IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 32 of 32 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2015-03-03
16:15
Okinawa Meio Univiersity Link Structural Analysis of Drive-by-Download Attacks
Yuji Dairiki (Kobe Univ.), Masaki Kamizono (SecureBrain), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2014-70
In analyzing Drive-by-Download (DBD) attack, it is basic and essential to analysis the link structure through tracking t... [more] ICSS2014-70
pp.43-48
ICSS 2015-03-04
10:50
Okinawa Meio Univiersity Prediction of Malware Activities based on Loopback Address from DNS
Masaki Kamizono (NICT/SecureBrain), Takashi Tomine, Yu Tsuda, Masashi Eto (NICT), Yuji Hoshizawa (Securebrain Corporation), Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (ynu) ICSS2014-80
During malware dynamic analysis, the analysis system often finds the loopback address in responses of DNS name resolutio... [more] ICSS2014-80
pp.103-108
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
14:40
Hokkaido San-Refure Hakodate Analysis of Cyber-attack Infrastructure with Malicious Website focused on Backdoor Shell
Masaki Kamizono (YNU/NICT), Yuji Hoshizawa (SecureBrain), Takahiro Kasama, Masashi Eto, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ISEC2014-46 SITE2014-41 ICSS2014-50 EMM2014-46
 [more] ISEC2014-46 SITE2014-41 ICSS2014-50 EMM2014-46
pp.321-326
ICSS, IA 2014-06-06
10:30
Hyogo Takikawa Memorial Hall, Kobe University Malicious Web Site Detection Based on Redirection Control using Client Environment
Takahiro Kasama, Masashi Eto (NICT), Masaki Kamizono (NICT/SecureBrain), Daisuke Inoue (NICT) IA2014-5 ICSS2014-5
 [more] IA2014-5 ICSS2014-5
pp.21-26
ICSS, IA 2014-06-06
10:55
Hyogo Takikawa Memorial Hall, Kobe University Development of an Environment-independent Dynamic Analysis System for Document Malware
Masaki Kamizono (NICT/SecureBrain), Kazuki Iwamoto (SecureBrain), Takahiro Kasama, Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) IA2014-6 ICSS2014-6
 [more] IA2014-6 ICSS2014-6
pp.27-32
ICSS, IPSJ-SPT 2014-03-28
11:15
Okinawa Meio Univiersity Timeline-Based Event Log Viewer over Multi-Host Environment
Takashi Tomine, Yu Tsuda, Masaki Kamizono (NICT), Kazunori Sugiura (Keio Univ.), Daisuke Inoue, Koji Nakao (NICT) ICSS2013-79
A cyber attacking becomes clever and complicated.
Recently the number of Advanced Persistent Threat (APT) attacks to ge... [more]
ICSS2013-79
pp.125-130
ICSS, IPSJ-SPT 2014-03-28
14:45
Okinawa Meio Univiersity Supporting Effect Assessment of Accessing Malicious Web Sites with Multi-Environment Analysis
Takayuki Yoshinori, Akihito Shinoda (Nagoya Inst. of Tech), Masaki Kamizono (NICT), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech) ICSS2013-85
It is not always true that enough information can be got by just using website analysis services, because some malicious... [more] ICSS2013-85
pp.161-166
IA, ICSS 2013-06-21
13:25
Niigata Ao-re Nagaoka Generic Unpacking Method Using Data Execution Prevention
Ryoichi Isawa (NICT), Masaki Kamizono (NICT/SecureBrain Corporation), Daisuke Inoue (NICT) IA2013-13 ICSS2013-13
To skip unpacking steps, automated generic unpacking methods are strongly required. The basic idea of the generic unpack... [more] IA2013-13 ICSS2013-13
pp.73-78
ICSS 2013-03-25
14:55
Kanagawa Yokohama National University Network-based classification of remote exploit attacks focusing on UUID
Yusuke Takahashi (Yokohama National Univ.), Masaki Kamizono, Yuji Hoshizawa (Securebrain), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2012-65
Remote exploit attacks, which target vulnerabilities of network services, is the class of most common attacks utilized i... [more] ICSS2012-65
pp.49-54
ICSS 2011-03-25
15:35
Tokyo Suspended Development and evaluation of PDF malware analysis system using dynamic analysis
Masaki Kamizono, Masata Nishida, Yuji Hoshizawa (Securebrain Corp.) ICSS2010-64
Several Adobe Reader zero-day vulnerabilities have been discovered recently, and the threat of PDF malware continues to ... [more] ICSS2010-64
pp.47-52
IA, ICSS 2009-06-18
11:10
Tokyo Kikai-Shinko-Kaikan Bldg A proposal for autonomous crawling client honeypot
Yuji Hoshizawa, Kazuo Kawamorita, Tsuyoshi Tachikawa, Masaki Kamizono (SecureBrain Corp.) IA2009-3 ICSS2009-11
In recent years, the trend in attack techniques of malware is changing from active attack targeting vulnerabilities, to ... [more] IA2009-3 ICSS2009-11
pp.13-17
ISEC, LOIS 2004-11-09
13:50
Osaka Osaka Univ. On Constructing the Illegal Code Detecting System on Memory for Virus Analysis
Sachihiro Ichikawa, Masaki Kamizono (Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (Univ. of Tokushima)
 [more] ISEC2004-93 OIS2004-60
pp.57-62
 Results 21 - 32 of 32 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan