Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, ICSS |
2009-06-18 10:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
A study on detection of botnet based on probabilistic dependencies Shintaro Murakami, Hiroki Hamasaki, Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ/ISIT), Katsunari Yoshioka (Yokohama National Univ.), Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) IA2009-1 ICSS2009-9 |
Damage by malware is becoming more serious. Especally, bots, which are a kind of malware, are a great problem these days... [more] |
IA2009-1 ICSS2009-9 pp.1-6 |
IA, ICSS |
2009-06-18 10:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Detection of Shellcodes in Remote Exploit Codes
-- Detection Method based on Structural Analysis -- Hiroki Nogawa, Fuminori Adachi, Yasumitsu Tsujino, Seiji Moriya, Kazunori Saito (Secureware) IA2009-2 ICSS2009-10 |
Shellcodes are small assembly programs used in remote exploits. Some researchers focus on shellcode analysis and detecti... [more] |
IA2009-2 ICSS2009-10 pp.7-12 |
IA, ICSS |
2009-06-18 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
A proposal for autonomous crawling client honeypot Yuji Hoshizawa, Kazuo Kawamorita, Tsuyoshi Tachikawa, Masaki Kamizono (SecureBrain Corp.) IA2009-3 ICSS2009-11 |
In recent years, the trend in attack techniques of malware is changing from active attack targeting vulnerabilities, to ... [more] |
IA2009-3 ICSS2009-11 pp.13-17 |
IA, ICSS |
2009-06-18 11:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
A Study on effective usage of the URL Blacklists Takahiro Matsuki, Yuu Arai (LAC) IA2009-4 ICSS2009-12 |
In these days, various menaces are increasing in the Web. The web-based malware infection become the mainstream. Many we... [more] |
IA2009-4 ICSS2009-12 pp.19-23 |
IA, ICSS |
2009-06-18 13:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
* Ryoichi Isawa (CRYPTO Co., Ltd.), Kota Kondo, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO Co., Ltd.), Koji Nakao (NICT) IA2009-5 ICSS2009-13 |
The widely distributed incidents analysis system developed by NICT consists of some L-SOCs and an upper level SOC. The L... [more] |
IA2009-5 ICSS2009-13 pp.25-30 |
IA, ICSS |
2009-06-18 13:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
* Kota Kondo (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO Co., Ltd.), Koji Nakao (NICT) IA2009-6 ICSS2009-14 |
The problem caused by the computer security incidents become serious in these days. For the countermeasure,the widely di... [more] |
IA2009-6 ICSS2009-14 pp.31-36 |
IA, ICSS |
2009-06-18 14:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
* Satoshi Hashimoto (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Tatsuya Takehisa (Japan Datacom Co., Ltd.), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-7 ICSS2009-15 |
In 2008, Nakano et al. proposed a password authentication method, which is secure against the stolen-verifier attack. Ho... [more] |
IA2009-7 ICSS2009-15 pp.37-42 |
IA, ICSS |
2009-06-18 14:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Remote Access VPN with Dynamic Port Randomization Function by Mobile Codes Tatsuya Takehisa (Japan Datacom Co., Ltd), Ryoichi Isawa (CRYPTO Co., Ltd.), Masanori Hirotomo, Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-8 ICSS2009-16 |
VPN servers that offer remote access in the Internet are exposed under many kinds of cyber-attacks. In recent years, cyb... [more] |
IA2009-8 ICSS2009-16 pp.43-48 |
IA, ICSS |
2009-06-18 15:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
[Invited Talk]
* Masakazu Takahashi (Microsoft) IA2009-9 ICSS2009-17 |
[more] |
IA2009-9 ICSS2009-17 pp.49-53 |
IA, ICSS |
2009-06-18 16:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
[Invited Talk]
* Youki Kadobayashi (Nara Inst. of Sci and Tech.) IA2009-10 ICSS2009-18 |
Network security technologies today are facing broad range of requirements, including network situational awareness, roo... [more] |
