Session Details
[A-7]情報セキュリティ
Tue. Mar 25, 2025 1:45 PM - 5:00 PM JST
Tue. Mar 25, 2025 4:45 AM - 8:00 AM UTC
Tue. Mar 25, 2025 4:45 AM - 8:00 AM UTC
Building No.1 2F 12N(Tokyo City University)
Chair:Mamoru Saita(NEC Corporation)
[A-7-12]Introduction of secure black box system in drones
〇Ryunosuke Okada1, Kento Sakamoto1, Hirohumi Yamaki1 (1. Tokyo Denki University)
[A-7-13]Design of a Lightweight Authentication Protocol for Multi-Swarm UAV Networks
〇Long Zhao1, Hideaki Goto1, Takuo Suganuma1 (1. Tohoku University)
[A-7-14]A preliminary study of automated vulnerability assessment based on SSVC
〇Daisuke Tsuji1, Yuki Ueki1, Norikata Matsumoto1, Nobutaka Kawaguchi1, Tomo Kakuta2, Yoshihiro Matsumoto2, Hirofumi Nakakoji2 (1. Hitachi, 2. Hitachi Systems)
[A-7-15]Reducing False Positives by Considering the Lifecycle of IoCs in SOC Operations
〇Mitsuharu Sasaki1, Atsushi Kobayashi1 (1. NTT-ME CORPORATION)
Break time
[A-7-16]Validation of Effectiveness of Colored Noise against Audio Adversarial Example
〇Mizuki Tomita1, Yuya Tarutani2, Yukinobu Fukushima1, Tokumi Yokohira1 (1. Okayama University, 2. Osaka University)
[A-7-17]A Method to Improve the Accuracy of Visualization Data Estimation by Leveraging Evaluation
〇Masanori Shinohara1 (1. NIPPON TELEGRAPH AND TELEPHONE CORPORATION)
[A-7-18]Proposal for a Passcode Management Method in Security Awareness
〇Norihiro Tanimura1, Nobuyuki Sugio1 (1. Hokkaido University of Science)
[A-7-19]Survey on information security at small and medium-sized enterprises in Ibaraki Prefecture
〇Atsushi KOBAYASHI Kobayashi2, Naoya Azuma1, Koomi Enokizawa1, Yuusuke Takano1, Manato Yokozuka1, Sougo Yoshida1, Taiki Mitake2, Masato Suzuki2, Shota Okayasu3, Takamichi Asou3, Hirofumi Ota1 (1. Ibaraki University, 2. NTT-ME Corporation, 3. NTT East Corporation)
Break time
[A-7-20]Fast Function Hook by Overwriting ENDBR64 Instructions
〇Kyohei Yamada1, Tomoki Nakashima1, Yuta Kazato1, Takehiro Kitano1, Akinori Shiraga1 (1. NTT)
[A-7-21]Rust実装へのサイドチャネル攻撃のシミュレーション評価
〇Kota Sugihara1, Yuichi Komano1 (1. Chiba Institute of Technology)
[A-7-22]Security Threat of LotL Attacks on IoT Devices with Linux OS
〇Yuki Kurihara1, Yuichi Komano1 (1. CIT)