Information and Systems-Software Science(Date:2021/03/01)

Presentation
An Evaluation of Scalable Clustering in Fast Construction Algorithm of Phylogenetic Tree

Tianxiang He(Kyushu Univ.),  Chansu Han(NICT),  Ryoichi Isawa(NICT),  Takeshi Takahashi(NICT),  Shuji Kijima(Kyushu Univ.),  Jun'ichi Takeuchi(Kyushu Univ.),  

[Date]2021-03-01
[Paper #]ICSS2020-38
Developing and Characterizing a New Approach to Extracting Communication Sessions Associated with NIDS Alerts

Ryosuke Ishibashi(Kyushu Univ.),  Hiroki Goto(Kyushu Univ.),  Chansu Han(NICT),  Tao Ban(NICT),  Takeshi Takahashi(NICT),  Jun'ichi Takeuchi(Kyushu Univ.),  

[Date]2021-03-01
[Paper #]ICSS2020-26
Improvement of Functional Difference Investigation Method and Analyzing for Clusters of IoT Malware

Reo Kawasoe(Kyushu Univ.),  Chansu Han(NICT),  Ryoichi Isawa(NICT),  Takeshi Takahashi(NICT),  Jun'ichi Takeuchi(Kyushu Univ.),  

[Date]2021-03-01
[Paper #]ICSS2020-39
A proposal of model for scale and frequency of cyber incidents¥¥ based on organizational attributes

Kazuki Ikegami(Meiji Univ.),  Hiroaki Kikuchi(Meiji Univ.),  

[Date]2021-03-01
[Paper #]ICSS2020-30
Detection of Infected Device Using DNS Traffic

Soichiro Kogo(Hosei Univ.),  Atsushi Kanai(Hosei Univ.),  

[Date]2021-03-01
[Paper #]ICSS2020-27
On the Privacy Risk of Exposure Notification Framework: Assessment and Countermeasures

Kazuki Nomoto(Waseda Univ.),  Mitsuaki Akiyama(NTT),  Masashi Eto(NICT),  Atsuo Inomata(Osaka Univ.),  Tatsuya Mori(Waseda Univ./NICT),  

[Date]2021-03-01
[Paper #]ICSS2020-34
Understanding the Adoption and Operation of DNS Cookie: Current State and Future Prospects

Masanori Yajima(Waseda Univ.),  Daiki Chiba(NTT),  Yoshiro Yoneya(JPRS),  Tatsuya Mori(Waseda Univ./NICT),  

[Date]2021-03-01
[Paper #]ICSS2020-28
Implementation and Evaluation of a Plagiarism Detection Method for Source Code on Programming Contest

Ryusei Ishikawa(Ritsumeikan Univ.),  Yuichi Hattori(Secure Cycle),  Hiroyuki Inoue(Hiroshima City Univ.),  Atsuo Inomata(Osaka Univ.),  

[Date]2021-03-01
[Paper #]ICSS2020-36
Method of Similarity Evaluation among Incidents for Multi-Located Network

Masahito Kumazaki(Nagoya Univ.),  Hirokazu Hasegawa(Nagoya Univ.),  Yukiko Yamaguchi(Nagoya Univ.),  Hajime Shimada(Nagoya Univ.),  Hiroki Takakura(NII),  

[Date]2021-03-01
[Paper #]ICSS2020-31
Implementation of Assessment System for Residual Risks of Information Leakage in Incident Countermeasures

Tomohiro Noda(Nagoya Univ.),  Hirokazu Hasegawa(Nagoya Univ.),  Hajime Shimada(Nagoya Univ.),  Yukiko Yamaguchi(Nagoya Univ.),  Hiroki Takakura(NII),  

[Date]2021-03-01
[Paper #]ICSS2020-32
A Method for Reconstructing Hidden Background Image in Tele-conference with Virtual Background

Satoki Tsuji(*),  Ryusei Ishikawa(Ritsumeikan Univ.),  Masashi Eto(NICT),  Yuichi Hattori(Secure Cycle Inc.),  Hiroyuki Inoue(Hiroshima City Univ.),  

[Date]2021-03-01
[Paper #]ICSS2020-35
A path authentication framework based on One-way cross networks

Kosuke Ishibashi(Hiroshima City Univ.),  Masakazu Soshi(Hiroshima City Univ.),  

[Date]2021-03-01
[Paper #]ICSS2020-33
Construction of Vulnerability Evaluation System with Machine Learning Methods

Ryu Watanabe(KDDIR),  Takashi Matsunaka(KDDIR),  Ayumu Kubota(KDDIR),  Junpei Urakawa(KDS/KDDIR),  

[Date]2021-03-01
[Paper #]ICSS2020-29
Design and implementation of a cyber security exercise rewinding mechanism

Yuma Kodera(JAIST),  Chinen Kenichi(JAIST),  

[Date]2021-03-01
[Paper #]ICSS2020-37
Analyzing the Transition of Vulnerabilities Targeted by IoT Malware

Kaichi Sameshima(YNU),  Takayuki Sasaki(YNU),  Rui Tanabe(YNU),  Katsunari Yoshioka(YNU),  Koji Nakao(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2021-03-01
[Paper #]ICSS2020-40
Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox

Takahiro Inoue(YNU),  Satoshi Hara(YNU/FUJISOFT),  Hironobu Sakaki(YNU/RainForest),  Kouichirou Okada(YNU/RainForest),  Eitaro Shioji(NTT),  Mitsuaki Akiyama(NTT),  Takayuki Sasaki(YNU),  Rui Tanabe(YNU),  Katsunari Yoshioka(YNU),  Koji Nakao(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2021-03-01
[Paper #]ICSS2020-41
Security Evaluation of End-to-End Encryption of LINE Version 2

Kotaro Kita(UH),  Takanori Isobe(UH),  

[Date]2021-03-02
[Paper #]ICSS2020-47
Consideration on the mechanism of identifying and tracking Bitcoin users

Toshiaki Saisho(Advanced IT Corp.),  Shigeo Tsujii(Chuo Univ.),  Kouichi Sakurai(Kyushu Univ./ATR),  

[Date]2021-03-02
[Paper #]ICSS2020-44
Study on analyzing Memcached DRDoS attacks and their infrastructures

Mizuki Kondo(YNU),  Natsuo Shintani(YNU),  Daisuke Makita(NICT),  Katsunari Yoshioka(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2021-03-02
[Paper #]ICSS2020-45
Evaluation of resonance-induced attacks on inertial measurement unit

Yuta Minamisawa(Waseda Univ.),  Ryo Iijima(Waseda Univ.),  Tatsuya Mori(Waseda Univ./NICT),  

[Date]2021-03-02
[Paper #]ICSS2020-52
12>> 1-20hit(34hit)