Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2015-03-03 13:00 |
Okinawa |
Meio Univiersity |
A detection system which uses DNS traffic features to detect domains which are related to botnets Wataru Tsuda, Youki Kadobayashi, Takeshi Okuda, Hiroaki Hazeyama (NAIST) ICSS2014-63 |
[more] |
ICSS2014-63 pp.1-6 |
ICSS |
2015-03-03 13:25 |
Okinawa |
Meio Univiersity |
Anomaly Detection Based on Clustering of Network Traffic Characteristics Considering Results of Signature Based IDS Evaluation Kohei Imai, Shigeki Aoki, Takao Miyamoto (Osaka Prefecture Univ.) ICSS2014-64 |
There is a lot of attacks over the Internet,intrusion detection systems(IDSs) are an active area of research.IDSs are cl... [more] |
ICSS2014-64 pp.7-12 |
ICSS |
2015-03-03 13:50 |
Okinawa |
Meio Univiersity |
Measures to Prevent Cyber-Attack Using Multi-Layer-Binding (MLB) Router
-- A Proposal of Dropping Request Protocol, and its Implementation and Evaluation Using OpenFlow -- Ken Eguchi, Shota Nagatomo, Yuji Yokoyama, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno (Tokyo Denki Univ.), Hiroshi Kobayashi (Tokyo Denki Univ) ICSS2014-65 |
There is a limit to the security achieved by traditional approaches that rely on the defense of individual systems, and ... [more] |
ICSS2014-65 pp.13-18 |
ICSS |
2015-03-03 14:15 |
Okinawa |
Meio Univiersity |
Implementation and Evaluation of Botnet Detection System with Temporal Locality of DGA Teppei Fukuda, Tomohiro Ishihara (UTokyo), Akira Kato (Keio Univ.) ICSS2014-66 |
In recent days, many botnet-based attacks are observed. In this thesis, our object is to detect the domain generation al... [more] |
ICSS2014-66 pp.19-24 |
ICSS |
2015-03-03 14:50 |
Okinawa |
Meio Univiersity |
A trial of network security tests over federated testbeds Masatoshi Enomoto, Hiroaki Hazeyama (NAIST), Kazumasa Kobayashi (KUSA), Suguru Yamaguchi (NAIST) ICSS2014-67 |
In network security test environment constructed in wide area, we can test independent of site or scale of test suite or... [more] |
ICSS2014-67 pp.25-29 |
ICSS |
2015-03-03 15:15 |
Okinawa |
Meio Univiersity |
A Pluggable and Programmable Flamework for Analyzing Security Logs Yu Tsuda, Takashi Tomine, Masaki Kamizono, Masashi Eto, Daisuke Inoue (NICT) ICSS2014-68 |
SIEM (Security Information and Event Management) systems can unify a lot of security logs from various security applianc... [more] |
ICSS2014-68 pp.31-36 |
ICSS |
2015-03-03 15:40 |
Okinawa |
Meio Univiersity |
A Study on the Effectiveness of Correlation Analysis of Cyber Attack Information by means of Tagging Technique Taichi Hata (JDC/Nissin), Manabu Inuma (Josai Univ.), Junji Shikata (Yokohama National Univ.), Shin Takeuchi (JDC/Nissin), Koji Nakao (NICT) ICSS2014-69 |
Recently, cyber-attacks caused by malwares are steadily increasing.
Since the attack techniques are also diversified, c... [more] |
ICSS2014-69 pp.37-42 |
ICSS |
2015-03-03 16:15 |
Okinawa |
Meio Univiersity |
Link Structural Analysis of Drive-by-Download Attacks Yuji Dairiki (Kobe Univ.), Masaki Kamizono (SecureBrain), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2014-70 |
In analyzing Drive-by-Download (DBD) attack, it is basic and essential to analysis the link structure through tracking t... [more] |
ICSS2014-70 pp.43-48 |
ICSS |
2015-03-03 16:40 |
Okinawa |
Meio Univiersity |
Implementation and evaluation of Drive by Download Attack detection using the features of the obfuscation Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama (NAIST), Takuji Iimura (UT), Youki Kadobayashi (NAIST) ICSS2014-71 |
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in a browser or in browse... [more] |
ICSS2014-71 pp.49-54 |
ICSS |
2015-03-03 17:05 |
Okinawa |
Meio Univiersity |
A Study on CAPTCHA System Using Differential Awkwardness-Objects Michitomo Yamguchi (Meiji Univ.), Takeshi Okamoto (Tsukuba Univ. of Tech.), Hiroaki Kikuchi (Meiji Univ.) ICSS2014-72 |
CAPTCHAs have been accepted as a technique which prevents unauthorized access by bots. Several researchers point out tha... [more] |
ICSS2014-72 pp.55-60 |
ICSS |
2015-03-03 17:40 |
Okinawa |
Meio Univiersity |
[Invited Talk]
Cyber Security Management Koji Nakao (NICT/KDDI) |
[more] |
|
ICSS |
2015-03-04 09:00 |
Okinawa |
Meio Univiersity |
Novel USB Hub against the Malicious USB Devices Tatsuya Takehisa (NICT/Nissin), Makoto Iwamura (NICT/NTT), Hayato Ushimaru (NICT/CDI), Daisuke Inoue (NICT) ICSS2014-73 |
USB devices that adapt USB interfaces (USB keyboards and USB mouses) are prevalent. However, a new attack has been repor... [more] |
ICSS2014-73 pp.61-66 |
ICSS |
2015-03-04 09:25 |
Okinawa |
Meio Univiersity |
Yet Another Electrical Forgery Attack on CAN using Strong Recessive Takeshi Sugawara, Minoru Saeki, Manabu Misawa (Mitsubishi Electric Corp.) ICSS2014-74 |
Yet another “electrical forgery attack” against Controller Area Network (CAN) is described. The electrical forgery attac... [more] |
ICSS2014-74 pp.67-72 |
ICSS |
2015-03-04 09:50 |
Okinawa |
Meio Univiersity |
A study on the safety of the pseudo-random number generator in RFID Hiroyuki Sato (JAIST), Atsuko Miyaji (JAIST/JST CREST), Chunhua Su (JAIST) ICSS2014-75 |
One of the ways of verifing that whether pseudo-random number generator (PRNG) meets the security requirements or not is... [more] |
ICSS2014-75 pp.73-78 |
ICSS |
2015-03-04 09:00 |
Okinawa |
Meio Univiersity |
A New Explicit Relation Between Trace, Definition Field, and Embedding Degree Atsuko Miyaji, Satoru Tanaka (JAIST) ICSS2014-76 |
For pairing based cryptography, elliptic curves defined over a finite fields $mathbb{F}_p^m$ with moderate embedding deg... [more] |
ICSS2014-76 pp.79-84 |
ICSS |
2015-03-04 09:25 |
Okinawa |
Meio Univiersity |
Scalar Multiplication Algorithm with Resistance for Side-channel Attacks Keisuke Kito (JAIST), Atsuko Miyaji (JAIST/JST CREST), Ryota Takahashi (JAIST) ICSS2014-77 |
Elliptic curve cryptosystems require shorter key length than traditional cryptosystems. It is good that scalar multiplic... [more] |
ICSS2014-77 pp.85-90 |
ICSS |
2015-03-04 09:50 |
Okinawa |
Meio Univiersity |
An Estimation of Signature Schemes for Multiple Signers Kenta Muranaka, Naoto Yanai (Osaka Univ.), Shingo Okamura (NITNC), Toru Fujiwara (Osaka Univ.) ICSS2014-78 |
A signature scheme for multiple signers is a cryptographic primitive where each signer generates an individual signature... [more] |
ICSS2014-78 pp.91-96 |
ICSS |
2015-03-04 10:25 |
Okinawa |
Meio Univiersity |
Estimation of Vulnerability Score based on Annual Analysis with Supervised Latent Dirichlet Allocation Yasuhiro Yamamoto, Daisuke Miyamoto, Masaya Nakayama (Tokyo Univ.) ICSS2014-79 |
This research purpose is to determine technical scores of vulnerability by using machine learning methods in order to ev... [more] |
ICSS2014-79 pp.97-102 |
ICSS |
2015-03-04 10:50 |
Okinawa |
Meio Univiersity |
Prediction of Malware Activities based on Loopback Address from DNS Masaki Kamizono (NICT/SecureBrain), Takashi Tomine, Yu Tsuda, Masashi Eto (NICT), Yuji Hoshizawa (Securebrain Corporation), Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (ynu) ICSS2014-80 |
During malware dynamic analysis, the analysis system often finds the loopback address in responses of DNS name resolutio... [more] |
ICSS2014-80 pp.103-108 |
ICSS |
2015-03-04 11:15 |
Okinawa |
Meio Univiersity |
A Cyber Attack Information Gathering Method That Adopts Integrated Malware Detection Service and Dynamic Analysis Shuta Morishima, Takuya Tsutsumi, Rui Tanabe, Yusuke Takahashi, Masaaki Kobayashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2014-81 |
The integrated malware detection service is a web service that analyzes suspicious files, domains and URLs which are pos... [more] |
ICSS2014-81 pp.109-114 |