IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information and Communication System Security (ICSS)  (Searched in: 2014)

Search Results: Keywords 'from:2015-03-03 to:2015-03-03'

[Go to Official ICSS Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 38  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2015-03-03
13:00
Okinawa Meio Univiersity A detection system which uses DNS traffic features to detect domains which are related to botnets
Wataru Tsuda, Youki Kadobayashi, Takeshi Okuda, Hiroaki Hazeyama (NAIST) ICSS2014-63
 [more] ICSS2014-63
pp.1-6
ICSS 2015-03-03
13:25
Okinawa Meio Univiersity Anomaly Detection Based on Clustering of Network Traffic Characteristics Considering Results of Signature Based IDS Evaluation
Kohei Imai, Shigeki Aoki, Takao Miyamoto (Osaka Prefecture Univ.) ICSS2014-64
There is a lot of attacks over the Internet,intrusion detection systems(IDSs) are an active area of research.IDSs are cl... [more] ICSS2014-64
pp.7-12
ICSS 2015-03-03
13:50
Okinawa Meio Univiersity Measures to Prevent Cyber-Attack Using Multi-Layer-Binding (MLB) Router -- A Proposal of Dropping Request Protocol, and its Implementation and Evaluation Using OpenFlow --
Ken Eguchi, Shota Nagatomo, Yuji Yokoyama, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno (Tokyo Denki Univ.), Hiroshi Kobayashi (Tokyo Denki Univ) ICSS2014-65
There is a limit to the security achieved by traditional approaches that rely on the defense of individual systems, and ... [more] ICSS2014-65
pp.13-18
ICSS 2015-03-03
14:15
Okinawa Meio Univiersity Implementation and Evaluation of Botnet Detection System with Temporal Locality of DGA
Teppei Fukuda, Tomohiro Ishihara (UTokyo), Akira Kato (Keio Univ.) ICSS2014-66
In recent days, many botnet-based attacks are observed. In this thesis, our object is to detect the domain generation al... [more] ICSS2014-66
pp.19-24
ICSS 2015-03-03
14:50
Okinawa Meio Univiersity A trial of network security tests over federated testbeds
Masatoshi Enomoto, Hiroaki Hazeyama (NAIST), Kazumasa Kobayashi (KUSA), Suguru Yamaguchi (NAIST) ICSS2014-67
In network security test environment constructed in wide area, we can test independent of site or scale of test suite or... [more] ICSS2014-67
pp.25-29
ICSS 2015-03-03
15:15
Okinawa Meio Univiersity A Pluggable and Programmable Flamework for Analyzing Security Logs
Yu Tsuda, Takashi Tomine, Masaki Kamizono, Masashi Eto, Daisuke Inoue (NICT) ICSS2014-68
SIEM (Security Information and Event Management) systems can unify a lot of security logs from various security applianc... [more] ICSS2014-68
pp.31-36
ICSS 2015-03-03
15:40
Okinawa Meio Univiersity A Study on the Effectiveness of Correlation Analysis of Cyber Attack Information by means of Tagging Technique
Taichi Hata (JDC/Nissin), Manabu Inuma (Josai Univ.), Junji Shikata (Yokohama National Univ.), Shin Takeuchi (JDC/Nissin), Koji Nakao (NICT) ICSS2014-69
Recently, cyber-attacks caused by malwares are steadily increasing.
Since the attack techniques are also diversified, c... [more]
ICSS2014-69
pp.37-42
ICSS 2015-03-03
16:15
Okinawa Meio Univiersity Link Structural Analysis of Drive-by-Download Attacks
Yuji Dairiki (Kobe Univ.), Masaki Kamizono (SecureBrain), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2014-70
In analyzing Drive-by-Download (DBD) attack, it is basic and essential to analysis the link structure through tracking t... [more] ICSS2014-70
pp.43-48
ICSS 2015-03-03
16:40
Okinawa Meio Univiersity Implementation and evaluation of Drive by Download Attack detection using the features of the obfuscation
Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama (NAIST), Takuji Iimura (UT), Youki Kadobayashi (NAIST) ICSS2014-71
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in a browser or in browse... [more] ICSS2014-71
pp.49-54
ICSS 2015-03-03
17:05
Okinawa Meio Univiersity A Study on CAPTCHA System Using Differential Awkwardness-Objects
Michitomo Yamguchi (Meiji Univ.), Takeshi Okamoto (Tsukuba Univ. of Tech.), Hiroaki Kikuchi (Meiji Univ.) ICSS2014-72
CAPTCHAs have been accepted as a technique which prevents unauthorized access by bots. Several researchers point out tha... [more] ICSS2014-72
pp.55-60
ICSS 2015-03-03
17:40
Okinawa Meio Univiersity [Invited Talk] Cyber Security Management
Koji Nakao (NICT/KDDI)
 [more]
ICSS 2015-03-04
09:00
Okinawa Meio Univiersity Novel USB Hub against the Malicious USB Devices
Tatsuya Takehisa (NICT/Nissin), Makoto Iwamura (NICT/NTT), Hayato Ushimaru (NICT/CDI), Daisuke Inoue (NICT) ICSS2014-73
USB devices that adapt USB interfaces (USB keyboards and USB mouses) are prevalent. However, a new attack has been repor... [more] ICSS2014-73
pp.61-66
ICSS 2015-03-04
09:25
Okinawa Meio Univiersity Yet Another Electrical Forgery Attack on CAN using Strong Recessive
Takeshi Sugawara, Minoru Saeki, Manabu Misawa (Mitsubishi Electric Corp.) ICSS2014-74
Yet another “electrical forgery attack” against Controller Area Network (CAN) is described. The electrical forgery attac... [more] ICSS2014-74
pp.67-72
ICSS 2015-03-04
09:50
Okinawa Meio Univiersity A study on the safety of the pseudo-random number generator in RFID
Hiroyuki Sato (JAIST), Atsuko Miyaji (JAIST/JST CREST), Chunhua Su (JAIST) ICSS2014-75
One of the ways of verifing that whether pseudo-random number generator (PRNG) meets the security requirements or not is... [more] ICSS2014-75
pp.73-78
ICSS 2015-03-04
09:00
Okinawa Meio Univiersity A New Explicit Relation Between Trace, Definition Field, and Embedding Degree
Atsuko Miyaji, Satoru Tanaka (JAIST) ICSS2014-76
For pairing based cryptography, elliptic curves defined over a finite fields $mathbb{F}_p^m$ with moderate embedding deg... [more] ICSS2014-76
pp.79-84
ICSS 2015-03-04
09:25
Okinawa Meio Univiersity Scalar Multiplication Algorithm with Resistance for Side-channel Attacks
Keisuke Kito (JAIST), Atsuko Miyaji (JAIST/JST CREST), Ryota Takahashi (JAIST) ICSS2014-77
Elliptic curve cryptosystems require shorter key length than traditional cryptosystems. It is good that scalar multiplic... [more] ICSS2014-77
pp.85-90
ICSS 2015-03-04
09:50
Okinawa Meio Univiersity An Estimation of Signature Schemes for Multiple Signers
Kenta Muranaka, Naoto Yanai (Osaka Univ.), Shingo Okamura (NITNC), Toru Fujiwara (Osaka Univ.) ICSS2014-78
A signature scheme for multiple signers is a cryptographic primitive where each signer generates an individual signature... [more] ICSS2014-78
pp.91-96
ICSS 2015-03-04
10:25
Okinawa Meio Univiersity Estimation of Vulnerability Score based on Annual Analysis with Supervised Latent Dirichlet Allocation
Yasuhiro Yamamoto, Daisuke Miyamoto, Masaya Nakayama (Tokyo Univ.) ICSS2014-79
This research purpose is to determine technical scores of vulnerability by using machine learning methods in order to ev... [more] ICSS2014-79
pp.97-102
ICSS 2015-03-04
10:50
Okinawa Meio Univiersity Prediction of Malware Activities based on Loopback Address from DNS
Masaki Kamizono (NICT/SecureBrain), Takashi Tomine, Yu Tsuda, Masashi Eto (NICT), Yuji Hoshizawa (Securebrain Corporation), Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (ynu) ICSS2014-80
During malware dynamic analysis, the analysis system often finds the loopback address in responses of DNS name resolutio... [more] ICSS2014-80
pp.103-108
ICSS 2015-03-04
11:15
Okinawa Meio Univiersity A Cyber Attack Information Gathering Method That Adopts Integrated Malware Detection Service and Dynamic Analysis
Shuta Morishima, Takuya Tsutsumi, Rui Tanabe, Yusuke Takahashi, Masaaki Kobayashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2014-81
The integrated malware detection service is a web service that analyzes suspicious files, domains and URLs which are pos... [more] ICSS2014-81
pp.109-114
 Results 1 - 20 of 38  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan