Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, ICSS |
2024-06-17 15:20 |
Okayama |
Okayama University (Primary: On-site, Secondary: Online) |
Domain block list using Xor Filter to achieve low false positive rate and memory efficiency in P4 Kentaro Haruna, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) |
[more] |
|
IN, IA (Joint) |
2023-12-22 15:40 |
Hiroshima |
Satellite Campus Hiroshima |
A Cooperation Method for Countermeasure against DDoS Attacks in CDNs Interconnected by CDNI Kazuki Takashima, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2023-55 |
Currently, CDNs are one of major targets of DDoS attacks.
CDNs in CDNI, which aims to interconnect various CDNs for con... [more] |
IA2023-55 pp.59-66 |
IA |
2023-11-22 15:20 |
Aomori |
Aomori Prefecture Tourist Center ASPM (Aomori) (Primary: On-site, Secondary: Online) |
A Study on Observation of Cascading Changes of Objects in the Kubernetes Control Plane Using Distributed Tracing Tomoyuki Ehira, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2023-39 |
Kubernetes, a container operations management system, has a mechanism for automatically recovering from failures by main... [more] |
IA2023-39 pp.18-24 |
ICSS, IPSJ-SPT |
2023-03-13 15:40 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Generating Attack Trace Dataset Focusing on Attack Techniques and the Damage Caused by Each. Masahito Kumazaki, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) ICSS2022-56 |
[more] |
ICSS2022-56 pp.49-54 |
IA |
2023-01-25 13:55 |
Osaka |
Osaka Umeda Campus, Kwansei Gakuin University (Osaka) (Primary: On-site, Secondary: Online) |
Fast Container Image Updating with Binary Delta Encoding Naoki Matsumoto, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2022-70 |
Container is an execution environment isolation technology for Linux. By distributing container images that consolidate ... [more] |
IA2022-70 pp.14-21 |
IA |
2022-11-21 15:55 |
Niigata |
Bandai Civic Hall (Niigata) (Primary: On-site, Secondary: Online) |
The visibility of port scan traffic analysis in many small-scale darknets Kodai Mizutani, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2022-43 |
Darknets are one of information sources to grasp a trend of cyber-attcks. While the demand for IPv4 addresses is high, t... [more] |
IA2022-43 pp.39-46 |
IA |
2022-11-21 16:20 |
Niigata |
Bandai Civic Hall (Niigata) (Primary: On-site, Secondary: Online) |
Outsourcing Malware Dynamic Analysis without Disclosing File Contents Keisuke Hamajima, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2022-44 |
Malware dynamic analysis requires specialized skills. If there are no security experts in the organization and it is dif... [more] |
IA2022-44 pp.47-51 |
SITE, IA, IPSJ-IOT [detail] |
2021-03-02 13:30 |
Online |
Online |
User-Centric Capability Based Authorization and Access Control in Home Network Naoki Matsumoto, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) SITE2020-52 IA2020-48 |
Multifunctional devices such as smart speakers are now connected to our home network. However, there is no way for users... [more] |
SITE2020-52 IA2020-48 pp.85-92 |
IA, IN (Joint) |
2020-12-15 11:15 |
Online |
Online |
Network Control in a Cloud Platform Using Identities of Workloads and It's Application to Packet Filtering Kentaro Ohnishi, Daisuke Kotani (Kyoto Univ.), Hirofumi Ichihara, Yohei Kanemaru (LINE), Yasuo Okabe (Kyoto Univ.) IA2020-30 |
Conventional network controls use IP addresses and port numbers (Locators) as identifiers of Workloads like processes an... [more] |
IA2020-30 pp.22-29 |
IA |
2020-10-01 11:40 |
Online |
Online |
Ethical Education on Information Security Mind for Practical Security Learning Yoshinari Kanaya (Tohoku Univ.), Daisuke Kotani (Kyoto Univ.), Katsuyoshi Iida (Hokkaido Univ.), Hideaki Sone (Tohoku Univ.) IA2020-2 |
Practical education on information security may cause trouble if any student in the course tries the new education again... [more] |
IA2020-2 pp.6-9 |
IA |
2017-11-16 14:15 |
Overseas |
KMITL, Bangkok, Thailand |
Xilara: XSS audItor using htmL templAte restoRAtion Keitaro Yamazaki, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2017-49 |
Mitigating Cross Site Scripting (XSS) is important to protect user's sensitive data in the web applications.
XSS mitiga... [more] |
IA2017-49 pp.89-94 |
IA |
2017-11-10 11:30 |
Kumamoto |
Hotel Greenpia Minamiaso |
Investigation of A Method for Detecting New Scanning Activities by Correlating Low-Interaction Honeypots with Darknet Ryoh Akiyoshi, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2017-25 |
In this paper, we discuss a method for detecting new scanning activities by using low-interaction honeypots and darknet.... [more] |
IA2017-25 pp.13-18 |
IA |
2017-11-10 11:55 |
Kumamoto |
Hotel Greenpia Minamiaso |
A Low-Interaction Honeypot Observing Potential Vulnerabilities against HTTP/2 Katsuki Koiwa, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2017-26 |
A honeypots are used as a mechanism to detect cyber attacks against unknown vulnerabilities. Honeypot is a decoy system... [more] |
IA2017-26 pp.19-23 |
IA |
2017-11-10 13:10 |
Kumamoto |
Hotel Greenpia Minamiaso |
A Mixed Integer Programming Formulation for Network Optimization under Tunneling-based Traffic Engineering Schemes. Tsubasa Munemitsu, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2017-27 |
To utilize the resource of a network efficiently, not a few methods are proposed to decentralize the load of a network b... [more] |
IA2017-27 pp.25-30 |
IA |
2016-11-09 13:35 |
Hokkaido |
Onuma International Seminar Hous |
Design of a Threshold-based Authentication System Which Provides Attributes Using Secret Sharing Tomohiro Ito, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2016-57 |
In identity federation, each service provider verifies the identity of a user based on authentication performed by an au... [more] |
IA2016-57 pp.7-12 |
IA |
2016-11-09 16:40 |
Hokkaido |
Onuma International Seminar Hous |
Fine-grained traffic control on software router Takaaki Kuwabara, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2016-60 |
We consider fine-grained traffic control on the ingress router in a tree-structured stub network site based on the sourc... [more] |
IA2016-60 pp.23-28 |
IA |
2016-11-04 15:05 |
Overseas |
Taipei (Taiwan) |
An anonymous distributed electronic voting system using Zerocoin Yu Takabatake, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2016-54 |
Existing e-voting systems rely on a database managed by an administrator, and hence the administrator may possibly count... [more] |
IA2016-54 pp.127-131 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-27 14:55 |
Ishikawa |
Hotel Rurikoh |
A Packet-In Message Filter in OpenFlow Switches Considering Wildcarded Headers Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) SITE2013-61 IA2013-86 |
OpenFlow switches forward packets to a controller as Packet-In messages if specified by the flow table. If switches rece... [more] |
SITE2013-61 IA2013-86 pp.43-48 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-27 16:25 |
Ishikawa |
Hotel Rurikoh |
An Efficient Judging Method of a Large Amount of E-mails Having the Same Sender and Recipient Addresses Yoshiharu Tsuzaki, Ryosuke Matsumoto, Daisuke Kotani, Shuichi Miyazaki, Yasuo Okabe (Kyoto Univ.) SITE2013-62 IA2013-87 |
With the wide use of e-mail, it has become commonly expected that e-mails are delivered to recipients immediately. It is... [more] |
SITE2013-62 IA2013-87 pp.61-66 |
IA |
2012-09-21 14:40 |
Tokyo |
|
A Method of Controlling Packet-In Messages in OpenFlow Switches for Reducing Loads of Switches and Control Networks Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2012-17 |
We propose a method to filter out packets of heavy flows forwarded to the controller in OpenFlow switches to reduce swit... [more] |
IA2012-17 pp.31-36 |