Information and Systems-Information and Communication System Security(Date:2015/06/11)

Presentation
An Efficient Rainbow Table Compression

Yuki Tabata(NDA),  Keisuke Iwai(NDA),  Hidema Tanaka(NDA),  Takakazu Kurokawa(NDA),  

[Date]2015-06-11
[Paper #]IA2015-3,ICSS2015-3
Implementation of a Pairing Library Using BN Elliptic Curve

Yusuke Kanbara(Univ. of Tsukuba),  Naoki Kanayama(Univ. of Tsukuba),  Takashi Nishide(Univ. of Tsukuba),  Eiji Okamoto(Univ. of Tsukuba),  

[Date]2015-06-11
[Paper #]IA2015-5,ICSS2015-5
An Empirical Evaluation of Locating Cryptographic Functions on the Memory

Ryoya Furukawa(Kobe Univ.),  Ryoichi Isawa(NICT),  Masakatu Morii(Kobe Univ.),  Daisuke Inoue(NICT),  Koji Nakao(NICT),  

[Date]2015-06-11
[Paper #]IA2015-4,ICSS2015-4
Report on the 23rd USENIX Security Symposium

Shinichi Matsumoto(ISIT),  Kazuomi Oishi(SIST),  Kuniyasu Suzaki(AIST),  

[Date]2015-06-11
[Paper #]IA2015-8,ICSS2015-8
The Analysis of the CREAM vulnerability against OpenSSL

Jun Hasegawa(Kobe Univ.),  Yuhei Watanabe(Kobe Univ.),  Masakatu Morii(Kobe Univ.),  

[Date]2015-06-11
[Paper #]IA2015-6,ICSS2015-6
Traffic Data Analysis for Multiple Darknet and its Applications

Kensho Murai(Kobe Univ.),  Keisuke Furumoto(Kobe Univ.),  Kosuke Murakami(KDDI),  Koji Nakao(KDDI/NICT),  Masakatu Morii(Kobe Univ.),  

[Date]2015-06-11
[Paper #]IA2015-7,ICSS2015-7
[Invited Talk] Recent trends in multivariate cryptography

Takanori Yasuda(ISIT),  

[Date]2015-06-11
[Paper #]IA2015-1,ICSS2015-1
[Invited Talk] Establishment of Cybersecurity Education by Industry-Academia Collaboration

Takeshi Yagi(NTT),  Mitsuaki Akiyama(NTT),  Tatsuya Mori(Waseda Univ.),  Takeo Hariu(NTT),  Shigeki Goto(Waseda Univ.),  

[Date]2015-06-11
[Paper #]IA2015-2,ICSS2015-2
Detecting Malicious Domain Names based on the Time-series Analysis of Attackers Network Resources

Daiki Chiba(NTT/Waseda Univ.),  Takeshi Yagi(NTT),  Mitsuaki Akiyama(NTT),  Tatsuya Mori(Waseda Univ.),  Takeshi Yada(NTT),  Takeo Hariu(NTT),  Shigeki Goto(Waseda Univ.),  

[Date]2015-06-12
[Paper #]IA2015-10,ICSS2015-10
Experimental Results on an Attack Detection System for Advanced Persistent Threats

Kenichiro Muto(NTT Communications),  Yasuhiro Okumura(NTT Communications),  Shinya Kuramoto(NTT Communications),  Hidemori Ikeda(NTT Communications),  Mitsuhiro Hatada(NTT Communications),  Takayuki Watanabe(NTT Communications),  Tohru Sato(NTT),  Kazufumi Aoki(NTT),  Junichi Murakami(FFRI),  Kazuyuki Iso(FFRI),  Yasuhiro Kunda(FFRI),  Toshio Nawa(CDI),  Mai Kiuchi(CDI),  

[Date]2015-06-12
[Paper #]IA2015-9,ICSS2015-9
A Report on International Conference NDSS2015

Hiroaki Anada(ISIT),  Yuhei Kawakoya(NTTi3),  Kuniyasu Suzaki(AIST),  

[Date]2015-06-12
[Paper #]IA2015-12,ICSS2015-12
A study on a Tool for Automated Vulnerability Monitoring and Alerting on Software Assets inside Organizations

Takeshi Takahashi(NICT),  Daisuke Miyamoto(NICT),  Bhola Panta(NICT),  Koji Nakao(NICT),  

[Date]2015-06-12
[Paper #]IA2015-18,ICSS2015-18
Camera Based Data Recognition for Enbedding Invisible Information in Images

Tomoe Hatanaka(Kobe Univ.),  Yuki Saji(Kobe Univ.),  Makoto Takita(Kobe Univ.),  Masakatu Morii(Kobe Univ.),  

[Date]2015-06-12
[Paper #]IA2015-14,ICSS2015-14
Can internet measurement be a noise for analysis of darknet?

Yumehisa Haga(Waseda Univ.),  Akira Saso(Waseda Univ.),  Tatsuya Mori(Waseda Univ.),  Shigeki Goto(Waseda Univ.),  

[Date]2015-06-12
[Paper #]IA2015-15,ICSS2015-15
Droid Dowser: an APK information gathering system using headless WebKit scriptable with a JavaScript API

Ruo Ando(NICT),  

[Date]2015-06-12
[Paper #]IA2015-17,ICSS2015-17
A detect method for an undesirable use of e-mail server using cardinality analysis

Akira Sato(Univ. of Tsukuba),  Yuki Kato(Univ. of Tsukuba),  Kenichi Yoshida(Univ. of Tsukuba),  Yasushi Shinjo(Univ. of Tsukuba),  

[Date]2015-06-12
[Paper #]IA2015-16,ICSS2015-16
Knapsack Cryptosystems with Random Secret Sequences using Logical And Operation

Yasuyuki Murakami(OECU),  Shinsuke Hamasho(OECU),  Masao Kasahara(WU/CU),  

[Date]2015-06-12
[Paper #]IA2015-11,ICSS2015-11
[Invited Talk] Hardware Security for Mobile Devices in Public Spaces

Yu-ichi Hayashi(Tohoku Gakuin Univ.),  Naofumi Homma(Tohoku Univ.),  Takafumi Aoki(Tohoku Univ.),  Hideaki Sone(Tohoku Univ.),  

[Date]2015-06-12
[Paper #]IA2015-13,ICSS2015-13