IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 56 of 56 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2014-03-28
12:05
Okinawa Meio Univiersity Identifying C&C Server by Analyzing Relation between Control Flow and Communications
Tomonori Ikuse, Kazufumi Aoki, Takeo Hariu (NTT) ICSS2013-81
In recent years, it is difficult to prevent malware infection entirely because of the diversi cation of attack vectors a... [more] ICSS2013-81
pp.137-142
ICSS, IPSJ-SPT 2014-03-28
14:20
Okinawa Meio Univiersity Design of HTTP Communication Profiling for Infected Hosts Detection
Daiki Chiba, Kensuke Nakata, Mitsuaki Akiyama, Kazufumi Aoki, Kazunori Kamiya, Takeshi Yagi (NTT) ICSS2013-84
Countermeasures against malware should need both prevention and detection of malware infection. Detection of malware-inf... [more] ICSS2013-84
pp.155-160
ICSS 2013-11-12
15:10
Fukuoka Nishijin Plaza An OEP Identifying Method based on the Order of Opcodes
Noriaki Nakamura, Masakatu Morii (Kobe Univ.), Ryoichi Isawa, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-59
To skip unpacking steps, automated generic unpacking methods are strongly required.Most of generic unpackers extract mem... [more] ICSS2013-59
pp.13-18
IA, ICSS 2013-06-21
13:25
Niigata Ao-re Nagaoka Generic Unpacking Method Using Data Execution Prevention
Ryoichi Isawa (NICT), Masaki Kamizono (NICT/SecureBrain Corporation), Daisuke Inoue (NICT) IA2013-13 ICSS2013-13
To skip unpacking steps, automated generic unpacking methods are strongly required. The basic idea of the generic unpack... [more] IA2013-13 ICSS2013-13
pp.73-78
LOIS 2013-03-08
14:50
Okinawa   A Study on Malware Traffic Detection by Using N-gram Probability Density
Kenji Kawamoto (Waseda Univ.), Masatsugu Ichino, Yusuke Otsuki (Univ. of Electro-Comm.), Mitsuhiro Hatada (NTT), Hiroshi Yoshiura (Univ. of Electro-Comm.), Jiro Katto (Waseda Univ.) LOIS2012-102
The threat of malware is increasing.
Malware detection has thus become important for the safety of the Internet usage.
... [more]
LOIS2012-102
pp.191-196
ICSS, IA 2012-06-22
09:50
Tokyo Room 1206, 1st bldg, Takanawa Campus, Tokai University A High-Speed Classification Method based on Opcode of Malware
Yang Zong, Hirofumi Yamaki, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) IA2012-8 ICSS2012-8
Malicious software in form of Internet worms, computer viruses, and trojan horses poses a major threat to the security o... [more] IA2012-8 ICSS2012-8
pp.43-48
RECONF 2011-09-27
11:25
Aichi Nagoya Univ. A proposal of pattern matching techniques using dynamically reconfigurable hardware
Masato Nogami, Nobuya Watanabe, Akira Nagoya (Okayama Univ.) RECONF2011-37
The pattern matching of the strings using hardware has the problem that increases circuit size when the number of patter... [more] RECONF2011-37
pp.87-92
NS 2011-05-19
13:10
Tokyo Sophia University Trust-value management considering second infection for P2P file sharing networks
Yuki Yamashita, Kenji Yokota (Kyoto Univ.), Takuya Asaka (Tokyo Metropolitan Univ.), Tatsuro Takahashi (Kyoto Univ.) NS2011-23
In recent years, malwares in P2P networks are a major problem. As one of the virus prevention methods, DTM (Dynamic trus... [more] NS2011-23
pp.41-46
ICSS 2011-03-25
15:35
Tokyo Suspended Development and evaluation of PDF malware analysis system using dynamic analysis
Masaki Kamizono, Masata Nishida, Yuji Hoshizawa (Securebrain Corp.) ICSS2010-64
Several Adobe Reader zero-day vulnerabilities have been discovered recently, and the threat of PDF malware continues to ... [more] ICSS2010-64
pp.47-52
NS, IN
(Joint)
2010-03-05
11:40
Miyazaki Miyazaki Phoenix Seagaia Resort (Miyazaki) A Scheme of Detecting Malware for Websites
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IN2009-200
This paper reports the actual situation of malware distributed to websites by constructing web honeypots, which carries ... [more] IN2009-200
pp.337-342
NS 2009-12-11
15:05
Ehime Ehime University (Ehime) A Study of Malware Spreading Detection in Mobile P2P Networks.
Masashi Yamashita, Keisuke Nakano, Masakazu Sengoku (Niigata Univ.) NS2009-141
Since the evolution of mobile devices, the risk of malware spreading in mobile peer to peer (P2P) networks increased. It... [more] NS2009-141
pp.115-118
ICSS 2009-11-13
11:05
Miyazaki University of Miyazaki Similarity Scoring Method of Runtime Packed Malware and its Evaluation
Tatsunori Orii, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (Yokohama Nat Univ.), Hyung Chan Kim, Daisuke Inoue, Koji Nakao (NICT) ICSS2009-55
A great number of malware have been generated and released over the Internet because of the underground distribution of ... [more] ICSS2009-55
pp.7-12
IN 2009-07-10
11:25
Hokkaido HOKKAIDO UNIVERSITY A Provider Provisioned Websites Protection Scheme against Malware Distribution
Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) IN2009-34
This paper proposes a website protection scheme for service providers by analyzing accesses to web honeynets, which carr... [more] IN2009-34
pp.55-60
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
13:25
Akita Akita University Investigation about Malware Distribution to Websites
Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) ISEC2009-32 SITE2009-24 ICSS2009-46
This paper reports the actual situation of malware distribution to websites by constructing web honeynets, which carries... [more] ISEC2009-32 SITE2009-24 ICSS2009-46
pp.175-180
ICSS 2009-05-15
14:20
Hyogo Kobe University Notes on Malware Detection System Based on Process Monitoring
Yuko Ozasa, Kengo Kuniyoshi, Akira Morikawa, Masakatu Morii (Kobe Univ.) ICSS2009-3
Due to the increase of malwares and its variants, such as bots, worms,
spywares and adwares, both personal and busines... [more]
ICSS2009-3
pp.9-14
WBS, IT, ISEC 2009-03-10
17:30
Hokkaido Hakodate Mirai Univ. Detecting anomalies by monitoring terminals in Home Network
Kengo Kuniyoshi, Masakatu Morii (Kobe Univ.) IT2008-94 ISEC2008-152 WBS2008-107
The system like IDS and IPS based on the handcrafted signatures which represent the illegal characteristics is effective... [more] IT2008-94 ISEC2008-152 WBS2008-107
pp.329-334
 Results 41 - 56 of 56 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan