Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-14 15:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Phishing Detection Method Based on Content-Similarity in DNS Graph WenBo Zhou, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110 |
Phishing attacks, known as a prevalent form of social engineering attacks, have become one of the most significant cyber... [more] |
IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110 pp.332-336 |
IA |
2024-01-25 16:40 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Strengthening Cybersecurity with Data Analytics
-- A Web Tool for Secure Exploration of CVE Data -- Chidchanok Choksuchat, Sorawit Khamnaewnak, Chanin Maiprom, Suwimon Bureekarn, Touchai Angchuan, Sinchai Kamonphiwong, Thossaporn Kamolphiwong (PSU) IA2023-68 |
In the realm of Higher Education, the sophistication of cyberattacks necessitates a departure from traditional security ... [more] |
IA2023-68 pp.48-51 |
ICSS |
2023-11-16 13:25 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Real time detection for replay-attack communication in control system Koushi Nishi, Yuichi Futa (TUT), Hiroyuki Okazaki (Shinshu University) ICSS2023-52 |
Attacks on control system in factory and power plant are increasing every year. Therefore, System that monitor communica... [more] |
ICSS2023-52 pp.7-14 |
MW, EMCJ, EST, IEE-EMC [detail] |
2023-10-19 13:10 |
Yamagata |
Yamagata University (Primary: On-site, Secondary: Online) |
An Application of Genetic Algorithms for XSS Attack Payload Generation and WAF Evaluation Yu Funahashi, Hideaki Kimura (Chubu Univ) EMCJ2023-43 MW2023-97 EST2023-70 |
We propose a method of generating and evolving malicious scripts (payloads) used in cross-site scripting (XSS) attacks b... [more] |
EMCJ2023-43 MW2023-97 EST2023-70 pp.42-45 |
IN, ICTSSL, IEE-SMF |
2023-10-20 14:40 |
Fukuoka |
Fukuoka University |
A Study on Applying Digital Twin-Assisted Security Platform for Cyber-Physical Systems to Supply Chain Keizo Sugiyama (KDDI Research) ICTSSL2023-32 |
The convergence of cyberspace and physical space is becoming more significant towards Beyond 5G. The impact of attacks, ... [more] |
ICTSSL2023-32 pp.42-46 |
MSS, CAS, SIP, VLD |
2023-07-07 10:10 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Notion of Current-State Opacity and Its Verification for Discrete-Time Piecewise Linear Systems Taiga Matsumae, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) CAS2023-17 VLD2023-17 SIP2023-33 MSS2023-17 |
Opacity is one of the security concepts against cyber-attacks, and is frequently formulated for discrete event systems (... [more] |
CAS2023-17 VLD2023-17 SIP2023-33 MSS2023-17 pp.84-87 |
IA, SITE, IPSJ-IOT [detail] |
2023-03-17 10:25 |
Gunma |
Maebashi Institute of Technology (Primary: On-site, Secondary: Online) |
[Invited Talk]
Dual-Use of Cybersecurity
-- From the Threat Landscape in Cyberspace with a Focus on IoT Security -- Tsukasa Ogino (CCDS) SITE2022-62 IA2022-85 |
The Internet of Things (IoT), in which automobiles, drones, home appliances, and other devices are connected via the Int... [more] |
SITE2022-62 IA2022-85 pp.45-52 |
IN, NS (Joint) |
2023-03-03 09:50 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Cyber-Attack Detection Method for Closed Network
-- A study of the detection technique of network-bridged equipment -- Nobuyuki Nakamura (OKI) IN2022-100 |
Cyber-Attacks in closed network occur recently. As closed network is not connected to the internet and may contain equip... [more] |
IN2022-100 pp.205-210 |
IA |
2023-01-25 15:25 |
Osaka |
Osaka Umeda Campus, Kwansei Gakuin University (Osaka) (Primary: On-site, Secondary: Online) |
Cybersecurity Analysis of Internet Banking in Developing and Developed countries, a case study of Tanzania and Japan Ndalama Festus Edward, Yuzo Taenaka, Youki Kadobayashi (NAIST) IA2022-72 |
Over the last few years, internet banking has become the primary way of accessing banking services for many bank custome... [more] |
IA2022-72 pp.28-35 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2022-11-30 15:10 |
Kumamoto |
(Primary: On-site, Secondary: Online) |
FPGA Implementation and Area Evaluation of JTAG Access Mechanism Using Lightweight One-Time Password Authentication Scheme Hisashi Okamoto, Jun Ma, Senling Wang, Hiroshi Kai, Hiroshi Takahashi (Ehime Univ), Akihiro Shimizu (Kochi Univ. of Technology) VLD2022-48 ICD2022-65 DC2022-64 RECONF2022-71 |
When building a cyber-physical system (CPS), it is essential to guarantee the fault tolerance and security of edge devic... [more] |
VLD2022-48 ICD2022-65 DC2022-64 RECONF2022-71 pp.168-173 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 11:35 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Design and Trial of Cyber Security Exercise for Basic CISO Skillset Tatsumi Seko, Touri Nakagawa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-104 |
Conventional security officers lack the authority and responsibility to make decisions related to management and are not... [more] |
NS2022-104 pp.23-28 |
HWS, ICD |
2022-10-25 17:05 |
Shiga |
(Primary: On-site, Secondary: Online) |
How to Identify the Physical Direction of CAN Message Transmission Yosuke Maekawa, Camille Gay (TOYOTA/YNU), Tsutomu Matsumoto (YNU) HWS2022-43 ICD2022-35 |
The impact of cyber-attacks on automobiles is becoming more serious as vehicles become more connected and multi-function... [more] |
HWS2022-43 ICD2022-35 pp.76-81 |
MSS, NLP |
2022-03-29 10:45 |
Online |
Online |
A proposal of method for defending against cyber attacks by combining honeypots and IPS Yudai Yamamoto, Shingo Yamaguchi (Yamaguchi Univ.) MSS2021-71 NLP2021-142 |
We propose a defense system that makes it possible to detect and prevent attacks targeting web applications and IoT devi... [more] |
MSS2021-71 NLP2021-142 pp.83-88 |
CQ, CBE (Joint) |
2022-01-27 16:30 |
Ishikawa |
Kanazawa(Ishikawa Pref.) (Primary: On-site, Secondary: Online) |
Anomaly Detection Using Statistical Processing in Building Automation and Control Systems Takeshi Okuda, Kohei Miyazawa, Tetsuya Yokotani, Hiroaki Mukai (KIT) CQ2021-84 |
In building automation and control systems (BACS), systems such as air conditioning, lighting, and disaster prevention a... [more] |
CQ2021-84 pp.45-49 |
IN, NS, CS, NV (Joint) |
2021-09-09 14:05 |
Online |
Online |
A Machine Learning Based Network Intrusion Detection System with Appling Different Algorithms in Multiple Stages Seiichi Sasa, Hiroyuki Suzuki, Akio Koyama (Yamagata Univ.) NS2021-63 |
In recent years, the rapid development of Information and Communication Technology (ICT) has led to the provision of a w... [more] |
NS2021-63 pp.36-41 |
IA, ICSS |
2021-06-22 09:50 |
Online |
Online |
Etherpot: A honeypot for observing cyberattacks on Ethereum client Wang Jia, Sasaki Takayuki (Yokohama National Univ.), Omote Kazumasa (Univ. of Tsukuba), Yoshioka Katsunari, Matsumoto Tsutomu (Yokohama National Univ.) IA2021-11 ICSS2021-11 |
In recent years, Ethereum has received a great deal of attention with the functionality to perform arbitrary programmabl... [more] |
IA2021-11 ICSS2021-11 pp.56-61 |
IN, NS (Joint) |
2021-03-05 11:20 |
Online |
Online |
Proposal for LDoS attack using indirect transmission in Zigbee and a countermeasure against it Satoshi Okada, Daisuke Miyamoto, Yuji Sekiya, Hiroshi Nakamura (The University of Tokyo) NS2020-153 |
Low-Rate DoS (LDoS) attack degrades the quality of service with less traffic than typical DoS attacks. LDoS attack has a... [more] |
NS2020-153 pp.179-184 |
ICSS, IPSJ-SPT |
2021-03-01 11:55 |
Online |
Online |
Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures Tomohiro Noda, Hirokazu Hasegawa, Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-32 |
Recent sophisticated targeted attacks make it difficult for us to protect our corporate resources perfectly. Therefore, ... [more] |
ICSS2020-32 pp.37-42 |
NS, NWS (Joint) |
2021-01-22 14:20 |
Online |
Online |
An Aggregation Approach for Improving Network Scan Failure and Delay Estimation of IoT Wireless Equipment Babatunde Ojetunde, Kenta Suzuki, Kazuto Yano, Yoshinori Suzuki (ATR) NS2020-118 |
Recently we proposed a method for identifying the network scan response state that is needed to estimate the cause of ne... [more] |
NS2020-118 pp.43-52 |
IN |
2021-01-18 15:50 |
Online |
Online |
[Invited Talk]
Risk Analysis Methods and Actual Conditions in Cyber Security Kentaro Sonoda, Haruka Nakashima (NEC) IN2020-49 |
Risks in corporations mean business risks, and a cyber security (cyber attack) is positioned as one of the important bus... [more] |
IN2020-49 p.37 |