IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Information and Communication System Security (ICSS) [schedule] [select]
Chair Hiroki Takakura (NII)
Vice Chair Katsunari Yoshioka (Yokohama National Univ.), Kazunori Kamiya (NTT)
Secretary Takahiro Kasama (NICT), Akira Yamada (KDDI labs.)
Assistant Keisuke Kito (Mitsubishi Electric), Toshihiro Yamauchi (Okayama Univ.)

Special Interest Group on Security Psychology and Trust (IPSJ-SPT) [schedule] [select]

Conference Date Mon, Mar 1, 2021 09:10 - 18:00
Tue, Mar 2, 2021 09:10 - 18:05
Topics Security, Trust, etc. 
Conference Place  
Copyright
and
reproduction
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
Registration Fee This workshop will be held as the IEICE workshop in fully electronic publishing. Registration fee will be necessary except the speakers and participants other than the participants to workshop(s) in non-electronic publishing. See the registration fee page. We request the registration fee or presentation fee to participants who will attend the workshop(s) on ICSS.
Due for Registration Please proceed the payment of registration fee by 3 days before the workshop date. The meeting URL will be announce from one of the secretaries of the committee via e-mail, just before the workshop date.

Mon, Mar 1   [updated]
09:10 - 10:50
(1)
ICSS
09:10-09:35 Developing and Characterizing a New Approach to Extracting Communication Sessions Associated with NIDS Alerts
[updated] ICSS2020-26
Ryosuke Ishibashi, Hiroki Goto (Kyushu Univ.), Chansu Han, Tao Ban, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.)
(2)
ICSS
09:35-10:00 Detection of Infected Device Using DNS Traffic ICSS2020-27 Soichiro Kogo, Atsushi Kanai (Hosei Univ.)
(3)
ICSS
10:00-10:25 Understanding the Adoption and Operation of DNS Cookie: Current State and Future Prospects ICSS2020-28 Masanori Yajima (Waseda Univ.), Daiki Chiba (NTT), Yoshiro Yoneya (JPRS), Tatsuya Mori (Waseda Univ./NICT)
(4)
ICSS
10:25-10:50 Construction of Vulnerability Evaluation System with Machine Learning Methods ICSS2020-29 Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota (KDDIR), Junpei Urakawa (KDS/KDDIR)
  10:50-11:05 Break ( 15 min. )
Mon, Mar 1   [updated]
11:05 - 12:20
(5)
ICSS
11:05-11:30 A proposal of model for scale and frequency of cyber incidents¥¥ based on organizational attributes
[updated] ICSS2020-30
Kazuki Ikegami, Hiroaki Kikuchi (Meiji Univ.)
(6)
ICSS
11:30-11:55 Method of Similarity Evaluation among Incidents for Multi-Located Network ICSS2020-31 Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII)
(7)
ICSS
11:55-12:20 Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures ICSS2020-32 Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII)
  12:20-13:40 Lunch Break ( 80 min. )
Mon, Mar 1   [updated]
13:40 - 14:55 [updated]
(8) 13:40-14:05  
(9) 14:05-14:30  
(10)
ICSS
14:30-14:55 A path authentication framework based on One-way cross networks ICSS2020-33 Kosuke Ishibashi, Masakazu Soshi (Hiroshima City Univ.)
  14:55-16:00
[updated]
Break ( 65 min. )
[updated]
Mon, Mar 1   [updated]
16:00 - 18:00
(11)
[updated]
16:00-18:00  
Mon, Mar 1   [updated]
09:10 - 10:50
(12)
ICSS
[updated]
09:10-09:35 On the Privacy Risk of Exposure Notification Framework: Assessment and Countermeasures
[updated] ICSS2020-34
Kazuki Nomoto (Waseda Univ.), Mitsuaki Akiyama (NTT), Masashi Eto (NICT), Atsuo Inomata (Osaka Univ.), Tatsuya Mori (Waseda Univ./NICT)
[updated]
(13)
ICSS
[updated]
09:35-10:00 A Method for Reconstructing Hidden Background Image in Tele-conference with Virtual Background ICSS2020-35 Satoki Tsuji, Ryusei Ishikawa (Ritsumeikan Univ.), Masashi Eto (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Hiroshima City Univ.)
(14)
ICSS
[updated]
10:00-10:25 Implementation and Evaluation of a Plagiarism Detection Method for Source Code on Programming Contest ICSS2020-36 Ryusei Ishikawa (Ritsumeikan Univ.), Yuichi Hattori (Secure Cycle), Hiroyuki Inoue (Hiroshima City Univ.), Atsuo Inomata (Osaka Univ.)
(15)
ICSS
[updated]
10:25-10:50 Design and implementation of a cyber security exercise rewinding mechanism ICSS2020-37 Yuma Kodera, Chinen Kenichi (JAIST)
  10:50-11:05 Break ( 15 min. )
Mon, Mar 1   [updated]
11:05 - 12:20
(16)
[updated]
11:05-11:30  
(17)
[updated]
11:30-11:55  
(18)
[updated]
11:55-12:20  
  12:20-13:40 Lunch Break ( 80 min. )
Mon, Mar 1   [updated]
13:40 - 15:20 [updated]
(19)
ICSS
[updated]
13:40-14:05 An Evaluation of Scalable Clustering in Fast Construction Algorithm of Phylogenetic Tree
[updated] ICSS2020-38
Tianxiang He (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Shuji Kijima, Jun'ichi Takeuchi (Kyushu Univ.)
[updated]
(20)
ICSS
[updated]
14:05-14:30 Improvement of Functional Difference Investigation Method and Analyzing for Clusters of IoT Malware
[updated] ICSS2020-39
Reo Kawasoe (Kyushu Univ.), Chansu Han, Ryoichi Isawa, Takeshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ.)
(21)
ICSS
[updated]
14:30-14:55 Analyzing the Transition of Vulnerabilities Targeted by IoT Malware
[updated] ICSS2020-40
Kaichi Sameshima, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU)
[updated]
(22)
ICSS
[updated]
14:55-15:20
[updated]
Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox
[updated] ICSS2020-41
Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU)
[updated]
  15:20-16:00
[updated]
Break ( 40 min. )
[updated]
Tue, Mar 2   [updated]
09:35 - 10:50 [updated]
(23)
ICSS
[updated]
09:35-10:00
[updated]
Proposal for Chameleon Hash with a Revocation Function
[updated] ICSS2020-42
Koki Matsubara (Osaka Univ.), Atsuko Miyaji (Osaka Univ./ JAIST), Tian Yangguang (Osaka Univ.)
[updated]
(24)
ICSS
[updated]
10:00-10:25
[updated]
Authentication and authorization of IoT devices using blockchain and fog nodes ICSS2020-43 Takahiro Igarashi, Yuichi Futa (TUT)
(25)
ICSS
[updated]
10:25-10:50
[updated]
Consideration on the mechanism of identifying and tracking Bitcoin users ICSS2020-44 Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR)
  10:50-11:05 Break ( 15 min. )
Tue, Mar 2   [updated]
11:05 - 11:55 [updated]
(26)
ICSS
[updated]
11:05-11:30 Study on analyzing Memcached DRDoS attacks and their infrastructures ICSS2020-45 Mizuki Kondo, Natsuo Shintani (YNU), Daisuke Makita (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
(27)
ICSS
[updated]
11:30-11:55
[updated]
Distributed Slow HTTP DoS Attack Detection by Combining Multiple Schemes ICSS2020-46 Koki Tamura, Yuichi Futa (TUT)
  11:55-13:40
[updated]
Lunch Break ( 105 min. )
[updated]
Tue, Mar 2 PM 
13:40 - 15:45
(28)
ICSS
[updated]
13:40-14:05
[updated]
Research on the vulnerability of homoglyph attacks to online machine translation system ICSS2020-50 Takeshi Sakamoto, Tatsuya Mori (Waseda Univ)
(29)
ICSS
[updated]
14:05-14:30 Developing an Interactive Analysis System for Voice Assistant Apps
[updated] ICSS2020-48
Atsuko Natatsuka (Waseda Univ.), Ryo Iijima (Waseda Univ./NICT), Takuya Watanabe, Mitsuaki Akiyama (NTT), Tetsuya Sakai (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT)
[updated]
(30)
ICSS
[updated]
14:30-14:55 ICSS2020-49
(31)
ICSS
[updated]
14:55-15:20
[updated]
