IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 156  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2024-03-21
11:20
Okinawa OIST
(Primary: On-site, Secondary: Online)
Analyzing Attackers and Victims Actions via LockBit3.0 Website Data Dynamics
Yuji Sekine, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-70
LockBit3.0 is one of the top ransomware groups that has been active since July 2022, targeting over 1,000 companies. In ... [more] ICSS2023-70
pp.9-16
ICSS, IPSJ-SPT 2024-03-22
11:45
Okinawa OIST
(Primary: On-site, Secondary: Online)
Impact of ChatGPT Assisted Polymorphic Malware on Antivirus Detection
Huang Zhewei, Yinn Minn Pa pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-89
With the rapid implementation of large-scale language models (LLMs), there are concerns about their misuse in cyberattac... [more] ICSS2023-89
pp.145-152
RCC, ISEC, IT, WBS 2024-03-14
09:30
Osaka Osaka Univ. (Suita Campus) A Study on Malicious Communication Detection Using Attack Characteristics of Malware on an Internal Network.
Ken Aono, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95
Recently, targeted attacks have been increasing.
Malicious attackers use malware to gain access to the organization's ... [more]
IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95
pp.249-253
RCC, ISEC, IT, WBS 2024-03-14
09:55
Osaka Osaka Univ. (Suita Campus) Comparison of accuracy of classification methods using machine learning for imaged malware
Kenta Usui, Hiroki Tanioka, Masahiko Sano, Kenji Matsuura, Tetsushi Ueta (Tokushima Univ.) IT2023-114 ISEC2023-113 WBS2023-102 RCC2023-96
In recent years, the damage caused by malware has become more serious, and the increase in the number of variants of exi... [more] IT2023-114 ISEC2023-113 WBS2023-102 RCC2023-96
pp.254-258
RCC, ISEC, IT, WBS 2024-03-14
10:20
Osaka Osaka Univ. (Suita Campus) Improving classification accuracy of imaged malware through data expansion
Kaoru Yokobori, Hiroki Tanioka, Masahiko Sano, Kenji Matsuura, Tetsushi Ueta (Tokushima Univ.) IT2023-115 ISEC2023-114 WBS2023-103 RCC2023-97
Although malware-based attacks have existed for years,
malware infections increased in 2019 and 2020.
One of the reaso... [more]
IT2023-115 ISEC2023-114 WBS2023-103 RCC2023-97
pp.259-264
IA, SITE, IPSJ-IOT [detail] 2024-03-12
16:00
Okinawa Miyakojima City Future Creation Center
(Primary: On-site, Secondary: Online)
Improvement of Unknown Malicious Domain Detection Based on DNS Query History Analysis
Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech) SITE2023-83 IA2023-89
Network users are increasing and there is concern about the malware infection.
In some cases, malware-infected terminal... [more]
SITE2023-83 IA2023-89
pp.92-97
NS, IN
(Joint)
2024-03-01
13:50
Okinawa Okinawa Convention Center Evaluation experiment on a route server function for maintaining dynamic routes in metabolic routers
Yuya Suga, Hiroki Saruta, Rei Ishioka, Junichi Murayama (Tokai Univ.) IN2023-112
As a measure against malware infecting routers, we are studying metabolic routers. This router can delete even undetecta... [more] IN2023-112
pp.279-282
MIKA
(3rd)
2023-10-10
15:35
Okinawa Okinawa Jichikaikan
(Primary: On-site, Secondary: Online)
[Poster Presentation] Two-Stage Malware Detection Using Calling API Sequences
Kohei Tsunewaki, Tomotaka Kimura, Jun Cheng (Doshisha Univ.)
