Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SITE, IPSJ-CE |
2022-12-04 14:20 |
Fukuoka |
(Primary: On-site, Secondary: Online) |
[Invited Talk]
Please fill in this blank. Katasumi Takahashi (NTT Social Informatics Laboratories) |
[more] |
|
SITE, IPSJ-CE |
2022-12-04 15:05 |
Fukuoka |
(Primary: On-site, Secondary: Online) |
[Invited Talk]
** Please fill in this blank. ** Mitsuaki Akiyama (NTT Social Informatics Laboratories) |
[more] |
|
ISEC, SITE, LOIS |
2022-11-18 13:00 |
Online |
Online |
[Invited Talk]
Quantum Computation and Cryptography Takashi Yamakawa (NTT) ISEC2022-34 SITE2022-38 LOIS2022-18 |
Recently, there have been many exciting works in the interdisciplinary field of quantum computations and cryptography. T... [more] |
ISEC2022-34 SITE2022-38 LOIS2022-18 p.26 |
ICSS |
2022-11-07 15:25 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Analysis of Environmental Sensitivity of Persistent IoT Malware using Sandboxes with File Systems from Various IoT Devices Takahiro Inoue (YNU), Eizo Okada, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2022-45 |
(To be available after the conference date) [more] |
ICSS2022-45 pp.43-48 |
HCS |
2022-08-27 10:30 |
Hyogo |
(Primary: On-site, Secondary: Online) |
An attempt to analyze dialogue process in health guidance for lifestyle-related diseases prevention Tae Sato, Kaori Fujimura, Reiko Aruga, Yasuo Ishigure, Asami Miyajima (NTT), Tamae Ogata, Akina Mine, Emiko Kikuchi, Yasuhiro Nishizaki (Tokai Univ.) HCS2022-41 |
Lifestyle-related diseases need to be prevented for people to maintain quality of life (QOL) and both physical and menta... [more] |
HCS2022-41 pp.27-32 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 15:50 |
Online |
Online |
Revocable Identity-Based Encryption With Multiple Private-Key Generators secure against Chosen Ciphertext Attacks and Decryption Key Exposure Yudai Suzuki, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Akira Nagai (NTT) ISEC2022-27 SITE2022-31 BioX2022-52 HWS2022-27 ICSS2022-35 EMM2022-35 |
This study gives new security definitions for revocable identity-based encryption with multiple private-key generators (... [more] |
ISEC2022-27 SITE2022-31 BioX2022-52 HWS2022-27 ICSS2022-35 EMM2022-35 pp.118-123 |
R |
2022-05-28 13:00 |
Online |
Online |
Correlation analysis of reviewer rating trends and trustworthiness on EC site Ryohei Suzuki, Iifan Tyou, Naoto Kiribuchi, Nami Ashizawa (NTT), Kazutoshi Sasahara (Tokyo Tech) R2022-1 |
E-commerce sites have a system to evaluate the reputation of products by the number of stars and reviews. When purchasin... [more] |
R2022-1 pp.1-6 |
HCS |
2022-03-11 10:40 |
Online |
Online |
How People Distinguish Individuals from their Movements: Toward the Realization of Personalized Agents Chihiro Takayama, Mitsuhiro Goto, Eitoku Shinichiro, Ryo Ishii, Hajime Noto, Shiro Ozawa, Takao Nakamura (NTT) HCS2021-62 |
[more] |
HCS2021-62 pp.7-12 |
ICSS, IPSJ-SPT |
2022-03-08 10:00 |
Online |
Online |
Input predictive attack by keyboard acoustic emanations using BERT and its countermeasures Masahiro Iida (Teikyo Univ.), Mitsuaki Akiyama (NTT), Masaki Kamizono (DTCY), Takahiro Kasama (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Kyoto Sangyo Univ.), Atsuo Inomata (Osaka Univ.) ICSS2021-67 |
The Keyboard Acoustic Emanations has been proposed to estimate the input key from keystroke sounds as a kind of side-cha... [more] |
ICSS2021-67 pp.49-54 |
ICSS, IPSJ-SPT |
2022-03-08 14:00 |
Online |
Online |
ICSS2021-76 |
(To be available after the conference date) [more] |
ICSS2021-76 pp.105-110 |
PRMU |
2021-12-16 10:45 |
Online |
Online |
Shadow Reduction Based on LiDAR intensity Shogo Sato, Yasuhiro Yao, Shingo Ando, Jun Shimamura (NTT) PRMU2021-25 |
In recent years, there has been a growing demand
for urban digitization using cameras and light detection and
ranging ... [more] |
PRMU2021-25 pp.7-12 |
QIT (2nd) |
2021-11-30 16:20 |
Online |
Online |
Certified Deletion for Public Key Encryption and Classical Communication Taiga Hiroka, Tomoyuki Morimae (Kyoto Univ.), Ryo Nishimaki, Takashi Yamakawa (NTT) |
Broadbent and Islam (TCC’20) proposed a quantum cryptographic primitive called quantum encryption with certified deletio... [more] |
|
IA, ICSS |
2021-06-22 09:25 |
Online |
Online |
Analtsis of cost-effectiveness in malicious site detection using VirusTotal Kyohei Takao (YNU), Hiroshi Mori (Deloitte Tohmatsu Cyber LLC), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) IA2021-10 ICSS2021-10 |
VirusTotal receives to-be-tested files and URLs and provides scan results by more than 70 security software.
Its incre... [more] |
IA2021-10 ICSS2021-10 pp.50-55 |
ICSS, IPSJ-SPT |
2021-03-02 09:35 |
Online |
Online |
An Efficient Discovery of Malicious URL Using VirusTotal and Web Access Log Chika Hiraishi, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-55 |
The threats of malicious websites are increasing that, urgent countermeasures are needed. Using a block list of known ma... [more] |
ICSS2020-55 pp.172-177 |
ICSS, IPSJ-SPT |
2020-03-02 16:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2019-81 |
While IoT malware such as Mirai have been targeting Telnet services, there are still many devices that are still running... [more] |
ICSS2019-81 pp.79-84 |
CCS, IN (Joint) |
2019-08-01 14:55 |
Hokkaido |
KIKI SHIRETOKO NATURAL RESORT |
Performance Evaluation of Machine Learning Based Channel Selection Algorithm Implemented on IoT Sensor Devices So Hasegawa, Ma Jing, Ryoma Kitagawa (TUS), Song-Ju Kim (KU), Yoshito Watanabe, Liu Wei, Yozo Shoji (NICT), Mikio Hasegawa (TUS) CCS2019-17 |
The number of IoT devices have been dramatically increased. Numerous IoT devices generate enormous traffic, which causes... [more] |
CCS2019-17 pp.1-6 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 10:20 |
Kochi |
Kochi University of Technology |
An Approach to Attack Scenario Generation for Simulation of Targeted Attacks Yusuke Takahashi, Shigeyoshi Shima, Atsunori Naito (NEC), Rui Tanabe, Katsunari Yoshioka (YNU) ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16 |
Cyber exercise is implemented by security organizations for the purpose of development of human re-sources against targe... [more] |
ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16 pp.7-14 |
ICSS, IPSJ-SPT |
2019-03-07 14:20 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
How to build malware sandbox using real IoT devices Jia Xiong, Tatsuya Tamai, Kazuki Tamiya (Yokohama National Univ.), Satoshi Hara (Yokohama National Univ./Fujisoft), Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2018-69 |
In spite of their increasing importance in the battle against evolving IoT threats, construction of IoT malware sandboxe... [more] |
ICSS2018-69 pp.7-12 |
ICSS, IPSJ-SPT |
2019-03-07 14:45 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Discrimination of IoT devices by clustering their responses to network scan Takuya Hoizumi, Shin Nishida, Keisuke Uchida, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
[more] |
|
ICSS, IPSJ-SPT |
2019-03-07 15:50 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
An experiment design of security notification to users of IoT devices through dedicated client software Shin Nishida, Takuya Hoizumi, Keisuke Uchida, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2018-75 |
Notification of vulnerability and malware infection of IoT devices to the stakeholders is becoming increasingly importan... [more] |
ICSS2018-75 pp.41-46 |