|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-22 10:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Study of keyword-based search method for IoT devices deployed at important facilities Mami Kawaguchi, Takayuki Sasaki, Kihara Momoka, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-86 |
IoT devices are increasingly deployed in various systems, including remote monitoring systems.Some of these IoT devices ... [more] |
ICSS2023-86 pp.123-128 |
ICSS, IPSJ-SPT |
2022-03-07 12:50 |
Online |
Online |
am I infected? A New Web Service to Inspect End Users' IoT Devices for Malware Infection and Vulnerabilities Songwei He, Takaya Noma, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2021-58 |
IoT devices have become prevalent in recent years, but unfortunately, many devices are infected by malware due to their ... [more] |
ICSS2021-58 pp.1-6 |
ICSS, IPSJ-SPT |
2022-03-07 13:50 |
Online |
Online |
Internet-wide discovery of IoT devices deployed at important facilities Mizuki Hiraku, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ) ICSS2021-61 |
Previous study has revealed that there are a number of IoT devices used at important facilities, such as water treatment... [more] |
ICSS2021-61 pp.14-19 |
IA, ICSS |
2021-06-22 09:50 |
Online |
Online |
Etherpot: A honeypot for observing cyberattacks on Ethereum client Wang Jia, Sasaki Takayuki (Yokohama National Univ.), Omote Kazumasa (Univ. of Tsukuba), Yoshioka Katsunari, Matsumoto Tsutomu (Yokohama National Univ.) IA2021-11 ICSS2021-11 |
In recent years, Ethereum has received a great deal of attention with the functionality to perform arbitrary programmabl... [more] |
IA2021-11 ICSS2021-11 pp.56-61 |
ICSS, IPSJ-SPT |
2021-03-01 14:30 |
Online |
Online |
Analyzing the Transition of Vulnerabilities Targeted by IoT Malware Kaichi Sameshima, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-40 |
While the popularity of IoT devices are rapidly growing, vulnerable IoT devices have been the target of cyber-attacks. I... [more] |
ICSS2020-40 pp.84-89 |
ICSS, IPSJ-SPT |
2021-03-01 14:55 |
Online |
Online |
Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41 |
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] |
ICSS2020-41 pp.90-95 |
HWS (2nd) |
2018-12-13 13:50 |
Tokyo |
Tokyo Univ. Takeda Bldg. Takeda Hall |
Research on security using trusted hardware Takayuki Sasaki (NEC) |
(Advance abstract in Japanese is available) [more] |
|
IN, ICTSSL, NWS (Joint) |
2016-10-20 17:00 |
Osaka |
Osaka Uinv. |
[Invited Talk]
Enhancing SDN Security Takayuki Sasaki (NEC) ICTSSL2016-26 IN2016-55 |
Software Defined Networking (SDN) has become one of the core building blocks of enterprise networks, and security of SDN... [more] |
ICTSSL2016-26 IN2016-55 pp.35-40(ICTSSL), pp.37-42(IN) |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|