IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
... (for ESS/CS/ES/ISS)
Tech. Rep. Archives
... (for ES/CS)
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Information and Communication System Security (ICSS) [schedule] [select]
Chair Hiroki Takakura (NII)
Vice Chair Katsunari Yoshioka (Yokohama National Univ.), Kazunori Kamiya (NTT)
Secretary Takahiro Kasama (NICT), Akira Yamada (KDDI labs.)
Assistant Keisuke Kito (Mitsubishi Electric), Toshihiro Yamauchi (Okayama Univ.)

Special Interest Group on Security Psychology and Trust (IPSJ-SPT) [schedule] [select]

Conference Date Mon, Mar 2, 2020 09:40 - 16:40
Tue, Mar 3, 2020 09:10 - 16:40
Topics Security, Trust, etc. 
Conference Place OKINAWAKEN SEINENKAIKAN 
Address 2-15-23 Kume, Naha, Okinawa
Transportation Guide 5 mins on foot from Asahibashi station
Contact
Person
+81-98-864-1780
Participation Fee This workshop will be held as the IEICE workshop in fully electronic publishing. Participant fee will be necessary except the speakers and participants other than the participants to workshop(s) in non-electronic publishing. See the participant fee page. We request the participant fee to participants who will attend the workshop(s) on ICSS.

