Session Details

[D-19]情報通信システムセキュリティ

Thu. Mar 7, 2024 9:00 AM - 12:00 PM JST
Thu. Mar 7, 2024 12:00 AM - 3:00 AM UTC
School of Integrated Arts and Sciences K206(HIROSHIMA UNIVERSITY Higashi-Hiroshima campus)
Chair:MASAYA SATO, Toshiaki Tanaka

[D-19-01]Authentication methods using the changes of configuration information

○Hiroaki Ohtsuka1, Naoto Fujiki1, Kensuke Nakata1, Yukio Nagafuchi1, Ryota Sato1, Takuya Minami1, Yoshiaki Nakajima1 (1. NTT Social Informatics Laboratories)
PDF DownloadDownload PDF

[D-19-02]Anomaly communication detection linked with vulnerability information

○Nobuhiro Chiba1, Yukio Nagafuchi1, Kensuke Nakata1, Ryota Sato1 (1. NTT Social Informatics Laboratories)
PDF DownloadDownload PDF

[D-19-03]A study on a Method for Finding Obfusccator Executable File based on File Similarity

○Ryuki Hiratsuka1, Yorinori Kishimoto1 (1. Tokyo University Information Sciences)
PDF DownloadDownload PDF

[D-19-04]A Proposal of Forensic Support Method using Similarity of Log Event IDs

○Rei Isono1, yorinori kisimoto1 (1. Tokyo University of Information Sciences)
PDF DownloadDownload PDF

[D-19-05]A Study of Pre-Attack Stock Price Trends of Companies Victimized by Cyber Attacks

○Naoki Taniya1, Yorinori Kisimoto1 (1. Faculty of Informatics, Tokyo University of Information Sciences)
PDF DownloadDownload PDF

[D-19-06]A study on privacy preserving detection system for phishing sites

○Tomomi Kanayama1, Toshiaki Tanaka1, Jun Kurihara1 (1. Graduate School of Information Science, University of Hyogo)
PDF DownloadDownload PDF

Break time

[D-19-07]A Proposal for Reducing Security Processing Delays in Virtual Networks

○Ryohei Sato1, Ayumi Ishimaru1, Yuichi Nakatani1, Akinori Shiraga1 (1. NTT Network Innovation Center)
PDF DownloadDownload PDF

[D-19-08]INTRUSION DETECTION SYSTEM USING BERT

○Yuuki Yamanaka1, Tomokatsu Takahashi1, Yoshiaki Nakajima1 (1. NTT Social Informatics Laboratories)
PDF DownloadDownload PDF

[D-19-09]Exploration of Accelerating Anomaly Detection in Packets Using BERT

○Tomokatsu Takahashi1, Yuuki Yamanaka1, Takuya Minami1, Yoshiaki Nakajima1 (1. NTT Social Informatics Laboratories)
PDF DownloadDownload PDF

[D-19-10]A Proposal of Grouping Method with Detected Anomaly Results of Communication

○Naoto Fujiki1, Yukio Nagafuchi1, Kensuke Nakata1, Ryota Sato1, Yoshiaki Nakajima1 (1. Nippon Telegraph and Telephone Corporation)
PDF DownloadDownload PDF

[D-19-11]Demonstrating Improper Authentication by Emulating Unencrypted FeliCa Communication

○Keiichi Morita1, Hirofumi Yamaki1 (1. Tokyo Denki University)
PDF DownloadDownload PDF