Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-21 11:20 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Analyzing Attackers and Victims Actions via LockBit3.0 Website Data Dynamics Yuji Sekine, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-70 |
LockBit3.0 is one of the top ransomware groups that has been active since July 2022, targeting over 1,000 companies. In ... [more] |
ICSS2023-70 pp.9-16 |
RCC, ISEC, IT, WBS |
2024-03-14 15:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Phishing Detection Method Based on Content-Similarity in DNS Graph WenBo Zhou, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110 |
Phishing attacks, known as a prevalent form of social engineering attacks, have become one of the most significant cyber... [more] |
IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110 pp.332-336 |
IA |
2024-01-25 16:10 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Analyzing Cybersecurity Datasets
-- Enhancing Security throughout the Data Life Cycle -- Chidchanok Choksuchat, Sorawit Khamnaewnak, Siwakorn Kasikam, Chanin Maiprom, Suwimon Bureekarn (PSU) IA2023-63 |
Our study identifies and prevents threats in real-time, particularly focusing on the publishing stage of the data lifecy... [more] |
IA2023-63 pp.37-39 |
ISEC |
2023-05-17 10:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Risk Assessment Method against ML-specific Attacks for ML system developers
-- A Damage Assessment Method for ML system developers -- Jun Yajima, Maki Inui, Kentarou Tsuji (Fujitsu Ltd.), Nobukazu Yoshioka (Waseda Univ.) ISEC2023-4 |
To develop machine learning (ML) systems that are secure againstML-specific attacks, to conduct threat assessment to fin... [more] |
ISEC2023-4 pp.25-32 |
IA, ICSS |
2022-06-23 15:20 |
Nagasaki |
Univ. of Nagasaki (Primary: On-site, Secondary: Online) |
An Investigation of Abuse Possibility of IoT Devices After Unauthorized Login Kosuke Murakami (NICT/KDDIR), Takahiro Kasama, Daisuke Inoue (NICT) IA2022-6 ICSS2022-6 |
IoT devices with weak ID/Password settings and accessible from the Internet by Telnet and SSH services are infected with... [more] |
IA2022-6 ICSS2022-6 pp.31-36 |
ICSS, IPSJ-SPT |
2022-03-07 13:30 |
Online |
Online |
Time Efficient Risk Assessment Tool for IoT Systems Rajulapati Shourya, Takashi Kawauchi (Hitachi) ICSS2021-60 |
We have developed an integrated security design platform that provides security analysis independent of the consultant's... [more] |
ICSS2021-60 p.13 |
ICSS, IPSJ-SPT |
2022-03-08 11:00 |
Online |
Online |
A study of new cyber attacks for fast charging of electric vehicle Hiroki Nagayama, Masahiro Shiraishi, Yukio Nagafuchi, Asami Miyajima (NTT) ICSS2021-70 |
In order to realize a carbon-neutral society, the shift from gasoline vehicles to electric vehicles (EVs) is being
prom... [more] |
ICSS2021-70 pp.66-71 |
ICSS, IPSJ-SPT |
2022-03-08 15:30 |
Online |
Online |
Verifying concept of personalized malware by investigating end-user environments Daigo Ichikawa, Rui Tanabe, XU Haoyuan, Yoshioka Katsunari, Matsumoto Tsutomu (YNU) ICSS2021-83 |
Personalized malware conducts malicious activities only when it is running on the target environment. Previous studies h... [more] |
ICSS2021-83 pp.147-152 |
WBS, IT, ISEC |
2021-03-05 13:30 |
Online |
Online |
Information retrieval for security reports using behavior of cyber attacker Yuki Kawaguchi, Mayo Yamasaki (NTT) IT2020-154 ISEC2020-84 WBS2020-73 |
Cyber security incident responders require related information about related incidents for the quick and comprehensive
... [more] |
IT2020-154 ISEC2020-84 WBS2020-73 pp.257-264 |
IN, NS (Joint) |
2021-03-05 09:50 |
Online |
Online |
A study of new cyber attacks for Data Distribution Services Hiroki Nagayama, Masahiro Shiraishi, Tomoaki Washio, Asami Miyajima (NTT) IN2020-76 |
Data Distribution Services (DDS) has been attracting attention in recent years as pub/sub middleware for mission-critica... [more] |
IN2020-76 pp.132-137 |
ICSS, IPSJ-SPT |
2021-03-02 10:25 |
Online |
Online |
Proof of concept of sandbox evasion attack using email address stored in target machine Yuta Inoue, Rui Tanabe (YNU), Takahiro Kasama, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-57 |
In recent years, malware sandbox appliances that dynamically analyze target files are becoming popular. However, malware... [more] |
ICSS2020-57 pp.184-189 |
ICD, HWS [detail] |
2020-10-26 13:50 |
Online |
Online |
Security Threats and Preventions for Photonics Computing Model Junko Takahashi, Koji Chida, Takeshi Sakamoto (NTT) HWS2020-33 ICD2020-22 |
This paper presents security analysis on photonic computing models in All-Photonics Network (APN). New computing archite... [more] |
HWS2020-33 ICD2020-22 pp.48-53 |
IN, CCS (Joint) |
2020-08-03 13:00 |
Online |
Online |
5G Threat Analysis Based on Smart Factory Operational Scenario
-- Security from a NFV perspective -- Takahashi Hideaki, Taenaka Yuzo, Kadobayashi Youki (NAIST) IN2020-13 |
The 5th generation mobile communication system (5G) is expected to bring major innovations to mobile communication netwo... [more] |
IN2020-13 pp.25-30 |
SC |
2019-06-01 10:30 |
Ibaraki |
National Institute for Materials Science |
An Introduction of Security Case Studies for Service Robots and IoT Devices Jiro Yamazaki, Hidenori Tsuiji, Fumiaki Yamasaki (NOS) SC2019-8 |
In the past years, robots worked in very restricted area such as industrial factory for a certain purposes and
also iso... [more] |
SC2019-8 pp.45-50 |
IN, NS (Joint) |
2019-03-05 11:30 |
Okinawa |
Okinawa Convention Center |
A study on Maliciousness Measurement in Cyber Threat Intelligence Using Graph Convolutional Networks Yuta Kazato, Yoshihide Nakagawa, Yuichi Nakatani (NTT) IN2018-128 |
Cyber threat information (CTI) sharing is one of the important functions to protect end-users and services from cyber-at... [more] |
IN2018-128 pp.265-270 |
ICSS |
2018-11-21 16:05 |
Kagoshima |
|
[Invited Talk]
Security Countermeasure at ShowNet in Interop Tokyo 2018 Kenichiro Hashimoto (Lastline), Masato Jingu (NICT), Takashi Tomine (lepidum) ICSS2018-59 |
Cyber attacks become emerging threats on the Internet.We held an exhibition in ICT called Interop Tokyo every June. In t... [more] |
ICSS2018-59 p.37 |
NS, IN (Joint) |
2018-03-01 09:20 |
Miyazaki |
Phoenix Seagaia Resort |
A distributed security gateway scheme for preventing advanced targeted attacks by cooperated multiple hosts Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-90 |
Recently, cyber attacks that targeting enterprises become serious.The majority of the damage is information leakage.As a... [more] |
IN2017-90 pp.5-10 |
ICSS |
2017-11-20 15:40 |
Oita |
Beppu International Convention Center |
Educational Tools to Learn Concrete Control Measures Corresponding to Threats of Cyber Attacks Tan Omiya, Daisuke Miyamoto, Youki Kadobayashi (NAIST) ICSS2017-40 |
Recently, the threats of cyber attacks have increased. There is the need to understand information security measures to ... [more] |
ICSS2017-40 pp.11-16 |
RCS, IN, NV (Joint) |
2017-05-12 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Distributive Analyzing Scheme of Host Operation for Blocking Information Leakage from an Intranet Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-5 |
Recently, damage by targeted attacks is getting worse. These attacks leak corporate information. For preventing such lea... [more] |
IN2017-5 pp.21-24 |
ICSS, IPSJ-SPT |
2017-03-13 13:25 |
Nagasaki |
University of Nagasaki |
Modeling of Attack Activity for Integrated Analysis of Threat Information Kenta Nomura, Daiki Ito (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-47 |
Cyber attacks targeting specific victims use multiple intrusion routes and various attack methods. In order to combat su... [more] |
ICSS2016-47 pp.7-12 |