Program

Awards

Best Paper Awards πŸŽ‰

  • CHRONOHUNT: Determining Optimal Pace For Automated Alert Analysis in Threat Hunting using Reinforcement Learning
    Boubakr Nour (Ericsson Security Research), Makan Pourzandi (Ericsson Security Research), Jesus Alatorre (Ericsson Cyber Defense Center), Jan Willekens (Ericsson Cyber Defense Center), Mourad Debbabi (Concordia University)
  • An analysis of the relationship between Black-hat SEO malware families leveraging information from redirected fake E-commerce scam sites
    Makoto Shimamura (Trend Micro Inc.), Shingo Matsugaya (Trend Micro Inc. / Japan Cybercrime Control Center), Keisuke Sakai (Kanagawa Prefectural Police Headquarters / Kagawa University), Kousuke Takeshige (Chiba Prefectural Police Headquarters / Kagawa University), Masaki Hashimoto (Kagawa University)

Best Poster Award πŸŽ‰

  • A Proactive Detection of IoT Botnet using Darknet Traffic on SOC Gunyang Park (Korea Institute of Science and Technology Information), Taeyong Kim (Korea Institute of Science and Technology Information), Younsu Lee (Korea Institute of Science and Technology Information), Jun Lee (Korea Institute of Science and Technology Information)

Notes

  • All times in the program are JST (Japan Standard Time; UTC+9) time zone.
  • The presentation time, including Q&A, is as follows:
    • Main Track:
      • Regular papers: 25 minutes
      • Short papers: 20 minutes
    • Experience and Practice Track: 15 minutes
    • Workshop session: 20 15 minutes
  • Meals will be provided at each conference lunch time.
  • The program is subject to minor changes.

Day 1 - November 6, 2024

08:30 - 09:30 Registration
09:30 - 10:00 Conference Opening Session
10:00 - 11:00

Keynote Speech 1

Chair: Koji Nakao (NICT)

Enhancing ML-based system detection and monitoring through model fusion and cognitive diversity

Speaker: Prof. D. Frank Hsu (Fordham University)

11:00 - 11:30 Coffee Break
11:30 - 12:40

Session 1 - Advanced Threat Detection and Hunting

Session Chair: Katsunari Yoshioka (Yokohama National University)

CHRONOHUNT: Determining Optimal Pace For Automated Alert Analysis in Threat Hunting using Reinforcement Learning (Best Paper πŸŽ‰)

Boubakr Nour (Ericsson Security Research), Makan Pourzandi (Ericsson Security Research), Jesus Alatorre (Ericsson Cyber Defense Center), Jan Willekens (Ericsson Cyber Defense Center), Mourad Debbabi (Concordia University)

Inherited Threat Reproduction on Open Source 5G Testbed

Toshiro Sawamoto (NICT), Mio Suzuki (NICT), Yutaro Osako (Osaka University / NICT), Takahiro Kasama (NICT), Daisuke Inoue (NICT), Koji Nakao (NICT)

[Short Paper] Traceability Measurement Analysis of Sustained Internet-Wide Scanners via Darknet

Chansu Han (NICT), Akira Tanaka (NICT), Takeshi Takahashi (NICT), Sajjad Dadkhah (University of New Brunswick), Ali A. Ghorbani (University of New Brunswick), Tsung-Nan Lin (National Taiwan University)

12:40 - 13:40 Conference Lunch
13:40 - 15:15

Session 2 - Machine Learning and AI in Cybersecurity

Session Chair: Chansu Han (NICT)

One Pixel Adversarial Attack for Fooling Deep Learning-Based Facial Expression Recognition Systems

Pramod Kumar (PDPM Indian Institute of Information Technology Design and Manufacturing Jabalpur), Ayan Seal (PDPM Indian Institute of Information Technology Design and Manufacturing Jabalpur), Sraban-Kumar Mohanty (PDPM Indian Institute of Information Technology Design and Manufacturing Jabalpur), Haibo Zhang (Kyushu Institute of Technology), Kouichi Sakurai (Kyushu University)

Enhancing Cybersecurity with Transformers: Preventing Phishing Emails and Social Media Scams

Essam Al Daoud (Zarqa University), Laith Al Daoud (Jordan University of Science and Technology), Mahmoud Asassfeh (Zarqa University), Ala’a Al-Shaikh (Zarqa University), Ala'a Al-Sherideh (Zarqa University), Suha Afaneh (Zarqa University)

Sockpuppets Detection Using Markov-Driven Graph Convolutional Networks with Ensemble Learning

Chun-I Fan (National Sun Yat-sen University), Ming-Feng Tsai (National Sun Yat-sen University), Chun-Pin Hu (National Sun Yat-sen University), Ming-Hung Wang (National Chung Cheng University)

[Short Paper] Fine-Tuning Large Language Models For Network Traffic Analysis in Cyber Security

Ortal Lavi (Fujitsu Research of Europe), Ofir Manor (Fujitsu Research of Europe), Tomer Schwartz (Fujitsu Research of Europe), Andres F. Murillo (Fujitsu Research of Europe), Ayoub Messous (Fujitsu Research of Europe), Motoyoshi Sekiya (Fujitsu Research of Europe), Junichi Suga (Fujitsu Laboratories), Kenji Hikichi (Fujitsu Laboratories), Yuki Unno (Fujitsu Laboratories)

15:15 - 15:30

Sponsor session

Session Chair: Ryoichi Isawa (NICT)

15:30 - 16:00 Coffee Break
16:00 - 17:15

Session 3 - Hardware and System-Level Security

Session Chair: Masaya Sato (Okayama Prefectural University)

Information Flow Tracking for Hardware Trojan Detection: a Feasibility Study

Ryoichi Isawa (NICT), Nobuyuki Kanaya (NICT), Daisuke Inoue (NICT)

Vulnerabilities and Challenges in the Development of PUF-Based Authentication Protocols on FPGAs: A Brief Review

Sinan Yavuz (University of Siegen), Edwin Naroska (Niederrhein University of Applied Sciences), Kai Daniel (University of Applied Sciences Ruhr West)

kdMonitor: Kernel Data Monitor for Detecting Kernel Memory Corruption

Hiroki Kuzuno (Kobe University), Toshihiro Yamauchi (Okayama University)

Day 2 - November 7, 2024

08:30 - 09:30 Registration
09:30 - 11:10

Workshop on Blockchain and Distributed Ledger Technologies

Session Chair: Ramesh Ramadoss (MultiTech Ventures LLC)

[Invited Talk] Blockchain for IoT with Applications to Agriculture

Angelos Stavrou (Virginia Tech)

[Invited Talk] Development of ISO 25126 Information security controls based on ISO/IEC 27002 for distributed ledger services

Kyeong Hee Oh (DLTSF/ISACA Korea)

[Workshop Paper] A Multi-Package Trust Model for Improving the Trustworthiness of Traceability Data in Blockchain-Based Beef Supply Chain

Oratile Leteane (University of Botswana), Yirsaw Ayalew (University of Botswana), Tshiamo Motshegwa (University of Botswana)

[Invited Talk] Concept of session Root-of-Trust

Hiroshi Watanabe (National Yang Ming Chiao Tung University)

[Invited Talk] Blockchain-Driven Ledger Systems for IoT in LPWAN: Design, Disaster Management, and Transmission Optimization

Zheng Wen (Waseda University)

[Invited Talk] Security Issues in Public Blockchains

Ramesh Ramadoss (MultiTech Ventures LLC)

11:10 - 11:40 Coffee Break
11:40 - 12:40

Session 4 - Experience and Practice Track 1

Session Chair: Ryoichi Isawa (NICT)

Detection Evasion Using eBPF for Linux Fileless Malware

Yuta Takabayashi (Kanazawa University), Masahiro Mambo (Kanazawa University)

