Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, ICSS |
2015-06-11 13:05 |
Fukuoka |
Kyushu Institute of Technology Univ. |
[Invited Talk]
Recent trends in multivariate cryptography Takanori Yasuda (ISIT) IA2015-1 ICSS2015-1 |
[more] |
IA2015-1 ICSS2015-1 pp.1-2 |
IA, ICSS |
2015-06-11 13:45 |
Fukuoka |
Kyushu Institute of Technology Univ. |
[Invited Talk]
Establishment of Cybersecurity Education by Industry-Academia Collaboration Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-2 ICSS2015-2 |
[more] |
IA2015-2 ICSS2015-2 pp.3-8 |
IA, ICSS |
2015-06-11 14:35 |
Fukuoka |
Kyushu Institute of Technology Univ. |
An Efficient Rainbow Table Compression Yuki Tabata, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) IA2015-3 ICSS2015-3 |
Rainbow table is a method to crack the password in high speed from hash values. Rainbow table can crack passwords only i... [more] |
IA2015-3 ICSS2015-3 pp.9-14 |
IA, ICSS |
2015-06-11 14:55 |
Fukuoka |
Kyushu Institute of Technology Univ. |
An Empirical Evaluation of Locating Cryptographic Functions on the Memory Ryoya Furukawa (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT) IA2015-4 ICSS2015-4 |
This paper presents a simple and effective idea to locate cryptographic functions on the memory for malware analysis.
... [more] |
IA2015-4 ICSS2015-4 pp.15-20 |
IA, ICSS |
2015-06-11 15:15 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Implementation of a Pairing Library Using BN Elliptic Curve Yusuke Kanbara, Naoki Kanayama, Takashi Nishide, Eiji Okamoto (Univ. of Tsukuba) IA2015-5 ICSS2015-5 |
Bilinear mapping which called a pairing can realize high performance cryptographic protocols which could not be construc... [more] |
IA2015-5 ICSS2015-5 pp.21-26 |
IA, ICSS |
2015-06-11 15:45 |
Fukuoka |
Kyushu Institute of Technology Univ. |
The Analysis of the CREAM vulnerability against OpenSSL Jun Hasegawa, Yuhei Watanabe, Masakatu Morii (Kobe Univ.) IA2015-6 ICSS2015-6 |
In this paper we discuss vulnerability of "CREAM", which was originally created by Daniel J. Bernstein in 2005 and named... [more] |
IA2015-6 ICSS2015-6 pp.27-32 |
IA, ICSS |
2015-06-11 16:05 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Traffic Data Analysis for Multiple Darknet and its Applications Kensho Murai, Keisuke Furumoto (Kobe Univ.), Kosuke Murakami (KDDI), Koji Nakao (KDDI/NICT), Masakatu Morii (Kobe Univ.) IA2015-7 ICSS2015-7 |
The Internet is transcending national boundaries to become an important and essential communication approach in the worl... [more] |
IA2015-7 ICSS2015-7 pp.33-38 |
IA, ICSS |
2015-06-11 16:25 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Report on the 23rd USENIX Security Symposium Shinichi Matsumoto (ISIT), Kazuomi Oishi (SIST), Kuniyasu Suzaki (AIST) IA2015-8 ICSS2015-8 |
[more] |
IA2015-8 ICSS2015-8 pp.39-44 |
IA, ICSS |
2015-06-12 10:30 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Experimental Results on an Attack Detection System for Advanced Persistent Threats Kenichiro Muto, Yasuhiro Okumura, Shinya Kuramoto, Hidemori Ikeda, Mitsuhiro Hatada, Takayuki Watanabe (NTT Communications), Tohru Sato, Kazufumi Aoki (NTT), Junichi Murakami, Kazuyuki Iso, Yasuhiro Kunda (FFRI), Toshio Nawa, Mai Kiuchi (CDI) IA2015-9 ICSS2015-9 |
In this paper, we proposed an attack detection system, which is a component of the model a security model against advanc... [more] |
IA2015-9 ICSS2015-9 pp.45-50 |
IA, ICSS |
2015-06-12 10:50 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Detecting Malicious Domain Names based on the Time-series Analysis of Attackers Network Resources Daiki Chiba (NTT/Waseda Univ.), Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeshi Yada, Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-10 ICSS2015-10 |
Attackers launching cyber attacks frequently change their malicious websites to evade countermeasures such as blacklisti... [more] |
IA2015-10 ICSS2015-10 pp.51-56 |
IA, ICSS |
2015-06-12 11:10 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Knapsack Cryptosystems with Random Secret Sequences using Logical And Operation Yasuyuki Murakami, Shinsuke Hamasho (OECU), Masao Kasahara (WU/CU) IA2015-11 ICSS2015-11 |
In 2012, the present authors proposed a knapsack public-key cryptosystem using a random secret sequence, which will be r... [more] |
IA2015-11 ICSS2015-11 pp.57-62 |
IA, ICSS |
2015-06-12 11:30 |
Fukuoka |
Kyushu Institute of Technology Univ. |
A Report on International Conference NDSS2015 Hiroaki Anada (ISIT), Yuhei Kawakoya (NTTi3), Kuniyasu Suzaki (AIST) IA2015-12 ICSS2015-12 |
International conference NDSS (Network and Distributed System Security Symposium) is one of the top conference of inform... [more] |
IA2015-12 ICSS2015-12 pp.63-68 |
IA, ICSS |
2015-06-12 13:00 |
Fukuoka |
Kyushu Institute of Technology Univ. |
[Invited Talk]
Hardware Security for Mobile Devices in Public Spaces Yu-ichi Hayashi (Tohoku Gakuin Univ.), Naofumi Homma, Takafumi Aoki, Hideaki Sone (Tohoku Univ.) IA2015-13 ICSS2015-13 |
The users of tablet PCs are rapidly spreading, and accordingly there are many scenes browsing and inputting personal inf... [more] |
IA2015-13 ICSS2015-13 pp.69-74 |
IA, ICSS |
2015-06-12 13:50 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Camera Based Data Recognition for Enbedding Invisible Information in Images
-- New Type for Two-Dimensional Barcode and Its Application -- Tomoe Hatanaka, Yuki Saji, Makoto Takita, Masakatu Morii (Kobe Univ.) IA2015-14 ICSS2015-14 |
Because Two-dimensional barcodes like a QR code can be read by terminals which equip camera device, it is frequently use... [more] |
IA2015-14 ICSS2015-14 pp.75-80 |
IA, ICSS |
2015-06-12 14:10 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Can internet measurement be a noise for analysis of darknet? Yumehisa Haga, Akira Saso, Tatsuya Mori, Shigeki Goto (Waseda Univ.) IA2015-15 ICSS2015-15 |
Darknet is a passive sensor system dedicated to monitoring traffic
routed to unused IP address space.
Darknets have be... [more] |
IA2015-15 ICSS2015-15 pp.81-86 |
IA, ICSS |
2015-06-12 14:30 |
Fukuoka |
Kyushu Institute of Technology Univ. |
A detect method for an undesirable use of e-mail server using cardinality analysis Akira Sato, Yuki Kato, Kenichi Yoshida, Yasushi Shinjo (Univ. of Tsukuba) IA2015-16 ICSS2015-16 |
[more] |
IA2015-16 ICSS2015-16 pp.87-92 |
IA, ICSS |
2015-06-12 15:00 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Droid Dowser: an APK information gathering system using headless WebKit scriptable with a JavaScript API Ruo Ando (NICT) IA2015-17 ICSS2015-17 |
With rising popularization of Android application, more sophisticated methodology is required for inspect information fl... [more] |
IA2015-17 ICSS2015-17 pp.93-97 |
IA, ICSS |
2015-06-12 15:20 |
Fukuoka |
Kyushu Institute of Technology Univ. |
A study on a Tool for Automated Vulnerability Monitoring and Alerting on Software Assets inside Organizations Takeshi Takahashi, Daisuke Miyamoto, Bhola Panta, Koji Nakao (NICT) IA2015-18 ICSS2015-18 |
Each organization needs to manage its IT assets and related vulnerabilities in order to maintain its security level.
Ne... [more] |
IA2015-18 ICSS2015-18 pp.99-104 |