Information and Systems-Image Engineering(Date:2018/11/21)

Presentation
Spoofed Website Detection using Machine Learning

Naoki Kurihara(Institute of Information Security),  Hidenori Tsuji(Institute of Information Security),  Masaki Hashimoto(Institute of Information Security),  

[Date]2018-11-21
[Paper #]ICSS2018-56
Development of remote LAN monitoring system

Katsuya Matsuoka(UT),  Masaya Mizutani(UT),  Hideya Ochiai(UT),  Hiroshi Esaki(UT),  

[Date]2018-11-21
[Paper #]ICSS2018-53
Investigation of Security-Related Factors of Satisfactions in Internet Services

Yukiko Sawaya(KDDI Research),  Akira Yamada(KDDI Research),  Ayumu Kubota(KDDI Research),  

[Date]2018-11-21
[Paper #]ICSS2018-54
Malware Analysis Method Using Conditional Generative Adversarial Network

Keisuke Furumoto(NICT),  Ryoichi Isawa(NICT),  Takeshi Takahashi(NICT),  Daisuke Inoue(NICT),  

[Date]2018-11-21
[Paper #]ICSS2018-57
話題誘導するトピックモデルを用いたセキュリティレポートからの攻撃傾向の把握

Tatsuya Nagai(Kobe Univ.),  Tomohiro Inui(Kobe Univ.),  Makoto Takita(Kobe Univ.),  Keisuke Furumoto(NICT),  Yoshiaki Shiraishi(Kobe Univ.),  Yasuhiro Takano(Kobe Univ.),  Masami Mohri(Gifu Univ.),  Masakatu Morii(Kobe Univ.),  

[Date]2018-11-21
[Paper #]ICSS2018-58
[Invited Talk] Advanced R&D Required at the Leading Edge of Cybersecurity

Takeshi Yagi(NTT Security Japan),  

[Date]2018-11-21
[Paper #]ICSS2018-55
[Invited Talk] Security Countermeasure at ShowNet in Interop Tokyo 2018

Kenichiro Hashimoto(Lastline),  Masato Jingu(NICT),  Takashi Tomine(lepidum),  

[Date]2018-11-21
[Paper #]ICSS2018-59
OpenIDで認証情報を発行するブロックチェーンを用いた認証・認可システム

Yuki Ezawa(Kobe Univ.),  Shohei Kakei(Kobe Univ.),  Makoto Takita(Kobe Univ.),  Yoshiaki Shiraishi(Kobe Univ.),  Yasuhiro Takano(Kobe Univ.),  Masami Mohri(Kobe Univ.),  Masaktu Morii(Kobe Univ.),  

[Date]2018-11-22
[Paper #]ICSS2018-60
ブロックチェーンに格納した認証情報を用いる認証方式

Toshiki Tsuchida(Kobe Univ.),  Makoto Takita(Kobe Univ.),  Yoshiaki Shiraishi(Kobe Univ.),  Masami Mohri(Gifu Univ.),  Yasuhiro Takano(Kobe Univ.),  Masakatu Morii(Kobe Univ.),  

[Date]2018-11-22
[Paper #]ICSS2018-61
匿名性を考慮したTPMを用いるSSLクライアント認証

Shohei Kakei(Kobe Univ.),  Yoshiaki Shiraishi(Kobe Univ.),  Masami Mohri(Gifu Univ.),  Masakatu Morii(Kobe Univ.),  

[Date]2018-11-22
[Paper #]ICSS2018-67
[Invited Talk] An Overview of Cyber Security for Connected Vehicles

Junko Takahashi(NTT),  

[Date]2018-11-22
[Paper #]ICSS2018-63
機械学習による脆弱性記述に基づく深刻度推定

Shunta Nakagawa(Kobe Univ.),  Tatsuya Nagai(Kobe Univ.),  Hideaki Kanehara(NICT),  Keisuke Furumoto(NICT),  Makoto Takita(Kobe Univ.),  Yoshiaki Shiraishi(Kobe Univ.),  Takeshi Takahashi(NICT),  Masami Mohri(Gifu Univ.),  Yasuhiro Takano(Kobe Univ.),  Masakatu Morii(Kobe Univ.),  

[Date]2018-11-22
[Paper #]ICSS2018-64
監査者に提出する証拠を選択可能としたクラウドストレージのデータ所有証明

Shinobu Ogiso(Gifu Univ.),  Masami Mohri(Gifu Univ.),  Yoshiaki Shiraishi(Kobe Univ.),  

[Date]2018-11-22
[Paper #]ICSS2018-65
Part II: Calculating Similarity between IoT Malware over CPU Architectures

Ryoichi Isawa(NICT),  Tao Ban(NICT),  Katsunari Yoshioka(YNU/NICT),  Daisuke Inoue(NICT),  

[Date]2018-11-22
[Paper #]ICSS2018-66
Identification Scheme Based on the Binary Syndrome Decoding Problem Using High Density Parity Check Codes

Haruka Ito(Saga Univ.),  Masanori Hirotomo(Saga Univ.),  Youji Fukuta(Kindai Univ.),  Masami Mohri(Gifu Univ.),  Yoshiaki Shiraishi(Kobe Univ.),  

[Date]2018-11-22
[Paper #]ICSS2018-62