Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2015-11-26 13:20 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
[Invited Talk]
The latest trend of the international standardization for Safety and Security in factories
-- Bridging between Safety standards and Security standards -- Koji Demachi (Yokogawa Electric) ICSS2015-35 |
[more] |
ICSS2015-35 pp.1-6 |
ICSS |
2015-11-26 14:10 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
A Traffic Analysis to Identify Unintended Impact on Business Caused by an Incident Response Minori Shiota, Yukiko Yamaguchi, Hajime Shiimada (Nagoya Univ), Hiroki Takakura (NII) ICSS2015-36 |
To confront recent sophisticated targeted attacks, we have to prevent the theft of information and the destruction of th... [more] |
ICSS2015-36 pp.7-12 |
ICSS |
2015-11-26 14:35 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
TCP Behavior-based Slow DoS Attack Detection Hiroyuki Nooka, Kazunori Kamiya, Hiroshi Kurakami, Takeshi Yada (NTT) ICSS2015-37 |
In this paper, we discuss the detection of a form of DoS/DDoS attack known as Slow DoS.
Currently, countermeasures agai... [more] |
ICSS2015-37 pp.13-18 |
ICSS |
2015-11-26 15:00 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
tkiwa: A Detection Tool for Packets with Characteristic Network Protocol Header Takashi Koide (Yokohama National Univ.), Daisuke Makita (Yokohama National Univ./NICT), Takahiro Kasama, Mio Suzuki, Daisuke Inoue, Koji Nakao (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2015-38 |
The packets from malware and network tools that have their own implementation of network stack may have character-istic ... [more] |
ICSS2015-38 pp.19-24 |
ICSS |
2015-11-26 15:25 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
Study on Rogue Access Point detection method Takaaki Hoyo, Atsushi Kanai (Hosei Univ.) ICSS2015-39 |
Wireless LAN access points are installed everywhere, it has become possible to connect to the Internet. While such acces... [more] |
ICSS2015-39 pp.25-30 |
ICSS |
2015-11-26 15:50 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
On Evaluation of Android Markets Based on Maliciousness and Impact of Registered Applications Yosuke Kikuchi, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2015-40 |
With the spread of Android devices, the number of malware targeting Android has been rapidly increasing in recent years.... [more] |
ICSS2015-40 pp.31-36 |
ICSS |
2015-11-26 16:25 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
[Invited Talk]
Observing IoT Devices Infected by Malware Katsunari Yoshioka (YNU) |
[more] |
|
ICSS |
2015-11-26 17:05 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
[Invited Talk]
International trends in cyber security for Medical Devices
-- Safety and Security -- Toshiaki Nakazato (SNAG) ICSS2015-41 |
Medical devices have been shifted from standalone devices to the ones that work together with other medical devices inco... [more] |
ICSS2015-41 pp.37-42 |
ICSS |
2015-11-27 09:30 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
[Invited Talk]
Introduction of Fukushima Renewable Energy Institute, AIST (FREA) Hirohide Furutani, Kenji Otani (AIST) ICSS2015-42 |
[more] |
ICSS2015-42 pp.43-47 |
ICSS |
2015-11-27 13:00 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
[Invited Talk]
International Standardization for Secure Software Update of ITS Communication Devices Masashi Eto (NICT) |
[more] |
|
ICSS |
2015-11-27 13:50 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
Cyber security issues and measures of automobiles Hiroki Mase, Kazuma Ito, Shinya Yamamoto (NIT) ICSS2015-43 |
In the last couple of years automobiles have evolved into complex systems of electronic control unit based software. In ... [more] |
ICSS2015-43 pp.49-53 |
ICSS |
2015-11-27 14:15 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
Towards A Practical Implementation of Mandatory Access Control with Logic-Based Language Masaki Hashimoto, Minetoshi Takizawa (IISEC), Fumihiko Takayama (IIT), Hidenori Tsuji, Hidehiko Tanaka (IISEC) ICSS2015-44 |
SELinux is an effective MAC system for preventing damage from spreading after security breaches.
In this paper, we repl... [more] |
ICSS2015-44 pp.55-60 |
ICSS |
2015-11-27 14:40 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
A Suspicious Processes Detection Scheme using Process Frequency Junji Nakazato, Yu Tsuda, Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2015-45 |
Many serious security incidents caused by the targeted attacks have been occurred. The targeted attacks can not be preve... [more] |
ICSS2015-45 pp.61-66 |
ICSS |
2015-11-27 15:05 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
An annotated context-free grammar based vulnerability detection using LALR parser Ruo Ando (NICT) ICSS2015-46 |
Detecting vulnerabilities in the mission-critical software is the key issue for production networks. However, recent res... [more] |
ICSS2015-46 pp.67-72 |