Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-22 11:45 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Impact of ChatGPT Assisted Polymorphic Malware on Antivirus Detection Huang Zhewei, Yinn Minn Pa pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-89 |
With the rapid implementation of large-scale language models (LLMs), there are concerns about their misuse in cyberattac... [more] |
ICSS2023-89 pp.145-152 |
RCC, ISEC, IT, WBS |
2024-03-14 09:30 |
Osaka |
Osaka Univ. (Suita Campus) |
A Study on Malicious Communication Detection Using Attack Characteristics of Malware on an Internal Network. Ken Aono, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95 |
Recently, targeted attacks have been increasing.
Malicious attackers use malware to gain access to the organization's ... [more] |
IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95 pp.249-253 |
IA, SITE, IPSJ-IOT [detail] |
2024-03-12 16:00 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
Improvement of Unknown Malicious Domain Detection Based on DNS Query History Analysis Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech) SITE2023-83 IA2023-89 |
Network users are increasing and there is concern about the malware infection.
In some cases, malware-infected terminal... [more] |
SITE2023-83 IA2023-89 pp.92-97 |
MIKA (3rd) |
2023-10-10 15:35 |
Okinawa |
Okinawa Jichikaikan (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Two-Stage Malware Detection Using Calling API Sequences Kohei Tsunewaki, Tomotaka Kimura, Jun Cheng (Doshisha Univ.) |
We propose a two-step malware detection method based on intrinsic features of calling API (Application Programming Inter... [more] |
|
IA |
2023-09-21 14:15 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Studies on Malicious Domain Detection Method based on Feature of DNS Communication History by using DNS Traffic Analysis Toshiki Koga, Daiki Nobayashi, Takeshi Ikenaga (KIT) IA2023-12 |
Malware on the Internet is causing increasing damage, and countermeasures are needed. In some cases, malware-infected te... [more] |
IA2023-12 pp.6-10 |
ICSS, IPSJ-SPT |
2023-03-14 13:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Assessment Method for Persistent Malware Infection on IoT Devices Shunki Soeda, Takahiro Inoue, Rui Tanabe, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2022-78 |
Malware targeting IoT devices has become a growing threat in recent years. Some of them continue to infect devices perma... [more] |
ICSS2022-78 pp.181-186 |
RISING (3rd) |
2022-10-31 14:00 |
Kyoto |
Kyoto Terrsa (Day 1), and Online (Day 2, 3) |
[Poster Presentation]
Machine Learning Analyze for Undiscovered Malicious Domain Detection by using DNS Query Analysis Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (kyutech) |
Network users is increasing in recently and there is concern about the malware infection.
Malware exist various types a... [more] |
|
R |
2022-10-07 14:50 |
Fukuoka |
(Primary: On-site, Secondary: Online) |
A Note on A Transformer Encoder-Based Malware Classification Using API Calls Chen Li (Kyutech), Junjun Zheng (Osaka Univ.) R2022-36 |
Malware is a major security threat to computer systems and significantly impacts system reliability. Recurrent neural ne... [more] |
R2022-36 pp.25-30 |
IA, ICSS |
2022-06-23 14:30 |
Nagasaki |
Univ. of Nagasaki (Primary: On-site, Secondary: Online) |
Discussion about improving a detection accuracy of malware variants using time series differences in latent representation. Atsushi Shinoda, Hajime Shimada, Yukiko Yamaguti (Nagoya Univ.), Hirokazu Hasegawa (NII) IA2022-4 ICSS2022-4 |
Today, computers are used for various purposes to support people's daily lives. Therefore, the existence of malware that... [more] |
IA2022-4 ICSS2022-4 pp.19-24 |
IA, ICSS |
2022-06-24 11:50 |
Nagasaki |
Univ. of Nagasaki (Primary: On-site, Secondary: Online) |
Studies on Blacklists based DNS Query Analysis for Malicious Domain Detection Hiroto Yamada, Daiki Nobayashi, Takeshi Ikenaga (Kyutech) IA2022-14 ICSS2022-14 |
Malware infection of network users is one of the critical threats on the Internet. Users have a risk of being infected w... [more] |
IA2022-14 ICSS2022-14 pp.76-80 |
ICSS, IPSJ-SPT |
2022-03-08 13:40 |
Online |
Online |
ML-based detection of C&C communications for sandbox analysis of IoT malware Yuki Endo, Kaichi Sameshima, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2021-75 |
In order to analyze the behavior of malware, dynamic analysis has been widely utilized. Among various communication of m... [more] |
ICSS2021-75 pp.99-104 |
IE, ITS, ITE-AIT, ITE-ME, ITE-MMS [detail] |
2022-02-22 11:55 |
Online |
Online |
Bit-plane oriented Detection method of Malicious Code Hidden in the Image Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2021-50 IE2021-59 |
With the increasing importance of cyberspace, the threat of malware has also been increasing. Malware which hides malici... [more] |
ITS2021-50 IE2021-59 pp.151-156 |
IA |
2021-10-15 16:50 |
Online |
Online |
Malware Traffic Detection at Certain Time Using IP Flow Information Seiya Komatsu, Yusei Katsura, Masatoshi Kakiuchi, Ismail Arai, Kazutoshi Fujikawa (NAIST) IA2021-27 |
The damage caused by the activities of malware such as botnets and ransomware has become a social problem. In order to d... [more] |
IA2021-27 pp.6-11 |
ICSS, IPSJ-SPT |
2021-03-01 09:35 |
Online |
Online |
Detection of Infected Device Using DNS Traffic Soichiro Kogo, Atsushi Kanai (Hosei Univ.) ICSS2020-27 |
The damage caused by computer viruses is becoming a serious problem. However, it requires a lot of effort to manage all ... [more] |
ICSS2020-27 pp.7-12 |
ICSS, IPSJ-SPT |
2021-03-02 10:00 |
Online |
Online |
Evaluation of Uncertain Reports by Multiple Anti-virus Engines Kazuya Nomura (Waseda Univ.), Mistuaki Akiyama (NTT), Masaki Kamizono (Deloitte Tohmatsu Cyber LLC), Takahiro Kasama (NICT) ICSS2020-56 |
VirusTotal is an online service that provides detection results from multiple anti-virus engines. It is used in a wide r... [more] |
ICSS2020-56 pp.178-183 |
ICSS, IPSJ-SPT |
2021-03-02 11:30 |
Online |
Online |
Detecting unknown malware families by anomaly detection using deep learning Ren Takeuchi, Shintaro Mizuno, Vo Ngoc Khoi Nguyen, Jun Tsuchiya, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka Univ.) ICSS2020-59 |
The analysis of malware has become an indispensable process for anti-malware. Malware is diversifying day by day, so tha... [more] |
ICSS2020-59 pp.195-200 |
ISEC, IT, WBS |
2020-03-11 11:20 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Applying Machine Learning to Malware Detection in Mobile Applications Yoshiki Kusama, Keiji Takeda, Kazuma Kobayashi, Osamu Nakamura (Keio Univ.), Lee Myoungje (LINE corp.) IT2019-112 ISEC2019-108 WBS2019-61 |
In this paper, we proposed and implemented a detection method that focuses on a binary file stored in an APK(Android app... [more] |
IT2019-112 ISEC2019-108 WBS2019-61 pp.151-157 |
ICSS |
2019-11-13 14:20 |
Miyazaki |
MRT Terrace(Miyazaki) |
Issue on Adversarial Malware Sample Generation using Reinforcement Learning against Machine Learning Based Malware Detection System Seiya Takagi, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-62 |
In recent years, security researchers have applied machine learning techniques to malware detection researches to improv... [more] |
ICSS2019-62 pp.13-18 |
ISEC, SITE, LOIS |
2019-11-02 15:00 |
Osaka |
Osaka Univ. |
On Robustness of Machine-Learning-Based Malware Detection Wanjia Zheng (U. Tsukuba), Kazumasa Omote (U. Tsukuba/NICT) ISEC2019-83 SITE2019-77 LOIS2019-42 |
As the 2020 Tokyo Olympics are approaching, the possibility of being targeted by attackers has further increased in Japa... [more] |
ISEC2019-83 SITE2019-77 LOIS2019-42 pp.133-140 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 10:55 |
Kochi |
Kochi University of Technology |
Investigation on Blockchain-based Malware Information Sharing Method in Malware Detection System Ryusei Fuji, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama (Univ. of Miyazaki), Mirang Park (Kanagawa Inst. of Tech.), Norio Shiratori (Chuo Univ.), Naonobu Okazaki (Univ. of Miyazaki) ISEC2019-45 SITE2019-39 BioX2019-37 HWS2019-40 ICSS2019-43 EMM2019-48 |
Rapid malware detection is very important because malware causes serious damage to the modern society based on the Inter... [more] |
ISEC2019-45 SITE2019-39 BioX2019-37 HWS2019-40 ICSS2019-43 EMM2019-48 pp.293-298 |