IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 8 of 8  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
SITE, ISEC, LOIS 2018-11-04
11:30
Fukuoka   A Machine Learning-based Method for Detecting Malicious JavaScript using Information based on Abstract Syntax Tree
Ryota Sano, Junko Sato, Yoichi Murakami, Masaki Hanada, Eiji Nunohiro (Tokyo Univ. of Information Sciences) ISEC2018-75 SITE2018-53 LOIS2018-35
The number of Drive-by-Download attacks, which can be infected with malware via websites, has recently been increased. S... [more] ISEC2018-75 SITE2018-53 LOIS2018-35
pp.63-68
CS 2017-07-27
09:39
Nagasaki Fukue Bunka Kaikan Obfuscated Malicious JavaScript Detection Scheme Using the Feature Based on Divided URL
Shoya Morishige, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-15
Recently, obfuscated malicious JavaScript codes which divide URL into segments to evade the pattern matching of anti-vir... [more] CS2017-15
pp.13-18
IA, ICSS 2015-06-12
10:50
Fukuoka Kyushu Institute of Technology Univ. Detecting Malicious Domain Names based on the Time-series Analysis of Attackers Network Resources
Daiki Chiba (NTT/Waseda Univ.), Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeshi Yada, Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-10 ICSS2015-10
Attackers launching cyber attacks frequently change their malicious websites to evade countermeasures such as blacklisti... [more] IA2015-10 ICSS2015-10
pp.51-56
ICSS 2015-03-03
16:40
Okinawa Meio Univiersity Implementation and evaluation of Drive by Download Attack detection using the features of the obfuscation
Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama (NAIST), Takuji Iimura (UT), Youki Kadobayashi (NAIST) ICSS2014-71
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in a browser or in browse... [more] ICSS2014-71
pp.49-54
ICSS 2014-11-28
10:45
Miyagi Tohoku Gakuin University (Tagajo Campus) A Study of Drive by Download Attack detection using the features of the obfuscation
Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama, Youki Kadobayashi (NAIST) ICSS2014-60
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in the browser or its plu... [more] ICSS2014-60
pp.55-60
ICSS 2014-11-28
11:10
Miyagi Tohoku Gakuin University (Tagajo Campus) searching malicious URL from vast webspace
Bo Sun (Waseda Univ.), Mitsuaki Akiyama, Takeshi Yagi (NTT), Tatsuya Mori (Waseda Univ.) ICSS2014-61
Many Web-based attacks such as Drive-by-download and phishing scam
are easily triggered by accessing landing page URL.... [more]
ICSS2014-61
pp.61-66
ICSS, IPSJ-SPT 2014-03-27
13:30
Okinawa Meio Univiersity Measuring Lifetime of Malicious Website Based on Redirection from Compromised Websites
Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT) ICSS2013-71
Attackers continuously generate URLs and FQDNs of malicious websites in order to circumvent security countermeasures
us... [more]
ICSS2013-71
pp.53-58
ICSS, IPSJ-SPT 2014-03-27
13:55
Okinawa Meio Univiersity An Investigation of Malicious JavaScript Code used in Drive-by Download
Yuta Takata, Mitsuaki Akiyama, Takeo Hariu (NTT) ICSS2013-72
Malicious website contains JavaScript code that exploits vulnerabilities in the browser or the browser's plugins.Researc... [more] ICSS2013-72
pp.59-64
 Results 1 - 8 of 8  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan