IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 14 of 14  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
SITE, ISEC, LOIS 2018-11-04
11:30
Fukuoka   A Machine Learning-based Method for Detecting Malicious JavaScript using Information based on Abstract Syntax Tree
Ryota Sano, Junko Sato, Yoichi Murakami, Masaki Hanada, Eiji Nunohiro (Tokyo Univ. of Information Sciences) ISEC2018-75 SITE2018-53 LOIS2018-35
The number of Drive-by-Download attacks, which can be infected with malware via websites, has recently been increased. S... [more] ISEC2018-75 SITE2018-53 LOIS2018-35
pp.63-68
CS 2017-07-27
09:39
Nagasaki Fukue Bunka Kaikan Obfuscated Malicious JavaScript Detection Scheme Using the Feature Based on Divided URL
Shoya Morishige, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-15
Recently, obfuscated malicious JavaScript codes which divide URL into segments to evade the pattern matching of anti-vir... [more] CS2017-15
pp.13-18
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
10:15
Tokyo   A Proposal on the Actual State Survey Method of RIG Exploit Kit in User Environments
Ichiro Shimada, Toshifumi Oota (KKE), Kouichirou Okada (SecureBrain), Akira Yamada (KDDI Research) ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19
In recent years, web-based cyber attacks, which exploit web browsers and compromise computers, are prevailing. In many c... [more] ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19
pp.33-38
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
13:25
Tokyo   A Forensic Support System for Reproduction of Incidents Caused by Drive-by Download
Yuki Okuda, Youji Fukuta (Kindai Univ.), Yoshiaki Shiraishi (Kobe Univ.), Nobukazu Iguchi (Kindai Univ.) ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21
In this research, we have developed a system that supports investigation of malware infections and activities in Drive-b... [more] ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21
pp.81-86
ICSS 2016-11-25
16:10
Kanagawa Institute of Information Security Performance of link-mining techniques to detect malicious websites
Yasuhiro Takano, Daiki Ito, Tatsuya Nagai (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-44
Conventional techniques to avoid malicious websites techniques by referring URL's keywords reported in black lists have ... [more] ICSS2016-44
pp.31-35
ICSS, IA 2016-06-07
13:00
Saga Saga University On the Effect Assessment of Malicious Web Sites Using Multi-Environment Analysis
Yuya Nishio, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2016-11 ICSS2016-11
The malicious websites used by Drive-by Download Attacks change their behavior for web client environments. To analyze t... [more] IA2016-11 ICSS2016-11
pp.57-62
IA, ICSS 2015-06-12
10:50
Fukuoka Kyushu Institute of Technology Univ. Detecting Malicious Domain Names based on the Time-series Analysis of Attackers Network Resources
Daiki Chiba (NTT/Waseda Univ.), Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeshi Yada, Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-10 ICSS2015-10
Attackers launching cyber attacks frequently change their malicious websites to evade countermeasures such as blacklisti... [more] IA2015-10 ICSS2015-10
pp.51-56
ICSS 2015-03-03
16:15
Okinawa Meio Univiersity Link Structural Analysis of Drive-by-Download Attacks
Yuji Dairiki (Kobe Univ.), Masaki Kamizono (SecureBrain), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2014-70
In analyzing Drive-by-Download (DBD) attack, it is basic and essential to analysis the link structure through tracking t... [more] ICSS2014-70
pp.43-48
ICSS 2015-03-03
16:40
Okinawa Meio Univiersity Implementation and evaluation of Drive by Download Attack detection using the features of the obfuscation
Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama (NAIST), Takuji Iimura (UT), Youki Kadobayashi (NAIST) ICSS2014-71
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in a browser or in browse... [more] ICSS2014-71
pp.49-54
ICSS 2014-11-28
10:45
Miyagi Tohoku Gakuin University (Tagajo Campus) A Study of Drive by Download Attack detection using the features of the obfuscation
Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama, Youki Kadobayashi (NAIST) ICSS2014-60
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in the browser or its plu... [more] ICSS2014-60
pp.55-60
ICSS 2014-11-28
11:10
Miyagi Tohoku Gakuin University (Tagajo Campus) searching malicious URL from vast webspace
Bo Sun (Waseda Univ.), Mitsuaki Akiyama, Takeshi Yagi (NTT), Tatsuya Mori (Waseda Univ.) ICSS2014-61
Many Web-based attacks such as Drive-by-download and phishing scam
are easily triggered by accessing landing page URL.... [more]
ICSS2014-61
pp.61-66
ICSS, IPSJ-SPT 2014-03-27
13:30
Okinawa Meio Univiersity Measuring Lifetime of Malicious Website Based on Redirection from Compromised Websites
Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT) ICSS2013-71
Attackers continuously generate URLs and FQDNs of malicious websites in order to circumvent security countermeasures
us... [more]
ICSS2013-71
pp.53-58
ICSS, IPSJ-SPT 2014-03-27
13:55
Okinawa Meio Univiersity An Investigation of Malicious JavaScript Code used in Drive-by Download
Yuta Takata, Mitsuaki Akiyama, Takeo Hariu (NTT) ICSS2013-72
Malicious website contains JavaScript code that exploits vulnerabilities in the browser or the browser's plugins.Researc... [more] ICSS2013-72
pp.59-64
ICSS, IPSJ-SPT 2014-03-28
14:45
Okinawa Meio Univiersity Supporting Effect Assessment of Accessing Malicious Web Sites with Multi-Environment Analysis
Takayuki Yoshinori, Akihito Shinoda (Nagoya Inst. of Tech), Masaki Kamizono (NICT), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech) ICSS2013-85
It is not always true that enough information can be got by just using website analysis services, because some malicious... [more] ICSS2013-85
pp.161-166
 Results 1 - 14 of 14  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan