Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
KBSE |
2015-01-26 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Investigation of a Reverse Engineering Method for Verifying Source Code with a Use Case Model
-- A Case of an ASP.NET Application -- Shinpei Ogata (Shinshu Univ.), Yoshitaka Aoki (SIT), Satoshi Yazawa (VR), Saeko Matsuura (SIT) KBSE2014-42 |
Traceability between a requirements specification and source code should be kept but it’s difficult. Verifying that the ... [more] |
KBSE2014-42 pp.19-24 |
SS |
2014-03-11 15:45 |
Okinawa |
Tenbusu Naha |
Facilitate Defect Removal Using Static Analysis Tools by introducing competition Satoshi Arai (Waseda Univ.), Kazunori Sakamoto (NII), Hironori Washizaki, Yoshiaki Fukazawa (Waseda Univ.) SS2013-81 |
(To be available after the conference date) [more] |
SS2013-81 pp.55-60 |
KBSE |
2014-03-07 12:35 |
Okinawa |
Okinawaken-Seinenkaikan |
An Android Application Analysis Method for Highlighting Disclosure of Fine-Grained User Information Takuya Sakashita, Shinpei Ogata, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Univ.) KBSE2013-93 |
We have proposed a static analysis method of android application to highlight the user information disclosed by the appl... [more] |
KBSE2013-93 pp.85-90 |
SS, IPSJ-SE |
2013-10-24 13:50 |
Ishikawa |
|
A representation of relationships between functions and variables in source code Yamato Takahashi, Kazuya Fukuhara, Toshimitsu Inomata, Yoshikazu Arai, Shintaro Imai (Iwate Prefectural Univ.) SS2013-40 |
In development of embedded software, the quality of software is very important.
A code review is performed in order ... [more] |
SS2013-40 pp.49-54 |
SS, KBSE |
2013-07-26 10:00 |
Hokkaido |
|
[Encouragement Talk]
A preliminary evaluation of C-Helper, a tool for C beginners Kota Uchida, Katsuhiko Gondow (Tokyo Inst. of Tech.) SS2013-24 KBSE2013-24 |
(To be available after the conference date) [more] |
SS2013-24 KBSE2013-24 pp.67-72 |
MSS, SS |
2013-03-06 16:40 |
Fukuoka |
Shikanoshima |
Towards detection of automatically undetectable violations focused on the locality of coding standards violations Yasunari Takai (Nagoya Univ.), Takashi Kobayashi (Tokyo Inst. of Tech./Nagoya Univ.), Noritoshi Atsumi (Nagoya Univ.), Shinichiro Yamamoto (Aichi Pref. Univ.), Kiyoshi Agusa (Kyoto Univ.) MSS2012-68 SS2012-68 |
In the field of software development, developers use coding standards. They are rules which should be obeyed in coding. ... [more] |
MSS2012-68 SS2012-68 pp.51-56 |
ICSS, IA |
2012-06-22 09:50 |
Tokyo |
Room 1206, 1st bldg, Takanawa Campus, Tokai University |
A High-Speed Classification Method based on Opcode of Malware Yang Zong, Hirofumi Yamaki, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) IA2012-8 ICSS2012-8 |
Malicious software in form of Internet worms, computer viruses, and trojan horses poses a major threat to the security o... [more] |
IA2012-8 ICSS2012-8 pp.43-48 |
SS, MSS |
2012-01-26 14:15 |
Kochi |
Kochi City Culture-Plaza Cul-Port |
Automatic Generation of Non-linear Loop Invariants for Programs with Function Calls Eiichi Suzuki, Toshiki Sakabe, Masahiko Sakai, Keiichirou Kusakari, Naoki Nishida (Nagoya Univ.) MSS2011-61 SS2011-46 |
Finding loop invariants is one of the most important tasks in program verification. It is, however, difficult to automat... [more] |
MSS2011-61 SS2011-46 pp.39-44 |
SS |
2011-07-01 11:30 |
Overseas |
Korea Univ. (Seoul) |
Preliminary Assessment of Software Metrics based on Coding Standards Violations Yasunari Takai, Takashi Kobayashi, Kiyoshi Agusa (Nagoya Univ.) SS2011-12 |
Software metrics is one of promise technique to capture the size and quality of products, development process in order t... [more] |
SS2011-12 pp.63-67 |
IA, ICSS |
2011-06-17 13:00 |
Fukuoka |
Kyushu Institute of Technology |
Detecting Original Entry Point based on Comparing Runtime Library Codes in Malware Unpacking Kazuki Iwamoto, Katsumi Wasaki (Shinshu Univ.) IA2011-10 ICSS2011-10 |
Almost malwares are compressed or encrypted by packer.
So we can't analyse them directly.
Several methods to extract a... [more] |
IA2011-10 ICSS2011-10 pp.57-62 |
IA, ICSS |
2009-06-19 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Study on Classification of Malware and it Applications Soma Katsute (Kobe Univ.), Kouki Yasumoto (NEC), Ryoichi Isawa (Kobe Univ./CRYPTO), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-19 ICSS2009-27 |
Recently, the increasing and spreading of the malwares become a big problem. Most of the malwares are subspieces and pa... [more] |
IA2009-19 ICSS2009-27 pp.103-108 |
SS |
2008-07-31 15:45 |
Hokkaido |
Future University-Hakodate |
Refinement of Transactional Functions Extraction Based on Screen Transitions and Database Accessses Takuto Edagawa, Teruhiko Akaike, Yoshiki Higo, Shinji Kusumoto (Osaka Univ.) SS2008-17 |
Function Point(FP) is one of the software size metrics and counts the amount of functionalitywhich information system pr... [more] |
SS2008-17 pp.25-30 |
ISEC |
2007-12-19 17:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Classification and feature extraction by using computer virus static analysis Kazuki Iwamoto (JCSR), Katsumi Wasaki (Shinshu Univ.) ISEC2007-127 |
About the variant judgment of the computer virus, we consider the method of classification and feature extraction based ... [more] |
ISEC2007-127 pp.107-113 |
SS, KBSE |
2006-10-26 13:15 |
Ehime |
Ehime University |
Detecting Web Application Vulnerabilities with Static Analysis Seikoh Nishita (Takushoku Univ.) |
This paper describes a technique for detecting vulnerability of Web applications such as SQL injection and cross-site sc... [more] |
SS2006-40 KBSE2006-16 pp.1-6 |
SS |
2005-12-19 15:15 |
Kochi |
Kochi Women's University |
Obfuscating Cipher Programs against Primary Attacking Tasks Hiroki Yamauchi, Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto (NAIST) |
In this paper, we propose a cracker-centric approach to give a realistic guideline for applying software obfuscation met... [more] |
SS2005-59 pp.25-30 |
SS |
2005-06-24 09:00 |
Nagano |
Shinshu Univ. Ohta-Kokusai-Kinenkan |
A Static Analysis using Tree Automata for XML Access Control Isao Yagi, Yoshiaki Takata, Hiroyuki Seki (NAIST) |
Recently, an access control for XML database is one of the key issues in
database security. Given an access control po... [more] |
SS2005-18 pp.1-6 |