Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2017-11-21 10:55 |
Oita |
Beppu International Convention Center |
Subspecies Classification for Malwares based on Visualization of Dynamic Analysis result Taiki Gouda, Korehito Kashiki, Keisuke Furumoto, Masakatu Morii (Kobe Univ.) ICSS2017-45 |
Along with the activation of malware infection activity, the appearance frequency of new subspecies also tends to increa... [more] |
ICSS2017-45 pp.41-45 |
ICSS |
2017-11-21 11:20 |
Oita |
Beppu International Convention Center |
A Study on the structure and Its Classification Naoya Nitta, Masakatu Morii (Kobe Univ.) ICSS2017-46 |
[more] |
ICSS2017-46 pp.47-51 |
ICSS |
2017-11-21 14:00 |
Oita |
Beppu International Convention Center |
ICSS2017-50 |
[more] |
ICSS2017-50 pp.71-76 |
IT |
2017-09-08 15:50 |
Yamaguchi |
Centcore Yamaguchi Hotel |
Coded Caching for Hierarchical Networks with Different Number of Layers (II) Makoto Takita (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2017-49 |
Coded caching is a technique to reduce network loads.
Recent works have discussed single-layer caching systems, but ma... [more] |
IT2017-49 pp.61-66 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 14:15 |
Tokyo |
|
ISEC2017-20 SITE2017-12 ICSS2017-19 EMM2017-23 |
[more] |
ISEC2017-20 SITE2017-12 ICSS2017-19 EMM2017-23 pp.93-98 |
ICSS, IPSJ-SPT |
2017-03-13 13:25 |
Nagasaki |
University of Nagasaki |
Modeling of Attack Activity for Integrated Analysis of Threat Information Kenta Nomura, Daiki Ito (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-47 |
Cyber attacks targeting specific victims use multiple intrusion routes and various attack methods. In order to combat su... [more] |
ICSS2016-47 pp.7-12 |
ICSS, IPSJ-SPT |
2017-03-14 11:45 |
Nagasaki |
University of Nagasaki |
Representation for Attack Activity to Associate Threat Information Daiki Ito, Kenta Nomura (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-64 |
As sophisticated and complicated cyber attacks become a social problem, Threat Intelligence, in which new knowledge obta... [more] |
ICSS2016-64 pp.147-152 |
ICSS, IPSJ-SPT |
2017-03-14 10:55 |
Nagasaki |
University of Nagasaki |
A Vulnerability Analysis of Android Applications from the View of Framework Ryoya Furukawa, Tatsuya Nagai (Kobe Univ.), Hiroshi Kumagai, Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) |
[more] |
|
ICSS, IPSJ-SPT |
2017-03-14 11:20 |
Nagasaki |
University of Nagasaki |
Ransomware Detection Focused on Encryption Processing Shigeta Takanari, Morii Masakatu (Kobe Univ.), Hasegawa Tomohisa, Ikegami Masato, Ishikawa Teiichi (Canon IT Solutions) ICSS2016-67 |
[more] |
ICSS2016-67 pp.165-169 |
ISEC, WBS, IT |
2017-03-09 13:35 |
Tokyo |
TOKAI University |
On the Design of Locally Repairable Codes Based on Code Modification Hiroto Tamiya (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2016-106 ISEC2016-96 WBS2016-82 |
Locally repairable codes (LRCs) are a class of codes designed for the local correction of erasures.
Locality and Availa... [more] |
IT2016-106 ISEC2016-96 WBS2016-82 pp.49-53 |
ICSS |
2016-11-25 16:10 |
Kanagawa |
Institute of Information Security |
Performance of link-mining techniques to detect malicious websites Yasuhiro Takano, Daiki Ito, Tatsuya Nagai (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-44 |
Conventional techniques to avoid malicious websites techniques by referring URL's keywords reported in black lists have ... [more] |
ICSS2016-44 pp.31-35 |
IT |
2016-09-02 10:00 |
Saga |
New Heartpia |
On Error Correction Capability of Irregular LDPC Codes under the Bit-Flipping Decoding Algorithm Hiroto Tamiya (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2016-35 |
The error-correction capability of LDPC codes for iterative decoding algorithms have been investigated. However, it is d... [more] |
IT2016-35 pp.7-12 |
IT |
2016-07-28 15:50 |
Fukuoka |
Seminar House, Fukuoka Univ. |
[Invited Talk]
Coding theory and its application to new implementation Masakatu Morii (Kobe Univ.) IT2016-28 |
[more] |
IT2016-28 p.43 |
ICSS, IA |
2016-06-06 14:10 |
Saga |
Saga University |
Method to Locate Cryptographic Functions from Malware Ryoya Furukawa (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT) |
[more] |
|
ICSS, IA |
2016-06-06 16:05 |
Saga |
Saga University |
Kenta Nomura (Kobe Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) IA2016-5 ICSS2016-5 |
(To be available after the conference date) [more] |
IA2016-5 ICSS2016-5 pp.25-30 |
ICSS, IA |
2016-06-07 09:30 |
Saga |
Saga University |
Daiki Ito (Kobe Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) IA2016-7 ICSS2016-7 |
[more] |
IA2016-7 ICSS2016-7 pp.33-38 |
ICSS, IA |
2016-06-07 13:25 |
Saga |
Saga University |
Tatsuya Nagai (Kobe Univ.), Masaki Kamizono (PwC Cyber Services LLCPwC Cyber Services), Yoshiaki Shiraishi (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services LLCPwC Cyber Services), Masakatu Morii (Kobe Univ.) IA2016-12 ICSS2016-12 |
(To be available after the conference date) [more] |
IA2016-12 ICSS2016-12 pp.63-68 |
IT |
2015-09-04 09:25 |
Ishikawa |
Hakusan Shobutei |
On the Decoding Problem of Algebraic Codes over Symbol-Pair Read Channels Makoto Takita (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2015-35 |
In this paper, we discuss a decoding problem of algebraic codes over symbol-pair read channels.
The channels output ove... [more] |
IT2015-35 pp.7-12 |
IA, ICSS |
2015-06-11 14:55 |
Fukuoka |
Kyushu Institute of Technology Univ. |
An Empirical Evaluation of Locating Cryptographic Functions on the Memory Ryoya Furukawa (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT) IA2015-4 ICSS2015-4 |
This paper presents a simple and effective idea to locate cryptographic functions on the memory for malware analysis.
... [more] |
IA2015-4 ICSS2015-4 pp.15-20 |
IA, ICSS |
2015-06-11 15:45 |
Fukuoka |
Kyushu Institute of Technology Univ. |
The Analysis of the CREAM vulnerability against OpenSSL Jun Hasegawa, Yuhei Watanabe, Masakatu Morii (Kobe Univ.) IA2015-6 ICSS2015-6 |
In this paper we discuss vulnerability of "CREAM", which was originally created by Daniel J. Bernstein in 2005 and named... [more] |
IA2015-6 ICSS2015-6 pp.27-32 |