Security Evaluation of End-to-End Encryption of LINE Version 2
[updated] ICSS2020-47
Kotaro Kita, Takanori Isobe (UH)
(32)
ICSS
[updated]
15:20-15:45 The linear probability of the stream cipher Salsa ICSS2020-51 Junru Li (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST)
  15:45-16:00 Break ( 15 min. )
Tue, Mar 2 PM 
16:00 - 16:50
(33)
ICSS
[updated]
16:00-16:25 Evaluation of resonance-induced attacks on inertial measurement unit
[updated] ICSS2020-52
Yuta Minamisawa, Ryo Iijima (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT)
[updated]
(34)
ICSS
[updated]
16:25-16:50 Security Evaluation of PUF utilizing Unrolled Architecture ICSS2020-53 Yusuke Nozaki, Kensaku Asahi, Masaya Yoshikawa (Meijo Univ.)
Tue, Mar 2 PM 
09:10 - 10:50
(35)
ICSS
[updated]
09:10-09:35 A Study on the Adoption of Link Preview by the Phishing Sites ICSS2020-54 Norihito Omori (Waseda Univ.), Satoshi Furutani, Takuya Watanabe, Toshiki Shibahara, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.)
(36)
ICSS
[updated]
09:35-10:00 An Efficient Discovery of Malicious URL Using VirusTotal and Web Access Log
[updated] ICSS2020-55
Chika Hiraishi, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
(37)
ICSS
[updated]
10:00-10:25 Evaluation of Uncertain Reports by Multiple Anti-virus Engines
[updated] ICSS2020-56
Kazuya Nomura (Waseda Univ.), Mistuaki Akiyama (NTT), Masaki Kamizono (Deloitte Tohmatsu Cyber LLC), Takahiro Kasama (NICT)
(38)
ICSS
[updated]
10:25-10:50 Proof of concept of sandbox evasion attack using email address stored in target machine ICSS2020-57 Yuta Inoue, Rui Tanabe (YNU), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
  10:50-11:05 Break ( 15 min. )
Tue, Mar 2 AM  [updated]
11:05 - 11:55 [updated]
(39)
ICSS
[updated]
11:05-11:30 Accuracy evaluation of CNNs and random forests with Malware API call sequences
[updated] ICSS2020-58
Shugo Asai, Futa Yuichi (TUT)
[updated]
(40)
ICSS
[updated]
11:30-11:55 Detecting unknown malware families by anomaly detection using deep learning ICSS2020-59 Ren Takeuchi, Shintaro Mizuno, Vo Ngoc Khoi Nguyen, Jun Tsuchiya, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.)
  11:55-13:40
[updated]
Lunch Break ( 105 min. )
[updated]
Tue, Mar 2 PM 
13:40 - 15:45
(41)
[updated]
13:40-14:05  
(42)
[updated]
14:05-14:30  
(43)
[updated]
14:30-14:55  
(44)
[updated]
14:55-15:20  
(45)
[updated]
15:20-15:45  
  15:45-16:00 Break ( 15 min. )
Tue, Mar 2 PM 
16:00 - 18:05
(46)
[updated]
16:00-16:25  
(47)
[updated]
16:25-16:50  
(48)
[updated]
16:50-17:15  
(49)
[updated]
17:15-17:40  
(50)
[updated]
17:40-18:05  

Announcement for Speakers
General TalkEach speech will have 18 minutes for presentation and 7 minutes for discussion.

Contact Address and Latest Schedule Information
ICSS Technical Committee on Information and Communication System Security (ICSS)   [Latest Schedule]
Contact Address Hiroki Takakura(National Institute of Informatics)
E-: is-adm-q 
Announcement Latest information will be presented on the homepage:
https://www.ieice.org/iss/icss/index-en.html
IPSJ-SPT Special Interest Group on Security Psychology and Trust (IPSJ-SPT)   [Latest Schedule]
Contact Address  


Last modified: 2021-02-17 10:56:15


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 

[On-Site Price List of Paper Version of Proceedings (Technical Report)] (in Japanese)
 
[Presentation and Participation FAQ] (in Japanese)
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Return to ICSS Schedule Page]   /   [Return to IPSJ-SPT Schedule Page]   /  
 
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan