Information and Systems-Software Science(Date:2023/03/13)

Presentation
Dynamic Analysis of Adversarial Attacks

Kentaro Goto(JPNIC),  Masato Uchida(Waseda Univ.),  

[Date]2023-03-13
[Paper #]ICSS2022-52
URL Warning List Creation and Manage Methods using VirusTotal and Web Access Log

Kyohei Takao(YNU),  Chika Hiraishi(YNU),  Kazuki Takada(SecureBrain),  Akira Fujita(NICT),  Daisuke Inoue(NICT),  Rui Tanabe(YNU),  Katsunari Yoshioka(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2023-03-13
[Paper #]ICSS2022-66
Expanding Underlying Number Fields Reducing from Module-LWE to Ring-LWE

Sosuke Funatsu(OU),  Atsuko Miyaji(OU),  Shinya Okumura(OU),  

[Date]2023-03-13
[Paper #]ICSS2022-71
A Study of Security Control Schemes in Fog Computing Based on TPO Conditions

Yushi Hosokawa(Hosei Univ.),  Kanai Atushi(Hosei Univ.),  qian wu(Hosei Univ.),  hatasima ryu(NTT),  tanimoto sigeaki(ChibaTech Univ.),  

[Date]2023-03-13
[Paper #]ICSS2022-80
Evaluation of Copy Protection Technology Using Web Font

Kazuki Nomoto(Waseda Univ.),  Tatsuya Mori(Waseda Univ./NICT/RIKEN AIP),  

[Date]2023-03-13
[Paper #]ICSS2022-61
New linear approximation and improved bias of ChaCha in differential linear analysis

Ryo Watanabe(Osaka Univ..),  Atsuko Miyaji(Osaka Univ./JAIST),  

[Date]2023-03-13
[Paper #]ICSS2022-69
sEMG-based Gesture Authentication for Smartwatch

Akihisa Watanabe(Waseda Univ.,),  Ryo Iijima(Waseda Univ.,),  Tatsuya Mori(Waseda Univ.,),  

[Date]2023-03-13
[Paper #]ICSS2022-50
Proposal and evaluation of visualization method for understanding security risks based on software dependencies

Tomohiko Yano(SECOM),  Hiroki Kuzuno(Kobe Univ.),  

[Date]2023-03-13
[Paper #]ICSS2022-60
Evaluation and countermeasures of notification destination restoration attacks using password recovery functions of multiple web services

Ryusei Ishikawa(Ritsumeikan Univ.),  Soramichi Akiyama(Ritsumeikan Univ.),  Atsuo Inomata(Ritsumeikan Univ., Osaka Univ.),  Tetsutaro Uehara(Ritsumeikan Univ.),  

[Date]2023-03-13
[Paper #]ICSS2022-62
Preservation Techniques of Fileless Attack Artifacts using Customized PowerShell

Masahito Kimura(Ritsumeikan Univ.),  Chris Liu(DTCY),  Tetsutaro Uehara(Ritsumeikan Univ.),  

[Date]2023-03-13
[Paper #]ICSS2022-57
Dynamic Fake QR Code using Invisible Laser Irradiation

Yuki Kamata(Tokai Univ.),  Shuya Kawaguchi(Tokai Univ.),  Toshihiro Ohigashi(Tokai Univ.),  Yoshihisa Takayama(Tokai Univ.),  

[Date]2023-03-13
[Paper #]ICSS2022-49
Disabling Adversarial Examples through Color Conversion using CMYK Defense Model

Ryo Soeda(Waseda Univ.),  Masato Uchida(Waseda Univ.),  

[Date]2023-03-13
[Paper #]ICSS2022-54
Implementation and Evaluation for Remote-Control Security System of IoT Devices

Masaru Takeuchi(JDC),  Yohei Watanabe(UEC/JDC),  Naoto Yanai(OU/JDC),  Akira Takeuchi(JDC),  Tatsuya Takehisa(Nisshin),  Yukitoshi Sanada(KU/JDC),  Junji Shikata(YNU),  Koji Nakao(NICT),  

[Date]2023-03-13
[Paper #]ICSS2022-67
A Study on Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities

Masaru Takeuchi(JDC),  Toshiaki Saisho(JDC),  Junji Shikata(JDC),  Toshio Sato(WU),  Kazue Sako(WU),  Jiro Katto(WU),  Takuro Sato(WU),  

[Date]2023-03-13
[Paper #]ICSS2022-68
Developing a Hand Gesture Recognition System for VR Devices

Mei Suzuki(Waseda Univ.),  Ryo Iijima(Waseda Univ.),  Kazuki Nomoto(Waseda Univ.),  Tetsushi Ohki(Shizuoka Univ./AIP),  Tatsuya Mori(Waseda Univ./NICT/AIP),  

[Date]2023-03-13
[Paper #]ICSS2022-48
An Analysis of the Risk of Unauthorized Access to the WebUI of IoT Devices

Kosuke Murakami(NICT/KDDIR),  Takahiro Kasama(NICT),  Daisuke Inoue(NICT),  

[Date]2023-03-13
[Paper #]ICSS2022-63
On a Threshold Ring Signature for Generating Efficiently Sized Signatures

Ryunosuke Higashi(OU),  Atsuko Miyaji(OU),  Hideaki Miyaji(OU),  Yuta Maeno(OU),  

[Date]2023-03-13
[Paper #]ICSS2022-72
Analyzing Software Dependency Analysis utilizing Multi-index Hashing and Directory Structure Information

Yo Kanemoto(NTT),  Yuuki Yamanaka(NTT),  Eitaro Shioji(NTT),  Kazufumi Aoki(NTT),  Makoto Iwamura(NSJ),  Mitsuaki Akiyama(NTT),  

[Date]2023-03-13
[Paper #]ICSS2022-58
Lessons Learned from Construction of the Security Technical Term Dictionary

Misato Matsuda(NICT),  Akira Fujita(NICT),  Yu Tsuda(NICT),  piyokango(NICT),  Daisuke Inoue(NICT),  

[Date]2023-03-13
[Paper #]ICSS2022-65
A Study on Effectiveness of Malware Infection Notification based on Role-playing Type Survey

Akira Fujita(NICT),  Misato Matsuda(NICT),  Takahiro Kasama(NICT),  Daisuke Inoue(NICT),  

[Date]2023-03-13
[Paper #]ICSS2022-64
12>> 1-20hit(33hit)