Information and Systems-Software Science(Date:2017/11/20)

Presentation
Preliminary Evaluation on the Program Classification at the Processor Level using Machine Learning

Ryotaro Kobayashi(Kogakuin Univ.),  Hayate Takase(Toyohashi Univ. of Tech.),  Genki Otani(Toyohashi Univ. of Tech.),  Ren Ohmura(Toyohashi Univ. of Tech.),  Masahiko Kato(Univ. of Nagasaki),  

[Date]2017-11-20
[Paper #]ICSS2017-39
国内におけるサイバー演習の現状と、技術演習にとどまらないノンテクニカルスキル要素を加えたサイバー演習の提案

Emi Kojima(PwC),  Kazuharu Nara(JAMSS),  Masaki Kamizono(PwC),  

[Date]2017-11-20
[Paper #]ICSS2017-41
Educational Tools to Learn Concrete Control Measures Corresponding to Threats of Cyber Attacks

Tan Omiya(NAIST),  Daisuke Miyamoto(NAIST),  Youki Kadobayashi(NAIST),  

[Date]2017-11-20
[Paper #]ICSS2017-40
[Invited Talk] Case Study and Future Perspective on Security Assessment of Connected Car

Masaki Kamizono(PwC),  

[Date]2017-11-20
[Paper #]ICSS2017-38
[招待講演]IoTのためのサイバーセキュリティ研究の手法と人材育成について

Akira Mori(AIST),  

[Date]2017-11-20
[Paper #]
Study of Traffic Analysis Method for Illegal Host Detection with Kmeans++

Taisuke Yamada(Tokyo Denki Univ.),  Masaki Inamura(Tokyo Denki Univ.),  

[Date]2017-11-21
[Paper #]ICSS2017-48
Development of verification tool for Whitelisting Intrusion Detection Method

Teruyoshi Yamaguchi(Mitsubishi Electric),  Takeshi Asai(Mitsubishi Electric),  Hideaki Ijiro(Mitsubishi Electric),  Tsunato Nakai(Mitsubishi Electric),  Koichi Shimizu(Mitsubishi Electric),  Nobuhiro Kobayashi(Mitsubishi Electric),  Kazuki Watanabe(Mitsubishi Electric),  

[Date]2017-11-21
[Paper #]ICSS2017-49
A Study on the Security of Dynamic Multi-Cast Key Distribution Protocol After Static Secret Keys Revealed

Masahiro Matsui(NTT),  Yuki Okano(NTT),  Reo Yoshida(NTT),  Tetsutaro Kobayashi(NTT),  

[Date]2017-11-21
[Paper #]ICSS2017-43
A Study of Detecting Infected Hosts by Graph Analysis of DNS Server Logs

Kazunori Kamiya(SC-Lab.),  Ayako Hasegawa(SC-Lab.),  Yuji Sekiya(Univ. of Tokyo),  Kazuya Okada(Univ. of Tokyo),  

[Date]2017-11-21
[Paper #]ICSS2017-47
A note on the threat of malware infection for cryptographic functions in software implementation

Dai Watanabe(Hitachi),  

[Date]2017-11-21
[Paper #]ICSS2017-44
Subspecies Classification for Malwares based on Visualization of Dynamic Analysis result

Taiki Gouda(Kobe Univ.),  Korehito Kashiki(Kobe Univ.),  Keisuke Furumoto(Kobe Univ.),  Masakatu Morii(Kobe Univ.),  

[Date]2017-11-21
[Paper #]ICSS2017-45
A Study on the structure and Its Classification

Naoya Nitta(Kobe Univ.),  Masakatu Morii(Kobe Univ.),  

[Date]2017-11-21
[Paper #]ICSS2017-46
ダイアモンドモデルに基づく脅威情報分析のためのインタフェースについて

Hidenori Kondo(Kobe Univ.),  Tatsuya Nagai(Kobe Univ.),  Keisuke Furumoto(Kobe Univ.),  Daiki Ito(PwC Cyber Services),  Kenta Nomura(PwC Cyber Services),  Masaki Kamizono(PwC Cyber Services),  Yoshiaki Shiraishi(Kobe Univ.),  Yasuhiro Takano(Kobe Univ.),  Masami Mohri(Gifu Univ.),  Masakatu Morii(Kobe Univ.),  

[Date]2017-11-21
[Paper #]ICSS2017-50
LDPC符号を用いたシンドローム復号問題に基づく署名方式

Toshiki Tsuchida(Kobe Univ.),  Haruka Ito(Saga Univ.),  Makoto Takita(Kobe Univ.),  Masanori Hirotomo(Saga Univ.),  Kenta Nomura(PwC Cyber Services),  Yoshiaki Shiraishi(Kobe Univ.),  Masami Mohri(Gifu Univ.),  Youji Fukuta(Kindai Univ.),  Masakatu Morii(Kobe Univ.),  

[Date]2017-11-21
[Paper #]ICSS2017-42