Presentation 2019-03-07
An experiment design of security notification to users of IoT devices through dedicated client software
Shin Nishida, Takuya Hoizumi, Keisuke Uchida, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Notification of vulnerability and malware infection of IoT devices to the stakeholders is becoming increasingly important. Especially, ISPs play critical roles in identifying and notifying the users although such activities are costly. Therefore, various studies have been conducted to measure and compare the effectiveness of notifications in various setups. In this study, we focus on a case in which notification can be done via dedicated client software installed on users PCs and/or smart phones. We show a design for notification experiment particularly for WarpDrive project.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) IoT device / Security notification / Security countermeasure
Paper # ICSS2018-75
Date of Issue 2019-02-28 (ICSS)

Conference Information
Committee ICSS / IPSJ-SPT
Conference Date 2019/3/7(2days)
Place (in Japanese) (See Japanese page)
Place (in English) NICT Okinawa Electromagnetic Technology Center
Topics (in Japanese) (See Japanese page)
Topics (in English) Security, etc.
Chair Yoshiaki Shiraishi(Kobe Univ.)
Vice Chair Hiroki Takakura(NII) / Katsunari Yoshioka(Yokohama National Univ.)
Secretary Hiroki Takakura(NTT) / Katsunari Yoshioka(NICT)
Assistant Akira Yamada(KDDI labs.) / Keisuke Kito(Mitsubishi Electric)

Paper Information
Registration To Technical Committee on Information and Communication System Security / Special Interest Group on Security Psychology and Trust
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) An experiment design of security notification to users of IoT devices through dedicated client software
Sub Title (in English)
Keyword(1) IoT device
Keyword(2) Security notification
Keyword(3) Security countermeasure
1st Author's Name Shin Nishida
1st Author's Affiliation Yokohama National University(Yokohama National Univ.)
2nd Author's Name Takuya Hoizumi
2nd Author's Affiliation Yokohama National University(Yokohama National Univ.)
3rd Author's Name Keisuke Uchida
3rd Author's Affiliation Yokohama National University(Yokohama National Univ.)
4th Author's Name Akira Fujita
4th Author's Affiliation Institute of Advanced Sciences, Yokohama National University(Yokohama National Univ.)
5th Author's Name Katsunari Yoshioka
5th Author's Affiliation Graduate School of Environment and Information Sciences/Institute of Advanced Sciences, Yokohama National University(Yokohama National Univ.)
6th Author's Name Tsutomu Matsumoto
6th Author's Affiliation Graduate School of Environment and Information Sciences/Institute of Advanced Sciences, Yokohama National University(Yokohama National Univ.)
Date 2019-03-07
Paper # ICSS2018-75
Volume (vol) vol.118
Number (no) ICSS-486
Page pp.pp.41-46(ICSS),
#Pages 6
Date of Issue 2019-02-28 (ICSS)