情報セキュリティ特論 菊池 浩明 火曜3限 412 教室 (2018年春セメスター) |
||||||||
No | Date | Contents | Author | Issue | Keyword | |||
1 | 2018/4/10 | Guidance | ||||||
2 | 2018/4/17 | Broken Hearted: How To Attack ECG Biometrics | Simon Eberz, Nicola Paoletti, Marc Roeschlin, Andrea Patané, Marta Kwiatkowska, Ivan Martinovic | NDSS 17 | 生体認証,心電図,偽造 | |||
3 | 2018/4/24 | CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers | James Larisch; David Choffnes; Dave Levin; Bruce M. Maggs; Alan Mislove; Christo Wilson | IEEESP 17 | PKI, ネットワークセキュリティ | |||
2018/5/1 | 休校日 | |||||||
4 | 2018/5/8 | Understanding the Mirai Botnet | Manos Antonakakis, ; Tim April, Akamai; Michael Bailey, ; Matt Bernhard, , Ann Arbor; Elie Bursztein, ; Jaime Cochran, Cloudflare; Zakir Durumeric and J. Alex Halderman, Ann Arbor; Luca Invernizzi, ; Michalis Kallitsis, ; Deepak Kumar, ; Chaz Lever, ; Zane Ma and Joshua Mason, ; Damian Menscher,; Chad Seaman, ; Nick Sullivan, Cloudflare; Kurt Thomas, ; Yi Zhou | Usenix 17 | マルウェア,IoT | |||
5 | 2018/5/15 | 休講 | ||||||
6 | 2018/5/22 | Leakage-Abuse Attacks on Order-Revealing Encryption | Paul Grubbs; Kevin Sekniqi; Vincent Bindschaedler; Muhammad Naveed; Thomas Ristenpart | IEEESP 17 | 暗号理論,個人情報 | |||
7 | 2018/5/29 | Membership Inference Attacks against Machine Learning Models | Reza Shokri; Marco Stronati; Congzheng Song; Vitaly Shmatikov | IEEESP 17 | 機械学習,リスク評価 | |||
8 | 2018/6/5 | PathShuffle: Credit Mixing and Anonymous Payments for Ripple | Pedro Moreno-Sanchez , Tim Ruffing, Aniket Kate | PETS 17 | 匿名性,購買 | |||
9 | 2018/6/12 | Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering | Niklas Buescher, Spyros Boukoros, Stefan Bauregger, and Stefan Katzenbeisser | PETS 17 | CPS, IoT, ネットワークセキュリティ | |||
10 | 2018/6/19 | Privacy Preserving Distributed Linear Regression on High-Dimensional Data | Adria Gascon, Phillipp Schoppmann, Borja Balle , Mariana Raykova, Jack Doerner, Samee Zahur , and David Evans | PETS 17 | 暗号プロトコル,線形回帰 | |||
11 | 2018/6/26 | Locally Differentially Private Protocols for Frequency Estimation | Tianhao Wang, Jeremiah Blocki, and Ninghui Li; Somesh Jha | Usenix 17 | プライバシー保護,確率統計 | |||
12 | 2018/7/3 | Exploring User Perceptions of Discrimination in Online Targeted Advertising | Angelisa C. Plane, Elissa M. Redmiles, and Michelle L. Mazurek, Michael Carl Tschantz | Usenix 17 | ウェブ広告,認知科学 | |||
13 | 2018/7/10 | How to Learn Klingon Without Dictionary: Detection and Measurement of Black Keywords Used by Underground Economy | Hao Yang; Xiulin Ma; Kun Du; Zhou Li; Haixin Duan; Xiaodong Su; Guang Liu; Zhifeng Geng; Jianping Wu | IEEESP 17 | ウェブ, SEO, プライバシー | |||
14 | 2018/7/17 | FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild | Zhenhua Li, Weiwei Wang, Christo Wilson, Jian Chen, Chen Qian, Taeho Jung, Lan Zhang, Kebin Liu, Xiangyang Li, Yunhao Liu | NDSS 17 | ネットワークセキュリティ,無線通信 | |||
15 | 2018/7/24 | 休講 | ||||||
16 | 補講 | Self-driving cars and data collection: Privacy perceptions of networked autonomous vehicles | Cara Bloom, Joshua Tan, Javed Ramjohn, and Lujo Bauer | Soups 17 | ユーザスタディ,自動運転 | |||
※ IEEESP (IEEE Symposium on Security and Privacy) | ||||||||
CCS (ACM conference on computer and communications security) | ||||||||
KDD (ACM SIGKDD Int. Conference on Knowledge Discovery and Data Mining) | ||||||||
EC(International Cryptology Conference EUROCRYPT) | ||||||||
ASIACCS(ACM Symposium on InformAtion, Compuer and Communications Security) | ||||||||
ICISC(International Conference on Information Security and Cryptology) | ||||||||
CRYPTO (IACR International Cryptology Conference) | ||||||||
CT-RSA(RSA Security Conference Cryptographers Track) | ||||||||
RAID(Recent Advances in Intrusion Detection) | ||||||||
PAKDD (Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining | ||||||||
CCSW (ACM workshop on Cloud computing security) |