Exploring the Impact of LLM Assisted Malware Variants on Anti-Virus Detection

Zhewei Huang (Yokohama National University), Yin Minn Pa Pa (Yokohama National University), Katsunari Yoshioka (Yokohama National University)

Enhancing Microcontroller Security Through Volatile Memory-Resident Encrypted Code

Minjung Kim (Kyungpook National University), Daejin Park (Kyungpook National University)

Efficient and Secure Multi-Point Communication Framework Supporting Resource Constraints Environment

Jheng-Jia Huang (National Taiwan University of Science and Technology), Wei-Hsueh Wang (National Taiwan University of Science and Technology), Wen-Yan Dai (National Taiwan University of Science and Technology), Guan-Yu Chen (National Taiwan University of Science and Technology), Yi-Fan Tseng (National Chengchi University)

12:40 - 13:40 Conference Lunch
13:40 - 14:40

Keynote Speech 2

Chair: Hiroaki Kikuchi (Meiji University)

Title: Adversarial Attacks Against Emerging Deep Encoder Networks

Speaker: Seira Hidano (KDDI Research, Inc.)

14:40 - 16:20 Poster Session w/ Coffee
  • [P01] A Proactive Detection of IoT Botnet using Darknet Traffic on SOC (Best Poster πŸŽ‰)
  • [P02] Trends Analysis for Counteracting APT attacks on SOC
  • [P03] Real-time Monitoring of OT Security Threats within O-RAN Private Networks
  • [P04] Vehicle re-identification using features extracted by deep learning model from LiDAR data
  • [P05] Collecting DoS Attack Targets from Multiple Mirai Variants by Mimicking Bot Client
  • [P06] Anomaly detection system for on-board LiDAR sensor in autonomous mobility
  • [P07] Anomaly detection in multi-LiDAR sensor network
  • [P08] Blockchain framework for managing datasets and models for 3D machine-learning
  • [P09] From Packets to Explanation: Enhancing NIDS with XAI and Cyber-Attack Analysis
  • [P10] Inside Packed IoT Malware: Dissecting Binaries for Malware Detection Signals
  • [P11] Function Call Graph Comparison in IoT Malware Analysis: IDA Pro vs Radare2
  • [P12] Learning with Limited Data: Few-Shot IoT Malware Classification
  • [P13] Towards Multi-Architecture IoT Malware Analysis: Uncovering Discriminative Information in Printable Strings from Binary Data
  • [P14] An Authentic Portable Machine Learning Hands-on Lab for Cybersecurity
  • [P15] Analyzing the Impact of User Code and Library Functions for Improving IoT Malware Clustering
16:20 - 16:30 Break
16:30 - 17:45

Session 5 - Fraud and Scam Detection

Session Chair: Yin Minn Pa Pa (Yokohama National University)

Can We Determine Whether a Set of Ethereum Transaction Data Contains Fraudulent Transactions?

Shunsuke Nakatani (Kobe University), Hiroki Kuzuno (Kobe University), Makoto Takita (Kobe University), Masami Mohri (Kindai University), Yoshiaki Shiraishi (Kobe University)

Threat of Technical Support Scams in Japan

Ayumu Yamada (NICT), Hiroyuki Ito (NICT), Kosuke Kajimoto (Japan Cybercrime Control Center), Tetsuya Kageyama (Japan Cybercrime Control Center / LAC Co., Ltd.), Taichi Aoki (Japan Cybercrime Control Center / FUJITSU DEFENSE & NATIONAL SECURITY LIMITED), Takahiro KASAMA (NICT)

An analysis of the relationship between Black-hat SEO malware families leveraging information from redirected fake E-commerce scam sites (Best Paper πŸŽ‰)

Makoto Shimamura (Trend Micro Inc.), Shingo Matsugaya (Trend Micro Inc. / Japan Cybercrime Control Center), Keisuke Sakai (Kanagawa Prefectural Police Headquarters / Kagawa University), Kousuke Takeshige (Chiba Prefectural Police Headquarters / Kagawa University), Masaki Hashimoto (Kagawa University)

