情報セキュリティ特論
菊池 浩明
火曜
3限 412 教室 (2019年春セメスター)
No Date   Contents Author Issue Keyword
1 2019/4/16   Guidance      
2 2019/4/23   Tracking Ransomware End-to-end D. Y. Huang et al SP 18 マルウェア, ランサムウェア
3 2019/5/7   Privacy Risks with Facebook's PII-Based Targeting: Auditing a Data Broker's Advertising Interface G. Venkatadri et al. SP 18 Privacy,SNS, 広告,データブローカー
4 2019/5/14   EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements Y. Chen, T. Li, R. Zhang, Y. Zhang and T. Hedgpeth SP 18 攻撃手法,眼球運動,パスワード解析
5 2019/5/21   When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts, S. Eberz, G. Lovisotto, A. Patane, M. Kwiatkowska, V. Lenders and I. Martinovic SP 18 生体認証,多要素認証,個人識別
6 2019/5/28   Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks K. Jansen, M. Schafer, D. Moser, V. Lenders, C. Popper and J. Schmitt SP 18 GPSなりすまし,クラウドソーシング
7 2019/6/4   Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies Gertjan Franken, Tom Van Goethem, and Wouter Joosen, imec-DistriNet, KU Leuven Usenix 18 ウェブ,クッキー,GDPR, ポリシー
8 2019/6/11   An Empirical Analysis of Anonymity in Zcash George Kappos, Haaroon Yousaf, Mary Maller, and Sarah Meiklejohn Usenix 18 仮想通貨,匿名性,Zcash
9 2019/6/18   Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide? Wajih Ul Hassan, Saad Hussain, and Adam Bates, University Of Illinois Urbana-Champaign Usenix 18 SNS, バイタルセンサー,プライバシー
10 2019/6/25   Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path Baojun Liu, Chaoyi Lu, Haixin Duan, and Ying Liu, Zhou Li,; Shuang Hao,  Min Yang Usenix 18 DNS,アドレス偽造,ウェブ
11 2019/7/2   Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets Weiteng Chen and Zhiyun Qian Usenix 18 無線ルータ,ネットワーク脆弱性
12 2019/7/9   MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense. Radhesh Krishnan Konoth, Emanuele Vineti, Veelasha Moonsamy, Martina Lindorfer, Christopher Kruegel, Herbert Bos, and Giovanni Vigna CCS 18 仮想通貨,Coinhive, ブラウザマイニング攻撃
13 2019/7/16   Fraud De-Anonymization for Fun and Profit Nestor Hernandez, Mizanur Rahman, Ruben Recabarren, and Bogdan Carbunar CCS 18 匿名化詐欺,順位,ビッグデータ
14 2019/7/23   Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai Orcun Cetin , Carlos Ganan, Lisette Altena, Takahiro Kasama, Daisuke Inoue, Kazuki Tamiya, Ying Tie , Katsunari Yoshioka , Michel van Eeten NDSS 19 IoTマルウェア,ネットワーク運用管理 (変更
15 2019/7/30    Preserving Both Privacy and Utility in Network Trace Anonymization Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, and Mourad Debbabi CCS 18 通信路匿名化,プライバシー (変更
16 補講          
IEEESP (IEEE Symposium on Security and Privacy)
CCS (ACM conference on computer and communications security)
KDD (ACM SIGKDD Int. Conference on Knowledge Discovery and Data Mining)
EC(International Cryptology Conference EUROCRYPT)
ASIACCS(ACM Symposium on InformAtion, Compuer and Communications Security)
ICISC(International Conference on Information Security and Cryptology)
CRYPTO (IACR International Cryptology Conference)
CT-RSA(RSA Security Conference Cryptographers Track)
RAID(Recent Advances in Intrusion Detection)
PAKDD (Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining
CCSW (ACM workshop on Cloud computing security)