IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 6 of 6  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
SAT, SANE
(Joint)
2024-02-09
13:20
Kagoshima AmaHome PLAZA (Amami City Shimin Koryu Center)
(Primary: On-site, Secondary: Online)
Secure Firmware Updates for Nano-Satellites: Design Considerations and PoC Implementation
Yuta Nakagawa, Keika Mori, Ryoya Furukawa, Hiroshi Kumagai, Masaki Kamizono (DTCY) SANE2023-111
With the increase in the number of satellite launches in recent years, cyber attacks on satellites have become a serious... [more] SANE2023-111
pp.43-48
SAT, SANE
(Joint)
2024-02-09
13:45
Kagoshima AmaHome PLAZA (Amami City Shimin Koryu Center)
(Primary: On-site, Secondary: Online)
Cyber Threat Analysis for Nano-Satellites
Keika Mori, Ryoya Furukawa, Yuta Nakagawa, Kotaro Saito, Yusuke Yamamoto, FajardoTapia Isai, Shogo Suzuki, Hiroshi Kumagai, Masaki Kamizono (DTCY) SANE2023-112
The number of launches of nano-satellites is increasing due to more frequent launch opportunities and lower development ... [more] SANE2023-112
pp.49-54
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-20
14:25
Online Online Cryptocurrency Analysis System for Investigating Cyber Crime Economy
Hiroshi Mori, Hiroshi Kumagai, Yin Minn Pa Pa, Yuta Takata, Ryoya Furukawa, Yuji Sakurai, Masaki Kamizono (DTCY) ISEC2022-24 SITE2022-28 BioX2022-49 HWS2022-24 ICSS2022-32 EMM2022-32
 [more] ISEC2022-24 SITE2022-28 BioX2022-49 HWS2022-24 ICSS2022-32 EMM2022-32
pp.98-103
ICSS, IPSJ-SPT 2017-03-14
10:55
Nagasaki University of Nagasaki A Vulnerability Analysis of Android Applications from the View of Framework
Ryoya Furukawa, Tatsuya Nagai (Kobe Univ.), Hiroshi Kumagai, Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.)
 [more]
ICSS, IA 2016-06-06
14:10
Saga Saga University Method to Locate Cryptographic Functions from Malware
Ryoya Furukawa (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT)
 [more]
IA, ICSS 2015-06-11
14:55
Fukuoka Kyushu Institute of Technology Univ. An Empirical Evaluation of Locating Cryptographic Functions on the Memory
Ryoya Furukawa (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT) IA2015-4 ICSS2015-4
This paper presents a simple and effective idea to locate cryptographic functions on the memory for malware analysis.
... [more]
IA2015-4 ICSS2015-4
pp.15-20
 Results 1 - 6 of 6  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan