|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
R |
2021-11-30 13:25 |
Online |
Online |
Predicting Vulnerability Discovery Processes in Support Periods for an Operating System Kento Kubota, Tadashi Dohi, Hiroyuki Okamura (Hiroshima Univ.) R2021-35 |
In this note, we classify the severity level of software vulnerabilities founded in Debian Linux Version 8.0, which is a... [more] |
R2021-35 pp.7-12 |
CPSY, RECONF, VLD, IPSJ-ARC, IPSJ-SLDM [detail] |
2021-01-26 15:05 |
Online |
Online |
Detection of Vulnerability Inducing Code Optimization Based on Binary Code Yuka Azuma, Nagisa Ishiura (Kwansei Gakuin Univ.) VLD2020-65 CPSY2020-48 RECONF2020-84 |
In this paper, we propose a method to detect vulnerability inducing code elimination by compiler optimization. It is re... [more] |
VLD2020-65 CPSY2020-48 RECONF2020-84 pp.148-153 |
ASN, ICTSSL |
2018-05-14 16:00 |
Hiroshima |
Hiroshima City Univ. |
[Special Talk]
Security check for campus-wide network using vulnerability diagnosis software Kenji Ishida, Susumu Idenoue (Hiroshima City Univ.) ICTSSL2018-6 ASN2018-6 |
Security management is important in operation and management of campus wide network. For this security management, it is... [more] |
ICTSSL2018-6 ASN2018-6 pp.29-33 |
ISEC |
2015-09-04 11:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An extension of cryptographic protocol in distributed in-memory caching system Ruo Ando (NICT) ISEC2015-28 |
Recent distributed system adopts object caching subsystem in order to achieve scalability. In many cases, its transactio... [more] |
ISEC2015-28 pp.21-26 |
R |
2010-05-28 16:35 |
Tottori |
|
Security evaluation of software system with security patch maintenance Masataka Tokuzane, Hiroyuki Okamura, Tadashi Dohi (Hiroshima Univ.) R2010-16 |
This paper proposes software security criterion based
on a stochastic model. Especially we consider the software syste... [more] |
R2010-16 pp.55-60 |
R |
2008-05-30 15:00 |
Hyogo |
Kobe Gakuin Univ. |
Quantitative Security Analysis of an IMS-based VoIP Network System Toshikazu Uemura, Tadashi Dohi, Naoto Kaio (Hiroshima Univ.) R2008-12 |
In multimedia wireless networks, the VoIP (voice of internet protocol) technology is commonly used to compress the voice... [more] |
R2008-12 pp.19-24 |
SS |
2008-03-04 09:55 |
Nagasaki |
Nagasaki Univ. |
A Proposal of The Secure Software Engineering Noriaki Saito, Satoshi Oda, Toshiyuki Miyazawa, Sakae Chikara, Toru Kawamura, Atsushi Kanai (NTT) SS2007-71 |
At the recent software design and development, a necessity of the security is increasing, though a developing term is sh... [more] |
SS2007-71 pp.85-90 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 16:10 |
Hokkaido |
Future University-Hakodate |
Evaluation of a library against injection attacks Takao Okubo (Fujitsu Labs./IISEC), Hidehiko Tanaka (IISEC) |
Injection vulnerabilities, which enable attacks done by injecting command string into input data, have big percentage of... [more] |
ISEC2007-41 SITE2007-35 pp.177-184 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|