Mon, Mar 2 AM 
10:00 - 11:00
(1)
ICSS
10:00-10:20 Improvement of the Backup Method Dealing with 2 Types of Damages
[updated]
Taiga Hasuike, Masahiro Mambo (Kanazawa Univ.)
(2)
ICSS
10:20-10:40 Estimation method of information asset security attributes using design mode Takeshi Ueda, Koichi Shimizu, Shun Hinatsu, Fumio Omatsu (Mitsubishi Electric Corp.)
(3)
ICSS
10:40-11:00 Information Rates for Multiple Assignment Schemes on Five Participants Yutaro Shimma, Kouya Tochikubo (Nihon Univ.)
  11:00-11:10 Break ( 10 min. )
Mon, Mar 2 AM 
11:10 - 12:10
(4)
ICSS
11:10-11:30 A Verification Method of Infrastructure as Code using Alloy Analyzer Ryo Hase, Yohei Matsuura (Mitsubishi Electric)
(5)
ICSS
11:30-11:50 Effect of Environmental Temperature Change in LED Fingerprinting Ayaka Tsuchiya, Akiko Toh, Yang Li, Kazuo Sakiyama, Takeshi Sugawara (UEC)
(6)
ICSS
11:50-12:10 Log Storing System Using Blockchain Takashi Ikeda, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.)
  12:10-13:30 Lunch Break ( 80 min. )
Mon, Mar 2 PM 
13:30 - 14:50
(7)
ICSS
13:30-13:50
(8)
ICSS
13:50-14:10 Search for Similar Binary Code in Cross-Architecture Using Neural Machine Translation Model Moritoshi Aoyanagi, Hidenori Tsuji, Masaki Hashimoto (IISEC)
(9)
ICSS
14:10-14:30 A Study on Fuzzing for Device Drivers with AddressSanitizer Kentaro Ishii (Kove Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kove Univ.)
(10)
ICSS
14:30-14:50 Development of a recovery tool for a ransomware infected PC Ryosuke Kokado (Kobe Univ.), Masato Ikegami, Tomohisa Hasegawa, Takafumi Harada, Hiroshi Kitani (Canon MJ), Masakatu Morii (Kobe Univ.)
  14:50-15:00 Break ( 10 min. )
Mon, Mar 2 PM 
15:00 - 16:40
(11)
ICSS
15:00-15:20 Backdoor Detection Based On Network Functions For IoT Devices Minami Yoda, Shuji Sakuraba, Junichi Yamamoto (UEC), Yuichi Sei (UEC/JST PRESTO), Yasuyuki Tahara, Akihiko Ohsuga (UEC)
(12)
ICSS
15:20-15:40 Evaluating Effectiveness of a Timing Attack on Android Devices in JavaScript
[updated]
Keisuke Sugita (Kobe Univ.), Ryoichi Isawa (NICT), Masakatsu Morii (Kobe Univ.)
(13)
ICSS
15:40-16:00 Proposing Criteria for Detecting Internet-Wide Scanners for Darknet Monitoring Yukiko Endo, Yoshiki Mori (NICT), Jumpei Shimamura (Clwit), Masaki Kubo (NICT)
(14)
ICSS
16:00-16:20 An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation
[updated]
Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
[updated]
(15)
ICSS
16:20-16:40 Mirai may detect that you talk to smart speaker
-- On privacy violation by attackers who compromised home router --
Shoya Okuda, Tatsuya Tamai, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
Tue, Mar 3 AM 
09:10 - 10:30
(16)
ICSS
09:10-09:30 A research of HTTP request and an identification method of fake User-Agent values
[updated]
Masato Inoue, Masaki Hashimoto (IISEC)
(17)
ICSS
09:30-09:50 Preliminary Study of WAF Signature Generation by Utilizing Real-time Information on the Web Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.)
(18)
ICSS
09:50-10:10 Analysis of Cyber-attacks Observed by a Simple TLS Honeypot Listening on All Ports Daisuke Makita (NICT), Jumpei Shimamura (clwit), Masaki Kubo, Daisuke Inoue (NICT)
(19)
ICSS
10:10-10:30 Local survey on transitioning of TLS version and EV Certificates Usage (FY2019 4Q) Yuji Suga (IIJ)
  10:30-10:40 Break ( 10 min. )
Tue, Mar 3 AM 
10:40 - 12:00
(20)
ICSS
10:40-11:00 Development of an expert system for automatic classification of illegal and harmful information on the dark web Hanae Kobayashi, Masaki Hashimoto (IISEC)
(21)
ICSS
11:00-11:20 Model checking RNNs with modal μ-calculus Tatsuhiro Aoshima, Toshinori Usui (NTT)
(22)
ICSS
11:20-11:40 Adversarial Attack against Neural Machine Translation Systems
[updated]
Takeshi Sakamoto, Tatsuya Mori (Waseda Univ.)
(23)
ICSS
11:40-12:00 Adversarial Attacks against Electrocardiograms
[updated]
Taiga Ono (Waseda Univ.), Takeshi Sugawara (UEC), Tatsuya Mori (Waseda Univ.)
  12:00-13:10 Lunch Break ( 70 min. )
Tue, Mar 3 PM 
13:10 - 15:10
(24) 13:10-15:10  
  15:10-15:20 Break ( 10 min. )
Tue, Mar 3 PM 
15:20 - 16:20 [updated]
(25) 15:20-15:40  
(26)
ICSS
[updated]
15:40-16:00
[updated]
Effective single-sided RAMBleed
[updated]
Hiroki Nagahama (Kobe Univ), Makoto Takita (Univ of Hyogo), Masanori Hirotomo (Saga Univ), Masakatsu Morii (Kobe Univ)
(27)
ICSS
[updated]
16:00-16:20
[updated]
Mon, Mar 2 AM 
09:40 - 11:00
(28)
[updated]
09:40-10:00  
(29)
[updated]
10:00-10:20  
(30)
[updated]
10:20-10:40  
(31)
[updated]
10:40-11:00  
  11:00-11:10 Break ( 10 min. )
Mon, Mar 2 AM 
11:10 - 12:10
(32)
ICSS
[updated]
11:10-11:30 A Technique for Issuing Security Alerts and Filtering Traffic based on Vulnerability Information Monitoring Takeshi Takahashi, Ryutaro Ushigome, Mio Suzuki, Daisuke Inoue (NICT)
(33)
ICSS
[updated]
11:30-11:50 An Evaluation of Contact Points for Security Notifications Miori Saito, Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
(34)
ICSS
[updated]
11:50-12:10 Generating Adversarial Videos that Bypass Content Filtering
[updated]
Norihito Omori, Tatsuya Mori (Waseda Univ.)
  12:10-13:30 Lunch Break ( 80 min. )
Mon, Mar 2 PM 
13:30 - 14:50
(35)
ICSS
[updated]
13:30-13:50 Implementation of aggregate message authentication and its evaluation
[updated]
Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takehisa, Hidekazu Nishiura, Zoa Jiafa (NISSIN), Yu Imamura (JDC), Junji Sikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC)
(36)
ICSS
[updated]
13:50-14:10 Extension of authentication method using hash chain aggregation Hirai Shinta, Soshi Masakazu (Hiroshima City Univ.)
(37)
ICSS
[updated]
14:10-14:30 Securty Analysis of Salsa20 and ChaCha Using Inverse Function's Properties Yusuke Matsuoka, Atsuko Miyaji (Osaka Univ.)
(38)
ICSS
[updated]
14:30-14:50 The efficient and high level of commitment scheme with low output locality Hideaki Miyaji, Atsuko Miyaji (OU)
  14:50-15:00 Break ( 10 min. )
Mon, Mar 2 PM 
15:00 - 16:40 [updated]
(39)
[updated]
15:00-15:20
[updated]
 
(40)
[updated]
15:20-15:40
[updated]
 
(41)
[updated]
15:40-16:00
[updated]
 
(42)
[updated]
16:00-16:20
[updated]
 
(43)
[updated]
16:20-16:40
[updated]
 
Tue, Mar 3 AM 
09:10 - 10:30
(44)
[updated]
09:10-09:30  
(45)
[updated]
09:30-09:50  
(46)
[updated]
09:50-10:10  
(47)
ICSS
[updated]
10:10-10:30
  10:30-10:40 Break ( 10 min. )
Tue, Mar 3 AM 
10:40 - 12:00
(48)
ICSS
[updated]
10:40-11:00 A Secure Second-price Sealed-Bid Auction using smart contract Yuki Sugitani, Atsuko Miyaji (Osaka Univ.)
(49)
ICSS
[updated]
11:00-11:20 Performance Evaluation of an Access Control Mechanism with Session Types Tomoya Nishiguchi, Yuuki Takano, Atsuko Miyaji (Osaka Univ.)
(50)
ICSS
[updated]
11:20-11:40 Realization of Privacy Policy with Attribute-Based Encryption and Its Applications Motoi Hayashi, Atsuko Miyaji (Osaka Univ.)
(51)
ICSS
[updated]
11:40-12:00
  12:00-13:10 Lunch Break ( 70 min. )
  13:10-15:20 ( 130 min. )
Tue, Mar 3 PM 
15:20 - 16:40
(52)
[updated]
15:20-15:40  
(53)
ICSS
[updated]
15:40-16:00 Secure and Compact Elliptic Curve Scalar Multiplication based on Affine
[updated]
Jin Yaoan, Atsuko Miyaji (Osaka Univ.)
(54)
ICSS
[updated]
16:00-16:20
(55)
ICSS
[updated]
16:20-16:40 Study on Implementation of Anonymous Public-Key Certificates based on Elliptic Curve Kazuomi Oishi (SIST)

Announcement for Speakers
General TalkEach speech will have 15 minutes for presentation and 5 minutes for discussion.

Contact Address and Latest Schedule Information
ICSS Technical Committee on Information and Communication System Security (ICSS)   [Latest Schedule]
Contact Address Hiroki Takakura(National Institute of Informatics)
E-: is-adm-q 
Announcement Latest information will be presented on the homepage:
https://www.ieice.org/iss/icss/index-en.html
IPSJ-SPT Special Interest Group on Security Psychology and Trust (IPSJ-SPT)   [Latest Schedule]
Contact Address  


Last modified: 2020-02-04 12:21:50


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 

[On-Site Price List of Paper Version of Proceedings (Technical Report)] (in Japanese)
 
[Presentation and Participation FAQ] (in Japanese)
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Return to ICSS Schedule Page]   /   [Return to IPSJ-SPT Schedule Page]   /  
 
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan