IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information and Communication System Security (ICSS)  (Searched in: 2015)

Search Results: Keywords 'from:2016-03-03 to:2016-03-03'

[Go to Official ICSS Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 29  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2016-03-03
12:40
Kyoto Academic Center for Computing and Media Studies, Kyoto University Improving IoTPOT for Observing Various Attacks Targeting Embedded Devices
Shogo Suzuki, YinMin Papa, Yuta Ezawa, Ying Tie, Sou Nakayama, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2015-47
IoTPOT, which we previously implemented as a honeypot system for embedded devices, can only emulate Telnet service. In t... [more] ICSS2015-47
pp.1-6
ICSS, IPSJ-SPT 2016-03-03
13:10
Kyoto Academic Center for Computing and Media Studies, Kyoto University Observing Cyber Attacks on Building Control System by Honeypot
Ying Tie (YNU), Koichi Shimizu (Mitsubishi Electric Corporation), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2015-48
Although several reports describe that scans on control system such as building control system have been increasing, the... [more] ICSS2015-48
pp.7-12
ICSS, IPSJ-SPT 2016-03-03
13:40
Kyoto Academic Center for Computing and Media Studies, Kyoto University Storage-Efficient and Low-Power Packet Classification for Internet of Things
Yuta Kitamura (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2015-49
This paper addresses packet classification for Internet of Things (IoT) security. Packet Classification is a function to... [more] ICSS2015-49
pp.13-18
ICSS, IPSJ-SPT 2016-03-03
12:40
Kyoto Academic Center for Computing and Media Studies, Kyoto University Malicious-Spam-Mail Detection System with Autonomous Learning Ability
Shogo Osaka, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-50
Recently, damages caused by spam mails that guide receivers to malicious
web pages become more and more serious. In thi... [more]
ICSS2015-50
pp.19-24
ICSS, IPSJ-SPT 2016-03-03
13:10
Kyoto Academic Center for Computing and Media Studies, Kyoto University An Actual Survey on Web Scanning by URI Co-occurrence Detection
Yang Zhong, Shingo Orihara, Masaki Tanikawa (NTT), Hajime Shimada, Tutomu Murase (Nagoya Univ), Hiroki Takakura (NII), Yoshihito Oshima (NTT) ICSS2015-51
Attackers often try to scan vulnerable servers before actual attacks.
Detecting vulnerability scans previously is effec... [more]
ICSS2015-51
pp.25-30
ICSS, IPSJ-SPT 2016-03-03
13:40
Kyoto Academic Center for Computing and Media Studies, Kyoto University Analyzing Targeted Cyber Attacks by Focusing on Contents of Decoy Documents
Natsuko Kawakami, Ryota kikkawa, Ying Tie, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
In recent targeted cyberattacks, targeted malware display embedded or downloaded decoy documents upon their execution as... [more]
ICSS, IPSJ-SPT 2016-03-03
14:20
Kyoto Academic Center for Computing and Media Studies, Kyoto University [Invited Talk] Looking Back on My Research
Yuko Murayama (Iwate Prefectural Univ.) ICSS2015-52
 [more] ICSS2015-52
pp.31-34
ICSS, IPSJ-SPT 2016-03-03
15:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University Current Status and Issues of the Application of AI Technology for Digital Forensics
Shinichi Matsumoto (ISIT), Kouichi Sakurai (Kyushu Univ.)
 [more]
ICSS, IPSJ-SPT 2016-03-03
16:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University Issue analysis toward forensics gathering infrastructure that supports the more efficient incident handling
Daichi Hasumi, Shigeyoshi Shima, Takahiro Kakumaru (NEC) ICSS2015-53
Organization introducing ICT systems needs to properly respond to the information security incidents. In contrast, recen... [more] ICSS2015-53
pp.35-40
ICSS, IPSJ-SPT 2016-03-03
16:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University Privacy-preserving Log Analysis with Deterministic Encryption
Yuji Furuta, Naoto Yanai (Osaka Univ.), Masashi Karasaki (NTT-neomeit), Katsuhiko Eguchi (NTT Neomeit), Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) ICSS2015-54
Recently, an increase of attacks via a network is remarkable, and the observation and the analysis of log information is... [more] ICSS2015-54
pp.41-46
ICSS, IPSJ-SPT 2016-03-03
15:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University Detection of Vulnerability Scanning Using Features of Collective Accesses Collected from Several Honeypots
Naomi Kuze, Shu Ishikura (Osaka Univ.), Takeshi Yagi, Daiki Chiba (NTT), Masayuki Murata (Osaka Univ.) ICSS2015-55
Attacks against websites are increasing rapidly with the expansion of web services. Diversifying web services make it di... [more] ICSS2015-55
pp.47-52
ICSS, IPSJ-SPT 2016-03-03
16:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University Evaluation of the attack detection method based on duration of continuous packet arrival
Yuhei Hayashi, Satoshi Nishiyama, Akinori Suzuki, Katsuhiko Sakai, Ichiro Kudo, Kazunori Kamiya (NTT) ICSS2015-56
Application layer DDoS attacks occur frequently. In order to detect the attacks in network, a security appliance with De... [more] ICSS2015-56
pp.53-58
ICSS, IPSJ-SPT 2016-03-03
16:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University Investigation of cyber incident prediction method based on a technical analysis
Masaru Kawakita, Shigeyoshi Shima (NEC) ICSS2015-57
 [more] ICSS2015-57
pp.59-64
ICSS, IPSJ-SPT 2016-03-04
10:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University A fast detecting method for obfuscated malicious JavaScript based on text pattern analysis
Jiawei Su, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (YNU) ICSS2015-58
The malicious JavaScript is a common springboard for attackers to launch several types of network attacks, such as Drive... [more] ICSS2015-58
pp.65-70
ICSS, IPSJ-SPT 2016-03-04
10:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University Static Detection of ROP Chain Based on Hidden Markov Model
Toshinori Usui, Tomonori Ikuse, Makoto Iwamura, Takeshi Yada (NTT) ICSS2015-59
Threats of targeted attacks have been widely observed. The targeted attacks generally utilize malicious documents that c... [more] ICSS2015-59
pp.71-76
ICSS, IPSJ-SPT 2016-03-04
11:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University A Suspicious Processes Detection Scheme using Process Frequency and Network State
Junji Nakazato, Yu Tsuda, Eto Masashi, Daisuke Inoue, Koji Nakao (NICT) ICSS2015-60
Many serious security incidents caused by the targeted attacks have been occurred. The targeted attacks can not be preve... [more] ICSS2015-60
pp.77-82
ICSS, IPSJ-SPT 2016-03-04
11:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University Preliminary Studies of Linkage Analysis among Process Behavior for Intrusion Prevention
Yudai Tomaru, Masaki Hashimoto, Hidehiko Tanaka (iisec) ICSS2015-61
Recently, there are many malware measures such as targeted attacks, communicate with C&C servers, file creation, executi... [more] ICSS2015-61
pp.83-88
ICSS, IPSJ-SPT 2016-03-04
10:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University A Study of Security of an Authentication Method Using Public and Private Keys with Relaying Plural Key Pairs
Yusuke Ogata, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) ICSS2015-62
It is difficult to sufficiently protect web accounts using a password-based authentication method against threats of man... [more] ICSS2015-62
pp.89-94
ICSS, IPSJ-SPT 2016-03-04
10:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University Selection of authentication methods with game theory in VANET
Hiroaki Hiroaki, Masakazu Soshi (Hiroshima City Univ.) ICSS2015-63
Much attention has recently been paid to VANET (Vehicular Ad-hoc Networks), where moving vehicles wirelessly communicate... [more] ICSS2015-63
pp.95-100
ICSS, IPSJ-SPT 2016-03-04
11:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University Towards Non-Encryption-Based RFID Private Tag Authentication
Kazuya Sakai (TMU) ICSS2015-64
In this paper, we present the summary of our research project on RFID security and privacy. To be specific, we will pres... [more] ICSS2015-64
pp.101-104
 Results 1 - 20 of 29  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan