Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2016-11-25 13:00 |
Kanagawa |
Institute of Information Security |
[Invited Talk]
Analyses of social needs and training programs of security human resources in Japan Masashi Eto (NICT), Masaki Kamizono (PwC Cyber Services LLC) ICSS2016-38 |
In response to the serious shortage of cybersecurity human resources in the domestic industry, a number of training prog... [more] |
ICSS2016-38 p.1 |
ICSS |
2016-11-25 13:50 |
Kanagawa |
Institute of Information Security |
Software-based Modification Detection of ECU for Automotive Network System Attestation Takuma Koyama, Junko Takahashi, Fumitaka Hoshino, Masashi Tanaka (NTT) ICSS2016-39 |
This paper proposes a software-based modification detection of the software of Electronic Control Units (ECU) in automot... [more] |
ICSS2016-39 pp.3-8 |
ICSS |
2016-11-25 14:15 |
Kanagawa |
Institute of Information Security |
Study of behavior each malware function from the API calls Nobuki Suetsugu, Masaki Hashimoto (IISEC) ICSS2016-40 |
In recent years, there are various studies to malicious behavior detection. In particular, for the detection, much techn... [more] |
ICSS2016-40 pp.9-14 |
ICSS |
2016-11-25 14:40 |
Kanagawa |
Institute of Information Security |
A fuzz testing method cooperated with threat modeling Yasuhiko Nishio, Tadashi Shiroma (CCDS), Hiroyuki Inoue (CCDS/HCU) ICSS2016-41 |
The purpose of this study is to develop a fuzz testing method that can ensure the IoT security especially automotive sys... [more] |
ICSS2016-41 pp.15-20 |
ICSS |
2016-11-25 15:20 |
Kanagawa |
Institute of Information Security |
Discussion and Evaluation on Regeneration of New Kyoto 2006+ Data Set Ryunosuke Tada, Ryotaro Kobayashi (Toyohashi Univ. of Tech.), Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2016-42 |
Network-based Intrusion Detection Systems (NIDSs) are used to counteract cyber-attacks, and thus various studies have be... [more] |
ICSS2016-42 pp.21-26 |
ICSS |
2016-11-25 15:45 |
Kanagawa |
Institute of Information Security |
Report on WhibOx 2016 White-Box Cryptography and Obfuscation Kazuomi Oishi (SIST) ICSS2016-43 |
A report on WhibOx 2016 is presented. WhibOx 2016 is a one-time workshop on white-box cryptogra-phy and obfuscation. It ... [more] |
ICSS2016-43 pp.27-29 |
ICSS |
2016-11-25 16:10 |
Kanagawa |
Institute of Information Security |
Performance of link-mining techniques to detect malicious websites Yasuhiro Takano, Daiki Ito, Tatsuya Nagai (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-44 |
Conventional techniques to avoid malicious websites techniques by referring URL's keywords reported in black lists have ... [more] |
ICSS2016-44 pp.31-35 |
ICSS |
2016-11-25 16:35 |
Kanagawa |
Institute of Information Security |
Clustering of Attacking Devices using Active Monitoring Takahiro Kasama, Daisuke Inoue (NICT) ICSS2016-45 |
(To be available after the conference date) [more] |
ICSS2016-45 pp.37-42 |