IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
... (for ESS/CS/ES/ISS)
Tech. Rep. Archives
... (for ES/CS)
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Information and Communication System Security (ICSS) [schedule] [select]
Chair Yoshiaki Shiraishi (Kobe Univ.)
Vice Chair Takeshi Ueda (Mitsubishi Electric), Hiroki Takakura (NII)
Secretary Katsunari Yoshioka (Yokohama National Univ.), Kazunori Kamiya (NTT)
Assistant Takahiro Kasama (NICT), Akira Yamada (KDDI labs.)

Special Interest Group on Security Psychology and Trust (IPSJ-SPT) [schedule] [select]

Conference Date Wed, Mar 7, 2018 13:00 - 16:30
Thu, Mar 8, 2018 09:20 - 16:05
Topics Security, Trust, etc. 
Conference Place 沖縄北部雇用能力開発総合センター 
Address 〒905-2172 名護市字豊原224-3
Transportation Guide (バスの場合は77系統「豊原」か「豊原入り口」が最寄りです。)
http://www3.jeed.or.jp/okinawa/poly/center.html
Participation Fee This workshop will be held as the IEICE workshop in fully electronic publishing. Participant fee will be necessary except the speakers and participants other than the participants to workshop(s) in non-electronic publishing. See the participant fee page. We request the participant fee to participants who will attend the workshop(s) on ICSS.

Wed, Mar 7 PM  Network Security 1(A)
13:00 - 14:40
(1)
ICSS
13:00-13:25 A Study on Malware Activity Detection Based on Real-time Analysis of Darknet Data Using Graphical Lasso Chansu Han (Kyushu Univ.), Jumpei Shimamura (Clwit Inc.), Takeshi Takahashi, Daisuke Inoue (NICT), Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.), Koji Nakao (NICT)
(2)
ICSS
13:25-13:50 Combining Local and Global Graph-based Features for Stealth Scan Detection on LAN Hiroki Nagayama, Bo HU, Kazunori Kamiya, Masaki Tanikawa (NTT)
(3)
ICSS
13:50-14:15 Malware Detection by Anomaly of Traffic Data for IoT Devices Kana Sakano, Tetsutaro Uehara (Ritsumeikan Univ.)
(4)
ICSS
14:15-14:40 Modeling Worm Propagation using Dynamic Patching Sugitani Yuki, Francois Bonnet, Miyaji Atsuko (Osaka Univ.)
  14:40-14:50 Break ( 10 min. )
Wed, Mar 7 PM  Cryptography 1 (B)
13:00 - 14:15
(5)
ICSS
13:00-13:25 On the effectiveness of solving ECDLP using Characteristic set methods Tomoya Nishiguchi, Chen Mou, Kenta kodera, Atuko Miyaji (Osaka Univ.)
(6)
ICSS
13:25-13:50 Application of Multi-Party Private Set-Intersection Motoi Hayashi, Katsunari Shishido, Atsuko Miyaji (Osaka Univ.)
(7)
ICSS
13:50-14:15 An analysis of the Guo-Johansson-Stankovski attack against QC-MDPC codes Yohei Maezawa, Tung Chou, Atsuko Miyaji (Osaka Univ,)
  14:15-14:50 Break ( 35 min. )
Wed, Mar 7 PM  Network Security 2(A)
14:50 - 16:30
(8)
ICSS
14:50-15:15 A study of decentralized IoT Security Controller Iifan Tyou, Hiroki Nagayama, Takuya Saeki, Yukio Nagafuchi, Masaki Tanikawa (NTT)
(9)
ICSS
15:15-15:40 A study of security requirements and function implementation for home networks in a period of IoT expansion Shingo Kashima, Tsuyoshi Kondoh, Tetsuhiko Murata, Masami Ueno (NTT)
(10)
ICSS
15:40-16:05 A Preliminary Study on Defining Malignant Activity by Linking in-System Elements Takuya Koike (IISEC), Miyuu Okubo (IRI), Hidenori Tsuji, Masaki Hashimoto (IISEC)
(11)
ICSS
16:05-16:30 The spread and the containment of virus in random network model Taichi Nishino, Francois Bonnet, Atsuko Miyaji (Osaka Univ.)
Wed, Mar 7 PM  Cryptography 2(B)
14:50 - 16:05
(12)
ICSS
14:50-15:15 Safety evaluation of stream cipher, Salsa20/ChaCha20 by redesign of diffusion Yusuke Matsuoka, Atsuko Miyaji (Osaka Univ.)
(13)
ICSS
15:15-15:40 Evaluation of HIBE based on Universal Sampler Shunsuke Otsuka, Akinori Kawachi, Atsuko Miyaji (Osaka Univ.)
(14)
ICSS
15:40-16:05
Thu, Mar 8 AM  Web Security 1(A)
09:20 - 11:00
(15)
ICSS
09:20-09:45 Estimate of Malicious Web Sites Based on Users' Web Access Behavior and Destination AS Numbers Kosuke Murakami, Jumpei Urakawa, Akira Yamada, Ayumu Kubota (KDDI Research)
(16)
ICSS
09:45-10:10 Automatically Collecting User-initiated Web-based Attacks Takashi Koide, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT)
(17)
ICSS
10:10-10:35 An Empirical Analysis of Online Advertising Fraud by analyzing User Activities Observed in the Ad Network Fumihiro Kanei, Daiki Chiba, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT)
(18)
ICSS
10:35-11:00 Darkweb Analysis System by Combining HSDir's Snooping and Active Scanning Akito Ono (Ritsumeikan Univ.), Masaki Kamizono (PwC Cyber Services), Takahiro Kasama (NICT), Tetsutaro Uehara (Ritsumeikan Univ.)
  11:00-11:10 Break ( 10 min. )
Thu, Mar 8 AM  Malware(B)
09:20 - 11:00
(19)
ICSS
09:20-09:45 Considering Opcode-based Similarity between IoT Malware Samples Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT)
(20)
ICSS
09:45-10:10 Evaluation of malware sandbox using evasive test samples Kou Ishii, Wateru Ueno, Rui Tanabe (Yokohama National Univ.), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
(21)
ICSS
10:10-10:35 Research on an Evaluation Method for Memory Forensics Tools Makoto Ashitsu, Ikuo Tanaka, Hidenori Tsuji, Masaki Hashimoto (IISEC)
(22)
ICSS
10:35-11:00 A Malware Detection Method by Machine Learning Focused on Malignant Activity Tadashi Shimomura, Nobuki Suetsugu, Hidenori Tsuji, Masaki Hashimoto (IISEC)
  11:00-11:10 Break ( 10 min. )
Thu, Mar 8 AM  Web Security 2(A)
11:10 - 12:25
(23)
ICSS
11:10-11:35 Classification for Important Decoy Documents Based on Supervised Learning Yao Xiao, Shuta Morishima (Yokohama National Univ.), Tsuyufumi Watanabe (Yokohama National Univ./Fujisoft), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
(24)
ICSS
11:35-12:00 Predicting Website Abuse Using Update Histories Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT), Shigeki Goto (Waseda Univ.)
(25)
ICSS
12:00-12:25 Analyzing web application vulnerability reports by machine learning Takaaki Nagumo, Yuusuke Kubo, Yasuhiro Kobayashi, Wataru Hasegawa, Takahiro Hamada (NTT Com)
  12:25-13:25 Lunch Break ( 60 min. )
Thu, Mar 8 AM  Threat Intelligence(B)
11:10 - 12:00
(26)
ICSS
11:10-11:35
(27)
ICSS
11:35-12:00
  12:00-13:00 Lunch Break ( 60 min. )
Thu, Mar 8 PM  Network Security 3(A)
13:25 - 14:40
(28)
ICSS
13:25-13:50 Response Signature Generation method for Detecting Malicious Destinations Kazuma Shinomiya, Iifan Tyou, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT)
(29)
ICSS
13:50-14:15 Investigation of Inferability of IP addresses for Clients in Organizations Miori Saito, Wataru Ueno, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
(30)
ICSS
14:15-14:40 Subspace Clustering Method with Semantic Interpretability for Bot Behavior Classification Shohei Araki, Bo Hu, Kazunori Kamiya, Masaki Tanikawa (NTT)
  14:40-14:50 Break ( 10 min. )
Thu, Mar 8 PM  SPT/Authentication(B)
13:25 - 15:05
(31) 13:25-13:50 (IPSJ-SPT) PINWrite:A New Smartphone Authentication Scheme Using Handwriting Recognition
(32) 13:50-14:15  
(33)
ICSS
14:15-14:40 A Survey of Factors Influencing Progress of HTTPS Adoption Tetsuya Okuda, Naoko Chiba, Mitsuaki Akiyama, Yuki Okano (NTT)
(34)
ICSS
14:40-15:05 A countermeasure against camrip using the phase modulation Toshiki Sasazaki, Tatsuya Mori (Waseda Univ.)
  15:05-15:15 Break ( 10 min. )
Thu, Mar 8 PM  Network Security 4(A)
15:15 - 16:05
(35)
ICSS
15:15-15:40 Empirical Analysis of Reflectors in DRDoS attacks based on Large-Scale Network Data Jumpei Urakawa, Kosuke Murakami, Akira Yamada, Ayumu Kubota (KDDI Research)
(36)
ICSS
15:40-16:05 Analyzing Victims of DRDoS Attacks Observed by Honeypots Kazuya Watanabe (Yokohama National Univ.), Tomomi Nishizoe (NTT Com), Daisuke Makita (NICT), Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
Thu, Mar 8 PM  Cryptography 3(B)
15:15 - 16:05
(37)
ICSS
15:15-15:40 On the Ring Signature Scheme Using LDPC Codes Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.)
(38)
ICSS
15:40-16:05 On a Method to Implement White-box Cryptography (No Presentation) Tomonari Ozeki, Masakazu Soshi (Hiroshima City Univ.)

Announcement for Speakers
General TalkEach speech will have 20 minutes for presentation and 5 minutes for discussion.

Contact Address and Latest Schedule Information
ICSS Technical Committee on Information and Communication System Security (ICSS)   [Latest Schedule]
Contact Address Yoshiaki Shiraishi (Kobe University)
E-: is-adm-q 
Announcement Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html
IPSJ-SPT Special Interest Group on Security Psychology and Trust (IPSJ-SPT)   [Latest Schedule]
Contact Address  


Last modified: 2018-03-07 13:17:00


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 

[On-Site Price List of Paper Version of Proceedings (Technical Report)] (in Japanese)
 
[Presentation and Participation FAQ] (in Japanese)
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Return to ICSS Schedule Page]   /   [Return to IPSJ-SPT Schedule Page]   /  
 
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan