IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Internet Architecture (IA)  (Searched in: 2009)

Search Results: Keywords 'from:2009-06-18 to:2009-06-18'

[Go to Official IA Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 20  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA, ICSS 2009-06-18
10:20
Tokyo Kikai-Shinko-Kaikan Bldg A study on detection of botnet based on probabilistic dependencies
Shintaro Murakami, Hiroki Hamasaki, Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ/ISIT), Katsunari Yoshioka (Yokohama National Univ.), Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) IA2009-1 ICSS2009-9
Damage by malware is becoming more serious. Especally, bots, which are a kind of malware, are a great problem these days... [more] IA2009-1 ICSS2009-9
pp.1-6
IA, ICSS 2009-06-18
10:45
Tokyo Kikai-Shinko-Kaikan Bldg Detection of Shellcodes in Remote Exploit Codes -- Detection Method based on Structural Analysis --
Hiroki Nogawa, Fuminori Adachi, Yasumitsu Tsujino, Seiji Moriya, Kazunori Saito (Secureware) IA2009-2 ICSS2009-10
Shellcodes are small assembly programs used in remote exploits. Some researchers focus on shellcode analysis and detecti... [more] IA2009-2 ICSS2009-10
pp.7-12
IA, ICSS 2009-06-18
11:10
Tokyo Kikai-Shinko-Kaikan Bldg A proposal for autonomous crawling client honeypot
Yuji Hoshizawa, Kazuo Kawamorita, Tsuyoshi Tachikawa, Masaki Kamizono (SecureBrain Corp.) IA2009-3 ICSS2009-11
In recent years, the trend in attack techniques of malware is changing from active attack targeting vulnerabilities, to ... [more] IA2009-3 ICSS2009-11
pp.13-17
IA, ICSS 2009-06-18
11:35
Tokyo Kikai-Shinko-Kaikan Bldg A Study on effective usage of the URL Blacklists
Takahiro Matsuki, Yuu Arai (LAC) IA2009-4 ICSS2009-12
In these days, various menaces are increasing in the Web. The web-based malware infection become the mainstream. Many we... [more] IA2009-4 ICSS2009-12
pp.19-23
IA, ICSS 2009-06-18
13:30
Tokyo Kikai-Shinko-Kaikan Bldg *
Ryoichi Isawa (CRYPTO Co., Ltd.), Kota Kondo, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO Co., Ltd.), Koji Nakao (NICT) IA2009-5 ICSS2009-13
The widely distributed incidents analysis system developed by NICT consists of some L-SOCs and an upper level SOC. The L... [more] IA2009-5 ICSS2009-13
pp.25-30
IA, ICSS 2009-06-18
13:55
Tokyo Kikai-Shinko-Kaikan Bldg *
Kota Kondo (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO Co., Ltd.), Koji Nakao (NICT) IA2009-6 ICSS2009-14
The problem caused by the computer security incidents become serious in these days. For the countermeasure,the widely di... [more] IA2009-6 ICSS2009-14
pp.31-36
IA, ICSS 2009-06-18
14:20
Tokyo Kikai-Shinko-Kaikan Bldg *
Satoshi Hashimoto (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Tatsuya Takehisa (Japan Datacom Co., Ltd.), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-7 ICSS2009-15
In 2008, Nakano et al. proposed a password authentication method, which is secure against the stolen-verifier attack. Ho... [more] IA2009-7 ICSS2009-15
pp.37-42
IA, ICSS 2009-06-18
14:45
Tokyo Kikai-Shinko-Kaikan Bldg Remote Access VPN with Dynamic Port Randomization Function by Mobile Codes
Tatsuya Takehisa (Japan Datacom Co., Ltd), Ryoichi Isawa (CRYPTO Co., Ltd.), Masanori Hirotomo, Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-8 ICSS2009-16
VPN servers that offer remote access in the Internet are exposed under many kinds of cyber-attacks. In recent years, cyb... [more] IA2009-8 ICSS2009-16
pp.43-48
IA, ICSS 2009-06-18
15:30
Tokyo Kikai-Shinko-Kaikan Bldg [Invited Talk] *
Masakazu Takahashi (Microsoft) IA2009-9 ICSS2009-17
 [more] IA2009-9 ICSS2009-17
pp.49-53
IA, ICSS 2009-06-18
16:15
Tokyo Kikai-Shinko-Kaikan Bldg [Invited Talk] *
Youki Kadobayashi (Nara Inst. of Sci and Tech.) IA2009-10 ICSS2009-18
Network security technologies today are facing broad range of requirements, including network situational awareness, roo... [more] IA2009-10 ICSS2009-18
p.55
IA, ICSS 2009-06-19
09:20
Tokyo Kikai-Shinko-Kaikan Bldg A Reduction Method of Advertising Messages on QoS Routing Protocols for Excluding Crankbacks
Kenji Fujikawa (NICT), Masataka Ohta (NICT/Tokyo Inst. of Tech.) IA2009-11 ICSS2009-19
In this paper,
we explain a reduction method of advertising messages
on hierarchical QoS routing protocol HQLIP
and... [more]
IA2009-11 ICSS2009-19
pp.57-62
IA, ICSS 2009-06-19
09:45
Tokyo Kikai-Shinko-Kaikan Bldg The Simple browser based application platform -- Application of the single GUI window system which executes one or more GUI window programs --
Takatoshi Yanase (Applet Server System Lab) IA2009-12 ICSS2009-20
Browser displays contents receiving them form web servers. And browser based applications called web application switch... [more] IA2009-12 ICSS2009-20
pp.63-66
IA, ICSS 2009-06-19
10:10
Tokyo Kikai-Shinko-Kaikan Bldg Design and Verification of Dual Redundant Communication Protocols using Model Checking
Satoshi Ikeda, Masahiro Jibiki (NEC Corp.), Yasushi Kuno, Taketoshi Nishimori (Univ. of Tsukuba.) IA2009-13 ICSS2009-21
Fail-over clusters are utilized as a means to assure high-availability for services which require high reliability. If w... [more] IA2009-13 ICSS2009-21
pp.67-72
IA, ICSS 2009-06-19
10:35
Tokyo Kikai-Shinko-Kaikan Bldg Validation of packet origin using public route information
Meidai Saito (National Police Academy), Keisuke Ishibashi (NTT Corp.) IA2009-14 ICSS2009-22
uRPF is widely used technology to filter source IP spoofed packets, using route information. With uRPF filtering, a rout... [more] IA2009-14 ICSS2009-22
pp.73-78
IA, ICSS 2009-06-19
11:00
Tokyo Kikai-Shinko-Kaikan Bldg Evaluation of Traffic Engineering Mechanism for Peer-to-Peer Appications
Satoshi Kamei (NTT Corp.), Takeshi Inoue, Tomohiro Nishitani (NTT Comm.) IA2009-15 ICSS2009-23
 [more] IA2009-15 ICSS2009-23
pp.79-84
IA, ICSS 2009-06-19
11:25
Tokyo Kikai-Shinko-Kaikan Bldg Reducing Network Power Consumption Using Dynamic Link Metric Method and Power Off Links
Zhou Jia, Shan Gao, Aya Tsurusaki, Naoaki Yamanaka (Keio Univ.) IA2009-16 ICSS2009-24
 [more] IA2009-16 ICSS2009-24
pp.85-89
IA, ICSS 2009-06-19
13:00
Tokyo Kikai-Shinko-Kaikan Bldg Key escrow method of personal decryptographic key by using elliptic curve caliculation
Michiko Harayama, Kouji Sakai, Hiroyuki Goto (Gifu Univ.) IA2009-17 ICSS2009-25
 [more] IA2009-17 ICSS2009-25
pp.91-96
IA, ICSS 2009-06-19
13:25
Tokyo Kikai-Shinko-Kaikan Bldg Design and Evaluation of NGN/IPv6 Security Test System
Kenji Rikitake, Masashi Eto, Mio Suzuki, Daisuke Inoue (NICT), Koji Nakao (NICT/KDDI), Satoshi Kobayashi, Suminobu Akiba (DIT) IA2009-18 ICSS2009-26
In this paper, we propose a system design methodology for performing
vulnerability tests of NGN and IPv6 protocol suite... [more]
IA2009-18 ICSS2009-26
pp.97-102
IA, ICSS 2009-06-19
13:50
Tokyo Kikai-Shinko-Kaikan Bldg Study on Classification of Malware and it Applications
Soma Katsute (Kobe Univ.), Kouki Yasumoto (NEC), Ryoichi Isawa (Kobe Univ./CRYPTO), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-19 ICSS2009-27
Recently, the increasing and spreading of the malwares become a big problem. Most of the malwares are subspieces and pa... [more] IA2009-19 ICSS2009-27
pp.103-108
IA, ICSS 2009-06-19
14:15
Tokyo Kikai-Shinko-Kaikan Bldg *
Akira Morikawa, Motomu Murakami, Yuko Ozasa, Soma Katsute (Kobe Univ.), Ryoichi Isawa (Kobe Univ./CRYPTO), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-20 ICSS2009-28
Recently, the malwares are widely spreaded and cause the serious problems.
For the countermeasure, the malware analysi... [more]
IA2009-20 ICSS2009-28
pp.109-114
 Results 1 - 20 of 20  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan