Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, ICSS |
2011-06-17 13:50 |
Fukuoka |
Kyushu Institute of Technology |
DenseShip: Virtual Machine Monitor Specialized for Server-Type Honeypot Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT) IA2011-11 ICSS2011-11 |
(To be available after the conference date) [more] |
IA2011-11 ICSS2011-11 pp.63-68 |
IA, ICSS |
2011-06-17 15:00 |
Fukuoka |
Kyushu Institute of Technology |
Analysis of Website Infections using Malware Takeshi Yagi, Shinta Nakayama, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Mitsutaka Itoh (NTT) IA2011-13 ICSS2011-13 |
This paper reports the actual situation of website infections using malware. Recently, with the widespread of the web, m... [more] |
IA2011-13 ICSS2011-13 pp.75-80 |
ICSS |
2011-03-25 15:10 |
Tokyo |
Suspended |
Automatic Unpacking Based on Entropy of Memory-Access Values Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.) ICSS2010-63 |
Malware executables are often obfuscated with encryption or compression using a technique known as packing, thus perform... [more] |
ICSS2010-63 pp.41-46 |
IN, MoNA (Joint) |
2010-11-18 14:50 |
Fukuoka |
Fukuoka Institute of Technology |
Architecture Design of Web Phantom: Hybrid Web Honeypot Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT) IN2010-85 |
This paper proposes a hybrid web honeypot, namely Web Phantom, which generates a blacklist to prevent malware infection ... [more] |
IN2010-85 pp.25-30 |
ICSS |
2010-11-05 16:00 |
Hiroshima |
Hiroshima City University |
Determining granularity of URL filtering based on tree structure of malicious website URL Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh (NTT) ICSS2010-53 |
A network administrator takes a measure based on the blacklist to prevent end users from accessing unwanted malicious we... [more] |
ICSS2010-53 pp.53-58 |
IN |
2010-07-08 15:25 |
Hokkaido |
Hokkaido Univ. |
Investigation and Evaluation of Attack Monitoring Methods Using Web Honeypots Takeshi Yagi (NTT Corp.), Alberto Chan (Univ. of British Columbia), Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IN2010-29 |
[more] |
IN2010-29 pp.37-42 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 13:25 |
Aomori |
Hirosaki University |
Evaluating Destination Hosts of Malware Based on Search Engine Results Kazufumi Aoki, Mitsuaki Akiyama, Makoto Iwamura, Mitsutaka Itoh (NTT) ISEC2010-18 SITE2010-14 ICSS2010-24 |
Malware dynamic analysis using isolated environment couldn't obtain enough results because existing malwares (e.g., Bots... [more] |
ISEC2010-18 SITE2010-14 ICSS2010-24 pp.75-80 |
IA, ICSS |
2010-06-17 13:55 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Automatic OEP Finding Method for Malware Unpacking Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT) IA2010-3 ICSS2010-3 |
Malware analysts have to first extract hidden original code from a packed executable to analyze malware functionalities,... [more] |
IA2010-3 ICSS2010-3 pp.13-18 |
IA, ICSS |
2010-06-17 14:20 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
How to Identify Code Region after Detecting Entry Point of Malware Makoto Iwamura, Mitsutaka Itoh (NTT/Waseda Univ.), Yoichi Muraoka (Waseda Univ.) IA2010-4 ICSS2010-4 |
The goal of many existing methods for unpacking was finding OEP (Original Entry Point), not identifying where the origin... [more] |
IA2010-4 ICSS2010-4 pp.19-24 |
IA, ICSS |
2010-06-18 13:55 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
An Empirical Investigation of Gumblar Evolution Mitsuaki Akiyama, Kazumichi Sato, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.) IA2010-13 ICSS2010-13 |
Due to incidents of web-based malware infection lead by a tampered web content, called Gumblar, clarification of
the ac... [more] |
IA2010-13 ICSS2010-13 pp.69-74 |
IA, ICSS |
2010-06-18 14:20 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A Life-cycle Monitoring Method of Malware Download Sites for Websites Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IA2010-14 ICSS2010-14 |
This paper proposes a method to monitor life-cycle of malware download sites for websites and reports the actual life-cy... [more] |
IA2010-14 ICSS2010-14 pp.75-80 |
ICSS |
2010-03-26 15:30 |
Fukuoka |
The University of Kitakyushu |
Investigation of Attacks to Websites using Multi-domain Web-based Honeypots Naoto Tanimoto, Takeshi Yagi, Takeo Hariu, Mitsutaka Itoh (NTT Corporation) ICSS2009-66 |
Recently, a large number of websites are under attacks from attackers. Many compromised websites are used by attackers a... [more] |
ICSS2009-66 pp.25-28 |
NS, IN (Joint) |
2010-03-05 11:40 |
Miyazaki |
Miyazaki Phoenix Seagaia Resort (Miyazaki) |
A Scheme of Detecting Malware for Websites Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IN2009-200 |
This paper reports the actual situation of malware distributed to websites by constructing web honeypots, which carries ... [more] |
IN2009-200 pp.337-342 |
IN |
2009-07-10 11:25 |
Hokkaido |
HOKKAIDO UNIVERSITY |
A Provider Provisioned Websites Protection Scheme against Malware Distribution Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) IN2009-34 |
This paper proposes a website protection scheme for service providers by analyzing accesses to web honeynets, which carr... [more] |
IN2009-34 pp.55-60 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 13:25 |
Akita |
Akita University |
Investigation about Malware Distribution to Websites Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) ISEC2009-32 SITE2009-24 ICSS2009-46 |
This paper reports the actual situation of malware distribution to websites by constructing web honeynets, which carries... [more] |
ISEC2009-32 SITE2009-24 ICSS2009-46 pp.175-180 |
ICSS |
2009-05-15 15:10 |
Hyogo |
Kobe University |
Investigation of Spam Mail Driven Web-Based Passive Attack Yuhei Kawakoya, Mitsuaki Akiyama, Kazufumi Aoki, Mitsutaka Itoh (NTT), Hiroki Takakura (Kyoto Univ) ICSS2009-5 |
In recent years, the number of web-based passive attacks which are driven by URLs included in spam mail is increasing. B... [more] |
ICSS2009-5 pp.21-26 |
ISEC |
2007-12-19 17:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Evaluation of a Detection System against Fuzzing Attacks on the SIP Protocol Masaya Ozawa (Chuo Univ.), Eric Y. Chen, Mitsutaka Itoh (NTT PF Lab.), Mitsutoshi Hatori (Chuo Univ.) ISEC2007-128 |
As the number of VoIP users grows rapidly in recent years, the available attack vectors against VoIP systems also increa... [more] |
ISEC2007-128 pp.115-121 |