Information and Systems-Information and Communication System Security(Date:2018/06/25)

Presentation
Designing network control system for industrial IoT security

Yutaka Oiwa(AIST),  Ray Atarashi(IIJ-II),  Yoshifumi Atarashi(Alaxala),  Toru Asahina(Alaxala),  

[Date]2018-06-25
[Paper #]IA2018-4,ICSS2018-4
Calculating Similarity between IoT Malware Samples over CPU Architectures

Ryoichi Isawa(NICT),  Tao Ban(NICT),  Ying Tie(YNU),  Katsunari Yoshioka(YNU/NICT),  Daisuke Inoue(NICT),  

[Date]2018-06-25
[Paper #]IA2018-2,ICSS2018-2
A Study on the structure and Its Classification

Naoya Nitta(Kobe Univ.),  Masakatu Morii(Kobe Univ.),  

[Date]2018-06-25
[Paper #]IA2018-1,ICSS2018-1
The Existence of the QR Code Guiding to a Malicious Web Site and a Counterfeit Attack Using It

Okuma Hiroya(Kobe Univ.),  Makoto Takita(Kobe Univ.),  Masakatu Morii(Kobe Univ.),  

[Date]2018-06-25
[Paper #]IA2018-6,ICSS2018-6
ナップザックタイプ暗号に対する解読法の提案

Masaru Takada(Kobe Univ.),  Masakatu Morii(Kobe Univ.),  

[Date]2018-06-25
[Paper #]IA2018-7,ICSS2018-7
Malware Classification Based on Data Compression Algorithm and Its Evaluation

Sohei Takechi(Ehime Univ.),  Hiroshi Kai(Ehime Univ.),  Masakatu Morii(Kobe Univ),  

[Date]2018-06-25
[Paper #]IA2018-3,ICSS2018-3
Survey on current situation of incorrect setting of DNS server

Akira Sato(Univ. of Tsukuba),  Kazunori Fujiwara(JPRS),  Takaho Omuro(Univ. of Tsukuba),  Kodai Watanabe(Univ. of Tsukuba),  Kenichi Yoshida(Univ. of Tsukuba),  

[Date]2018-06-25
[Paper #]IA2018-5,ICSS2018-5
[招待講演]サイバー社会の現実とISMS的対策の限界

Shiro Maruyama(Benesse InfoShell),  

[Date]2018-06-25
[Paper #]
ランサムウェア検知ソフトCryptoDropの耐性評価

Sho Minami(The Univ. of Tsukuba),  Takashi Nishide(The Univ. of Tsukuba),  

[Date]2018-06-26
[Paper #]IA2018-14,ICSS2018-14
Datagram TLS extensions for multipath communication

Seiya Nuta(Univ. of Tsukuba),  Takashi Nishide(Univ. of Tsukuba),  

[Date]2018-06-26
[Paper #]IA2018-15,ICSS2018-15
A study of applying SDN to the operational challenges of multi-service wide-area IP network

Aki Fukuda(NTT),  Hitoshi Irino(NTT),  Yoshinori Koike(NTT),  Hirotaka Yoshioka(NTT),  

[Date]2018-06-26
[Paper #]IA2018-11,ICSS2018-11
Proposal of Sparse-Modeling based Approach for Betweenness Centrality Estimation

Ryotaro Matsuo(Kwansei Gakuin Univ.),  Ryo Nakamura(Kwansei Gakuin Univ.),  Hiroyuki Ohsaki(Kwansei Gakuin Univ.),  

[Date]2018-06-26
[Paper #]IA2018-10,ICSS2018-10
ブロックチェーンを用いた認証システムの検討

Yuki Ezawa(Kobe Univ.),  Makoto Takita(Kobe Univ.),  Yoshiaki Shiraishi(Kobe Univ.),  Yasuhiro Takano(Kobe Univ.),  Masami Mohri(Gifu Univ.),  Masakatu Morii(Kobe Univ.),  

[Date]2018-06-26
[Paper #]IA2018-8,ICSS2018-8
A Study on Extraction Method of Characteristics of Malware Using Generative Adversalial Networks

Keisuke Furumoto(NICT),  Ryoichi Isawa(NICT),  Takeshi Takahashi(NICT),  Daisuke Inoue(NICT),  

[Date]2018-06-26
[Paper #]IA2018-13,ICSS2018-13
[Invited Talk] Security Analysis with Formal Methods

Naoto Yanai(Osaka Univ.),  

[Date]2018-06-26
[Paper #]IA2018-12,ICSS2018-12
A consideration on the possibility of automatic classifying for anomalous posts on Twitter

Ryutaro Ushigome(NICT/Chuo Univ),  Takeshi Matsuda(Univ of Nagasaki),  Michio Sonoda(NICT),  Takeshi Takahashi(NICT),  Mio Suzuki(NICT),  Jinhui Chao(Chuo Univ),  

[Date]2018-06-26
[Paper #]IA2018-9,ICSS2018-9