情報セキュリティ特論 菊池 浩明 火曜3限 412 教室 (2019年春セメスター) |
||||||||
No | Date | Contents | Author | Issue | Keyword | |||
1 | 2019/4/16 | Guidance | ||||||
2 | 2019/4/23 | Tracking Ransomware End-to-end | D. Y. Huang et al | SP 18 | マルウェア, ランサムウェア | |||
3 | 2019/5/7 | Privacy Risks with Facebook's PII-Based Targeting: Auditing a Data Broker's Advertising Interface | G. Venkatadri et al. | SP 18 | Privacy,SNS, 広告,データブローカー | |||
4 | 2019/5/14 | EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements | Y. Chen, T. Li, R. Zhang, Y. Zhang and T. Hedgpeth | SP 18 | 攻撃手法,眼球運動,パスワード解析 | |||
5 | 2019/5/21 | When Your Fitness Tracker Betrays You: Quantifying the Predictability of Biometric Features Across Contexts, | S. Eberz, G. Lovisotto, A. Patane, M. Kwiatkowska, V. Lenders and I. Martinovic | SP 18 | 生体認証,多要素認証,個人識別 | |||
6 | 2019/5/28 | Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks | K. Jansen, M. Schafer, D. Moser, V. Lenders, C. Popper and J. Schmitt | SP 18 | GPSなりすまし,クラウドソーシング | |||
7 | 2019/6/4 | Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies | Gertjan Franken, Tom Van Goethem, and Wouter Joosen, imec-DistriNet, KU Leuven | Usenix 18 | ウェブ,クッキー,GDPR, ポリシー | |||
8 | 2019/6/11 | An Empirical Analysis of Anonymity in Zcash | George Kappos, Haaroon Yousaf, Mary Maller, and Sarah Meiklejohn | Usenix 18 | 仮想通貨,匿名性,Zcash | |||
9 | 2019/6/18 | Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide? | Wajih Ul Hassan, Saad Hussain, and Adam Bates, University Of Illinois Urbana-Champaign | Usenix 18 | SNS, バイタルセンサー,プライバシー | |||
10 | 2019/6/25 | Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path | Baojun Liu, Chaoyi Lu, Haixin Duan, and Ying Liu, Zhou Li,; Shuang Hao, Min Yang | Usenix 18 | DNS,アドレス偽造,ウェブ | |||
11 | 2019/7/2 | Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets | Weiteng Chen and Zhiyun Qian | Usenix 18 | 無線ルータ,ネットワーク脆弱性 | |||
12 | 2019/7/9 | MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense. | Radhesh Krishnan Konoth, Emanuele Vineti, Veelasha Moonsamy, Martina Lindorfer, Christopher Kruegel, Herbert Bos, and Giovanni Vigna | CCS 18 | 仮想通貨,Coinhive, ブラウザマイニング攻撃 | |||
13 | 2019/7/16 | Fraud De-Anonymization for Fun and Profit | Nestor Hernandez, Mizanur Rahman, Ruben Recabarren, and Bogdan Carbunar | CCS 18 | 匿名化詐欺,順位,ビッグデータ | |||
14 | 2019/7/23 | Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai | Orcun Cetin , Carlos Ganan, Lisette Altena, Takahiro Kasama, Daisuke Inoue, Kazuki Tamiya, Ying Tie , Katsunari Yoshioka , Michel van Eeten | NDSS 19 | IoTマルウェア,ネットワーク運用管理 (変更) | |||
15 | 2019/7/30 | Preserving Both Privacy and Utility in Network Trace Anonymization | Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, and Mourad Debbabi | CCS 18 | 通信路匿名化,プライバシー (変更) | |||
16 | 補講 | |||||||
※ IEEESP (IEEE Symposium on Security and Privacy) | ||||||||
CCS (ACM conference on computer and communications security) | ||||||||
KDD (ACM SIGKDD Int. Conference on Knowledge Discovery and Data Mining) | ||||||||
EC(International Cryptology Conference EUROCRYPT) | ||||||||
ASIACCS(ACM Symposium on InformAtion, Compuer and Communications Security) | ||||||||
ICISC(International Conference on Information Security and Cryptology) | ||||||||
CRYPTO (IACR International Cryptology Conference) | ||||||||
CT-RSA(RSA Security Conference Cryptographers Track) | ||||||||
RAID(Recent Advances in Intrusion Detection) | ||||||||
PAKDD (Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining | ||||||||
CCSW (ACM workshop on Cloud computing security) |