We propose a two-step malware detection method based on intrinsic features of calling API (Application Programming Inter... [more]
IA 2023-09-21
14:15
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
Studies on Malicious Domain Detection Method based on Feature of DNS Communication History by using DNS Traffic Analysis
Toshiki Koga, Daiki Nobayashi, Takeshi Ikenaga (KIT) IA2023-12
Malware on the Internet is causing increasing damage, and countermeasures are needed. In some cases, malware-infected te... [more] IA2023-12
pp.6-10
NS, IN, CS, NV
(Joint)
2023-09-07
14:30
Miyagi Tohoku University
(Primary: On-site, Secondary: Online)
[Encouragement Talk] Approximate modeling of malware propagation on wireless mobile devices
Hideyoshi Miura, Shoya Abukawa (Kansai Univ.), Tomotaka Kimura (Doshisha Univ.), Kouji Hirata (Kansai Univ.) NS2023-52
In this paper, we propose an approximate epidemic model representing the behavior of malware propagation on mobile devic... [more] NS2023-52
pp.7-12
RCS, IN, NV
(Joint)
2023-05-25
10:00
Kanagawa Keio University (Hiyoshi Campus), and online
(Primary: On-site, Secondary: Online)
Designing a suppressing scheme of spreading malware infection within a metabolic router
Rei Ishioka, Haruto Hirose, Junichi Murayama (Tokai Univ.) IN2023-1
As a countermeasure against malware infection on routers, we have been studying a metabolic-type router. Inside this rou... [more] IN2023-1
pp.1-4
ICSS, IPSJ-SPT 2023-03-14
13:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Assessment Method for Persistent Malware Infection on IoT Devices
Shunki Soeda, Takahiro Inoue, Rui Tanabe, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-78
Malware targeting IoT devices has become a growing threat in recent years. Some of them continue to infect devices perma... [more] ICSS2022-78
pp.181-186
IA 2022-11-21
16:20
Niigata Bandai Civic Hall (Niigata)
(Primary: On-site, Secondary: Online)
Outsourcing Malware Dynamic Analysis without Disclosing File Contents
Keisuke Hamajima, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2022-44
Malware dynamic analysis requires specialized skills. If there are no security experts in the organization and it is dif... [more] IA2022-44
pp.47-51
ICSS 2022-11-07
15:00
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
Observation of Attack Infrastructures by Scripts that Mimic C&C Communications of IoT Bots
Kaichi Sameshima, Yuki Endo, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2022-44
(To be available after the conference date) [more] ICSS2022-44
pp.37-42
ICSS 2022-11-07
15:25
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
Analysis of Environmental Sensitivity of Persistent IoT Malware using Sandboxes with File Systems from Various IoT Devices
Takahiro Inoue (YNU), Eizo Okada, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2022-45
(To be available after the conference date) [more] ICSS2022-45
pp.43-48
RISING
(3rd)
2022-10-31
14:00
Kyoto Kyoto Terrsa (Day 1), and Online (Day 2, 3) [Poster Presentation] Machine Learning Analyze for Undiscovered Malicious Domain Detection by using DNS Query Analysis
Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech)
Network users is increasing in recently and there is concern about the malware infection.
Malware exist various types a... [more]

R 2022-10-07
14:50
Fukuoka
(Primary: On-site, Secondary: Online)
A Note on A Transformer Encoder-Based Malware Classification Using API Calls
Chen Li (Kyutech), Junjun Zheng (Osaka Univ.) R2022-36
Malware is a major security threat to computer systems and significantly impacts system reliability. Recurrent neural ne... [more] R2022-36
pp.25-30
NS 2022-10-05
16:40
Hokkaido Hokkaidou University + Online
(Primary: On-site, Secondary: Online)
Modeling of malware diffusion with mobile devices in intermittently connected networks
Hideyoshi Miura, Syoya Abukawa (Kansai Univ.), Tomotaka Kimura (Doshisha Univ.), Kouji Hirata (Kansai Univ.) NS2022-86
In this paper, we introduce an epidemic model of malware with mobile devices in intermittently connected networks. In re... [more] NS2022-86
pp.24-28
IA, ICSS 2022-06-23
14:30
Nagasaki Univ. of Nagasaki
(Primary: On-site, Secondary: Online)
Discussion about improving a detection accuracy of malware variants using time series differences in latent representation.
Atsushi Shinoda, Hajime Shimada, Yukiko Yamaguti (Nagoya Univ.), Hirokazu Hasegawa (NII) IA2022-4 ICSS2022-4
Today, computers are used for various purposes to support people's daily lives. Therefore, the existence of malware that... [more] IA2022-4 ICSS2022-4
pp.19-24
IA, ICSS 2022-06-24
11:50
Nagasaki Univ. of Nagasaki
(Primary: On-site, Secondary: Online)
Studies on Blacklists based DNS Query Analysis for Malicious Domain Detection
Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (Kyutech) IA2022-14 ICSS2022-14
Malware infection of network users is one of the critical threats on the Internet. Users have a risk of being infected w... [more] IA2022-14 ICSS2022-14
pp.76-80
 Results 1 - 20 of 156  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan