現在位置: ホーム / 業績

業績

業績

2015年度

Paper論文誌

  1. C. Yoon, T. Park, S. Lee, H. Kang, S. Shin, and Z. Zhang, Enabling security functions with SDN: A feasibility study, Computer Networks, Volume 85, Pages 19–35.

Global Conference国際会議

  1. Daisuke Miyamoto, Ryo Nakamura, Yuji Sekiya, Takeshi Takahashi, Offloading Smartphone Firewalling Using OpenFlow-capable Wireless Access Points, In Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom), March 2016.
  2. Daisuke Miyamoto, Yasuhiro Yamamoto, Masaya Nakayama, Text mining-based Approach for Estimating Vulnerability Score, In Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), November 2015.
  3. Ayumu Hirata, Daisuke Miyamoto, Masaya Nakayama, Hiroshi Esaki, INTERCEPT+: SDN Support for Live Migration-based Honeypots, In Proceedings of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), November 2015.
  4. Daisuke Miyamoto, Gregory Blanc, Youki Kadobayashi. Eye Can Tell: On the Correlation between Eye Movement and Phishing Identification, In proceedings of the 22nd International Conference on Neural Information Processing (ICONIP). Istanbul, Turkey, November 2015.
  5. Pernelle Mensah, Gregory Blanc, Kazuya Okada, Daisuke Miyamoto, and Youki Kadobayashi. AJNA: Anti-Phishing JS-based Visual Analysis, to Mitigate Users' Excessive Trust in SSL/TLS, In Proceeding of the 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS2015), November 2015.
  6. Evangelos Ladakis, Giorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis, and Georgios Portokalidis. GPU-Disasm: A GPU-based x86 Disassembler. In proceedings of the 18th Information Security Conference (ISC). Trondheim, Norway, September 2015.
  7. P. Szynkiewicz, A. Kozakiewicz. System for off-line generation of signatures of active threats. In proceedings of the XXXI National Symposium on Telecommunications and Teleinformatics (KSTiT 2015). Krakow, Poland, September, 2015.
  8. A. Kozakiewicz, T. Palka, P. Kijewski. Detection of addresses of botnet C&C; servers in data from sandbox environments. In proceedings of the XXXI National Symposium on Telecommunications and Teleinformatics (KSTiT 2015). Krakow, Poland, September, 2015.
  9. M. Kruczkowski. System for detection of malware campaigns. In proceedings of the XXXI National Symposium on Telecommunications and Teleinformatics (KSTiT 2015). Krakow, Poland, September, 2015.
  10. Iasonas Polakis, Michalis Diamantaris, Thanasis Petsas, Federico Maggi, and Sotiris Ioannidis. Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software. In proceedings of the 12th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2015). Milano, Italy, July 2015.
  11. Jema David Nidbwile, Kazuya Okada, Youki Kadobayashi, and A. Govardhan, Web Server Protection against Application Layer DDoS Attacks using Machine Learning and Traffic Authentication, In NETSAP 2015: The 5th IEEE International Workshop on Network Technologies for Security, Administration and Protection, July 2015.
  12. Paweł Pawliński, Adam Kozakiewicz. Lowering Cost of Data Exchange for Analysis and Defence. In proceedings of the Coordinating Attack Response at Internet Scale (CARIS) Workshop. Berlin, Germany, June 2015.
  13. Romain Fontugne, Patrice Abry, Kensuke Fukuda, Pierre Borgnat, Johan Mazel, Herwig Wendt, Darryl Veitch. Random Projection and Multiscale Wavelet Leader Based Anomaly Detection and Address Identification in Internet Traffic. In proceedings of the 40th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP). Brisbane, Australia. April, 2015.
  14. Romain Fontugne, Johan Mazel, Kensuke Fukuda. An Empirical Mixture Model for Large-Scale RTT Measurements. In proceedings of the 34th IEEE International Conference on Computer Communications (INFOCOM 2015). Hong Kong, April, 2015.

2014年度

Global Conference国際会議

  1. Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Hervé Debar. Towards Autonomic DDoS Mitigation using Software Defined Networking. In Proceedings of the 2015 NDSS Workshop on Security of Emerging Networking (SENT 2015). San Diego,US. February 2015.
  2. Michalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Georgios Portokalidis, and Sotiris Ioannidis. The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines. In Proceedings of the 22nd Network and Distributed System Security Symposium (NDSS 2015). San Diego, CA, US, February 2015.
  3. Jianxing Chen, Romain Fontugne, Akira Kato, Kensuke Fukuda . Clustering Spam Campaigns with Fuzzy Hashing.In Proceedings of the 10th Asian Internet Engineering Conference (AINTEC 2014), Chiang Mai, Thailand, Nov, 2014.
  4. Sirikarn Pukkawanna, Youki Kadobayashi, Gregory Blanc, Joaquin Garcia-Alfaro, Hervé Debar. Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment. In Proceedings of International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2014), Wroclaw, Porland, Sep, 2014.
  5. Hajime Tazaki, Kazuya Okada, Yuji Sekiya and Youki Kadobayashi. MATATABI: Multi-layer Threat Analysis Platform with Hadoop. In Proceedings of International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2014), Wroclaw, Porland, Sep, 2014.
  6. Daisuke Miyamoto, Takuji Iimura, Gregory Blanc, Hajime Tazaki, Youki Kadobayashi. EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits. In Proceedings of International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2014), Wroclaw, Porland, Sep, 2014.
  7. Jean Lorchat, Cristel Pelsser, Romain Fontugne. Collaborative Repository for Cybersecurity Data and Threat Information. In Proceedings of International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2014), Wroclaw, Porland, Sep, 2014.
  8. Jun Liu, Kensuke Fukuda. Towards a Taxonomy of Dakrnet Traffic . In Proceedings of International Workshop on Traffic analysis and Characterization (TRAC 2014), p.7, Nicosia, Cyprus, Aug, 2014.
  9. Johan Mazel, Romain Fontugne, Kensuke Fukuda. A Taxonomy of Anomalies in Backbone Network Traffic. In Proceedings of International Workshop on Traffic Analysis and Characterization (TRAC 2014), p.7, Nicosia, Cyprus, Aug, 2014
  10. Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, Sotiris Ioannidis. AndRadar: Fast Discovery of Android Applications in Alternative Markets. In Proceedings of the 11th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). London, UK. July 2014.
  11. Thanasis Petsas, Giannis Voyatzis, Elias Athanasopoulos, Michalis Polychronakis, Sotiris Ioannidis. Rage Against the Virtual Machine: Hindering Dynamic Analysis of Mobile Malware. In Proceedings of the 7th European Workshop on Systems Security (EuroSec). Amsterdam, The Netherlands. April 2014.
  12. Kazuya Okada, Hiroaki Hazeyama, Youki Kadobayashi, Oblivious DDoS Mitigation with Locator/ID Separation Protocol. The 9th International Conference on Future Internet Technologies, Tokyo, Japan, Jun, 2014. (Short Paper)
  13. Takuji Iimura, Daisuke Miyamoto, Hajime Tazaki, Youki Kadobayashi, NECOMAtter: Curating Approach for Sharing Cyber Threat Information. The 9th International Conference on Future Internet Technologies, Tokyo, Japan, Jun, 2014 (Poster)
  14. Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi, Detecting Anomalies in Massive traffic with Sketches. The 9th International Conference on Future Internet Technologies, Tokyo, Japan, Jun, 2014 (Poster)
  15. Daisuke Miyamoto, Satoru Teramura, Masaya Nakayama. INTERCEPT: High-interaction Server-type Honeypot based on Live Migration. In Proceedings of the 2nd Workshop on Emulation Tools, Methodology and Techniques (EMUTools 2014). Lisbon, Portugal. May 2014
  16. Romain Fontugne, Johan Mazel, Kensuke Fukuda, Hashdoop: A MapReduce Framework for Network Anomaly Detection. The Second International Workshop on Security and Privacy in Big Data (BigSecurity2014) in conjunction with IEEE INFOCOM2014, p.6, Toronto, Canada, Apr, 2014

PaperInternet Draft

  1. C. Inacio, D.Miyamoto. MILE Implementation Report, Jul 2014. draft-ietf-mile-implementreport-00.txt.

2013年度

Global Conference国際会議

  1. Johan Mazel, Romain Fontugne, and Kensuke Fukuda. Visual comparison of Network Anomaly Detectors with Chord Diagrams. In Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC, p.8, 2014
  2. Antonis Papadogiannakis, Laertis Loutsis, Vassilis Papaefstathiou, Sotiris Ioannidis. ASIST: Architectural Support for Instruction Set Randomization. In Proceedings of the 20th ACM Conference on Computer and Communications Security, CCS, November 2013.
  3. Hajime Tazaki, Frédéric Urbani, Emilio Mancini, Mathieu Lacage, Daniel Câmara, Thierry Turletti, Walid Dabbous. Direct Code Execution: Revisiting Library OS Architecture for Reproducible Network Experiments. In Proceedings of the 9th COnference on emerging Networking EXperiments and Technologies, , December, 2013.
  4. Yuta Kazato, Kensuke Fukuda, and Toshiharu Sugawara. Towards classification of DNS erroneous queries. In Proceedings of Asian Internet Engineering Conference, AINTEC, p8, 2013.

Domestic Conference国内研究会

  1. 岡田和也, 関谷勇司, 門林雄基. SDN を利用した IX の設計に関する一検討. インターネットコン ファレンス 2013(IC2013), pp. 43-49, 2013.
  2. Hajime Tazaki, Kazuya Okada, Yuji Sekiya, Youki Kadobayashi. MATATABI: Multi-layer Threat Analysis Platform with Hadoop. In IEICE Technical Report, Vol. 113, No. 502, IEICE-ICSS2013-77, pp.113-118, Mar 2014.
  3. Tomohiro Ishihara, Hajime Tazaki, Kazuya Okada, Daisuke Miyamoto, Yuji Sekiya. DNS Traffic Analysis Platform with Hadoop Framework. In IEICE Technical Report, Vol. 113, No. 502, IEICE-ICSS2013-80, pp.131-135, Mar 2014.

PaperInternet Draft

  1. D.Miyamoto, T.Takahashi. Knowledge obtained from the implementation experience of an IODEF-capable incident response management system, Feb 2014. draft-daisuke-iodef-experiment-00.txt.