Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2014-03-28 12:05 |
Okinawa |
Meio Univiersity |
Identifying C&C Server by Analyzing Relation between Control Flow and Communications Tomonori Ikuse, Kazufumi Aoki, Takeo Hariu (NTT) ICSS2013-81 |
In recent years, it is difficult to prevent malware infection entirely because of the diversication of attack vectors a... [more] |
ICSS2013-81 pp.137-142 |
ICSS, IPSJ-SPT |
2014-03-28 14:20 |
Okinawa |
Meio Univiersity |
Design of HTTP Communication Profiling for Infected Hosts Detection Daiki Chiba, Kensuke Nakata, Mitsuaki Akiyama, Kazufumi Aoki, Kazunori Kamiya, Takeshi Yagi (NTT) ICSS2013-84 |
Countermeasures against malware should need both prevention and detection of malware infection. Detection of malware-inf... [more] |
ICSS2013-84 pp.155-160 |
ICSS |
2013-11-12 15:10 |
Fukuoka |
Nishijin Plaza |
An OEP Identifying Method based on the Order of Opcodes Noriaki Nakamura, Masakatu Morii (Kobe Univ.), Ryoichi Isawa, Daisuke Inoue, Koji Nakao (NICT) ICSS2013-59 |
To skip unpacking steps, automated generic unpacking methods are strongly required.Most of generic unpackers extract mem... [more] |
ICSS2013-59 pp.13-18 |
IA, ICSS |
2013-06-21 13:25 |
Niigata |
Ao-re Nagaoka |
Generic Unpacking Method Using Data Execution Prevention Ryoichi Isawa (NICT), Masaki Kamizono (NICT/SecureBrain Corporation), Daisuke Inoue (NICT) IA2013-13 ICSS2013-13 |
To skip unpacking steps, automated generic unpacking methods are strongly required. The basic idea of the generic unpack... [more] |
IA2013-13 ICSS2013-13 pp.73-78 |
LOIS |
2013-03-08 14:50 |
Okinawa |
|
A Study on Malware Traffic Detection by Using N-gram Probability Density Kenji Kawamoto (Waseda Univ.), Masatsugu Ichino, Yusuke Otsuki (Univ. of Electro-Comm.), Mitsuhiro Hatada (NTT), Hiroshi Yoshiura (Univ. of Electro-Comm.), Jiro Katto (Waseda Univ.) LOIS2012-102 |
The threat of malware is increasing.
Malware detection has thus become important for the safety of the Internet usage.
... [more] |
LOIS2012-102 pp.191-196 |
ICSS, IA |
2012-06-22 09:50 |
Tokyo |
Room 1206, 1st bldg, Takanawa Campus, Tokai University |
A High-Speed Classification Method based on Opcode of Malware Yang Zong, Hirofumi Yamaki, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) IA2012-8 ICSS2012-8 |
Malicious software in form of Internet worms, computer viruses, and trojan horses poses a major threat to the security o... [more] |
IA2012-8 ICSS2012-8 pp.43-48 |
RECONF |
2011-09-27 11:25 |
Aichi |
Nagoya Univ. |
A proposal of pattern matching techniques using dynamically reconfigurable hardware Masato Nogami, Nobuya Watanabe, Akira Nagoya (Okayama Univ.) RECONF2011-37 |
The pattern matching of the strings using hardware has the problem that increases circuit size when the number of patter... [more] |
RECONF2011-37 pp.87-92 |
NS |
2011-05-19 13:10 |
Tokyo |
Sophia University |
Trust-value management considering second infection for P2P file sharing networks Yuki Yamashita, Kenji Yokota (Kyoto Univ.), Takuya Asaka (Tokyo Metropolitan Univ.), Tatsuro Takahashi (Kyoto Univ.) NS2011-23 |
In recent years, malwares in P2P networks are a major problem. As one of the virus prevention methods, DTM (Dynamic trus... [more] |
NS2011-23 pp.41-46 |
ICSS |
2011-03-25 15:35 |
Tokyo |
Suspended |
Development and evaluation of PDF malware analysis system using dynamic analysis Masaki Kamizono, Masata Nishida, Yuji Hoshizawa (Securebrain Corp.) ICSS2010-64 |
Several Adobe Reader zero-day vulnerabilities have been discovered recently, and the threat of PDF malware continues to ... [more] |
ICSS2010-64 pp.47-52 |
NS, IN (Joint) |
2010-03-05 11:40 |
Miyazaki |
Miyazaki Phoenix Seagaia Resort (Miyazaki) |
A Scheme of Detecting Malware for Websites Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IN2009-200 |
This paper reports the actual situation of malware distributed to websites by constructing web honeypots, which carries ... [more] |
IN2009-200 pp.337-342 |
NS |
2009-12-11 15:05 |
Ehime |
Ehime University (Ehime) |
A Study of Malware Spreading Detection in Mobile P2P Networks. Masashi Yamashita, Keisuke Nakano, Masakazu Sengoku (Niigata Univ.) NS2009-141 |
Since the evolution of mobile devices, the risk of malware spreading in mobile peer to peer (P2P) networks increased. It... [more] |
NS2009-141 pp.115-118 |
ICSS |
2009-11-13 11:05 |
Miyazaki |
University of Miyazaki |
Similarity Scoring Method of Runtime Packed Malware and its Evaluation Tatsunori Orii, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (Yokohama Nat Univ.), Hyung Chan Kim, Daisuke Inoue, Koji Nakao (NICT) ICSS2009-55 |
A great number of malware have been generated and released over the Internet because of the underground distribution of ... [more] |
ICSS2009-55 pp.7-12 |
IN |
2009-07-10 11:25 |
Hokkaido |
HOKKAIDO UNIVERSITY |
A Provider Provisioned Websites Protection Scheme against Malware Distribution Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) IN2009-34 |
This paper proposes a website protection scheme for service providers by analyzing accesses to web honeynets, which carr... [more] |
IN2009-34 pp.55-60 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 13:25 |
Akita |
Akita University |
Investigation about Malware Distribution to Websites Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) ISEC2009-32 SITE2009-24 ICSS2009-46 |
This paper reports the actual situation of malware distribution to websites by constructing web honeynets, which carries... [more] |
ISEC2009-32 SITE2009-24 ICSS2009-46 pp.175-180 |
ICSS |
2009-05-15 14:20 |
Hyogo |
Kobe University |
Notes on Malware Detection System Based on Process Monitoring Yuko Ozasa, Kengo Kuniyoshi, Akira Morikawa, Masakatu Morii (Kobe Univ.) ICSS2009-3 |
Due to the increase of malwares and its variants, such as bots, worms,
spywares and adwares, both personal and busines... [more] |
ICSS2009-3 pp.9-14 |
WBS, IT, ISEC |
2009-03-10 17:30 |
Hokkaido |
Hakodate Mirai Univ. |
Detecting anomalies by monitoring terminals in Home Network Kengo Kuniyoshi, Masakatu Morii (Kobe Univ.) IT2008-94 ISEC2008-152 WBS2008-107 |
The system like IDS and IPS based on the handcrafted signatures which represent the illegal characteristics is effective... [more] |
IT2008-94 ISEC2008-152 WBS2008-107 pp.329-334 |