Information and Systems-Software Science(Date:2021/03/01)

Presentation
Developing an Interactive Analysis System for Voice Assistant Apps

Atsuko Natatsuka(Waseda Univ.),  Ryo Iijima(Waseda Univ./NICT),  Takuya Watanabe(NTT),  Mitsuaki Akiyama(NTT),  Tetsuya Sakai(Waseda Univ.),  Tatsuya Mori(Waseda Univ./NICT),  

[Date]2021-03-02
[Paper #]ICSS2020-48
A Study on the Adoption of Link Preview by the Phishing Sites

Norihito Omori(Waseda Univ.),  Satoshi Furutani(NTT),  Takuya Watanabe(NTT),  Toshiki Shibahara(NTT),  Mitsuaki Akiyama(NTT),  Tatsuya Mori(Waseda Univ.),  

[Date]2021-03-02
[Paper #]ICSS2020-54
Evaluation of Uncertain Reports by Multiple Anti-virus Engines

Kazuya Nomura(Waseda Univ.),  Mistuaki Akiyama(NTT),  Masaki Kamizono(Deloitte Tohmatsu Cyber LLC),  Takahiro Kasama(NICT),  

[Date]2021-03-02
[Paper #]ICSS2020-56
Distributed Slow HTTP DoS Attack Detection by Combining Multiple Schemes

Koki Tamura(TUT),  Yuichi Futa(TUT),  

[Date]2021-03-02
[Paper #]ICSS2020-46
Proof of concept of sandbox evasion attack using email address stored in target machine

Yuta Inoue(YNU),  Rui Tanabe(YNU),  Takahiro Kasama(NICT),  Daisuke Inoue(NICT),  Katsunari Yoshioka(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2021-03-02
[Paper #]ICSS2020-57
Security Evaluation of PUF utilizing Unrolled Architecture

Yusuke Nozaki(Meijo Univ.),  Kensaku Asahi(Meijo Univ.),  Masaya Yoshikawa(Meijo Univ.),  

[Date]2021-03-02
[Paper #]ICSS2020-53
カーネル仮想記憶空間における排他的ページ参照機構の実現方式と性能評価

Hiroki Kuzuno(SECOM),  Toshihiro Yamauchi(Okayama University),  

[Date]2021-03-02
[Paper #]ICSS2020-49
The linear probability of the stream cipher Salsa

Junru Li(Osaka Univ.),  Atsuko Miyaji(Osaka Univ./JAIST),  

[Date]2021-03-02
[Paper #]ICSS2020-51
Research on the vulnerability of homoglyph attacks to online machine translation system

Takeshi Sakamoto(Waseda Univ),  Tatsuya Mori(Waseda Univ),  

[Date]2021-03-02
[Paper #]ICSS2020-50
Proposal for Chameleon Hash with a Revocation Function

Koki Matsubara(Osaka Univ.),  Atsuko Miyaji(Osaka Univ./ JAIST),  Tian Yangguang(Osaka Univ.),  

[Date]2021-03-02
[Paper #]ICSS2020-42
Accuracy evaluation of CNNs and random forests with Malware API call sequences

Shugo Asai(TUT),  Futa Yuichi(TUT),  

[Date]2021-03-02
[Paper #]ICSS2020-58
Authentication and authorization of IoT devices using blockchain and fog nodes

Takahiro Igarashi(TUT),  Yuichi Futa(TUT),  

[Date]2021-03-02
[Paper #]ICSS2020-43
Detecting unknown malware families by anomaly detection using deep learning

Ren Takeuchi(Shizuoka Univ.),  Shintaro Mizuno(Shizuoka Univ.),  Vo Ngoc Khoi Nguyen(Shizuoka Univ.),  Jun Tsuchiya(Shizuoka Univ.),  Masakatsu Nishigaki(Shizuoka Univ.),  Tetsushi Ohki(Shizuoka Univ.),  

[Date]2021-03-02
[Paper #]ICSS2020-59
An Efficient Discovery of Malicious URL Using VirusTotal and Web Access Log

Chika Hiraishi(YNU),  Rui Tanabe(YNU),  Katsunari Yoshioka(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2021-03-02
[Paper #]ICSS2020-55
<<12 21-34hit(34hit)