IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 23  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS, IN
(Joint)
2024-03-01
13:25
Okinawa Okinawa Convention Center Evaluation and Analysis of Two Types of Attacks CPA and DDoS Targeting CDN caches
Jiaqi Liu, Noriaki Kamiyama (Ritsumeikan Univ) NS2023-221
The amount of Content Delivery traffic on the Internet has been increasing. The use of Internet technology is expanding.... [more] NS2023-221
pp.288-293
ICSS 2023-11-17
13:30
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Simulation of DNS cache poisoning attack detection method using DNS logs
Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyui Okazaki (Shinshu Univ.), Hikofumi Suzuki (NII) ICSS2023-64
DNS cache poisoning attacks exist as an attack that exploits the DNS cache function. Takahashi et al. proposed a method ... [more] ICSS2023-64
pp.93-100
IN, NS
(Joint)
2023-03-03
10:10
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
Impact Analysis of Attacker Location Count on Fake-Type Content Poisoning Attack in ICN
Takuto Kudo (Fukuoka Univ.), Noriaki Kamiyama (Ritsumeikan Univ.) IN2022-101
Information-centric networking (ICN) has been widely studied as a new network architecture for efficient content deliver... [more] IN2022-101
pp.211-216
NS, ICM, CQ, NV
(Joint)
2022-11-24
18:05
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Proposal of Kaminsky Attack Detection Method Using Blockchain Technology
Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (SU) NS2022-116
The Kaminsky attack is known as an efficient and successful method for DNS cache poisoning attacks. Takahashi et al. pro... [more] NS2022-116
pp.91-96
IA, CQ, MIKA
(Joint)
2022-09-15
17:50
Hokkaido Hokkaido Citizens Actives Center
(Primary: On-site, Secondary: Online)
A consideration of DoH-exclusive DNS architecture
Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2022-23
Conventional DNS communication uses non-encrypted UDP protocol so that DNS cache poisoning attacks and privacy leakage h... [more] IA2022-23
pp.50-53
CQ 2022-07-22
09:55
Osaka Ritsumeikan Ibaraki Future Plaza Conference Hall
(Primary: On-site, Secondary: Online)
Investigating Impact of Fake Type Content Poisoning Attack on ICN
Takuto Kudo (Fukuoka Univ.), Noriaki Kamiyama (Ritumeikan Univ.) CQ2022-23
Information-centric networking (ICN) has been widely studied as a new network architecture for efficient content delive... [more] CQ2022-23
pp.36-41
ICSS, IPSJ-SPT 2022-03-07
15:20
Online Online Evaluation of Detection System of DNS Cache Poisoning Using Blockchain Technology
Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) ICSS2021-65
DNS cache poisoning is an attack on DNS essential to use of Internet communications. Takahashi et al. proposed a detecti... [more] ICSS2021-65
pp.38-43
ICSS, IPSJ-SPT 2021-03-02
11:05
Online Online Study on analyzing Memcached DRDoS attacks and their infrastructures
Mizuki Kondo, Natsuo Shintani (YNU), Daisuke Makita (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-45
Internet-facing Memcached services are known to have been misused as powerful reflectors of DRDoS attacks. In this paper... [more] ICSS2020-45
pp.114-119
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] 2020-07-20
13:50
Online Online Side Channel Attack on CRT-RSA Using Sliding Window with Exponent Blinding
Soki Osawa, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2020-20 SITE2020-17 BioX2020-23 HWS2020-13 ICSS2020-7 EMM2020-17
This paper presents a side-channel attack on CRT-RSA. Some open-source cryptographic libraries (e.g.,
Libgcrypt) employ... [more]
ISEC2020-20 SITE2020-17 BioX2020-23 HWS2020-13 ICSS2020-7 EMM2020-17
pp.39-45
NS 2020-04-16
13:50
Online Online A Proposal of FQDN-based Whitelist Filter on DNS Cache Server against DNS Water Torture Attack
Keita Hasegawa, Daishi Kondo, Hideki Tode (OPU) NS2020-2
A Distributed Denial of Service (DDoS) attack is a major social issue, and as one of the DDoS incidents, a Domain Name S... [more] NS2020-2
pp.7-12
ISEC, SITE, LOIS 2019-11-02
10:50
Osaka Osaka Univ. Detection System of DNS Cache Poisoning Using Blockchain Technology
Tomohiro Takahashi, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (SU) ISEC2019-78 SITE2019-72 LOIS2019-37
Recently we enjoy the benefits of the Internet.
