Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, IN (Joint) |
2024-03-01 13:25 |
Okinawa |
Okinawa Convention Center |
Evaluation and Analysis of Two Types of Attacks CPA and DDoS Targeting CDN caches Jiaqi Liu, Noriaki Kamiyama (Ritsumeikan Univ) NS2023-221 |
The amount of Content Delivery traffic on the Internet has been increasing. The use of Internet technology is expanding.... [more] |
NS2023-221 pp.288-293 |
ICSS |
2023-11-17 13:30 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Simulation of DNS cache poisoning attack detection method using DNS logs Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyui Okazaki (Shinshu Univ.), Hikofumi Suzuki (NII) ICSS2023-64 |
DNS cache poisoning attacks exist as an attack that exploits the DNS cache function. Takahashi et al. proposed a method ... [more] |
ICSS2023-64 pp.93-100 |
IN, NS (Joint) |
2023-03-03 10:10 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Impact Analysis of Attacker Location Count on Fake-Type Content Poisoning Attack in ICN Takuto Kudo (Fukuoka Univ.), Noriaki Kamiyama (Ritsumeikan Univ.) IN2022-101 |
Information-centric networking (ICN) has been widely studied as a new network architecture for efficient content deliver... [more] |
IN2022-101 pp.211-216 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 18:05 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Proposal of Kaminsky Attack Detection Method Using Blockchain Technology Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (SU) NS2022-116 |
The Kaminsky attack is known as an efficient and successful method for DNS cache poisoning attacks. Takahashi et al. pro... [more] |
NS2022-116 pp.91-96 |
IA, CQ, MIKA (Joint) |
2022-09-15 17:50 |
Hokkaido |
Hokkaido Citizens Actives Center (Primary: On-site, Secondary: Online) |
A consideration of DoH-exclusive DNS architecture Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2022-23 |
Conventional DNS communication uses non-encrypted UDP protocol so that DNS cache poisoning attacks and privacy leakage h... [more] |
IA2022-23 pp.50-53 |
CQ |
2022-07-22 09:55 |
Osaka |
Ritsumeikan Ibaraki Future Plaza Conference Hall (Primary: On-site, Secondary: Online) |
Investigating Impact of Fake Type Content Poisoning Attack on ICN Takuto Kudo (Fukuoka Univ.), Noriaki Kamiyama (Ritumeikan Univ.) CQ2022-23 |
Information-centric networking (ICN) has been widely studied as a new network architecture for efficient content delive... [more] |
CQ2022-23 pp.36-41 |
ICSS, IPSJ-SPT |
2022-03-07 15:20 |
Online |
Online |
Evaluation of Detection System of DNS Cache Poisoning Using Blockchain Technology Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) ICSS2021-65 |
DNS cache poisoning is an attack on DNS essential to use of Internet communications. Takahashi et al. proposed a detecti... [more] |
ICSS2021-65 pp.38-43 |
ICSS, IPSJ-SPT |
2021-03-02 11:05 |
Online |
Online |
Study on analyzing Memcached DRDoS attacks and their infrastructures Mizuki Kondo, Natsuo Shintani (YNU), Daisuke Makita (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-45 |
Internet-facing Memcached services are known to have been misused as powerful reflectors of DRDoS attacks. In this paper... [more] |
ICSS2020-45 pp.114-119 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 13:50 |
Online |
Online |
Side Channel Attack on CRT-RSA Using Sliding Window with Exponent Blinding Soki Osawa, Rei Ueno, Naofumi Homma (Tohoku Univ.) ISEC2020-20 SITE2020-17 BioX2020-23 HWS2020-13 ICSS2020-7 EMM2020-17 |
This paper presents a side-channel attack on CRT-RSA. Some open-source cryptographic libraries (e.g.,
Libgcrypt) employ... [more] |
ISEC2020-20 SITE2020-17 BioX2020-23 HWS2020-13 ICSS2020-7 EMM2020-17 pp.39-45 |
NS |
2020-04-16 13:50 |
Online |
Online |
A Proposal of FQDN-based Whitelist Filter on DNS Cache Server against DNS Water Torture Attack Keita Hasegawa, Daishi Kondo, Hideki Tode (OPU) NS2020-2 |
A Distributed Denial of Service (DDoS) attack is a major social issue, and as one of the DDoS incidents, a Domain Name S... [more] |
NS2020-2 pp.7-12 |
ISEC, SITE, LOIS |
2019-11-02 10:50 |
Osaka |
Osaka Univ. |
Detection System of DNS Cache Poisoning Using Blockchain Technology Tomohiro Takahashi, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (SU) ISEC2019-78 SITE2019-72 LOIS2019-37 |
Recently we enjoy the benefits of the Internet.
Internet is working by various network services.
The Domain Name Syst... [more] |
ISEC2019-78 SITE2019-72 LOIS2019-37 pp.107-112 |
NS, IN, CS, NV (Joint) |
2019-09-06 11:15 |
Miyagi |
Research Institute of Electrical Communication, Tohoku Univ. |
A Study on Features Derived from Cache Property for DNS Tunneling Detection Naotake Ishikura, Daishi Kondo, Hideki Tode (Osaka Pref. Univ.) NS2019-93 |
A lot of enterprises are under threat of targeted attacks causing data exfiltration, and as a means of performing the at... [more] |
NS2019-93 pp.25-30 |
HWS, ICD |
2018-10-29 16:00 |
Osaka |
Kobe Univ. Umeda Intelligent Laboratory |
Evaluation of Availability on Cache Leakage from OSS-RSA Hayato Mori, Rei Ueno (Tohoku Univ.), Junko Takahashi (NTT), Yuichi Hayashi (naist), Naohumi Honma (Tohoku Univ.) HWS2018-53 ICD2018-45 |
In recent years, a new cache attack against RSA encryption using the time difference of operations, named SWL (SWL: Slid... [more] |
HWS2018-53 ICD2018-45 pp.35-40 |
NS |
2016-01-21 14:15 |
Fukuoka |
|
A Robust DNS cache against the cache poisoning attacks and its implementation Daisuke Yuto, Yukiji yamauchi (OIT) NS2015-150 |
Numerous vulnerabilities have been found to the DNS systems and protocols especially since the method of “Kaminsky Attac... [more] |
NS2015-150 pp.23-27 |
MoNA, IN (Joint) |
2015-11-18 13:55 |
Kumamoto |
Kumamoto University |
A simple robust DNS cache against the cache poisoning attacks Daisuke Yuto, Yukiji Yamauchi (OIT) IN2015-68 |
Numerous vulnerabilities have been found to the DNS systems and protocols especially since the method of “Kaminsky Attac... [more] |
IN2015-68 pp.41-45 |
IA, ICSS |
2015-06-11 15:45 |
Fukuoka |
Kyushu Institute of Technology Univ. |
The Analysis of the CREAM vulnerability against OpenSSL Jun Hasegawa, Yuhei Watanabe, Masakatu Morii (Kobe Univ.) IA2015-6 ICSS2015-6 |
In this paper we discuss vulnerability of "CREAM", which was originally created by Daniel J. Bernstein in 2005 and named... [more] |
IA2015-6 ICSS2015-6 pp.27-32 |
IA |
2014-09-12 16:15 |
Tokyo |
Tokyo Tech Front |
[Invited Talk]
DNS cache poisoning and its countermeasures Kazunori Fujiwara, Yasuhiro Orange Morishita (JPRS) IA2014-20 |
Recently, DNS cache poisoning attack is being focused again.
Though it is derived from the basic structure of DNS,
it ... [more] |
IA2014-20 pp.35-40 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 13:50 |
Aomori |
Hirosaki University |
Protection Mode Against Cache Attack (HYRAL) Kouzou Hirata (LIS) ISEC2010-14 SITE2010-10 ICSS2010-20 |
It is known that the Prime+probe method of Dag Arne Osuik, Adi shamir, and Eran Tromer[1] is the most efficient methods ... [more] |
ISEC2010-14 SITE2010-10 ICSS2010-20 pp.27-33 |
IN |
2010-06-04 11:40 |
Akita |
Akita ATORION |
Examination and problem for real operation of DNSSEC Kenichiro Okamoto, Naoto Yamamoto, Futoshi Kubo, Masahiro Uraga (NTT WEST) IN2010-21 |
DNSSEC is a function of DNS and guarantees the validity of communication with DNS server. It was standardized in RFC in ... [more] |
IN2010-21 pp.57-61 |
IN |
2009-07-09 15:15 |
Hokkaido |
HOKKAIDO UNIVERSITY |
[Invited Talk]
Anomalous Traffic Observed in DNS Keisuke Ishibashi, Tsuyoshi Toyono, Kazumichi Sato (NTT) IN2009-28 |
DNS is one onf the most critical infrastructure of the Internet, and used for most of Internet applications. On the othe... [more] |
IN2009-28 pp.19-24 |