Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-14 09:30 |
Osaka |
Osaka Univ. (Suita Campus) |
A Study on Malicious Communication Detection Using Attack Characteristics of Malware on an Internal Network. Ken Aono, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95 |
Recently, targeted attacks have been increasing.
Malicious attackers use malware to gain access to the organization's ... [more] |
IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95 pp.249-253 |
ICSS, IPSJ-SPT |
2022-03-08 14:20 |
Online |
Online |
Behavior Analysis of IoT Malware Using Function Call Sequence Graphs and Clustering Satoshi Takada, Tianxiang He (Kyushu Univ), Chansu Han, Akira Tanaka (NICT), Jun'ichi Takeuchi (Kyushu Univ) ICSS2021-77 |
Most IoT Malware is variants generated by editing and reusing a part of the functions based on publicly available source... [more] |
ICSS2021-77 pp.111-116 |
ICSS |
2018-11-22 14:20 |
Kagoshima |
|
Part II: Calculating Similarity between IoT Malware over CPU Architectures Ryoichi Isawa, Tao Ban (NICT), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2018-66 |
At the ICSS workshop held in June, 2018, we proposed a method for calculating
similarity between IoT malware samples ov... [more] |
ICSS2018-66 pp.73-78 |
ICSS, IA |
2018-06-25 13:25 |
Ehime |
Ehime University |
Calculating Similarity between IoT Malware Samples over CPU Architectures Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) IA2018-2 ICSS2018-2 |
Malware samples infecting IoT (Internet of Things) devices such as Web cameras and
home routers have spread over the In... [more] |
IA2018-2 ICSS2018-2 pp.7-12 |
ICSS, IPSJ-SPT |
2018-03-08 09:20 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Considering Opcode-based Similarity between IoT Malware Samples Ryoichi Isawa, Tao Ban (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Daisuke Inoue (NICT) ICSS2017-69 |
In this paper, we generate a similarity matrix between IoT (Internet of Things) malware samples based on their disassemb... [more] |
ICSS2017-69 pp.109-114 |
ICSS, IPSJ-SPT |
2018-03-08 10:35 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
A Malware Detection Method by Machine Learning Focused on Malignant Activity Tadashi Shimomura, Nobuki Suetsugu, Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2017-71 |
In recent years, many researches on detection and classification of malware have been done. Among them, researches on te... [more] |
ICSS2017-71 pp.121-126 |
IA, ICSS |
2017-06-08 14:25 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
A First Trend Review of Runtime Packers for IoT Malware Ryoichi Isawa (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Tao Ban, Daisuke Inoue (NICT) IA2017-4 ICSS2017-4 |
Malicious software (malware) specimens that infect IoT (Internet of Things) devices rapidly increase. If those specimens... [more] |
IA2017-4 ICSS2017-4 pp.19-24 |
IA, ICSS |
2015-06-11 14:55 |
Fukuoka |
Kyushu Institute of Technology Univ. |
An Empirical Evaluation of Locating Cryptographic Functions on the Memory Ryoya Furukawa (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT) IA2015-4 ICSS2015-4 |
This paper presents a simple and effective idea to locate cryptographic functions on the memory for malware analysis.
... [more] |
IA2015-4 ICSS2015-4 pp.15-20 |
ICSS |
2015-03-04 13:40 |
Okinawa |
Meio Univiersity |
The Geographical Origin Estimation of Malware Using Language Information Masaru Kawakita, Shigeyoshi Shima (NEC) ICSS2014-88 |
Cyber attack using malware has become a social problem, it had an impact on the decision in the nation. In the conventio... [more] |
ICSS2014-88 pp.151-156 |
ICSS |
2013-11-12 15:10 |
Fukuoka |
Nishijin Plaza |
An OEP Identifying Method based on the Order of Opcodes Noriaki Nakamura, Masakatu Morii (Kobe Univ.), Ryoichi Isawa, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-59 |
To skip unpacking steps, automated generic unpacking methods are strongly required.Most of generic unpackers extract mem... [more] |
ICSS2013-59 pp.13-18 |
IA, ICSS |
2013-06-21 13:25 |
Niigata |
Ao-re Nagaoka |
Generic Unpacking Method Using Data Execution Prevention Ryoichi Isawa (NICT), Masaki Kamizono (NICT/SecureBrain Corporation), Daisuke Inoue (NICT) IA2013-13 ICSS2013-13 |
To skip unpacking steps, automated generic unpacking methods are strongly required. The basic idea of the generic unpack... [more] |
IA2013-13 ICSS2013-13 pp.73-78 |
ICSS |
2013-03-25 15:30 |
Kanagawa |
Yokohama National University |
[Invited Talk]
PRACTICE - Proactive Response Against Cyber-attacks Through International Collaborative Exchange Katsunari Yoshioka (Yokohama National Univ.) ICSS2012-66 |
Proactive Response Against Cyber Attacks Through International Collaborative Exchange (PRACTICE) project aims at develop... [more] |
ICSS2012-66 p.55 |
ICSS |
2012-11-22 13:15 |
Hiroshima |
Miyajima Mori-no-Yado |
Packer Identification Based on Binary Code of Malware Using Machine Learning Ryoichi Isawa, Tao Ban, Daisuke Inoue (NICT) ICSS2012-48 |
PEiD is a well-known packer identication tool. However, it often fails to identify a packer name of the target le beca... [more] |
ICSS2012-48 pp.19-24 |
IA, ICSS |
2009-06-19 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
* Akira Morikawa, Motomu Murakami, Yuko Ozasa, Soma Katsute (Kobe Univ.), Ryoichi Isawa (Kobe Univ./CRYPTO), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-20 ICSS2009-28 |
Recently, the malwares are widely spreaded and cause the serious problems.
For the countermeasure, the malware analysi... [more] |
IA2009-20 ICSS2009-28 pp.109-114 |
ICSS |
2009-05-15 14:45 |
Hyogo |
Kobe University |
Network Observation and Analysis Report on nicter Junji Nakazato, Kazuhiro Ohtaka (NICT), Jumpei Shimamura (For Schooner), Koji Nakao (NICT) ICSS2009-4 |
(To be available after the conference date) [more] |
ICSS2009-4 pp.15-20 |
DE, DC |
2006-10-17 14:15 |
Tokyo |
|
[Invited Talk]
nicter: An Incident Analysis System for the Global Internet using Correlation between Network Monitoring and Malware Analysis Koji Nakao, Katsunari Yoshioka, Masashi Eto, Daisuke Inoue, Kenji Rikitake (NICT) |
As network security incidents are being more complex and serious, activities of network monitoring, incident analysis an... [more] |
DE2006-123 DC2006-30 pp.25-30 |