Presentation | 2016-06-06 Method to Locate Cryptographic Functions from Malware Ryoya Furukawa, Ryoichi Isawa, Masakatu Morii, Daisuke Inoue, Koji Nakao, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | |
Paper # | |
Date of Issue |
Conference Information | |
Committee | ICSS / IA |
---|---|
Conference Date | 2016/6/6(2days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | Saga University |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | Internet Security, etc. |
Chair | Yutaka Miyake(KDDI R&D Labs.) / Ken-ichi Yoshida(Univ. of Tsukuba) |
Vice Chair | Yoshiaki Shiraishi(Kobe Univ.) / Takeshi Ueda(Mitsubishi Electric) / Hiroyuki Osaki(Kwansei Gakuin Univ.) / Masahiro Jibiki(NICT) / Tomoki Yoshihisa(Osaka Univ.) |
Secretary | Yoshiaki Shiraishi(NII) / Takeshi Ueda(Yokohama National Univ.) / Hiroyuki Osaki(Tokyo Inst. of Tech.) / Masahiro Jibiki(Ritsumeikan Univ.) / Tomoki Yoshihisa |
Assistant | Kazunori Kamiya(NTT) / Takahiro Kasama(NICT) / Yusuke Sakumoto(Tokyo Metropolitan Univ.) / Yuichiro Hei(KDDI R&D Labs.) / Toshiki Watanabe(NEC) |
Paper Information | |
Registration To | Technical Committee on Information and Communication System Security / Technical Committee on Internet Architecture |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Method to Locate Cryptographic Functions from Malware |
Sub Title (in English) | |
Keyword(1) | |
1st Author's Name | Ryoya Furukawa |
1st Author's Affiliation | Kobe University(Kobe Univ.) |
2nd Author's Name | Ryoichi Isawa |
2nd Author's Affiliation | National Institute of Information and Communications Technology(NICT) |
3rd Author's Name | Masakatu Morii |
3rd Author's Affiliation | Kobe University(Kobe Univ.) |
4th Author's Name | Daisuke Inoue |
4th Author's Affiliation | National Institute of Information and Communications Technology(NICT) |
5th Author's Name | Koji Nakao |
5th Author's Affiliation | National Institute of Information and Communications Technology(NICT) |
Date | 2016-06-06 |
Paper # | |
Volume (vol) | vol.116 |
Number (no) | IA-79,ICSS-80 |
Page | pp.pp.-(), |
#Pages | |
Date of Issue |