Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2013-11-12 14:15 |
Fukuoka |
Nishijin Plaza |
Evaluations of Multi-Stage Traffic Analysis against Attacks on Websites Takeshi Yagi, Takeo Hariu (NTT), Hiroki Takakura (Nagoya University) ICSS2013-57 |
This paper proposes a traffic analysis scheme to detect attacks from accesses to websites. Conventional schemes can dete... [more] |
ICSS2013-57 pp.3-8 |
IN, MoNA (Joint) |
2010-11-18 14:50 |
Fukuoka |
Fukuoka Institute of Technology |
Architecture Design of Web Phantom: Hybrid Web Honeypot Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT) IN2010-85 |
This paper proposes a hybrid web honeypot, namely Web Phantom, which generates a blacklist to prevent malware infection ... [more] |
IN2010-85 pp.25-30 |
IA, ICSS |
2010-06-18 14:20 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A Life-cycle Monitoring Method of Malware Download Sites for Websites Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IA2010-14 ICSS2010-14 |
This paper proposes a method to monitor life-cycle of malware download sites for websites and reports the actual life-cy... [more] |
IA2010-14 ICSS2010-14 pp.75-80 |
ICSS |
2010-03-26 15:30 |
Fukuoka |
The University of Kitakyushu |
Investigation of Attacks to Websites using Multi-domain Web-based Honeypots Naoto Tanimoto, Takeshi Yagi, Takeo Hariu, Mitsutaka Itoh (NTT Corporation) ICSS2009-66 |
Recently, a large number of websites are under attacks from attackers. Many compromised websites are used by attackers a... [more] |
ICSS2009-66 pp.25-28 |
NS, IN (Joint) |
2010-03-05 11:40 |
Miyazaki |
Miyazaki Phoenix Seagaia Resort (Miyazaki) |
A Scheme of Detecting Malware for Websites Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IN2009-200 |
This paper reports the actual situation of malware distributed to websites by constructing web honeypots, which carries ... [more] |
IN2009-200 pp.337-342 |
IN |
2009-07-10 11:25 |
Hokkaido |
HOKKAIDO UNIVERSITY |
A Provider Provisioned Websites Protection Scheme against Malware Distribution Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) IN2009-34 |
This paper proposes a website protection scheme for service providers by analyzing accesses to web honeynets, which carr... [more] |
IN2009-34 pp.55-60 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 13:25 |
Akita |
Akita University |
Investigation about Malware Distribution to Websites Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) ISEC2009-32 SITE2009-24 ICSS2009-46 |
This paper reports the actual situation of malware distribution to websites by constructing web honeynets, which carries... [more] |
ISEC2009-32 SITE2009-24 ICSS2009-46 pp.175-180 |
ICSS |
2009-05-15 15:10 |
Hyogo |
Kobe University |
Investigation of Spam Mail Driven Web-Based Passive Attack Yuhei Kawakoya, Mitsuaki Akiyama, Kazufumi Aoki, Mitsutaka Itoh (NTT), Hiroki Takakura (Kyoto Univ) ICSS2009-5 |
In recent years, the number of web-based passive attacks which are driven by URLs included in spam mail is increasing. B... [more] |
ICSS2009-5 pp.21-26 |
DE |
2008-12-01 |
Tokyo |
Gakushuin |
[Poster Presentation]
A Concept of Oblivious CAPTCHA
-- Fifth-Factor Technology for Practical CAPTCHA Usages -- Hiroaki Ozeki (IBM Japan) DE2008-63 |
The CAPTCHA idea (Completely Automated Public Turing test to tell Computers and Humans Apart) is widely used as a HIP (H... [more] |
DE2008-63 pp.31-32 |
SS, KBSE |
2007-04-20 09:40 |
Fukushima |
Univ. of Aizu |
A Method of Detecting Security Flaws in Web Sessions through Model Checking Ikuya Morikawa, Yuji Yamaoka, Yuko Nakayama (Fujitsu Labs.) SS2007-6 KBSE2007-6 |
We propose a method to find security flaws related to sessions in Web applications with model checking. In this method, ... [more] |
SS2007-6 KBSE2007-6 pp.29-34 |
LOIS, IPSJ-DC |
2006-07-28 14:05 |
Yamagata |
Faculty of Engineering Yamagata University |
Server-side security requirements against the Web technology threats Yutaka Matsunaga (TEL), Michiko Oba (Hitachi) |
The number of the attacks to the Web servers exploiting Web technologies is increasing. These attacks have caused forced... [more] |
OIS2006-17 pp.47-53 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 13:25 |
Okayama |
Okayama Univ. |
IDS for SSL Enncrypted Web Traffic Akira Yamada, Yutaka Miyake, Keisuke Takemori (KDDI Labs.) |
The threat of attacks on web applications, such as SQL injection and cross site scripting, remains a serious problem. Th... [more] |
ISEC2006-32 SITE2006-29 pp.167-173 |
IA, MoNA |
2005-01-19 09:30 |
Osaka |
Osaka University Nakanoshima Center |
Alarm Aggregation Architecture for Identifying One Way XSS Attacks Omar Ismail, Masashi Etoh, Youki Kadobayashi, Suguru Yamaguchi (NAIST) |
Cross-Site Scripting(XSS) is caused by the failure of web applications to properly
validate user input before returning... [more] |
MoMuC2004-89 IA2004-20 pp.7-14 |