Information and Systems-Image Engineering(Date:2016/11/25)

Presentation
A fuzz testing method cooperated with threat modeling

Yasuhiko Nishio(CCDS),  Tadashi Shiroma(CCDS),  Hiroyuki Inoue(CCDS/HCU),  

[Date]2016-11-25
[Paper #]ICSS2016-41
Software-based Modification Detection of ECU for Automotive Network System Attestation

Takuma Koyama(NTT),  Junko Takahashi(NTT),  Fumitaka Hoshino(NTT),  Masashi Tanaka(NTT),  

[Date]2016-11-25
[Paper #]ICSS2016-39
Study of behavior each malware function from the API calls

Nobuki Suetsugu(IISEC),  Masaki Hashimoto(IISEC),  

[Date]2016-11-25
[Paper #]ICSS2016-40
Discussion and Evaluation on Regeneration of New Kyoto 2006+ Data Set

Ryunosuke Tada(Toyohashi Univ. of Tech.),  Ryotaro Kobayashi(Toyohashi Univ. of Tech.),  Hajime Shimada(Nagoya Univ.),  Hiroki Takakura(NII),  

[Date]2016-11-25
[Paper #]ICSS2016-42
Report on WhibOx 2016 White-Box Cryptography and Obfuscation

Kazuomi Oishi(SIST),  

[Date]2016-11-25
[Paper #]ICSS2016-43
Performance of link-mining techniques to detect malicious websites

Yasuhiro Takano(Kobe Univ.),  Daiki Ito(Kobe Univ.),  Tatsuya Nagai(Kobe Univ.),  Masaki Kamizono(PwC Cyber Services),  Masami Mohri(Gifu Univ.),  Yoshiaki Shiraishi(Kobe Univ.),  Yuji Hoshizawa(PwC Cyber Services),  Masakatu Morii(Kobe Univ.),  

[Date]2016-11-25
[Paper #]ICSS2016-44
Clustering of Attacking Devices using Active Monitoring

Takahiro Kasama(NICT),  Daisuke Inoue(NICT),  

[Date]2016-11-25
[Paper #]ICSS2016-45
[Invited Talk] Analyses of social needs and training programs of security human resources in Japan

Masashi Eto(NICT),  Masaki Kamizono(PwC Cyber Services LLC),  

[Date]2016-11-25
[Paper #]ICSS2016-38