IA2009-10 ICSS2009-18 p.55 |
IA, ICSS |
2009-06-19 09:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
A Reduction Method of Advertising Messages on QoS Routing Protocols for Excluding Crankbacks Kenji Fujikawa (NICT), Masataka Ohta (NICT/Tokyo Inst. of Tech.) IA2009-11 ICSS2009-19 |
In this paper,
we explain a reduction method of advertising messages
on hierarchical QoS routing protocol HQLIP
and... [more] |
IA2009-11 ICSS2009-19 pp.57-62 |
IA, ICSS |
2009-06-19 09:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
The Simple browser based application platform
-- Application of the single GUI window system which executes one or more GUI window programs -- Takatoshi Yanase (Applet Server System Lab) IA2009-12 ICSS2009-20 |
Browser displays contents receiving them form web servers. And browser based applications called web application switch... [more] |
IA2009-12 ICSS2009-20 pp.63-66 |
IA, ICSS |
2009-06-19 10:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Design and Verification of Dual Redundant Communication Protocols using Model Checking Satoshi Ikeda, Masahiro Jibiki (NEC Corp.), Yasushi Kuno, Taketoshi Nishimori (Univ. of Tsukuba.) IA2009-13 ICSS2009-21 |
Fail-over clusters are utilized as a means to assure high-availability for services which require high reliability. If w... [more] |
IA2009-13 ICSS2009-21 pp.67-72 |
IA, ICSS |
2009-06-19 10:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Validation of packet origin using public route information Meidai Saito (National Police Academy), Keisuke Ishibashi (NTT Corp.) IA2009-14 ICSS2009-22 |
uRPF is widely used technology to filter source IP spoofed packets, using route information. With uRPF filtering, a rout... [more] |
IA2009-14 ICSS2009-22 pp.73-78 |
IA, ICSS |
2009-06-19 11:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Evaluation of Traffic Engineering Mechanism for Peer-to-Peer Appications Satoshi Kamei (NTT Corp.), Takeshi Inoue, Tomohiro Nishitani (NTT Comm.) IA2009-15 ICSS2009-23 |
[more] |
IA2009-15 ICSS2009-23 pp.79-84 |
IA, ICSS |
2009-06-19 11:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Reducing Network Power Consumption Using Dynamic Link Metric Method and Power Off Links Zhou Jia, Shan Gao, Aya Tsurusaki, Naoaki Yamanaka (Keio Univ.) IA2009-16 ICSS2009-24 |
[more] |
IA2009-16 ICSS2009-24 pp.85-89 |
IA, ICSS |
2009-06-19 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Key escrow method of personal decryptographic key by using elliptic curve caliculation Michiko Harayama, Kouji Sakai, Hiroyuki Goto (Gifu Univ.) IA2009-17 ICSS2009-25 |
[more] |
IA2009-17 ICSS2009-25 pp.91-96 |
IA, ICSS |
2009-06-19 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Design and Evaluation of NGN/IPv6 Security Test System Kenji Rikitake, Masashi Eto, Mio Suzuki, Daisuke Inoue (NICT), Koji Nakao (NICT/KDDI), Satoshi Kobayashi, Suminobu Akiba (DIT) IA2009-18 ICSS2009-26 |
In this paper, we propose a system design methodology for performing
vulnerability tests of NGN and IPv6 protocol suite... [more] |
IA2009-18 ICSS2009-26 pp.97-102 |
IA, ICSS |
2009-06-19 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Study on Classification of Malware and it Applications Soma Katsute (Kobe Univ.), Kouki Yasumoto (NEC), Ryoichi Isawa (Kobe Univ./CRYPTO), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-19 ICSS2009-27 |
Recently, the increasing and spreading of the malwares become a big problem. Most of the malwares are subspieces and pa... [more] |
IA2009-19 ICSS2009-27 pp.103-108 |
IA, ICSS |
2009-06-19 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
* Akira Morikawa, Motomu Murakami, Yuko Ozasa, Soma Katsute (Kobe Univ.), Ryoichi Isawa (Kobe Univ./CRYPTO), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-20 ICSS2009-28 |
Recently, the malwares are widely spreaded and cause the serious problems.
For the countermeasure, the malware analysi... [more] |
IA2009-20 ICSS2009-28 pp.109-114 |