Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SITE, ISEC, LOIS |
2018-11-04 11:30 |
Fukuoka |
|
A Machine Learning-based Method for Detecting Malicious JavaScript using Information based on Abstract Syntax Tree Ryota Sano, Junko Sato, Yoichi Murakami, Masaki Hanada, Eiji Nunohiro (Tokyo Univ. of Information Sciences) ISEC2018-75 SITE2018-53 LOIS2018-35 |
The number of Drive-by-Download attacks, which can be infected with malware via websites, has recently been increased. S... [more] |
ISEC2018-75 SITE2018-53 LOIS2018-35 pp.63-68 |
CS |
2017-07-27 09:39 |
Nagasaki |
Fukue Bunka Kaikan |
Obfuscated Malicious JavaScript Detection Scheme Using the Feature Based on Divided URL Shoya Morishige, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-15 |
Recently, obfuscated malicious JavaScript codes which divide URL into segments to evade the pattern matching of anti-vir... [more] |
CS2017-15 pp.13-18 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 10:15 |
Tokyo |
|
A Proposal on the Actual State Survey Method of RIG Exploit Kit in User Environments Ichiro Shimada, Toshifumi Oota (KKE), Kouichirou Okada (SecureBrain), Akira Yamada (KDDI Research) ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19 |
In recent years, web-based cyber attacks, which exploit web browsers and compromise computers, are prevailing. In many c... [more] |
ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19 pp.33-38 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 13:25 |
Tokyo |
|
A Forensic Support System for Reproduction of Incidents Caused by Drive-by Download Yuki Okuda, Youji Fukuta (Kindai Univ.), Yoshiaki Shiraishi (Kobe Univ.), Nobukazu Iguchi (Kindai Univ.) ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21 |
In this research, we have developed a system that supports investigation of malware infections and activities in Drive-b... [more] |
ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21 pp.81-86 |
ICSS |
2016-11-25 16:10 |
Kanagawa |
Institute of Information Security |
Performance of link-mining techniques to detect malicious websites Yasuhiro Takano, Daiki Ito, Tatsuya Nagai (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-44 |
Conventional techniques to avoid malicious websites techniques by referring URL's keywords reported in black lists have ... [more] |
ICSS2016-44 pp.31-35 |
ICSS, IA |
2016-06-07 13:00 |
Saga |
Saga University |
On the Effect Assessment of Malicious Web Sites Using Multi-Environment Analysis Yuya Nishio, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2016-11 ICSS2016-11 |
The malicious websites used by Drive-by Download Attacks change their behavior for web client environments. To analyze t... [more] |
IA2016-11 ICSS2016-11 pp.57-62 |
IA, ICSS |
2015-06-12 10:50 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Detecting Malicious Domain Names based on the Time-series Analysis of Attackers Network Resources Daiki Chiba (NTT/Waseda Univ.), Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeshi Yada, Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-10 ICSS2015-10 |
Attackers launching cyber attacks frequently change their malicious websites to evade countermeasures such as blacklisti... [more] |
IA2015-10 ICSS2015-10 pp.51-56 |
ICSS |
2015-03-03 16:15 |
Okinawa |
Meio Univiersity |
Link Structural Analysis of Drive-by-Download Attacks Yuji Dairiki (Kobe Univ.), Masaki Kamizono (SecureBrain), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2014-70 |
In analyzing Drive-by-Download (DBD) attack, it is basic and essential to analysis the link structure through tracking t... [more] |
ICSS2014-70 pp.43-48 |
ICSS |
2015-03-03 16:40 |
Okinawa |
Meio Univiersity |
Implementation and evaluation of Drive by Download Attack detection using the features of the obfuscation Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama (NAIST), Takuji Iimura (UT), Youki Kadobayashi (NAIST) ICSS2014-71 |
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in a browser or in browse... [more] |
ICSS2014-71 pp.49-54 |
ICSS |
2014-11-28 10:45 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
A Study of Drive by Download Attack detection using the features of the obfuscation Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama, Youki Kadobayashi (NAIST) ICSS2014-60 |
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in the browser or its plu... [more] |
ICSS2014-60 pp.55-60 |
ICSS |
2014-11-28 11:10 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
searching malicious URL from vast webspace Bo Sun (Waseda Univ.), Mitsuaki Akiyama, Takeshi Yagi (NTT), Tatsuya Mori (Waseda Univ.) ICSS2014-61 |
Many Web-based attacks such as Drive-by-download and phishing scam
are easily triggered by accessing landing page URL.... [more] |
ICSS2014-61 pp.61-66 |
ICSS, IPSJ-SPT |
2014-03-27 13:30 |
Okinawa |
Meio Univiersity |
Measuring Lifetime of Malicious Website Based on Redirection from Compromised Websites Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT) ICSS2013-71 |
Attackers continuously generate URLs and FQDNs of malicious websites in order to circumvent security countermeasures
us... [more] |
ICSS2013-71 pp.53-58 |
ICSS, IPSJ-SPT |
2014-03-27 13:55 |
Okinawa |
Meio Univiersity |
An Investigation of Malicious JavaScript Code used in Drive-by Download Yuta Takata, Mitsuaki Akiyama, Takeo Hariu (NTT) ICSS2013-72 |
Malicious website contains JavaScript code that exploits vulnerabilities in the browser or the browser's plugins.Researc... [more] |
ICSS2013-72 pp.59-64 |
ICSS, IPSJ-SPT |
2014-03-28 14:45 |
Okinawa |
Meio Univiersity |
Supporting Effect Assessment of Accessing Malicious Web Sites with Multi-Environment Analysis Takayuki Yoshinori, Akihito Shinoda (Nagoya Inst. of Tech), Masaki Kamizono (NICT), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech) ICSS2013-85 |
It is not always true that enough information can be got by just using website analysis services, because some malicious... [more] |
ICSS2013-85 pp.161-166 |