Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2014-11-27 13:30 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
[Invited Talk]
Introduction to Japan's Control System Security Center Hideaki Kobayashi (CSSC) ICSS2014-51 |
CSSC was established in March 2012. At Tagajoi n May 2013,
CSSC constructed the testbed named CSS-Base6 for industrial... [more] |
ICSS2014-51 pp.1-6 |
ICSS |
2014-11-27 14:20 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
Dynamic Zoning of the Industrial Control System for Security improvement Wataru Machii, Isao Kato, Masahito Koike, Masafumi Matta, Tomomi Aoyama, Ichiro Koshijima, Yoshihiro Hashimoto (NIT) ICSS2014-52 |
In the previous paper, our authors proposed a design methodology of zones and conduits not only to isolate incidents cau... [more] |
ICSS2014-52 pp.7-12 |
ICSS |
2014-11-27 14:45 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
Industrial Control System Monitoring based on Communication Profile Masafumi Matta, Masahito Koike, Wataru Machii, Tomomi Aoyama, Hidemasa Naruoka, Ichiro Koshijima, Yoshihiro Hashimoto (Nagoya Inst. of Tech.) ICSS2014-53 |
[more] |
ICSS2014-53 pp.13-18 |
ICSS |
2014-11-27 15:10 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
Studying Resilient Cyber Incident Management From Large-scale Cyber Security Training Tomomi Aoyama, Ichiro Koshijima, Kohei Seki, Masafumi Matta (Nagoya Inst. of Tech.) ICSS2014-54 |
(To be available after the conference date) [more] |
ICSS2014-54 pp.19-23 |
ICSS |
2014-11-27 15:35 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
On the status of techniques and standardization regarding lightweight cryptography
-- ISO/IEC JTC1/SC27/WG2 status report -- Hirotaka Yoshida, Dai Watanabe (Hitachi), Nicky Mouha (KU Leuven) ICSS2014-55 |
As more and more computers and controllers used for ICS (industrial control systems) or for vehicles go online, increase... [more] |
ICSS2014-55 pp.25-30 |
ICSS |
2014-11-27 16:00 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
Efficient Computation of Weil Pairing over Supersingular Elliptic Curve and Its Evaluation Kazuma Tanaka (Univ. of Tsukuba), Tadanori Teruya (AIST), Naoki Kanayama, Takashi Nishide, Eiji Okamoto (Univ. of Tsukuba) ICSS2014-56 |
In SCIS 2014, the authors considered efficiency of computing symmetric parings on supersingular elliptic curves over fin... [more] |
ICSS2014-56 pp.31-36 |
ICSS |
2014-11-28 09:15 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
Expansion of a Proposal of Short Proxy Signature into an Aggregate Signature Scheme and Adaptation of it to Content Editing System Keiji Ogura (TUS), Masaki Inamura (TDU/AIST), Keiichi Iwamura (TUS) ICSS2014-57 |
[more] |
ICSS2014-57 pp.37-41 |
ICSS |
2014-11-28 09:40 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
security evaluation of content editing system that previous control allow about editing operation Katsuma Koga (Tokyo Univ of Science), Keiichi Iwamura (Tokyo Denki Unive), Masaki Inamura (Tokyo Univ of Science) ICSS2014-58 |
[more] |
ICSS2014-58 pp.43-48 |
ICSS |
2014-11-28 10:20 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
Detecting Backscatter of DDoS Attacks from Darknet Traffic Nobuaki Furutani (Kobe Univ), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit), Jun Kitazono, Seiichi Ozawa (Kobe Univ) ICSS2014-59 |
In this work, we propose a method to quickly discriminate DDoS backscatter packets from those of other traffic observed ... [more] |
ICSS2014-59 pp.49-53 |
ICSS |
2014-11-28 10:45 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
A Study of Drive by Download Attack detection using the features of the obfuscation Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama, Youki Kadobayashi (NAIST) ICSS2014-60 |
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in the browser or its plu... [more] |
ICSS2014-60 pp.55-60 |
ICSS |
2014-11-28 11:10 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
searching malicious URL from vast webspace Bo Sun (Waseda Univ.), Mitsuaki Akiyama, Takeshi Yagi (NTT), Tatsuya Mori (Waseda Univ.) ICSS2014-61 |
Many Web-based attacks such as Drive-by-download and phishing scam
are easily triggered by accessing landing page URL.... [more] |
ICSS2014-61 pp.61-66 |
ICSS |
2014-11-28 11:35 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
Detecting infected hosts with machine learning analysis of DNS responses Wataru Tsuda, Youki Kadobayashi, Hirotaka Fujiwara, Suguru Yamaguchi (NAIST) ICSS2014-62 |
In recent years, we face cyber attacks such as illegal money transfer via net-banking, spam mail and DDoS attacks caused... [more] |
ICSS2014-62 pp.67-72 |