IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 36 of 36 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
KBSE 2015-01-26
14:40
Tokyo Kikai-Shinko-Kaikan Bldg. An Investigation of a Reverse Engineering Method for Verifying Source Code with a Use Case Model -- A Case of an ASP.NET Application --
Shinpei Ogata (Shinshu Univ.), Yoshitaka Aoki (SIT), Satoshi Yazawa (VR), Saeko Matsuura (SIT) KBSE2014-42
Traceability between a requirements specification and source code should be kept but it’s difficult. Verifying that the ... [more] KBSE2014-42
pp.19-24
SS 2014-03-11
15:45
Okinawa Tenbusu Naha Facilitate Defect Removal Using Static Analysis Tools by introducing competition
Satoshi Arai (Waseda Univ.), Kazunori Sakamoto (NII), Hironori Washizaki, Yoshiaki Fukazawa (Waseda Univ.) SS2013-81
(To be available after the conference date) [more] SS2013-81
pp.55-60
KBSE 2014-03-07
12:35
Okinawa Okinawaken-Seinenkaikan An Android Application Analysis Method for Highlighting Disclosure of Fine-Grained User Information
Takuya Sakashita, Shinpei Ogata, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Univ.) KBSE2013-93
We have proposed a static analysis method of android application to highlight the user information disclosed by the appl... [more] KBSE2013-93
pp.85-90
SS, IPSJ-SE 2013-10-24
13:50
Ishikawa   A representation of relationships between functions and variables in source code
Yamato Takahashi, Kazuya Fukuhara, Toshimitsu Inomata, Yoshikazu Arai, Shintaro Imai (Iwate Prefectural Univ.) SS2013-40
In development of embedded software, the quality of software is very important.

A code review is performed in order ... [more]
SS2013-40
pp.49-54
SS, KBSE 2013-07-26
10:00
Hokkaido   [Encouragement Talk] A preliminary evaluation of C-Helper, a tool for C beginners
Kota Uchida, Katsuhiko Gondow (Tokyo Inst. of Tech.) SS2013-24 KBSE2013-24
(To be available after the conference date) [more] SS2013-24 KBSE2013-24
pp.67-72
MSS, SS 2013-03-06
16:40
Fukuoka Shikanoshima Towards detection of automatically undetectable violations focused on the locality of coding standards violations
Yasunari Takai (Nagoya Univ.), Takashi Kobayashi (Tokyo Inst. of Tech./Nagoya Univ.), Noritoshi Atsumi (Nagoya Univ.), Shinichiro Yamamoto (Aichi Pref. Univ.), Kiyoshi Agusa (Kyoto Univ.) MSS2012-68 SS2012-68
In the field of software development, developers use coding standards. They are rules which should be obeyed in coding. ... [more] MSS2012-68 SS2012-68
pp.51-56
ICSS, IA 2012-06-22
09:50
Tokyo Room 1206, 1st bldg, Takanawa Campus, Tokai University A High-Speed Classification Method based on Opcode of Malware
Yang Zong, Hirofumi Yamaki, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) IA2012-8 ICSS2012-8
Malicious software in form of Internet worms, computer viruses, and trojan horses poses a major threat to the security o... [more] IA2012-8 ICSS2012-8
pp.43-48
SS, MSS 2012-01-26
14:15
Kochi Kochi City Culture-Plaza Cul-Port Automatic Generation of Non-linear Loop Invariants for Programs with Function Calls
Eiichi Suzuki, Toshiki Sakabe, Masahiko Sakai, Keiichirou Kusakari, Naoki Nishida (Nagoya Univ.) MSS2011-61 SS2011-46
Finding loop invariants is one of the most important tasks in program verification. It is, however, difficult to automat... [more] MSS2011-61 SS2011-46
pp.39-44
SS 2011-07-01
11:30
Overseas Korea Univ. (Seoul) Preliminary Assessment of Software Metrics based on Coding Standards Violations
Yasunari Takai, Takashi Kobayashi, Kiyoshi Agusa (Nagoya Univ.) SS2011-12
Software metrics is one of promise technique to capture the size and quality of products, development process in order t... [more] SS2011-12
pp.63-67
IA, ICSS 2011-06-17
13:00
Fukuoka Kyushu Institute of Technology Detecting Original Entry Point based on Comparing Runtime Library Codes in Malware Unpacking
Kazuki Iwamoto, Katsumi Wasaki (Shinshu Univ.) IA2011-10 ICSS2011-10
Almost malwares are compressed or encrypted by packer.
So we can't analyse them directly.
Several methods to extract a... [more]
IA2011-10 ICSS2011-10
pp.57-62
IA, ICSS 2009-06-19
13:50
Tokyo Kikai-Shinko-Kaikan Bldg Study on Classification of Malware and it Applications
Soma Katsute (Kobe Univ.), Kouki Yasumoto (NEC), Ryoichi Isawa (Kobe Univ./CRYPTO), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-19 ICSS2009-27
Recently, the increasing and spreading of the malwares become a big problem. Most of the malwares are subspieces and pa... [more] IA2009-19 ICSS2009-27
pp.103-108
SS 2008-07-31
15:45
Hokkaido Future University-Hakodate Refinement of Transactional Functions Extraction Based on Screen Transitions and Database Accessses
Takuto Edagawa, Teruhiko Akaike, Yoshiki Higo, Shinji Kusumoto (Osaka Univ.) SS2008-17
Function Point(FP) is one of the software size metrics and counts the amount of functionalitywhich information system pr... [more] SS2008-17
pp.25-30
ISEC 2007-12-19
17:00
Tokyo Kikai-Shinko-Kaikan Bldg. Classification and feature extraction by using computer virus static analysis
Kazuki Iwamoto (JCSR), Katsumi Wasaki (Shinshu Univ.) ISEC2007-127
About the variant judgment of the computer virus, we consider the method of classification and feature extraction based ... [more] ISEC2007-127
pp.107-113
SS, KBSE 2006-10-26
13:15
Ehime Ehime University Detecting Web Application Vulnerabilities with Static Analysis
Seikoh Nishita (Takushoku Univ.)
This paper describes a technique for detecting vulnerability of Web applications such as SQL injection and cross-site sc... [more] SS2006-40 KBSE2006-16
pp.1-6
SS 2005-12-19
15:15
Kochi Kochi Women's University Obfuscating Cipher Programs against Primary Attacking Tasks
Hiroki Yamauchi, Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto (NAIST)
In this paper, we propose a cracker-centric approach to give a realistic guideline for applying software obfuscation met... [more] SS2005-59
pp.25-30
SS 2005-06-24
09:00
Nagano Shinshu Univ. Ohta-Kokusai-Kinenkan A Static Analysis using Tree Automata for XML Access Control
Isao Yagi, Yoshiaki Takata, Hiroyuki Seki (NAIST)
Recently, an access control for XML database is one of the key issues in
database security. Given an access control po... [more]
SS2005-18
pp.1-6
 Results 21 - 36 of 36 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan