Thu, Jun 17 PM 13:00 - 14:45 |
|
13:00-13:05 |
Opening Address ( 5 min. ) |
(1) |
13:05-13:30 |
Visualizing Gumblar infected machines by Analysis of Network Traffic |
Hirokazu Kaneko, Takahiro Matsuki, Yuu Arai (LAC) |
(2) |
13:30-13:55 |
A data screening technique for network log data by frequent sequential pattern mining |
Hisashi Tsuruta, Takayoshi Shoudai, Jun'ichi Takeuchi (Kyushu Univ./ISIT) |
(3) |
13:55-14:20 |
Automatic OEP Finding Method for Malware Unpacking |
Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT) |
(4) |
14:20-14:45 |
How to Identify Code Region after Detecting Entry Point of Malware |
Makoto Iwamura, Mitsutaka Itoh (NTT/Waseda Univ.), Yoichi Muraoka (Waseda Univ.) |
|
- |
|
|
14:45-14:55 |
Break ( 10 min. ) |
Thu, Jun 17 PM 14:55 - 16:35 |
(5) |
14:55-15:20 |
Anonymous Communication Protocol for Encouraging to Report Problems in Social Groups and Its Evaluation using Game Theory |
Kohei Sugiyama, Masaki Fukushima, Teruyuki Hasegawa (KDDI Labs.) |
(6) |
15:20-15:45 |
Proposal and Consideration for An Anonymity Method for Widespred High-Speed Incident Analysis System(II) |
Ryoichi Isawa (CRYPTO), Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO), Koji Nakao (NICT) |
(7) |
15:45-16:10 |
Implementation and its Evaluation of A Secure One-Time Passoword Method against the Stolen-Verifier Attack |
Tatsuya Takehisa (JDC), Ryoichi Isawa (Crypto), Masakatu Morii (Kobe Univ.) |
(8) |
16:10-16:35 |
iAuth: Yet Another HTTP Authentication Framework Integrated into HTML Forms |
Takeru Inoue, Yohei Katayama, Hiroshi Sato, Noriyuki Takahashi (NTT) |
|
- |
|
|
16:35-16:45 |
Break ( 10 min. ) |
Thu, Jun 17 PM 16:45 - 17:30 |
(9) |
16:45-17:30 |
[Invited Talk]
* |
Hiromitsu Takagi (AIST) |
|
- |
|
|
17:30-17:40 |
( 10 min. ) |
|
18:00-20:00 |
Reception Party ( 120 min. ) |
Fri, Jun 18 AM 10:00 - 11:15 |
(10) |
10:00-10:25 |
Scalable and User-friendly Access Control Mechanism for Distirubted File System |
Jumpei Arakawa, Koichi Sasada (Univ. of Tokyo.), Ikuo Takeuchi |
(11) |
10:25-10:50 |
A Vision of the Open Mobile Communication System with All Stratum Virtualization |
Nao Kawanishi (ATR), Ahmad Kamil Abdul Hamid (The Univ. of Tokyo), Yoshimasa Miyamori, Atsushi Kusuda (ATR), Yoshihiro Kawahara (The Univ. of Tokyo), Masayoshi Ohashi (ATR), Tohru Asami (The Univ. of Tokyo) |
(12) |
10:50-11:15 |
A study on security threats to Android devices |
Ei Shimamura, Masaya Yamagata (NEC) |
|
- |
|
|
11:15-13:00 |
Lunch Break ( 105 min. ) |
Fri, Jun 18 PM 13:00 - 13:45 |
(13) |
13:00-13:45 |
[Invited Talk]
* |
Itsuro Nishimoto (LAC) |
|
- |
|
|
13:45-13:55 |
Break ( 10 min. ) |
Fri, Jun 18 PM 13:55 - 15:25 |
(14) |
13:55-14:20 |
An Empirical Investigation of Gumblar Evolution |
Mitsuaki Akiyama, Kazumichi Sato, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.) |
(15) |
14:20-14:45 |
A Life-cycle Monitoring Method of Malware Download Sites for Websites |
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) |
(16) |
14:45-15:10 |
Hard-wired Shellcode Detection Algorithm
-- trial implementations on FPGA and ASIC -- |
Hiroki Nogawa, Fuminori Adachi, Yasumitsu Tsujino, Seiji Moriya, Kazunori Saito (Secureware) |
|
- |
|
|
15:10-15:25 |
Closing ( 15 min. ) |