, Kazuki Tamiya (Yokohama National Univ.), Satoshi Hara (Yokohama National Univ./Fujisoft), Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
(4) ICSS |
14:45-15:10 |
Discrimination of IoT devices by clustering their responses to network scan |
Takuya Hoizumi, Shin Nishida, Keisuke Uchida, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
|
15:10-15:25 |
Break ( 15 min. ) |
Thu, Mar 7 PM ICSS(1-2) 13:30 - 15:10 |
(5) ICSS |
13:30-13:55 |
A Method for Realizing Traceability of Security Requirements for Information Systems deployed in Public Cloud using GSN |
Ryo Hase, Yohei Matsuura (Mitsubishi Electric) |
(6) ICSS |
13:55-14:20 |
Regulatory Compliance Monitoring on the Web Using Paragraph Vector |
Mitsuharu Sasaki (NTT EAST), Taishi Nishiyama, Atsutoshi Kumagai, Kazunori Kamiya (NTT) |
(7) ICSS |
14:20-14:45 |
On Improvement of a White-box Cryptographic Scheme |
Masakazu Soshi (Hiroshima City Univ.) |
(8) ICSS |
14:45-15:10 |
Implementation and evaluation of aggregate message authentication method |
Atsuhiro Yamagishi (JDC), Tatsuya Takehisa, Eiichi Nishiura (NISSIN), Shouichi Hirose, Yu Imamura (JDC), Kazuhiko Minematsu (nec), Junji Shikata, Koji Nakao (YNU) |
|
15:10-15:25 |
Break ( 15 min. ) |
Thu, Mar 7 PM ICSS(2) 15:25 - 17:05 |
(9) ICSS |
15:25-15:50 |
A User Participation Type Web Security Platform and Its Real World Evaluation |
Akira Yamada, Yukiko Sawaya, Takashi Matsunaka, Shoma Tanaka, Ayumu Kubota (KDDI Research) |
(10) ICSS |
15:50-16:15 |
An experiment design of security notification to users of IoT devices through dedicated client software |
Shin Nishida, Takuya Hoizumi, Keisuke Uchida, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
(11) ICSS |
16:15-16:40 |
Analyzing Deceptive Internationalized Domain Names |
Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide (NTT), Yuta Sawabe, Shigeki Goto (Waseda Univ.), Mitsuaki Akiyama (NTT) |
(12) ICSS |
16:40-17:05 |
Web Application Identification Method Applicable to Large-scale Flow Data Using a Small-scale Labeled Data |
Shun Tobiyama, Shohei Araki, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT), Kenji Takahashi (NTT Security) |
Thu, Mar 7 PM SPT(1) 15:25 - 17:05 |
(13) |
15:25-15:50 |
|
(14) |
15:50-16:15 |
|
(15) |
16:15-16:40 |
|
(16) |
16:40-17:05 |
|
Fri, Mar 8 AM ICSS(3) 10:00 - 11:40 |
(17) ICSS |
10:00-10:25 |
|
|
(18) ICSS |
10:25-10:50 |
|
|
(19) ICSS |
10:50-11:15 |
|
|
(20) ICSS |
11:15-11:40 |
Threat Information Analysis Using Conditional Generative Adversarial Network |
Keisuke Furumoto, Hideaki Kanehara, Takeshi Takahashi (NICT), Yoshiaki Shiraishi (Kobe Univ.), Daisuke Inoue (NICT) |
|
11:40-13:00 |
Break ( 80 min. ) |
Fri, Mar 8 AM SPT(2) 10:00 - 11:40 |
(21) |
10:00-10:25 |
|
(22) |
10:25-10:50 |
|
(23) |
10:50-11:15 |
|
(24) |
11:15-11:40 |
|
|
11:40-13:00 |
Break ( 80 min. ) |
Fri, Mar 8 PM ICSS(4-1) 13:00 - 14:15 |
(25) ICSS |
13:00-13:25 |
A proposal of detection method of singed malicious program |
Hiroyuki Sakakibara, Kiyoto Kawauchi (Mitsubishi Electric) |
(26) ICSS |
13:25-13:50 |
Proposal of a Non-Technical Skills Map for Computer Security Incident Responses |
Takahiro Kasama, Shingo Yasuda, Hironobu Satoh (NICT), Masaki Kamizono, Emi Kojima (PwC), Takao Yamaguchi, Kazuharu Nara (JAMSS) |
(27) ICSS |
13:50-14:15 |
Report on 35th Chaos Computer Congress(35C3) |
Keisuke Kito (Mitsubishi Electric) |
|
14:15-14:25 |
Break ( 10 min. ) |
Fri, Mar 8 PM ICSS(4-2) 13:00 - 14:15 |
(28) ICSS |
13:00-13:25 |
Authentication with hash chain computation model |
Shinta Hirai, Masakazu Soshi (Hiroshima City Univ.) |
(29) ICSS |
13:25-13:50 |
|
|
(30) ICSS |
13:50-14:15 |
|
|
|
14:15-14:25 |
Break ( 10 min. ) |
Fri, Mar 8 PM ICSS(5-1) 14:25 - 15:40 |
(31) ICSS |
14:25-14:50 |
Traffic analysis to detect abnormal smartphone application behavior |
Iifan Tyou, Takahiro Nukushina, Yukio Nagafuchi, Masaki Tanikawa (NTT) |
(32) ICSS |
14:50-15:15 |
Performance survey for IoT security function on smartphone |
Yukio Nagafuchi, Takahiro Nukushina, Iifan Tyou, Masaki Tanikawa (NTT) |
(33) ICSS |
15:15-15:40 |
Understanding DNS over TLS: Performance Evaluation and Large-scale Measurement Study |
Masahiro Maki, Tatsuya Mori (Waseda Univ.) |
Fri, Mar 8 PM ICSS(5-2) 14:25 - 15:15 |
(34) ICSS |
14:25-14:50 |
|
|
(35) ICSS |
14:50-15:15 |
A Trouble Ticket System Specialized for Incident Response |
Yu Tsuda, Takashi Tomine (NICT), Masato Jingu (NICT/HISYS), Keisuke Iwasaki (NTT-AT), Kenjiro Terada, Daisuke Inoue (NICT) |