Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2022-11-21 16:20 |
Niigata |
Bandai Civic Hall (Niigata) (Primary: On-site, Secondary: Online) |
Outsourcing Malware Dynamic Analysis without Disclosing File Contents Keisuke Hamajima, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2022-44 |
Malware dynamic analysis requires specialized skills. If there are no security experts in the organization and it is dif... [more] |
IA2022-44 pp.47-51 |
R |
2022-10-07 14:50 |
Fukuoka |
(Primary: On-site, Secondary: Online) |
A Note on A Transformer Encoder-Based Malware Classification Using API Calls Chen Li (Kyutech), Junjun Zheng (Osaka Univ.) R2022-36 |
Malware is a major security threat to computer systems and significantly impacts system reliability. Recurrent neural ne... [more] |
R2022-36 pp.25-30 |
ICSS |
2021-11-30 09:55 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Comparison of CNN padding method using a part of malware API call sequence data with RNN. Shugo Asai, Yuichi Futa (TUT) ICSS2021-55 |
In recent years, as society has become more information-oriented, malware for information has been increasing. In such a... [more] |
ICSS2021-55 pp.55-60 |
SC |
2021-05-28 10:30 |
Online |
Online |
Service Authentication Proxy for Accelerating API Development Rina Ueno, Nariyuki Saito, Hiroshi Nasu, Yu Nakata (Hitachi) SC2021-3 |
Since API publish involves the risk of being attacked from outside the company, it is necessary to develop an authentica... [more] |
SC2021-3 pp.13-18 |
ICSS, IPSJ-SPT |
2021-03-02 11:05 |
Online |
Online |
Accuracy evaluation of CNNs and random forests with Malware API call sequences Shugo Asai, Futa Yuichi (TUT) ICSS2020-58 |
In this paper, we compare the accuracy of the results of classifying each malware family by Random Forest and CNN using ... [more] |
ICSS2020-58 pp.190-194 |
ICM, LOIS |
2021-01-21 17:50 |
Online |
Online |
Reproduction of Malware Behavior by Using Windows API Call Logs
-- Support for Major Win32 APIs and State Restoration After the Reproduction -- Naoya Matsuda, Youji Fukuta (Kindai Univ.), Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICM2020-47 LOIS2020-35 |
The authors have been developing a prototype tool to reproduce of malware behavior by using Windows API call logs so th... [more] |
ICM2020-47 LOIS2020-35 pp.75-80 |
SC |
2017-06-03 10:15 |
Fukushima |
University of Aizu(UBIC 3D) |
An Approach for Barter Exchange of Services on API Gateway Kosaku Kimura, Atsuji Sekiguchi (Fujitsu Labs.) SC2017-12 |
This paper proposes an approach for ahieving the barter exchange of values provided by APIs of services.
Most of web se... [more] |
SC2017-12 pp.67-72 |
SS, IPSJ-SE |
2013-10-24 11:10 |
Ishikawa |
|
Design and Implementation of a Framework for API-Based Language Extension via Rule-Based Rewriting utilizing COINS Takuya Shiode, Hideyuki Kawabata, Toshiaki Kitamura (Hiroshima City Univ.) SS2013-38 |
Although C language is quite simple, the language is useful enough to develop various kind of applications utilizing a v... [more] |
SS2013-38 pp.13-18 |
SS |
2013-01-10 14:45 |
Okinawa |
|
Design and Implementation of Compilers Constructed using COINS for Language Extensions using APIs Takuya Shiode, Hideyuki Kawabata, Toshiaki Kitamura (Hiroshima City Univ.) |
Although C language is quite simple, the language is useful enough to
develop various kind of applications utilizing a ... [more] |
SS2012-49 pp.19-24 |
SS |
2011-06-30 16:00 |
Overseas |
Korea Univ. (Seoul) |
A Prototype of Comparison Tool for Android Applications Based on Difference of API Calling Sequences Tetsuya Kanda, Yuki Manabe, Takashi Ishio, Makoto Matsushita, Katsuro Inoue (Osaka Univ.) SS2011-7 |
For both users and developers, it is important to select an appropriate application from similar ones. There are some wa... [more] |
SS2011-7 pp.35-40 |
SS |
2010-03-08 14:50 |
Kagoshima |
Kagoshima Univ. |
On the Analysis of Method Call Changes Related to Bug Fixes Ryosuke Morii, Hideaki Hata (Osaka Univ.), Osamu Mizuno (Kyoto Inst. of Tech.), Tohru Kikuno (Osaka Univ.) SS2009-57 |
During software development, APIs are used to reuse existing software. However, it is said APIs are difficult to use pro... [more] |
SS2009-57 pp.55-60 |