Session Details

[A-7]情報セキュリティ

Wed. Mar 6, 2024 1:45 PM - 5:00 PM JST
Wed. Mar 6, 2024 4:45 AM - 8:00 AM UTC
School of Engineering 105(HIROSHIMA UNIVERSITY Higashi-Hiroshima campus)
Chair:HIROAKI ANADA, Nishimura Kouji

[A-7-01]An Initial Study of Trust-based Security for Industrial Control Systems

○Takashi Ogura1, Junya Fujita1, Kazuma Koshide1, Takayuki Kameda1 (1. Hitachi Ltd.)
PDF DownloadDownload PDF

[A-7-02]A Study on Improving the Efficiency of Vulnerability Management Using SBOM

○Io Kishimoto1, Norio Yamagaki1, Hirofumi Ueda1, Tomohiko Yagyu1 (1. NipponElectricCompany,Limited)
PDF DownloadDownload PDF

[A-7-03]Consideration of Interfaces that Provides Personality-Based Attention Capture in Attack Email Guard

○Yudai Watanabe1, Keiichi Yonemura1 (1. National Institute of Technology, Kisarazu College)
PDF DownloadDownload PDF

[A-7-04]A study of secure PCF data exchange methods

○Nobuaki Endou1, Atsushi Sakurai1 (1. NTT)
PDF DownloadDownload PDF

[A-7-05]Analysis of Issues in Incident Response Training at Hiroshima University

○Koudai Ishibashi1, Kouji Nishimura1, Yuko Murakami1 (1. Hiroshima University)
PDF DownloadDownload PDF

[A-7-06]Model Extraction Attack Based on Generative Adversarial Networks by Utilizing Pre-trained Generator

○Ryota Sasaki1, Kota Yoshida1, Yuta Fukuda1, Takeshi Fujino1 (1. Ritsumeikan Univ.)
PDF DownloadDownload PDF

Break time

[A-7-07]Vulnerability risk assessment method using visualization data of device communication operation

○Yasunori Wada1, Takayuki Uehara1 (1. Nippon Telegraph and Telephone Corporation)
PDF DownloadDownload PDF

[A-7-08]Towards policy-based orchestration of network security functions in Zero Trust Architecture

○Nakul Ghate1, Shohei Mitani1, Tomohiko Yagyu1, Hirofumi Ueda1 (1. NEC Corporation)
PDF DownloadDownload PDF

[A-7-09]Policy Generation Method for Backdoor Inspection using Data-Flow/Control-Flow Analysis

○Daiki Tanaka1, Yusuke Shimada1, Shunichi Kinoshita1 (1. NEC Corporation)
PDF DownloadDownload PDF

[A-7-10]Generation of executable adversarial examples of malware by GAN

○Kazuya Gotanda1, Hirofumi Yamaki1 (1. Tokyo Denki Univ.)
PDF DownloadDownload PDF

[A-7-11]Improving Robustness to Adversarial Examples in Malware Detection via Local Part Learning

○Hikaru Matsuzawa1, Kengo Murata1, Tomoaki Yamazaki1, Kouzou Ohara1 (1. Aogaku Univ.)
PDF DownloadDownload PDF

[A-7-12]An Automated System for Building Dynamic Analysis Environments to Support Dynamic Analysis

○Yuki Ishida1, Ayane Kamagata1, Junko Sato1, Yorinori Kishimoto1, Atsushi Waseda1, Eiji Nunohiro1, Masaki Hanada1 (1. Tokyo Univ. of Information Sciences)
PDF DownloadDownload PDF