Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2016-03-03 12:40 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Improving IoTPOT for Observing Various Attacks Targeting Embedded Devices Shogo Suzuki, YinMin Papa, Yuta Ezawa, Ying Tie, Sou Nakayama, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2015-47 |
IoTPOT, which we previously implemented as a honeypot system for embedded devices, can only emulate Telnet service. In t... [more] |
ICSS2015-47 pp.1-6 |
ICSS, IPSJ-SPT |
2016-03-03 13:10 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Observing Cyber Attacks on Building Control System by Honeypot Ying Tie (YNU), Koichi Shimizu (Mitsubishi Electric Corporation), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2015-48 |
Although several reports describe that scans on control system such as building control system have been increasing, the... [more] |
ICSS2015-48 pp.7-12 |
ICSS, IPSJ-SPT |
2016-03-03 13:40 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Storage-Efficient and Low-Power Packet Classification for Internet of Things Yuta Kitamura (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2015-49 |
This paper addresses packet classification for Internet of Things (IoT) security. Packet Classification is a function to... [more] |
ICSS2015-49 pp.13-18 |
ICSS, IPSJ-SPT |
2016-03-03 12:40 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Malicious-Spam-Mail Detection System with Autonomous Learning Ability Shogo Osaka, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-50 |
Recently, damages caused by spam mails that guide receivers to malicious
web pages become more and more serious. In thi... [more] |
ICSS2015-50 pp.19-24 |
ICSS, IPSJ-SPT |
2016-03-03 13:10 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
An Actual Survey on Web Scanning by URI Co-occurrence Detection Yang Zhong, Shingo Orihara, Masaki Tanikawa (NTT), Hajime Shimada, Tutomu Murase (Nagoya Univ), Hiroki Takakura (NII), Yoshihito Oshima (NTT) ICSS2015-51 |
Attackers often try to scan vulnerable servers before actual attacks.
Detecting vulnerability scans previously is effec... [more] |
ICSS2015-51 pp.25-30 |
ICSS, IPSJ-SPT |
2016-03-03 13:40 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Analyzing Targeted Cyber Attacks by Focusing on Contents of Decoy Documents Natsuko Kawakami, Ryota kikkawa, Ying Tie, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
In recent targeted cyberattacks, targeted malware display embedded or downloaded decoy documents upon their execution as... [more] |
|
ICSS, IPSJ-SPT |
2016-03-03 14:20 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
[Invited Talk]
Looking Back on My Research Yuko Murayama (Iwate Prefectural Univ.) ICSS2015-52 |
[more] |
ICSS2015-52 pp.31-34 |
ICSS, IPSJ-SPT |
2016-03-03 15:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Current Status and Issues of the Application of AI Technology for Digital Forensics Shinichi Matsumoto (ISIT), Kouichi Sakurai (Kyushu Univ.) |
[more] |
|
ICSS, IPSJ-SPT |
2016-03-03 16:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Issue analysis toward forensics gathering infrastructure that supports the more efficient incident handling Daichi Hasumi, Shigeyoshi Shima, Takahiro Kakumaru (NEC) ICSS2015-53 |
Organization introducing ICT systems needs to properly respond to the information security incidents. In contrast, recen... [more] |
ICSS2015-53 pp.35-40 |
ICSS, IPSJ-SPT |
2016-03-03 16:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Privacy-preserving Log Analysis with Deterministic Encryption Yuji Furuta, Naoto Yanai (Osaka Univ.), Masashi Karasaki (NTT-neomeit), Katsuhiko Eguchi (NTT Neomeit), Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) ICSS2015-54 |
Recently, an increase of attacks via a network is remarkable, and the observation and the analysis of log information is... [more] |
ICSS2015-54 pp.41-46 |
ICSS, IPSJ-SPT |
2016-03-03 15:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Detection of Vulnerability Scanning Using Features of Collective Accesses Collected from Several Honeypots Naomi Kuze, Shu Ishikura (Osaka Univ.), Takeshi Yagi, Daiki Chiba (NTT), Masayuki Murata (Osaka Univ.) ICSS2015-55 |
Attacks against websites are increasing rapidly with the expansion of web services. Diversifying web services make it di... [more] |
ICSS2015-55 pp.47-52 |
ICSS, IPSJ-SPT |
2016-03-03 16:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Evaluation of the attack detection method based on duration of continuous packet arrival Yuhei Hayashi, Satoshi Nishiyama, Akinori Suzuki, Katsuhiko Sakai, Ichiro Kudo, Kazunori Kamiya (NTT) ICSS2015-56 |
Application layer DDoS attacks occur frequently. In order to detect the attacks in network, a security appliance with De... [more] |
ICSS2015-56 pp.53-58 |
ICSS, IPSJ-SPT |
2016-03-03 16:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Investigation of cyber incident prediction method based on a technical analysis Masaru Kawakita, Shigeyoshi Shima (NEC) ICSS2015-57 |
[more] |
ICSS2015-57 pp.59-64 |
ICSS, IPSJ-SPT |
2016-03-04 10:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A fast detecting method for obfuscated malicious JavaScript based on text pattern analysis Jiawei Su, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (YNU) ICSS2015-58 |
The malicious JavaScript is a common springboard for attackers to launch several types of network attacks, such as Drive... [more] |
ICSS2015-58 pp.65-70 |
ICSS, IPSJ-SPT |
2016-03-04 10:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Static Detection of ROP Chain Based on Hidden Markov Model Toshinori Usui, Tomonori Ikuse, Makoto Iwamura, Takeshi Yada (NTT) ICSS2015-59 |
Threats of targeted attacks have been widely observed. The targeted attacks generally utilize malicious documents that c... [more] |
ICSS2015-59 pp.71-76 |
ICSS, IPSJ-SPT |
2016-03-04 11:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A Suspicious Processes Detection Scheme using Process Frequency and Network State Junji Nakazato, Yu Tsuda, Eto Masashi, Daisuke Inoue, Koji Nakao (NICT) ICSS2015-60 |
Many serious security incidents caused by the targeted attacks have been occurred. The targeted attacks can not be preve... [more] |
ICSS2015-60 pp.77-82 |
ICSS, IPSJ-SPT |
2016-03-04 11:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Preliminary Studies of Linkage Analysis among Process Behavior for Intrusion Prevention Yudai Tomaru, Masaki Hashimoto, Hidehiko Tanaka (iisec) ICSS2015-61 |
Recently, there are many malware measures such as targeted attacks, communicate with C&C servers, file creation, executi... [more] |
ICSS2015-61 pp.83-88 |
ICSS, IPSJ-SPT |
2016-03-04 10:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A Study of Security of an Authentication Method Using Public and Private Keys with Relaying Plural Key Pairs Yusuke Ogata, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) ICSS2015-62 |
It is difficult to sufficiently protect web accounts using a password-based authentication method against threats of man... [more] |
ICSS2015-62 pp.89-94 |
ICSS, IPSJ-SPT |
2016-03-04 10:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Selection of authentication methods with game theory in VANET Hiroaki Hiroaki, Masakazu Soshi (Hiroshima City Univ.) ICSS2015-63 |
Much attention has recently been paid to VANET (Vehicular Ad-hoc Networks), where moving vehicles wirelessly communicate... [more] |
ICSS2015-63 pp.95-100 |
ICSS, IPSJ-SPT |
2016-03-04 11:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Towards Non-Encryption-Based RFID Private Tag Authentication Kazuya Sakai (TMU) ICSS2015-64 |
In this paper, we present the summary of our research project on RFID security and privacy. To be specific, we will pres... [more] |
ICSS2015-64 pp.101-104 |