Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2017-11-16 14:15 |
Overseas |
KMITL, Bangkok, Thailand |
Xilara: XSS audItor using htmL templAte restoRAtion Keitaro Yamazaki, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2017-49 |
Mitigating Cross Site Scripting (XSS) is important to protect user's sensitive data in the web applications.
XSS mitiga... [more] |
IA2017-49 pp.89-94 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 10:15 |
Tokyo |
|
A Proposal on the Actual State Survey Method of RIG Exploit Kit in User Environments Ichiro Shimada, Toshifumi Oota (KKE), Kouichirou Okada (SecureBrain), Akira Yamada (KDDI Research) ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19 |
In recent years, web-based cyber attacks, which exploit web browsers and compromise computers, are prevailing. In many c... [more] |
ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19 pp.33-38 |
ET |
2017-05-27 11:05 |
Tokyo |
Soka Univ. |
Support Environnment and Practices of Hacking Competition with Attack and Defense Style on a Game Website
-- Functions of a Trial Version and Discussions about the Result -- Makoto Nakaya (Kagawa Univ.), Masahiro Okawa (JAIST), Masahiro Nakajima (Irvine Systems), Hiroyuki Tominaga (Kagawa Univ.) ET2017-2 |
Practical education about information security is needed for system developers and administrators in Web service supplie... [more] |
ET2017-2 pp.7-12 |
ICSS, IPSJ-SPT |
2017-03-14 09:30 |
Nagasaki |
University of Nagasaki |
Visual Similarity-based Phishing Websites Detection Scheme using Image and CSS with Target Website Finder Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ) ICSS2016-58 |
Recently, detecting phishing websites and identifying their target are imperative. In several phishing detection schemes... [more] |
ICSS2016-58 pp.111-116 |
SC |
2017-03-10 16:35 |
Tokyo |
National Institute of Informatics |
Visualizing and Analyzing Street Crimes Using Personalized Security Information Service PRISM Takuhiro Kagawa, Yoshihiro Wada, Sachio Saiki, Masahide Nakamura (Kobe Univ.) SC2016-37 |
In our previous research, we have proposed a new security information service, called PRISM (Personalized Real-time Info... [more] |
SC2016-37 pp.51-56 |
NS, IN (Joint) |
2017-03-03 15:50 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
A Study on the Secure Sharing of User Authentication Private Keys among Devices Belonging to the Same Owner Hideo Nishimura, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) IN2016-172 |
In recent authentication based on the public-key cryptography, private keys are generated and kept inside the secure are... [more] |
IN2016-172 pp.449-454 |
IA, IN (Joint) |
2016-12-15 17:35 |
Hiroshima |
Hiroshima city university |
Developing Personalized Security Information Service Using Open Data Takuhiro Kagawa, Yoshihiro Wada, Sachio Saiki, Masahide Nakamura (Kobe Univ.) IA2016-72 |
Recently, many municipalities provide security information services by delivering regional incident information using Em... [more] |
IA2016-72 pp.53-58 |
ICSS, IPSJ-SPT |
2016-03-03 13:10 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
An Actual Survey on Web Scanning by URI Co-occurrence Detection Yang Zhong, Shingo Orihara, Masaki Tanikawa (NTT), Hajime Shimada, Tutomu Murase (Nagoya Univ), Hiroki Takakura (NII), Yoshihito Oshima (NTT) ICSS2015-51 |
Attackers often try to scan vulnerable servers before actual attacks.
Detecting vulnerability scans previously is effec... [more] |
ICSS2015-51 pp.25-30 |
ICSS, IPSJ-SPT |
2014-03-27 13:30 |
Okinawa |
Meio Univiersity |
Measuring Lifetime of Malicious Website Based on Redirection from Compromised Websites Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT) ICSS2013-71 |
Attackers continuously generate URLs and FQDNs of malicious websites in order to circumvent security countermeasures
us... [more] |
ICSS2013-71 pp.53-58 |
ICSS |
2013-11-12 14:15 |
Fukuoka |
Nishijin Plaza |
Evaluations of Multi-Stage Traffic Analysis against Attacks on Websites Takeshi Yagi, Takeo Hariu (NTT), Hiroki Takakura (Nagoya University) ICSS2013-57 |
This paper proposes a traffic analysis scheme to detect attacks from accesses to websites. Conventional schemes can dete... [more] |
ICSS2013-57 pp.3-8 |
KBSE |
2011-11-11 13:20 |
Nagano |
Shinshu Univ. |
A Formal Verification Method by Transforming UML Models of Web Applications Takahiko Ohsuga (Waseda Univ.), Kouichi Ono (IBM), Yoshiaki Fukazawa (Waseda Univ.) KBSE2011-49 |
Model checking techniques are being applied to application software for formal verifications. Regarded as results of dev... [more] |
KBSE2011-49 pp.79-84 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 13:25 |
Shizuoka |
Shizuoka University |
On Usage of Practical Web Application Source Code for Learning Support on Secure Coding Ryosuke Miyaji, Seikoh Nishita (Takushoku Univ) ISEC2011-22 SITE2011-19 ICSS2011-27 EMM2011-21 |
Security holes (vulnerabilities) in web applications causes security
incidents like personal information leakage and vi... [more] |
ISEC2011-22 SITE2011-19 ICSS2011-27 EMM2011-21 pp.123-129 |
IA, ICSS |
2011-06-17 15:00 |
Fukuoka |
Kyushu Institute of Technology |
Analysis of Website Infections using Malware Takeshi Yagi, Shinta Nakayama, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Mitsutaka Itoh (NTT) IA2011-13 ICSS2011-13 |
This paper reports the actual situation of website infections using malware. Recently, with the widespread of the web, m... [more] |
IA2011-13 ICSS2011-13 pp.75-80 |
IN, MoNA (Joint) |
2010-11-18 14:50 |
Fukuoka |
Fukuoka Institute of Technology |
Architecture Design of Web Phantom: Hybrid Web Honeypot Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT) IN2010-85 |
This paper proposes a hybrid web honeypot, namely Web Phantom, which generates a blacklist to prevent malware infection ... [more] |
IN2010-85 pp.25-30 |
ICSS |
2010-11-05 16:00 |
Hiroshima |
Hiroshima City University |
Determining granularity of URL filtering based on tree structure of malicious website URL Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh (NTT) ICSS2010-53 |
A network administrator takes a measure based on the blacklist to prevent end users from accessing unwanted malicious we... [more] |
ICSS2010-53 pp.53-58 |
IA, ICSS |
2010-06-18 14:20 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A Life-cycle Monitoring Method of Malware Download Sites for Websites Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IA2010-14 ICSS2010-14 |
This paper proposes a method to monitor life-cycle of malware download sites for websites and reports the actual life-cy... [more] |
IA2010-14 ICSS2010-14 pp.75-80 |
ICSS |
2010-03-26 15:30 |
Fukuoka |
The University of Kitakyushu |
Investigation of Attacks to Websites using Multi-domain Web-based Honeypots Naoto Tanimoto, Takeshi Yagi, Takeo Hariu, Mitsutaka Itoh (NTT Corporation) ICSS2009-66 |
Recently, a large number of websites are under attacks from attackers. Many compromised websites are used by attackers a... [more] |
ICSS2009-66 pp.25-28 |
NS, IN (Joint) |
2010-03-05 11:40 |
Miyazaki |
Miyazaki Phoenix Seagaia Resort (Miyazaki) |
A Scheme of Detecting Malware for Websites Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IN2009-200 |
This paper reports the actual situation of malware distributed to websites by constructing web honeypots, which carries ... [more] |
IN2009-200 pp.337-342 |
IN |
2009-07-10 11:25 |
Hokkaido |
HOKKAIDO UNIVERSITY |
A Provider Provisioned Websites Protection Scheme against Malware Distribution Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) IN2009-34 |
This paper proposes a website protection scheme for service providers by analyzing accesses to web honeynets, which carr... [more] |
IN2009-34 pp.55-60 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 13:25 |
Akita |
Akita University |
Investigation about Malware Distribution to Websites Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) ISEC2009-32 SITE2009-24 ICSS2009-46 |
This paper reports the actual situation of malware distribution to websites by constructing web honeynets, which carries... [more] |
ISEC2009-32 SITE2009-24 ICSS2009-46 pp.175-180 |