Internet is working by various network services.
The Domain Name Syst... [more]
ISEC2019-78 SITE2019-72 LOIS2019-37
pp.107-112
NS, IN, CS, NV
(Joint)
2019-09-06
11:15
Miyagi Research Institute of Electrical Communication, Tohoku Univ. A Study on Features Derived from Cache Property for DNS Tunneling Detection
Naotake Ishikura, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2019-93
A lot of enterprises are under threat of targeted attacks causing data exfiltration, and as a means of performing the at... [more] NS2019-93
pp.25-30
HWS, ICD 2018-10-29
16:00
Osaka Kobe Univ. Umeda Intelligent Laboratory Evaluation of Availability on Cache Leakage from OSS-RSA
Hayato Mori, Rei Ueno (Tohoku Univ.), Junko Takahashi (NTT), Yuichi Hayashi (naist), Naohumi Honma (Tohoku Univ.) HWS2018-53 ICD2018-45
In recent years, a new cache attack against RSA encryption using the time difference of operations, named SWL (SWL: Slid... [more] HWS2018-53 ICD2018-45
pp.35-40
NS 2016-01-21
14:15
Fukuoka   A Robust DNS cache against the cache poisoning attacks and its implementation
Daisuke Yuto, Yukiji yamauchi (OIT) NS2015-150
Numerous vulnerabilities have been found to the DNS systems and protocols especially since the method of “Kaminsky Attac... [more] NS2015-150
pp.23-27
MoNA, IN
(Joint)
2015-11-18
13:55
Kumamoto Kumamoto University A simple robust DNS cache against the cache poisoning attacks
Daisuke Yuto, Yukiji Yamauchi (OIT) IN2015-68
Numerous vulnerabilities have been found to the DNS systems and protocols especially since the method of “Kaminsky Attac... [more] IN2015-68
pp.41-45
IA, ICSS 2015-06-11
15:45
Fukuoka Kyushu Institute of Technology Univ. The Analysis of the CREAM vulnerability against OpenSSL
Jun Hasegawa, Yuhei Watanabe, Masakatu Morii (Kobe Univ.) IA2015-6 ICSS2015-6
In this paper we discuss vulnerability of "CREAM", which was originally created by Daniel J. Bernstein in 2005 and named... [more] IA2015-6 ICSS2015-6
pp.27-32
IA 2014-09-12
16:15
Tokyo Tokyo Tech Front [Invited Talk] DNS cache poisoning and its countermeasures
Kazunori Fujiwara, Yasuhiro Orange Morishita (JPRS) IA2014-20
Recently, DNS cache poisoning attack is being focused again.
Though it is derived from the basic structure of DNS,
it ... [more]
IA2014-20
pp.35-40
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
13:50
Aomori Hirosaki University Protection Mode Against Cache Attack (HYRAL)
Kouzou Hirata (LIS) ISEC2010-14 SITE2010-10 ICSS2010-20
It is known that the Prime+probe method of Dag Arne Osuik, Adi shamir, and Eran Tromer[1] is the most efficient methods ... [more] ISEC2010-14 SITE2010-10 ICSS2010-20
pp.27-33
IN 2010-06-04
11:40
Akita Akita ATORION Examination and problem for real operation of DNSSEC
Kenichiro Okamoto, Naoto Yamamoto, Futoshi Kubo, Masahiro Uraga (NTT WEST) IN2010-21
DNSSEC is a function of DNS and guarantees the validity of communication with DNS server. It was standardized in RFC in ... [more] IN2010-21
pp.57-61
IN 2009-07-09
15:15
Hokkaido HOKKAIDO UNIVERSITY [Invited Talk] Anomalous Traffic Observed in DNS
Keisuke Ishibashi, Tsuyoshi Toyono, Kazumichi Sato (NTT) IN2009-28
DNS is one onf the most critical infrastructure of the Internet, and used for most of Internet applications. On the othe... [more] IN2009-28
pp.19-24
 Results 1 - 20 of 23  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan