IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev ICSS Conf / Next ICSS Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 

===============================================
Technical Committee on Information and Communication System Security (ICSS)
Chair: Hiroki Takakura (NII)
Vice Chair: Katsunari Yoshioka (Yokohama National Univ.), Kazunori Kamiya (NTT)
Secretary: Takahiro Kasama (NICT), Akira Yamada (KDDI labs.)
Assistant: Keisuke Kito (Mitsubishi Electric), Toshihiro Yamauchi (Okayama Univ.)

===============================================
Special Interest Group on Security Psychology and Trust (IPSJ-SPT)


DATE:
Mon, Mar 2, 2020 09:40 - 16:40
Tue, Mar 3, 2020 09:10 - 16:40

PLACE:
OKINAWAKEN SEINENKAIKAN(2-15-23 Kume, Naha, Okinawa. 5 mins on foot from Asahibashi station. +81-98-864-1780)

TOPICS:
Security, Trust, etc.

----------------------------------------
Mon, Mar 2 AM (10:00 - 11:00)
----------------------------------------

(1)/ICSS 10:00 - 10:20
Improvement of the Backup Method Dealing with 2 Types of Damages
Taiga Hasuike, Masahiro Mambo (Kanazawa Univ.)

(2)/ICSS 10:20 - 10:40
Estimation method of information asset security attributes using design mode
Takeshi Ueda, Koichi Shimizu, Shun Hinatsu, Fumio Omatsu (Mitsubishi Electric Corp.)

(3)/ICSS 10:40 - 11:00
Information Rates for Multiple Assignment Schemes on Five Participants
Yutaro Shimma, Kouya Tochikubo (Nihon Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Mon, Mar 2 AM (11:10 - 12:10)
----------------------------------------

(4)/ICSS 11:10 - 11:30
A Verification Method of Infrastructure as Code using Alloy Analyzer
Ryo Hase, Yohei Matsuura (Mitsubishi Electric)

(5)/ICSS 11:30 - 11:50
Effect of Environmental Temperature Change in LED Fingerprinting
Ayaka Tsuchiya, Akiko Toh, Yang Li, Kazuo Sakiyama, Takeshi Sugawara (UEC)

(6)/ICSS 11:50 - 12:10
Log Storing System Using Blockchain
Takashi Ikeda, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.)

----- Lunch Break ( 80 min. ) -----

----------------------------------------
Mon, Mar 2 PM (13:30 - 14:50)
----------------------------------------

(7)/ICSS 13:30 - 13:50
(See Japanese page.)

(8)/ICSS 13:50 - 14:10
Search for Similar Binary Code in Cross-Architecture Using Neural Machine Translation Model
Moritoshi Aoyanagi, Hidenori Tsuji, Masaki Hashimoto (IISEC)

(9)/ICSS 14:10 - 14:30
A Study on Fuzzing for Device Drivers with AddressSanitizer
Kentaro Ishii (Kove Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kove Univ.)

(10)/ICSS 14:30 - 14:50
Development of a recovery tool for a ransomware infected PC
Ryosuke Kokado (Kobe Univ.), Masato Ikegami, Tomohisa Hasegawa, Takafumi Harada, Hiroshi Kitani (Canon MJ), Masakatu Morii (Kobe Univ.)

----- Break ( 10 min. ) -----

----------------------------------------
Mon, Mar 2 PM (15:00 - 16:40)
----------------------------------------

(11)/ICSS 15:00 - 15:20
Backdoor Detection Based On Network Functions For IoT Devices
Minami Yoda, Shuji Sakuraba, Junichi Yamamoto (UEC), Yuichi Sei (UEC/JST PRESTO), Yasuyuki Tahara, Akihiko Ohsuga (UEC)

(12)/ICSS 15:20 - 15:40
Evaluating Effectiveness of a Timing Attack on Android Devices in JavaScript
Keisuke Sugita (Kobe Univ.), Ryoichi Isawa (NICT), Masakatsu Morii (Kobe Univ.)

(13)/ICSS 15:40 - 16:00
Proposing Criteria for Detecting Internet-Wide Scanners for Darknet Monitoring
Yukiko Endo, Yoshiki Mori (NICT), Jumpei Shimamura (Clwit), Masaki Kubo (NICT)

(14)/ICSS 16:00 - 16:20
An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation
Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)

(15)/ICSS 16:20 - 16:40
Mirai may detect that you talk to smart speaker
-- On privacy violation by attackers who compromised home router --
Shoya Okuda, Tatsuya Tamai, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)

----------------------------------------
Tue, Mar 3 AM (09:10 - 10:30)
----------------------------------------

(16)/ICSS 09:10 - 09:30
A research of HTTP request and an identification method of fake User-Agent values
Masato Inoue, Masaki Hashimoto (IISEC)

(17)/ICSS 09:30 - 09:50
Preliminary Study of WAF Signature Generation by Utilizing Real-time Information on the Web
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.)

(18)/ICSS 09:50 - 10:10
Analysis of Cyber-attacks Observed by a Simple TLS Honeypot Listening on All Ports
Daisuke Makita (NICT), Jumpei Shimamura (clwit), Masaki Kubo, Daisuke Inoue (NICT)

(19)/ICSS 10:10 - 10:30
Local survey on transitioning of TLS version and EV Certificates Usage (FY2019 4Q)
Yuji Suga (IIJ)

----- Break ( 10 min. ) -----

----------------------------------------
Tue, Mar 3 AM (10:40 - 12:00)
----------------------------------------

(20)/ICSS 10:40 - 11:00
Development of an expert system for automatic classification of illegal and harmful information on the dark web
Hanae Kobayashi, Masaki Hashimoto (IISEC)

(21)/ICSS 11:00 - 11:20
Model checking RNNs with modal μ-calculus
Tatsuhiro Aoshima, Toshinori Usui (NTT)

(22)/ICSS 11:20 - 11:40
Adversarial Attack against Neural Machine Translation Systems
Takeshi Sakamoto, Tatsuya Mori (Waseda Univ.)

(23)/ICSS 11:40 - 12:00
Adversarial Attacks against Electrocardiograms
Taiga Ono (Waseda Univ.), Takeshi Sugawara (UEC), Tatsuya Mori (Waseda Univ.)

----- Lunch Break ( 70 min. ) -----

----------------------------------------
Tue, Mar 3 PM (13:10 - 15:10)
----------------------------------------

(24) 13:10 - 15:10


----- Break ( 10 min. ) -----

----------------------------------------
Tue, Mar 3 PM (15:20 - 16:20)
----------------------------------------

(25) 15:20 - 15:40


(26)/ICSS 15:40 - 16:00
Effective single-sided RAMBleed
Hiroki Nagahama (Kobe Univ), Makoto Takita (Univ of Hyogo), Masanori Hirotomo (Saga Univ), Masakatsu Morii (Kobe Univ)

(27)/ICSS 16:00 - 16:20
(See Japanese page.)

----------------------------------------
Mon, Mar 2 AM (09:40 - 11:00)
----------------------------------------

(28) 09:40 - 10:00


(29) 10:00 - 10:20


(30) 10:20 - 10:40


(31) 10:40 - 11:00


----- Break ( 10 min. ) -----

----------------------------------------
Mon, Mar 2 AM (11:10 - 12:10)
----------------------------------------

(32)/ICSS 11:10 - 11:30
A Technique for Issuing Security Alerts and Filtering Traffic based on Vulnerability Information Monitoring
Takeshi Takahashi, Ryutaro Ushigome, Mio Suzuki, Daisuke Inoue (NICT)

(33)/ICSS 11:30 - 11:50
An Evaluation of Contact Points for Security Notifications
Miori Saito, Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)

(34)/ICSS 11:50 - 12:10
Generating Adversarial Videos that Bypass Content Filtering
Norihito Omori, Tatsuya Mori (Waseda Univ.)

----- Lunch Break ( 80 min. ) -----

----------------------------------------
Mon, Mar 2 PM (13:30 - 14:50)
----------------------------------------

(35)/ICSS 13:30 - 13:50
Implementation of aggregate message authentication and its evaluation
Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takehisa, Hidekazu Nishiura, Zoa Jiafa (NISSIN), Yu Imamura (JDC), Junji Sikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC)

(36)/ICSS 13:50 - 14:10
Extension of authentication method using hash chain aggregation
Hirai Shinta, Soshi Masakazu (Hiroshima City Univ.)

(37)/ICSS 14:10 - 14:30
Securty Analysis of Salsa20 and ChaCha Using Inverse Function's Properties
Yusuke Matsuoka, Atsuko Miyaji (Osaka Univ.)

(38)/ICSS 14:30 - 14:50
The efficient and high level of commitment scheme with low output locality
Hideaki Miyaji, Atsuko Miyaji (OU)

----- Break ( 10 min. ) -----

----------------------------------------
Mon, Mar 2 PM (15:00 - 16:40)
----------------------------------------

(39) 15:00 - 15:20


(40) 15:20 - 15:40


(41) 15:40 - 16:00


(42) 16:00 - 16:20


(43) 16:20 - 16:40


----------------------------------------
Tue, Mar 3 AM (09:10 - 10:30)
----------------------------------------

(44) 09:10 - 09:30


(45) 09:30 - 09:50


(46) 09:50 - 10:10


(47)/ICSS 10:10 - 10:30
(See Japanese page.)

----- Break ( 10 min. ) -----

----------------------------------------
Tue, Mar 3 AM (10:40 - 12:00)
----------------------------------------

(48)/ICSS 10:40 - 11:00
A Secure Second-price Sealed-Bid Auction using smart contract
Yuki Sugitani, Atsuko Miyaji (Osaka Univ.)

(49)/ICSS 11:00 - 11:20
Performance Evaluation of an Access Control Mechanism with Session Types
Tomoya Nishiguchi, Yuuki Takano, Atsuko Miyaji (Osaka Univ.)

(50)/ICSS 11:20 - 11:40
Realization of Privacy Policy with Attribute-Based Encryption and Its Applications
Motoi Hayashi, Atsuko Miyaji (Osaka Univ.)

(51)/ICSS 11:40 - 12:00
(See Japanese page.)

----- Lunch Break ( 70 min. ) -----

----- ( 130 min. ) -----

----------------------------------------
Tue, Mar 3 PM (15:20 - 16:40)
----------------------------------------

(52) 15:20 - 15:40


(53)/ICSS 15:40 - 16:00
Secure and Compact Elliptic Curve Scalar Multiplication based on Affine
Jin Yaoan, Atsuko Miyaji (Osaka Univ.)

(54)/ICSS 16:00 - 16:20
(See Japanese page.)

(55)/ICSS 16:20 - 16:40
Study on Implementation of Anonymous Public-Key Certificates based on Elliptic Curve
Kazuomi Oishi (SIST)

# Information for speakers
General Talk will have 15 minutes for presentation and 5 minutes for discussion.

# CONFERENCE ANNOUNCEMENT:
- This workshop was cancelled due to prevention of the spread of coronavirus infection. Part of the presentations of this workshop was distributed via the Internet as a experimental online workshop (jointly held with the IPSJ-SPT workshop), on March 3.
https://www.iwsec.org/spt/e20200303.html

- This workshop has been cancelled. However, the technical report will be issued.


=== Technical Committee on Information and Communication System Security (ICSS) ===

# SECRETARY:
Hiroki Takakura(National Institute of Informatics)
E-mail: is-adm-q

# ANNOUNCEMENT:
# Latest information will be presented on the homepage:
https://www.ieice.org/iss/icss/index-en.html

=== Special Interest Group on Security Psychology and Trust (IPSJ-SPT) ===
# FUTURE SCHEDULE:

Thu, May 14, 2020: Online [Wed, Mar 11]


Last modified: 2020-12-07 13:54:07


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ICSS Schedule Page]   /   [Return to IPSJ-SPT Schedule Page]   /  
 
 Go Top  Go Back   Prev ICSS Conf / Next ICSS Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan