IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
... (for ESS/CS/ES/ISS)
Tech. Rep. Archives
... (for ES/CS)
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 17件中 1~17件目  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA, ICSS 2015-06-11
13:45
Fukuoka Kyushu Institute of Technology Univ. [Invited Talk] Establishment of Cybersecurity Education by Industry-Academia Collaboration
Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.)
 [more] IA2015-2 ICSS2015-2
pp.3-8
IA, ICSS 2015-06-12
10:50
Fukuoka Kyushu Institute of Technology Univ. Detecting Malicious Domain Names based on the Time-series Analysis of Attackers Network Resources
Daiki Chiba (NTT/Waseda Univ.), Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeshi Yada, Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.)
Attackers launching cyber attacks frequently change their malicious websites to evade countermeasures such as blacklisti... [more] IA2015-10 ICSS2015-10
pp.51-56
ICSS, IA 2014-06-06
13:00
Hyogo Takikawa Memorial Hall, Kobe University Analyzing Dynamic Class Loaded Applications in Android
Takaaki Nagumo, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT)
 [more] IA2014-8 ICSS2014-8
pp.39-44
ICSS, IPSJ-SPT 2014-03-27
13:30
Okinawa Meio Univiersity Measuring Lifetime of Malicious Website Based on Redirection from Compromised Websites
Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT)
Attackers continuously generate URLs and FQDNs of malicious websites in order to circumvent security countermeasures
us... [more]
ICSS2013-71
pp.53-58
ICSS, IPSJ-SPT 2014-03-27
13:55
Okinawa Meio Univiersity An Investigation of Malicious JavaScript Code used in Drive-by Download
Yuta Takata, Mitsuaki Akiyama, Takeo Hariu (NTT)
Malicious website contains JavaScript code that exploits vulnerabilities in the browser or the browser's plugins.Researc... [more] ICSS2013-72
pp.59-64
ICSS, IPSJ-SPT 2014-03-27
14:20
Okinawa Meio Univiersity Implementation and Evaluation of Web Phantom: Hybrid Web Honeypot
Takeshi Yagi, Takeo Hariu (NTT)
 [more] ICSS2013-73
pp.65-70
ICSS, IPSJ-SPT 2014-03-28
12:05
Okinawa Meio Univiersity Identifying C&C Server by Analyzing Relation between Control Flow and Communications
Tomonori Ikuse, Kazufumi Aoki, Takeo Hariu (NTT)
In recent years, it is difficult to prevent malware infection entirely because of the diversi cation of attack vectors a... [more] ICSS2013-81
pp.137-142
ICSS 2013-11-12
14:15
Fukuoka Nishijin Plaza Evaluations of Multi-Stage Traffic Analysis against Attacks on Websites
Takeshi Yagi, Takeo Hariu (NTT), Hiroki Takakura (Nagoya University)
This paper proposes a traffic analysis scheme to detect attacks from accesses to websites. Conventional schemes can dete... [more] ICSS2013-57
pp.3-8
IN, NV
(Joint)
2013-07-18
11:35
Hokkaido Hokkaido Univ. Faculty of Eng. Academic Lounge 3 Analysis of Blacklist Update Frequency for Monitoring Malware Infection Attacks on Websites
Takeshi Yagi, Takeo Hariu (NTT), Hiroyuki Ohsaki (Kwansei Gakuin Univ.), Masayuki Murata (Osaka Univ.)
(Advance abstract in Japanese is available) [more] IN2013-38
pp.13-18
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
13:30
Hokkaido   Identifying the Code to be Analyzed with Taint Tags
Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu (NTT)
 [more] ISEC2012-20 SITE2012-16 ICSS2012-22 EMM2012-12
pp.77-82
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
15:25
Hokkaido   Detecting Invalid Control Flow with Pseudo-Dispersion of Program Code
Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu (NTT)
Attacks that modify the control flow of a running program by corrupting memory address pointers have been a major threat... [more] ISEC2012-24 SITE2012-20 ICSS2012-26 EMM2012-16
pp.103-108
IA, ICSS 2011-06-17
15:00
Fukuoka Kyushu Institute of Technology Analysis of Website Infections using Malware
Takeshi Yagi, Shinta Nakayama, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Mitsutaka Itoh (NTT)
This paper reports the actual situation of website infections using malware. Recently, with the widespread of the web, m... [more] IA2011-13 ICSS2011-13
pp.75-80
IN, MoNA
(Joint)
2010-11-18
14:50
Fukuoka Fukuoka Institute of Technology Architecture Design of Web Phantom: Hybrid Web Honeypot
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT)
This paper proposes a hybrid web honeypot, namely Web Phantom, which generates a blacklist to prevent malware infection ... [more] IN2010-85
pp.25-30
IN 2010-07-08
15:25
Hokkaido Hokkaido Univ. Investigation and Evaluation of Attack Monitoring Methods Using Web Honeypots
Takeshi Yagi (NTT Corp.), Alberto Chan (Univ. of British Columbia), Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.)
 [more] IN2010-29
pp.37-42
IA, ICSS 2010-06-18
14:20
Kyoto Academic Center for Computing and Media Studies, Kyoto University A Life-cycle Monitoring Method of Malware Download Sites for Websites
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.)
This paper proposes a method to monitor life-cycle of malware download sites for websites and reports the actual life-cy... [more] IA2010-14 ICSS2010-14
pp.75-80
ICSS 2010-03-26
15:30
Fukuoka The University of Kitakyushu Investigation of Attacks to Websites using Multi-domain Web-based Honeypots
Naoto Tanimoto, Takeshi Yagi, Takeo Hariu, Mitsutaka Itoh (NTT Corporation)
Recently, a large number of websites are under attacks from attackers. Many compromised websites are used by attackers a... [more] ICSS2009-66
pp.25-28
NS, IN
(Joint)
2010-03-05
11:40
Miyazaki Miyazaki Phoenix Seagaia Resort (Miyazaki) A Scheme of Detecting Malware for Websites
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.)
This paper reports the actual situation of malware distributed to websites by constructing web honeypots, which carries ... [more] IN2009-200
pp.337-342
 17件中 1~17件目  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan