Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS |
2024-03-14 13:40 |
Okinawa |
Okinawa Pref Danjyo-Kyoudou-Sankaku Center (Primary: On-site, Secondary: Online) |
LOIS2023-64 |
Targeted attacks on specific organizations have become a significant issue due to their sophistication and the extensive... [more] |
LOIS2023-64 pp.96-101 |
SIS |
2023-03-02 13:30 |
Chiba |
Chiba Institute of Technology (Primary: On-site, Secondary: Online) |
An image watermarking method using adversarial perturbations Sei Takano, Mitsuji Muneyasu, Soh Yoshida (Kansai Univ.) SIS2022-43 |
The performance of convolutional neural networks (CNNs) has been dramatically improved in recent years, and they have at... [more] |
SIS2022-43 pp.15-20 |
ICSS, IPSJ-SPT |
2022-03-08 15:30 |
Online |
Online |
Verifying concept of personalized malware by investigating end-user environments Daigo Ichikawa, Rui Tanabe, XU Haoyuan, Yoshioka Katsunari, Matsumoto Tsutomu (YNU) ICSS2021-83 |
Personalized malware conducts malicious activities only when it is running on the target environment. Previous studies h... [more] |
ICSS2021-83 pp.147-152 |
ICSS, IPSJ-SPT |
2021-03-01 11:30 |
Online |
Online |
Method of Similarity Evaluation among Incidents for Multi-Located Network Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-31 |
In an organization computer network which consists of multiple sites, there are differences in security strength between... [more] |
ICSS2020-31 pp.31-36 |
ICSS, IPSJ-SPT |
2021-03-01 11:55 |
Online |
Online |
Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-32 |
Recent sophisticated targeted attacks make it difficult for us to protect our corporate resources perfectly. Therefore, ... [more] |
ICSS2020-32 pp.37-42 |
ICSS, IPSJ-SPT |
2021-03-02 10:25 |
Online |
Online |
Proof of concept of sandbox evasion attack using email address stored in target machine Yuta Inoue, Rui Tanabe (YNU), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-57 |
In recent years, malware sandbox appliances that dynamically analyze target files are becoming popular. However, malware... [more] |
ICSS2020-57 pp.184-189 |
ICSS |
2020-11-26 15:00 |
Online |
Online |
Initial Study of Incident Response Support System for Multi-Located Network Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Naoya Univ.), Hiroki Takakura (NII) ICSS2020-22 |
In the organization network which are consisted multi-sites, there are differences in security strength between the head... [more] |
ICSS2020-22 pp.17-20 |
ICSS |
2020-11-26 15:25 |
Online |
Online |
Initial Study of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-23 |
Recently, cyber attacks become more sophisticated and cause serious damage.
Especially in targeted attacks, it is diffi... [more] |
ICSS2020-23 pp.21-25 |
CS, IN, NS, NV (Joint) |
2020-09-11 09:25 |
Online |
Online |
A virtual-network replacing scheme for achieving a metabolic network Yu Tamura, Yuta Miyaoka, Junichi Murayama (Tokai Univ.) IN2020-24 |
A future targeted attacks would infect a network with a malware program and then tampers packet-forwarding routes. As a ... [more] |
IN2020-24 pp.13-18 |
CS, IN, NS, NV (Joint) |
2020-09-11 09:50 |
Online |
Online |
An edge-router replacing scheme for achieving a metabolic network Yuta Miyaoka, Yu Tamura, Junichi Murayama (Tokai Univ.) IN2020-25 |
A future cyber attack would tampers packet-forwarding routes of a target network using malware programs. As a solution a... [more] |
IN2020-25 pp.19-24 |
NS, IN (Joint) |
2020-03-05 11:00 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
An inheritance scheme of dynamic routing information for achieving successive replacing of virtual routers Yu Tamura, Yuta Miyaoka, Junichi Murayama (Tokai Univ.) IN2019-93 |
In future targeted attacks, malware programs infected in routers may cause various problems. Thus, we have proposed a sc... [more] |
IN2019-93 pp.103-108 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 16:00 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
[Invited Talk]
Trends and Countermeasures of Cyber Attacks
-- Introduction to Cyber Security for Network Engineers -- Yukiko Yano (NEC) CQ2019-93 |
In recent years, cyber attacks have spreading, information leaks such as confidential information of public institutions... [more] |
CQ2019-93 p.27 |
NS, IN, CS, NV (Joint) |
2019-09-06 11:15 |
Miyagi |
Research Institute of Electrical Communication, Tohoku Univ. |
A Study on Features Derived from Cache Property for DNS Tunneling Detection Naotake Ishikura, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2019-93 |
A lot of enterprises are under threat of targeted attacks causing data exfiltration, and as a means of performing the at... [more] |
NS2019-93 pp.25-30 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 10:20 |
Kochi |
Kochi University of Technology |
An Approach to Attack Scenario Generation for Simulation of Targeted Attacks Yusuke Takahashi, Shigeyoshi Shima, Atsunori Naito (NEC), Rui Tanabe, Katsunari Yoshioka (YNU) ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16 |
Cyber exercise is implemented by security organizations for the purpose of development of human re-sources against targe... [more] |
ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16 pp.7-14 |
AI |
2019-07-22 16:30 |
Hokkaido |
|
Modeling of Cyber Attack Based on POMDP Kazuma Igami, Hirofumi Yamaki (Tokyo Denki Univ.) AI2019-15 |
APTs(Advanced Persistent Threats), which are a type of cyber-attack, are a major threat to information systems because t... [more] |
AI2019-15 pp.77-82 |
ICSS |
2018-11-21 16:05 |
Kagoshima |
|
[Invited Talk]
Security Countermeasure at ShowNet in Interop Tokyo 2018 Kenichiro Hashimoto (Lastline), Masato Jingu (NICT), Takashi Tomine (lepidum) ICSS2018-59 |
Cyber attacks become emerging threats on the Internet.We held an exhibition in ICT called Interop Tokyo every June. In t... [more] |
ICSS2018-59 p.37 |
ICSS, IPSJ-SPT |
2018-03-07 15:40 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
A Preliminary Study on Defining Malignant Activity by Linking in-System Elements Takuya Koike (IISEC), Miyuu Okubo (IRI), Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2017-60 |
In recent years, cyber-attacks have become large-scale and complicated, and the impact on society continues to become in... [more] |
ICSS2017-60 pp.55-60 |
ICSS, IPSJ-SPT |
2018-03-08 11:10 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Classification for Important Decoy Documents Based on Supervised Learning Yao Xiao, Shuta Morishima (Yokohama National Univ.), Tsuyufumi Watanabe (Yokohama National Univ./Fujisoft), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2017-72 |
In recent targeted e-mail attacks, attackers often send their target organization an email with a malware disguised as a... [more] |
ICSS2017-72 pp.127-132 |
NS, IN (Joint) |
2018-03-01 09:20 |
Miyazaki |
Phoenix Seagaia Resort |
A distributed security gateway scheme for preventing advanced targeted attacks by cooperated multiple hosts Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-90 |
Recently, cyber attacks that targeting enterprises become serious.The majority of the damage is information leakage.As a... [more] |
IN2017-90 pp.5-10 |
RCS, IN, NV (Joint) |
2017-05-12 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Distributive Analyzing Scheme of Host Operation for Blocking Information Leakage from an Intranet Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-5 |
Recently, damage by targeted attacks is getting worse. These attacks leak corporate information. For preventing such lea... [more] |
IN2017-5 pp.21-24 |