Information and Systems-Software Science(Date:2022/11/07)

Presentation
A scalable and asyncronus group end-to-end encryption protocol

Taigen Takeshita(Keio Univ.),  Kousei Akama(Keio Univ.),  Masaaki Sato(Tokai Univ.),  Keisuke Uehara(Keio Univ.),  

[Date]2022-11-07
[Paper #]ICSS2022-38
Real-time detection method for DOM-based XSS via multiple files

Shu Hiura(Toho Univ.),  Akira Kanaoka(Toho Univ.),  

[Date]2022-11-07
[Paper #]ICSS2022-40
Observation of Attack Infrastructures by Scripts that Mimic C&C Communications of IoT Bots

Kaichi Sameshima(YNU),  Yuki Endo(YNU),  Rui Tanabe(YNU),  Katsunari Yoshioka(YNU),  Koji Nakao(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2022-11-07
[Paper #]ICSS2022-44
Analysis of Environmental Sensitivity of Persistent IoT Malware using Sandboxes with File Systems from Various IoT Devices

Takahiro Inoue(YNU),  Eizo Okada(YNU/RainForest),  Kouichirou Okada(YNU/RainForest),  Eitaro Shioji(NTT),  Mitsuaki Akiyama(NTT),  Rui Tanabe(YNU),  Katsunari Yoshioka(YNU),  Koji Nakao(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2022-11-07
[Paper #]ICSS2022-45
Blockchain-Based Cloud Storage Data Auditing Scheme for Identifying Data Provenance

Yuichi Kado(Kobe Univ.),  Masanori Hirotomo(Saga Univ.),  Yoshiaki Shiraishi(Kobe Univ),  Masakatu Morii(Kobe Univ.),  

[Date]2022-11-07
[Paper #]ICSS2022-39
Survey of Support Policy Settings and Publication for Consumer IoT Devices

Takahiro Kasama(NICT),  Kosuke Murakami(NICT/KDDI Research, Inc.),  Akira Fujita(NICT),  Daisuke Inoue(NICT),  

[Date]2022-11-08
[Paper #]ICSS2022-41
Tracing Methodology for Scanning Campaigns Based on Darknet Analysis

Chansu Han(NICT),  Akira Tanaka(NICT),  Takeshi Takahashi(NICT),  Jun'ichi Takeuchi(QU),  

[Date]2022-11-08
[Paper #]ICSS2022-43
Analysis of Weak Password Settings for IoT Devices and Results of User Notifications

Kosuke Murakami(NICT/KDDIR),  Takahiro Kasama(NICT),  Daisuke Inoue(NICT),  

[Date]2022-11-08
[Paper #]ICSS2022-42
An Efficient Method of Finding Flippable Bits for RAMBleed

Haruka Okuda(Kobe Univ.),  Makoto Takita(Univ. of Hyogo),  Kazuhide Fukushima(KDDI Research, Inc.),  Yuto Nakano(KDDI Research, Inc.),  Yoshiaki Shiraishi(Kobe Univ.),  Masakatu Morii(Kobe Univ.),  

[Date]2022-11-08
[Paper #]ICSS2022-47
Design and Implementation of a Task Scheduler for Delaying Ransomware

Shuhei Enomoto(TUAT),  Hiroki Kuzuno(Kobe Univ.),  Hiroshi Yamada(TUAT),  Yoshiaki Shiraishi(Kobe Univ.),  Masakatu Morii(Kobe Univ.),  

[Date]2022-11-08
[Paper #]ICSS2022-46