18:00 - 20:00 Conference Banquet

Day 3 - November 8, 2024

08:30 - 09:30 Registration
09:30 - 10:35

Session 6 - Quantum and Cryptographic Solutions

Session Chair: Rui Tanabe (Juntendo University)

Systematic Construction of Adaptively Decodable Visual Secret Sharing Scheme on Background Color

Masanori Hirotomo (Saga University), Atsushi Marui (Saga University), Yoshiaki Shiraishi (Kobe University)

[Short Paper] Enhanced Analysis of Cryptographic Library Usage Patterns and Trends in Android Applications

Akira Kanaoka (Toho University), Mamoru Abe (Toho University)

[Short Paper] Quantum Guard: Pioneering Quantum-Based Malware Defense for IoT Devices

Mansoor Ali Khan (National University of Singapore), Muhammad Naveed Aman (University of Nebraska-Lincoln), Biplab Sikdar (National University of Singapore)

10:35 - 11:05 Coffee Break
11:05 - 12:05

Session 7 - Experience and Practice Track 2

Session Chair: Masaki Kubo (NICT)

A Case Study of URL Blocklist Maintenance

Mizuho Hasegawa (Yokohama National University), Yamato Kawaguchi (Clwit, Inc.), Hiroaki Takayama (Clwit, Inc.), Yasuhiro Kunimine (Clwit, Inc.), Hidekazu Tanaka (NICT), Shintaro Kawamura (NICT), Akira Fujita (NICT), Shingo Yasuda (NICT), Daisuke Inoue (NICT), Nobuyo Fujiwara (Yokohama National University), Kazuki Takada (Hitachi Systems, Ltd. / Yokohama National University), Rui Tanabe (Clwit, Inc. / Juntendo University), Katsunari Yoshioka (Yokohama National University)

Control Displaying of Web Push Notifications Inducing Users to Phishing Websites

Masaya Sato (Okayama Prefectural University), Ryuuki Mandai (Okayama Prefectural University)

Blockchain-Enabled IoV: Secure Communication and Trustworthy Decision-Making

Jingyi Sun (Tongji University), Qi Shi (Tongji University), Guodong Jin (Tongji University), Hao Xu (Tongji University), Weichao Chen (Tongji University)

Investigating Black-Market Jobs on Social Networking Service

Yamato Kawaguchi (Yokohama National University), Kazuki Takada (Yokohama National University / Hitachi Systems, Ltd.), Yin Minn Pa Pa (Yokohama National University), Rui Tanabe (Yokohama National University / Juntendo University), Katsunari Yoshioka (Yokohama National University), Tsutomu Matsumoto (Yokohama National University / National Institute of Advanced Industrial Science and Technology)

12:05 - 13:05 Conference Lunch
13:05 - 14:20

Session 8 - Authentication and Intrusion Detection

Session Chair: Daisuke Inoue (NICT)

InstaMAuth: Instant Mobile Authentication Service Based on 5G Authenticated Call Sessions

Yi-Chen Hsieh (National Yang Ming Chiao Tung University), Tzu-Chi Yu (National Yang Ming Chiao Tung University), Chi-Yu Li (National Yang Ming Chiao Tung University), Guan-Hua Tu (Michigan State University)

An Approach to Multi-Class Intrusion Detection Based on Feature Subspaces and Weighted Fusion

Rui Liu (Kyushu University), Yaokai Feng (Kyushu University), Kouichi Sakurai (Kyushu University)

Enhancing Decision-Making of Network Intrusion Analysis Assisted by Explainable AI for Real-Time Security Monitoring

Hyunwoo LEE (Korea Institute of Science and Technology Information), Taewoong Kwon (Korea Institute of Science and Technology Information), Jun Lee (Korea Institute of Science and Technology Information), Jungsuk Song (Korea Institute of Science and Technology Information)

14:20 - 14:50 Conference Closing Ceremony