IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 65 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA 2017-11-16
14:15
Overseas KMITL, Bangkok, Thailand Xilara: XSS audItor using htmL templAte restoRAtion
Keitaro Yamazaki, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2017-49
Mitigating Cross Site Scripting (XSS) is important to protect user's sensitive data in the web applications.
XSS mitiga... [more]
IA2017-49
pp.89-94
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
10:15
Tokyo   A Proposal on the Actual State Survey Method of RIG Exploit Kit in User Environments
Ichiro Shimada, Toshifumi Oota (KKE), Kouichirou Okada (SecureBrain), Akira Yamada (KDDI Research) ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19
In recent years, web-based cyber attacks, which exploit web browsers and compromise computers, are prevailing. In many c... [more] ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19
pp.33-38
ET 2017-05-27
11:05
Tokyo Soka Univ. Support Environnment and Practices of Hacking Competition with Attack and Defense Style on a Game Website -- Functions of a Trial Version and Discussions about the Result --
Makoto Nakaya (Kagawa Univ.), Masahiro Okawa (JAIST), Masahiro Nakajima (Irvine Systems), Hiroyuki Tominaga (Kagawa Univ.) ET2017-2
Practical education about information security is needed for system developers and administrators in Web service supplie... [more] ET2017-2
pp.7-12
ICSS, IPSJ-SPT 2017-03-14
09:30
Nagasaki University of Nagasaki Visual Similarity-based Phishing Websites Detection Scheme using Image and CSS with Target Website Finder
Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ) ICSS2016-58
Recently, detecting phishing websites and identifying their target are imperative. In several phishing detection schemes... [more] ICSS2016-58
pp.111-116
SC 2017-03-10
16:35
Tokyo National Institute of Informatics Visualizing and Analyzing Street Crimes Using Personalized Security Information Service PRISM
Takuhiro Kagawa, Yoshihiro Wada, Sachio Saiki, Masahide Nakamura (Kobe Univ.) SC2016-37
In our previous research, we have proposed a new security information service, called PRISM (Personalized Real-time Info... [more] SC2016-37
pp.51-56
NS, IN
(Joint)
2017-03-03
15:50
Okinawa OKINAWA ZANPAMISAKI ROYAL HOTEL A Study on the Secure Sharing of User Authentication Private Keys among Devices Belonging to the Same Owner
Hideo Nishimura, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) IN2016-172
In recent authentication based on the public-key cryptography, private keys are generated and kept inside the secure are... [more] IN2016-172
pp.449-454
IA, IN
(Joint)
2016-12-15
17:35
Hiroshima Hiroshima city university Developing Personalized Security Information Service Using Open Data
Takuhiro Kagawa, Yoshihiro Wada, Sachio Saiki, Masahide Nakamura (Kobe Univ.) IA2016-72
Recently, many municipalities provide security information services by delivering regional incident information using Em... [more] IA2016-72
pp.53-58
ICSS, IPSJ-SPT 2016-03-03
13:10
Kyoto Academic Center for Computing and Media Studies, Kyoto University An Actual Survey on Web Scanning by URI Co-occurrence Detection
Yang Zhong, Shingo Orihara, Masaki Tanikawa (NTT), Hajime Shimada, Tutomu Murase (Nagoya Univ), Hiroki Takakura (NII), Yoshihito Oshima (NTT) ICSS2015-51
Attackers often try to scan vulnerable servers before actual attacks.
Detecting vulnerability scans previously is effec... [more]
ICSS2015-51
pp.25-30
ICSS, IPSJ-SPT 2014-03-27
13:30
Okinawa Meio Univiersity Measuring Lifetime of Malicious Website Based on Redirection from Compromised Websites
Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT) ICSS2013-71
Attackers continuously generate URLs and FQDNs of malicious websites in order to circumvent security countermeasures
us... [more]
ICSS2013-71
pp.53-58
ICSS 2013-11-12
14:15
Fukuoka Nishijin Plaza Evaluations of Multi-Stage Traffic Analysis against Attacks on Websites
Takeshi Yagi, Takeo Hariu (NTT), Hiroki Takakura (Nagoya University) ICSS2013-57
This paper proposes a traffic analysis scheme to detect attacks from accesses to websites. Conventional schemes can dete... [more] ICSS2013-57
pp.3-8
KBSE 2011-11-11
13:20
Nagano Shinshu Univ. A Formal Verification Method by Transforming UML Models of Web Applications
Takahiko Ohsuga (Waseda Univ.), Kouichi Ono (IBM), Yoshiaki Fukazawa (Waseda Univ.) KBSE2011-49
Model checking techniques are being applied to application software for formal verifications. Regarded as results of dev... [more] KBSE2011-49
pp.79-84
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2011-07-13
13:25
Shizuoka Shizuoka University On Usage of Practical Web Application Source Code for Learning Support on Secure Coding
Ryosuke Miyaji, Seikoh Nishita (Takushoku Univ) ISEC2011-22 SITE2011-19 ICSS2011-27 EMM2011-21
Security holes (vulnerabilities) in web applications causes security
incidents like personal information leakage and vi... [more]
ISEC2011-22 SITE2011-19 ICSS2011-27 EMM2011-21
pp.123-129
IA, ICSS 2011-06-17
15:00
Fukuoka Kyushu Institute of Technology Analysis of Website Infections using Malware
Takeshi Yagi, Shinta Nakayama, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Mitsutaka Itoh (NTT) IA2011-13 ICSS2011-13
This paper reports the actual situation of website infections using malware. Recently, with the widespread of the web, m... [more] IA2011-13 ICSS2011-13
pp.75-80
IN, MoNA
(Joint)
2010-11-18
14:50
Fukuoka Fukuoka Institute of Technology Architecture Design of Web Phantom: Hybrid Web Honeypot
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT) IN2010-85
This paper proposes a hybrid web honeypot, namely Web Phantom, which generates a blacklist to prevent malware infection ... [more] IN2010-85
pp.25-30
ICSS 2010-11-05
16:00
Hiroshima Hiroshima City University Determining granularity of URL filtering based on tree structure of malicious website URL
Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh (NTT) ICSS2010-53
A network administrator takes a measure based on the blacklist to prevent end users from accessing unwanted malicious we... [more] ICSS2010-53
pp.53-58
IA, ICSS 2010-06-18
14:20
Kyoto Academic Center for Computing and Media Studies, Kyoto University A Life-cycle Monitoring Method of Malware Download Sites for Websites
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IA2010-14 ICSS2010-14
This paper proposes a method to monitor life-cycle of malware download sites for websites and reports the actual life-cy... [more] IA2010-14 ICSS2010-14
pp.75-80
ICSS 2010-03-26
15:30
Fukuoka The University of Kitakyushu Investigation of Attacks to Websites using Multi-domain Web-based Honeypots
Naoto Tanimoto, Takeshi Yagi, Takeo Hariu, Mitsutaka Itoh (NTT Corporation) ICSS2009-66
Recently, a large number of websites are under attacks from attackers. Many compromised websites are used by attackers a... [more] ICSS2009-66
pp.25-28
NS, IN
(Joint)
2010-03-05
11:40
Miyazaki Miyazaki Phoenix Seagaia Resort (Miyazaki) A Scheme of Detecting Malware for Websites
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IN2009-200
This paper reports the actual situation of malware distributed to websites by constructing web honeypots, which carries ... [more] IN2009-200
pp.337-342
IN 2009-07-10
11:25
Hokkaido HOKKAIDO UNIVERSITY A Provider Provisioned Websites Protection Scheme against Malware Distribution
Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) IN2009-34
This paper proposes a website protection scheme for service providers by analyzing accesses to web honeynets, which carr... [more] IN2009-34
pp.55-60
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
13:25
Akita Akita University Investigation about Malware Distribution to Websites
Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) ISEC2009-32 SITE2009-24 ICSS2009-46
This paper reports the actual situation of malware distribution to websites by constructing web honeynets, which carries... [more] ISEC2009-32 SITE2009-24 ICSS2009-46
pp.175-180
 Results 21 - 40 of 65 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan