Presentation 2016-03-03
Analyzing Targeted Cyber Attacks by Focusing on Contents of Decoy Documents
Natsuko Kawakami, Ryota kikkawa, Ying Tie, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) In recent targeted cyberattacks, targeted malware display embedded or downloaded decoy documents upon their execution as a camouflage. In this study, we focus on the contents of the decoy documents obtained from samples used for targeted attacks. We show that we can often infer potential targets of the samples from the contents of the decoy documents. Moreover, we show and confirm that although most of the decoy documents are from publically available information, some decoy documents contain confidential information that is available for only limited group of people implying that at least one of them has been already compromised.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Targeted attacks / Integrated malware analysis service / Decoy document
Paper #
Date of Issue

Conference Information
Committee ICSS / IPSJ-SPT
Conference Date 2016/3/3(2days)
Place (in Japanese) (See Japanese page)
Place (in English) Academic Center for Computing and Media Studies, Kyoto University
Topics (in Japanese) (See Japanese page)
Topics (in English) Information and Communication System Security, etc.
Chair Yutaka Miyake(KDDI R&D Labs.)
Vice Chair Takashi Nishide(Univ. of Tsukuba) / Yoshiaki Shiraishi(Kobe Univ.)
Secretary Takashi Nishide(Mitsubishi Electric) / Yoshiaki Shiraishi(NII)
Assistant Katsunari Yoshioka(Yokohama National Univ.) / Kazunori Kamiya(NTT)

Paper Information
Registration To Technical Committee on Information and Communication System Security / Special Interest Group on Security Psychology and Trust
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Analyzing Targeted Cyber Attacks by Focusing on Contents of Decoy Documents
Sub Title (in English)
Keyword(1) Targeted attacks
Keyword(2) Integrated malware analysis service
Keyword(3) Decoy document
1st Author's Name Natsuko Kawakami
1st Author's Affiliation Yokohama National University(YNU)
2nd Author's Name Ryota kikkawa
2nd Author's Affiliation Yokohama National University(YNU)
3rd Author's Name Ying Tie
3rd Author's Affiliation Yokohama National University(YNU)
4th Author's Name Rui Tanabe
4th Author's Affiliation Yokohama National University(YNU)
5th Author's Name Katsunari Yoshioka
5th Author's Affiliation Yokohama National University(YNU)
6th Author's Name Tsutomu Matsumoto
6th Author's Affiliation Yokohama National University(YNU)
Date 2016-03-03
Paper #
Volume (vol) vol.115
Number (no) ICSS-488
Page pp.pp.-(),
#Pages
Date of Issue