IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information and Communication System Security (ICSS)  (Searched in: 2013)

Search Results: Keywords 'from:2014-03-27 to:2014-03-27'

[Go to Official ICSS Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 33  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2014-03-27
13:05
Okinawa Meio Univiersity The countermeasures against extraction of AES keys from memory dumping.
Michiyoshi Satoh (TSH) ICSS2013-62
The cipher AES extends a 128 bits (or 192 bits, 256 bits) secret key to 1408 bits (or 1664 bits, 1920 bits). Since the e... [more] ICSS2013-62
pp.1-6
ICSS, IPSJ-SPT 2014-03-27
13:30
Okinawa Meio Univiersity An Active Attack on RC4 in SSL/TLS
Toshihiro Ohigashi (Hiroshima Univ.), Takanori Isobe (Sony), Yuhei Watanabe (Kobe Univ.), Ryo Nojima (NICT), Masakatu Morii (Kobe Univ.) ICSS2013-63
In 2013, Isobe et al. and AlFardan et al. proposed practical plaintext recovery attacks on RC4 in SSL/TLS in the broadca... [more] ICSS2013-63
pp.7-12
ICSS, IPSJ-SPT 2014-03-27
13:55
Okinawa Meio Univiersity Implementation and Evaluation of a Distributed Secure Multi-party Computation System
Koki Hamada (NTT) ICSS2013-64
 [more] ICSS2013-64
pp.13-17
ICSS, IPSJ-SPT 2014-03-27
14:20
Okinawa Meio Univiersity General Construction of Certified Data Transmission Protocol Using ID-Based Encryption and ID-Based Signature
Hitoshi Miyazaki (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) ICSS2013-65
Certified data transmission protocols are used to attest to the fact that online deals of data is actually made. It is d... [more] ICSS2013-65
pp.19-24
ICSS, IPSJ-SPT 2014-03-27
14:55
Okinawa Meio Univiersity SSL Client Authentication with TPM -- Issuance of Public Key Certificate with OpenID and Terminal Authentication with SSL Client Certificate --
Akihito Shinoda (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) ICSS2013-66
TPM-embedded terminals can be used as authentication tokens by issuing certificates to signature keys generated by TPM. ... [more] ICSS2013-66
pp.25-30
ICSS, IPSJ-SPT 2014-03-27
15:20
Okinawa Meio Univiersity An authenticated key exchange protocol for the network between a server and terminals
Yumiko Murakami, Yutaka Kawai, Nobuhiro Kobayashi (Mitsubishi Electric) ICSS2013-67
 [more] ICSS2013-67
pp.31-35
ICSS, IPSJ-SPT 2014-03-27
15:45
Okinawa Meio Univiersity On Threats of Impersonation and Man-In-The-Middle Attack on Network Printers
Yuka Enomoto, Akira Kanaoka (Toho Univ.) ICSS2013-68
From Windows Vista, automatic network printer discovery and configuration is available by UPnP functions.
Recent Window... [more]
ICSS2013-68
pp.37-41
ICSS, IPSJ-SPT 2014-03-27
16:10
Okinawa Meio Univiersity Applying Identity-based Cryptography to Mutual Authentication between OpenFlow Devices
Tomoko Kazama, Akira Kanaoka (Toho Univ.) ICSS2013-69
Current OpenFlow specification apply TLS to establish mutual authentication between a controller and a switch, as option... [more] ICSS2013-69
pp.43-48
ICSS, IPSJ-SPT 2014-03-27
13:05
Okinawa Meio Univiersity Practical Password Management System against password-list-attacks -- Proposal of protection of Master Password --
Hironao Teruya, Wataru Nakamura (Meio Univ.), Keisuke Furumoto (Kobe Univ.), Takeshi Tengan, Katsuyoshi Tanabe (Meio Univ.), Masakatu Morii (Kobe Univ.) ICSS2013-70
With the increased use of the internet, the number of passwords which a user has to manage is also increasing. One of ma... [more] ICSS2013-70
pp.49-52
ICSS, IPSJ-SPT 2014-03-27
13:30
Okinawa Meio Univiersity Measuring Lifetime of Malicious Website Based on Redirection from Compromised Websites
Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT) ICSS2013-71
Attackers continuously generate URLs and FQDNs of malicious websites in order to circumvent security countermeasures
us... [more]
ICSS2013-71
pp.53-58
ICSS, IPSJ-SPT 2014-03-27
13:55
Okinawa Meio Univiersity An Investigation of Malicious JavaScript Code used in Drive-by Download
Yuta Takata, Mitsuaki Akiyama, Takeo Hariu (NTT) ICSS2013-72
Malicious website contains JavaScript code that exploits vulnerabilities in the browser or the browser's plugins.Researc... [more] ICSS2013-72
pp.59-64
ICSS, IPSJ-SPT 2014-03-27
14:20
Okinawa Meio Univiersity Implementation and Evaluation of Web Phantom: Hybrid Web Honeypot
Takeshi Yagi, Takeo Hariu (NTT) ICSS2013-73
 [more] ICSS2013-73
pp.65-70
ICSS, IPSJ-SPT 2014-03-28
09:00
Okinawa Meio Univiersity Ruleset Optimization for Detecting Malware-Derived Traffic Based on Network-Dependent Log Analysis
Kensuke Nakata, Kazunori Kamiya, Hiroshi Kurakami, Kazufumi Aoki, Takeshi Yagi (NTT) ICSS2013-74
Recent cyber-attacks rapidly get advanced to infect terminals via invalid network access and could damage enterprise act... [more] ICSS2013-74
pp.95-100
ICSS, IPSJ-SPT 2014-03-28
09:25
Okinawa Meio Univiersity Spam Analysis based on Mail Relay Routing
Junji Nakazato, Tao Ban (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-75
The characteristic analysis using contents of spam mail is changed by the purpose of spam campaign. In this paper, we pr... [more] ICSS2013-75
pp.101-106
ICSS, IPSJ-SPT 2014-03-28
09:50
Okinawa Meio Univiersity Implementation and Evaluation of a Proactive Cyber Attack Monitoring Platform
Masashi Eto (NICT), Tomohide Tanaka (clwit), Koei Suzuki, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-76
A number of network monitoring systems such as honeypot and web crawler have been launched to address increasingly-sophi... [more] ICSS2013-76
pp.107-112
ICSS, IPSJ-SPT 2014-03-28
10:15
Okinawa Meio Univiersity MATATABI: Multi-layer Threat Analysis Platform with Hadoop
Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Yuji Sekiya (Univ. of Tokyo), Youki Kadobayashi (NAIST) ICSS2013-77
Threat detections and analyses are indispensable processes in today’s cyberspace, but current state of the arts are stil... [more] ICSS2013-77
pp.113-118
ICSS, IPSJ-SPT 2014-03-28
10:50
Okinawa Meio Univiersity Detection of Android apps that secretly abuse the camera
Takuya Watanabe, Tatsuya Mori, Tetsuya Sakai (Waseda Univ.) ICSS2013-78
We propose a method for detecting Android apps that may secretly abuse the camera to leak private or important informati... [more] ICSS2013-78
pp.119-124
ICSS, IPSJ-SPT 2014-03-28
11:15
Okinawa Meio Univiersity Timeline-Based Event Log Viewer over Multi-Host Environment
Takashi Tomine, Yu Tsuda, Masaki Kamizono (NICT), Kazunori Sugiura (Keio Univ.), Daisuke Inoue, Koji Nakao (NICT) ICSS2013-79
A cyber attacking becomes clever and complicated.
Recently the number of Advanced Persistent Threat (APT) attacks to ge... [more]
ICSS2013-79
pp.125-130
ICSS, IPSJ-SPT 2014-03-28
11:40
Okinawa Meio Univiersity DNS Traffic Analysis Platform with Hadoop Framework
Tomohiro Ishihara, Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Daisuke Miyamoto, Yuji Sekiya (Univ. of Tokyo) ICSS2013-80
Recently, cyber threats have rapidly grown in regarding to the large scale of botnets as well as the nancial damages fr... [more] ICSS2013-80
pp.131-135
ICSS, IPSJ-SPT 2014-03-28
12:05
Okinawa Meio Univiersity Identifying C&C Server by Analyzing Relation between Control Flow and Communications
Tomonori Ikuse, Kazufumi Aoki, Takeo Hariu (NTT) ICSS2013-81
In recent years, it is difficult to prevent malware infection entirely because of the diversi cation of attack vectors a... [more] ICSS2013-81
pp.137-142
 Results 1 - 20 of 33  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan