Thu, Mar 3 PM 12:40 - 14:10 |
(1) ICSS |
12:40-13:10 |
Improving IoTPOT for Observing Various Attacks Targeting Embedded Devices |
Shogo Suzuki, YinMin Papa, Yuta Ezawa, Ying Tie, Sou Nakayama, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
(2) ICSS |
13:10-13:40 |
Observing Cyber Attacks on Building Control System by Honeypot |
Ying Tie (YNU), Koichi Shimizu (Mitsubishi Electric Corporation), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
(3) ICSS |
13:40-14:10 |
Storage-Efficient and Low-Power Packet Classification for Internet of Things |
Yuta Kitamura (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) |
Thu, Mar 3 PM 12:40 - 14:10 |
(4) ICSS |
12:40-13:10 |
Malicious-Spam-Mail Detection System with Autonomous Learning Ability |
Shogo Osaka, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) |
(5) ICSS |
13:10-13:40 |
An Actual Survey on Web Scanning by URI Co-occurrence Detection |
Yang Zhong, Shingo Orihara, Masaki Tanikawa (NTT), Hajime Shimada, Tutomu Murase (Nagoya Univ), Hiroki Takakura (NII), Yoshihito Oshima (NTT) |
(6) ICSS |
13:40-14:10 |
Analyzing Targeted Cyber Attacks by Focusing on Contents of Decoy Documents |
Natsuko Kawakami, Ryota kikkawa, Ying Tie, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
|
14:10-14:20 |
Break ( 10 min. ) |
Thu, Mar 3 PM 14:20 - 15:20 |
(7) ICSS |
14:20-15:20 |
[Invited Talk]
Looking Back on My Research |
Yuko Murayama (Iwate Prefectural Univ.) |
|
15:20-15:30 |
Break ( 10 min. ) |
Thu, Mar 3 PM 15:30 - 17:00 |
(8) ICSS |
15:30-16:00 |
Current Status and Issues of the Application of AI Technology for Digital Forensics |
Shinichi Matsumoto (ISIT), Kouichi Sakurai (Kyushu Univ.) |
(9) ICSS |
16:00-16:30 |
Issue analysis toward forensics gathering infrastructure that supports the more efficient incident handling |
Daichi Hasumi, Shigeyoshi Shima, Takahiro Kakumaru (NEC) |
(10) ICSS |
16:30-17:00 |
Privacy-preserving Log Analysis with Deterministic Encryption |
Yuji Furuta, Naoto Yanai (Osaka Univ.), Masashi Karasaki (NTT-neomeit), Katsuhiko Eguchi (NTT Neomeit), Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) |
Thu, Mar 3 PM 15:30 - 17:00 |
(11) ICSS |
15:30-16:00 |
Detection of Vulnerability Scanning Using Features of Collective Accesses Collected from Several Honeypots |
Naomi Kuze, Shu Ishikura (Osaka Univ.), Takeshi Yagi, Daiki Chiba (NTT), Masayuki Murata (Osaka Univ.) |
(12) ICSS |
16:00-16:30 |
Evaluation of the attack detection method based on duration of continuous packet arrival |
Yuhei Hayashi, Satoshi Nishiyama, Akinori Suzuki, Katsuhiko Sakai, Ichiro Kudo, Kazunori Kamiya (NTT) |
(13) ICSS |
16:30-17:00 |
Investigation of cyber incident prediction method based on a technical analysis |
Masaru Kawakita, Shigeyoshi Shima (NEC) |
Fri, Mar 4 AM 10:00 - 12:00 |
(14) ICSS |
10:00-10:30 |
A fast detecting method for obfuscated malicious JavaScript based on text pattern analysis |
Jiawei Su, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (YNU) |
(15) ICSS |
10:30-11:00 |
Static Detection of ROP Chain Based on Hidden Markov Model |
Toshinori Usui, Tomonori Ikuse, Makoto Iwamura, Takeshi Yada (NTT) |
(16) ICSS |
11:00-11:30 |
A Suspicious Processes Detection Scheme using Process Frequency and Network State |
Junji Nakazato, Yu Tsuda, Eto Masashi, Daisuke Inoue, Koji Nakao (NICT) |
(17) ICSS |
11:30-12:00 |
Preliminary Studies of Linkage Analysis among Process Behavior for Intrusion Prevention |
Yudai Tomaru, Masaki Hashimoto, Hidehiko Tanaka (iisec) |
Fri, Mar 4 AM 10:00 - 12:00 |
(18) ICSS |
10:00-10:30 |
A Study of Security of an Authentication Method Using Public and Private Keys with Relaying Plural Key Pairs |
Yusuke Ogata, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) |
(19) ICSS |
10:30-11:00 |
Selection of authentication methods with game theory in VANET |
Hiroaki Hiroaki, Masakazu Soshi (Hiroshima City Univ.) |
(20) ICSS |
11:00-11:30 |
Towards Non-Encryption-Based RFID Private Tag Authentication |
Kazuya Sakai (TMU) |
(21) |
11:30-12:00 |
|
|
12:00-13:30 |
Lunch Break ( 90 min. ) |
Fri, Mar 4 PM 13:30 - 15:00 |
(22) ICSS |
13:30-14:00 |
A New Key Correlation in the Stream Cipher RC4 |
Daiki Michihiro (JAIST), Atsuko Miyaji (Osaka Univ./JAIST/CREST) |
(23) ICSS |
14:00-14:30 |
Discrimination of communication traffic generated by malware-infected hosts |
Sho Mizuno, Mitsuhiro Hatada, Tatsuya Mori, Shigeki Goto (Waseda University) |
(24) ICSS |
14:30-15:00 |
An Autonomous DDoS Backscatter Detection System from Darknet Traffic |
Yuki Ukawa, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) |
Fri, Mar 4 PM 13:30 - 14:30 |
(25) ICSS |
13:30-14:00 |
Privacy-enhanced Similarity Search Scheme for Cloud Image Databases |
Hao Liu, Hideaki Goto (Tohoku Univ.) |
(26) ICSS |
14:00-14:30 |
Instantly Self-Verifiable Pre-Shared Key Exchange for Cyber-Physical Systems |
Kohei Isobe (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) |
|
14:30-14:40 |
Break ( 10 min. ) |
Fri, Mar 4 PM 15:10 - 16:10 |
(27) ICSS |
15:10-15:40 |
Cooperative Secure Network Coding |
Sumiyo Ishige (JAIST), Atsuko Miyaji (JAIST/Osaka Univ./JST CREST) |
(28) ICSS |
15:40-16:10 |
Improvement and implementation of scalar multiplication algorithms with side-channel protection |
Keisuke Kito (JAIST), Atsuko Miyaji (Osaka Univ./JAIST/JST CREST) |
Fri, Mar 4 PM 15:10 - 16:10 |
(29) ICSS |
15:10-15:40 |
Verification of Division Property and High-Order Differential Characteristic of Lightweight Blockcipher Piccolo |
Takuya Kubo, Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ of Science) |
(30) ICSS |
15:40-16:10 |
Higher-order differential attack on the round-reduced variants of the block cipher |
Yusuke Takahashi, Yasutaka Igarashi, Toshinobu Kaneko (TUS) |