Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2020-03-02 10:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Improvement of the Backup Method Dealing with 2 Types of Damages Taiga Hasuike, Masahiro Mambo (Kanazawa Univ.) ICSS2019-68 |
It is important to back up data regularly to ensure data availability.
When performing a backup, the system may be dest... [more] |
ICSS2019-68 pp.1-6 |
ICSS, IPSJ-SPT |
2020-03-02 10:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Estimation method of information asset security attributes using design mode Takeshi Ueda, Koichi Shimizu, Shun Hinatsu, Fumio Omatsu (Mitsubishi Electric Corp.) ICSS2019-69 |
In security evaluation such as risk analysis, analysis is performed based on the value of information assets in the syst... [more] |
ICSS2019-69 pp.7-12 |
ICSS, IPSJ-SPT |
2020-03-02 10:40 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Information Rates for Multiple Assignment Schemes on Five Participants Yutaro Shimma, Kouya Tochikubo (Nihon Univ.) ICSS2019-70 |
In 1988, Ito et al. proposed a multiple assignment secret sharing scheme. Their scheme can realize an arbitrary access s... [more] |
ICSS2019-70 pp.13-18 |
ICSS, IPSJ-SPT |
2020-03-02 11:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
A Verification Method of Infrastructure as Code using Alloy Analyzer Ryo Hase, Yohei Matsuura (Mitsubishi Electric) ICSS2019-71 |
[more] |
ICSS2019-71 pp.19-24 |
ICSS, IPSJ-SPT |
2020-03-02 11:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Effect of Environmental Temperature Change in LED Fingerprinting Ayaka Tsuchiya, Akiko Toh, Yang Li, Kazuo Sakiyama, Takeshi Sugawara (UEC) ICSS2019-72 |
Fingerprinting is a technique to identify mass-produced products by using their variations in fabrication. In particular... [more] |
ICSS2019-72 pp.25-29 |
ICSS, IPSJ-SPT |
2020-03-02 11:50 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Log Storing System Using Blockchain Takashi Ikeda, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2019-73 |
[more] |
ICSS2019-73 pp.31-36 |
ICSS, IPSJ-SPT |
2020-03-02 13:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
ICSS2019-74 |
(To be available after the conference date) [more] |
ICSS2019-74 pp.37-42 |
ICSS, IPSJ-SPT |
2020-03-02 13:50 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Search for Similar Binary Code in Cross-Architecture Using Neural Machine Translation Model Moritoshi Aoyanagi, Hidenori Tsuji, Masaki Hashimoto (IISEC) ICSS2019-75 |
Binary code similarity comparison plays an important role in binary code analysis, vulnerability detection, and stolen c... [more] |
ICSS2019-75 pp.43-48 |
ICSS, IPSJ-SPT |
2020-03-02 14:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
A Study on Fuzzing for Device Drivers with AddressSanitizer Kentaro Ishii (Kove Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kove Univ.) ICSS2019-76 |
A device driver is a program which runs with higher privilege in an operating system. If a device driver is compromised,... [more] |
ICSS2019-76 pp.49-53 |
ICSS, IPSJ-SPT |
2020-03-02 14:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Development of a recovery tool for a ransomware infected PC Ryosuke Kokado (Kobe Univ.), Masato Ikegami, Tomohisa Hasegawa, Takafumi Harada, Hiroshi Kitani (Canon MJ), Masakatu Morii (Kobe Univ.) ICSS2019-77 |
In recent years, malware called ransomware, which encrypts data on terminal devices, including servers and personal comp... [more] |
ICSS2019-77 pp.55-60 |
ICSS, IPSJ-SPT |
2020-03-02 15:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Backdoor Detection Based On Network Functions For IoT Devices Minami Yoda, Shuji Sakuraba, Junichi Yamamoto (UEC), Yuichi Sei (UEC/JST PRESTO), Yasuyuki Tahara, Akihiko Ohsuga (UEC) ICSS2019-78 |
We propose a method to detect a hardcoded username and password in IoT devices by means of static analysis.
Our appr... [more] |
ICSS2019-78 pp.61-65 |
ICSS, IPSJ-SPT |
2020-03-02 15:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Evaluating Effectiveness of a Timing Attack on Android Devices in JavaScript Keisuke Sugita (Kobe Univ.), Ryoichi Isawa (NICT), Masakatsu Morii (Kobe Univ.) ICSS2019-79 |
(To be available after the conference date) [more] |
ICSS2019-79 pp.67-71 |
ICSS, IPSJ-SPT |
2020-03-02 15:40 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Proposing Criteria for Detecting Internet-Wide Scanners for Darknet Monitoring Yukiko Endo, Yoshiki Mori (NICT), Jumpei Shimamura (Clwit), Masaki Kubo (NICT) ICSS2019-80 |
The NICTER project has been observing the darknet (observing packets arriving at unused IP addresses) for over 10 years.... [more] |
ICSS2019-80 pp.73-78 |
ICSS, IPSJ-SPT |
2020-03-02 16:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
An analysis of IoT malware infection pattern based on Internet-wide scan and darknet observation Shun Morishita, Kota Ogawa (YNU), Satoshi Hara (YNU/FSI), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2019-81 |
While IoT malware such as Mirai have been targeting Telnet services, there are still many devices that are still running... [more] |
ICSS2019-81 pp.79-84 |
ICSS, IPSJ-SPT |
2020-03-02 16:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Mirai may detect that you talk to smart speaker
-- On privacy violation by attackers who compromised home router -- Shoya Okuda, Tatsuya Tamai, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2019-82 |
In this study, we analyze the traffic of four popular smart speakers to assess the risk of privacy invasion by attackers... [more] |
ICSS2019-82 pp.85-90 |
ICSS, IPSJ-SPT |
2020-03-03 09:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
A research of HTTP request and an identification method of fake User-Agent values Masato Inoue, Masaki Hashimoto (IISEC) ICSS2019-83 |
Almost all websites that are open to the public are subject to scan and attack, and have received a lot of anomaly reque... [more] |
ICSS2019-83 pp.91-96 |
ICSS, IPSJ-SPT |
2020-03-03 09:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Preliminary Study of WAF Signature Generation by Utilizing Real-time Information on the Web Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2019-84 |
Zero-day attacks and attacks based on publicly disclosed vulnerability information are one of the major threats in netwo... [more] |
ICSS2019-84 pp.97-102 |
ICSS, IPSJ-SPT |
2020-03-03 09:50 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Analysis of Cyber-attacks Observed by a Simple TLS Honeypot Listening on All Ports Daisuke Makita (NICT), Jumpei Shimamura (clwit), Masaki Kubo, Daisuke Inoue (NICT) ICSS2019-85 |
As various devices have been connected to the Internet, cyber-attacks targeting them have also been increasing. Since va... [more] |
ICSS2019-85 pp.103-108 |
ICSS, IPSJ-SPT |
2020-03-03 10:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Local survey on transitioning of TLS version and EV Certificates Usage (FY2019 4Q) Yuji Suga (IIJ) ICSS2019-86 |
(To be available after the conference date) [more] |
ICSS2019-86 pp.109-111 |
ICSS, IPSJ-SPT |
2020-03-03 10:40 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Development of an expert system for automatic classification of illegal and harmful information on the dark web Hanae Kobayashi, Masaki Hashimoto (IISEC) ICSS2019-87 |
(To be available after the conference date) [more] |
ICSS2019-87 pp.113-118 |