[
MWS2008 | 
MWS2009 | 
MWS2010 | 
MWS2011 | 
MWS2012 | 
MWS2013 | 
MWS2014
]
MWS 2015
October 21 (Wed) - 23 (Fri), 2015
Nagasaki Brick Hall, Nagasaki, Japan
Nagasaki Shimbun Culture Hall, Nagasaki, Japan
Photo story of MWS 2015
  | 
Nagasaki Brick Hall | 
  | 
Nagasaki Shimbun Culture Hall | 
Award Ceremony
  | 
MWS2015 Best Paper Award: 
ROPGuard Bypass Prevention Method using Last Branch Recording Facilities, 
Mitsunobu Tarao (Kanagawa Institute of Technology) 
 and 
Takeshi Okamoto (Kanagawa Institute of Technology). | 
  | 
MWS2015 Best Student Paper Award: 
A Large-scale Analysis of Cloned Android Apps, 
Yuta Ishii (Waseda University), 
Takuya Watanabe (Waseda University), 
Mitsuaki Akiyama (NTT Secure Platform Laboratories) 
 and 
Tatsuya Mori (Waseda University). | 
 | 
 | 
Team Name | 
Total Score (Rank) | 
Technical Score (Rank) | 
Presentation Score (Rank) | 
  | 
MWS Cup 2015 First Place Winner | 
JINKAI-SENJUTSU Black Team | 
74 (1) | 
55 (1) | 
19 (8) | 
  | 
MWS Cup 2015 Second Place Winner | 
Security SANKA | 
67 (2) | 
47 (2) | 
20 (5) | 
  | 
MWS Cup 2015 Third Place Winner | 
urandom | 
64 (3) | 
43 (3) | 
21 (1) | 
  | 
MWS Cup 2015 Planning Board Chair Special Prize | 
JINKAI-SENJUTSU Black Team 
Kazumi Ishibuchi (HIRT, Hitachi, Ltd.) | 
MWS Cup 2015
  | 
Briefing from a MWS Planning Board member, before the technical session. | 
  | 
Just after the beginning of the technical session. | 
  | 
Introduction from a MWS Planning Board member during the technical session. | 
  | 
Commentary to the Challenges from the authors (1). | 
  | 
Commentary to the Challenges from the authors (2). | 
  | 
Commentary to the Challenges from the authors (3). | 
  | 
Just before the end of the technical session. | 
  | 
Presentation session. | 
  | 
Evaluation of presentations. | 
  | 
MWS 2015 Manuscripts and Slides
- Symbols
- "*" : presenter
 
- "**" : student presenter
 
 
 
1A3: Drive-by Download Attack 
    (session chair: Makoto Iwamura)
1A3-1: Drive-by Download Detection Method based on Network Traffic Correlation
- * Seigo Terada (PFU LIMITED)
 
- Takashi Kobayashi (PFU LIMITED)
 
- Kazuhiro Koide (PFU LIMITED)
 
- Itsufumi Hato (PFU LIMITED)
 
- Mugen Setoguchi (PFU LIMITED)
 
- Keiji Michine (PFU LIMITED)
 
- Kouichi Yamashita (PFU LIMITED)
 
1A3-2: A method of preventing the malicious redirections of Web sites by transitions of HTTP communications and URL attribute information
- ** Yuma Sato (Graduate School of Systems Information Science, Future University Hakodate)
 
- Yoshitaka Nakamura (School of Systems Information Science, Future University Hakodate)
 
- Osamu Takahashi (School of Systems Information Science, Future University Hakodate)
 
1A3-3: The assessment of the effectiveness of cyber attack detection system for enterprise use
- * Masayoshi Shigeta (NTT DATA Corporation)
 
- Hisamichi Ohtani (NTT DATA Corporation)
 
- Shinichi Ohshima (NTT DATA Corporation)
 
1A3-4: Improving Cyber Attack Detection System To Adopt The Changing Of Exploit Kit
- * Hiroki Mashiko (NTT DATA Corporation)
 
- Hisamichi Ohtani (NTT DATA Corporation)
 
- Masayoshi Shigeta (NTT DATA Corporation)
 
1F4: Android 
    (session chair: Ayumu Kubota)
1F4-1: Studies on Risk Level Evaluation Schemes using APK Metadata
- * Takeshi Takahashi (National Institute of Information and Communications Technology)
 
- Tao Ban (National Institute of Information and Communications Technology)
 
- Takao Mimura (SecureBrain Corporation)
 
- Koji Nakao (National Institute of Information and Communications Technology)
 
1F4-2: A Large-scale Analysis of Cloned Android Apps
- ** Yuta Ishii (Waseda University)
 
- Takuya Watanabe (Waseda University)
 
- Mitsuaki Akiyama (NTT Secure Platform Laboratories)
 
- Tatsuya Mori (Waseda University)
 
1F4-3: An empirical study of Android APK disributuion sites using headless browser with navigation scripting
- * Ruo Ando (Network Security Institute, National Institute of Information and Communications Technology)
 
2A1: Drive-by Download Attack and Illegal Communication 
    (session chair: Yasuyuki Tanaka)
2A1-1: Detection of suspicious redirection using HTTP request sequence
- ** Sei Kudo (National Defense Academy)
 
- Tran Cong Manh (National Defense Academy)
 
- Yasuhiro Nakamura (National Defense Academy)
 
2A1-2: Detecting obfuscated malicious JavaScript based on 
information-theoretic measures and novelty detection 
- ** Jiawei Su (Graduate School of Environment and Information Sciences, Yokohama National University)
 
- Katsunari Yoshioka (Graduate School of Environment and Information Sciences / Institute of Advanced Sciences, Yokohama National University)
 
- Junji Shikata (Graduate School of Environment and Information Sciences / Institute of Advanced Sciences, Yokohama National University)
 
- Tsutomu Matsumoto (Graduate School of Environment and Information Sciences / Institute of Advanced Sciences, Yokohama National University)
 
2A1-3: A study for effectiveness of User-Agent for malware communication traffic detection
- * Tatsuya Ichida (Recruit Technologies Co.,Ltd.)
 
2A1-4: Automatic Generation of URL Regular Expression for Detecting Malicious Traffic
- * Susumu Serita (Hitachi, Ltd. Research & Development Group)
 
- Yasuhiro Fujii (Hitachi, Ltd. Research & Development Group)
 
- Tomo Kakuta (Hitachi Systems, Ltd.)
 
- Yoshitake Michiori (Hitachi Systems, Ltd.)
 
- Ohtori Tomoya (Hitachi Systems, Ltd.)
 
- Takeyasu Kishiro (Hitachi Systems, Ltd.)
 
- Masato Terada (Hitachi, Ltd. Research & Development Group)
 
2A3: Log Analysis 
    (session chair: Nobutaka Kawaguchi)
2A3-1: Characterizing Network Behavior of Malware: Toward Detecting New Malware Families with Network Monitoring
- ** Mitsuhiro Hatada (Graduate School of Fundamental Science and Engineering, Waseda University / NTT Communications Corporation)
 
- Tatsuya Mori (Graduate School of Fundamental Science and Engineering, Waseda University)
 
2A3-2: Detecting RAT Activity in Proxy Server Logs with Machine Learning
- * Mamoru Mimura (Institute of Information Security)
 
- Yuhei Otsubo (Institute of Information Security / National Police Agency)
 
- Hidehiko Tanaka (Institute of Information Security)
 
2A3-3: Method for detecting Malware based on clustering of time series information of infection behavior
- ** Ayaka Samejima (The University of Electro-Communications)
 
- Mitsuhiro Hatada (NTT Communications Corporation)
 
- Hiroshi Yoshiura (The University of Electro-Communications)
 
- Masatsugu Ichino (The University of Electro-Communications)
 
2A3-4: Darknet Traffic Analysis by Focusing on Variations in Dominant Traffic
- ** Toui Kanai (Tohoku Institute of Technology)
 
- Hiroshi Tsunoda (Tohoku Institute of Technology)
 
- Glenn Mansfield Keeni (Cyber Solutions Inc.)
 
2A4: Dynamic Analysis 
    (session chair: Yoshiaki Shiraishi)
2A4-1: Malware Communication Analysis using Dynamic Binary Instrumentationin Heterogeneous Analysis Environments for Stealthiness
- ** Yuma Kurogome (Faculty of Environment and Information Studies, Keio University)
 
- Keiji Takeda (Faculty of Environment and Information Studies, Keio University)
 
2A4-2: Correlating Experts' Malware Analysis Reports and Dynamic Malware Analysis Logs
- * Akinori Fujino (School of Fundamental Science and Engineering, Waseda University)
 
- Tatsuya Mori (School of Fundamental Science and Engineering, Waseda University)
 
2A4-3: Configuration study of the sandbox for the function improvement of environment-dependent malware analyzing system
- * Kichi Tokuyama (Hitachi, Ltd.)
 
- Tomohiro Shigemoto (Hitachi, Ltd.)
 
- Tetsuro Kito (Hitachi, Ltd.)
 
- Yoshiaki Isobe (Hitachi, Ltd.)
 
- Hirofumi Nakakoji (Hitachi, Ltd.)
 
2A4-4: A Note of Malware Detections in non-Windows using a Sandbox
- * Kiyohito Yamamoto (NTT Communications Corporation)
 
- Kousuke Hiraki (NTT Communications Corporation)
 
- Toshiaki Sudou (NTT Communications Corporation)
 
3A1: Endpoint 
    (session chair: Junichi Murakami)
3A1-1: Data Acquisition for Malware Analysis on Windows 7 x64
- ** Susumu Nakano (Ritsumeikan University)
 
- Yuto Otsuki (Ritsumeikan University)
 
- Shuhei Aketa (Ritsumeikan University)
 
- Eiji Takimoto (Ritsumeikan University)
 
- Shoichi Saito (Nagoya Institute of Technology)
 
- Koichi Mouri (Ritsumeikan University)
 
3A1-2: Implementation of System Call Tracer for Windows 10 x64
- ** Yuto Otsuki (Ritsumeikan University)
 
- Susumu Nakano (Ritsumeikan University)
 
- Shuhei Aketa (Ritsumeikan University)
 
- Eiji Takimoto (Ritsumeikan University)
 
- Shoichi Saito (Nagoya Institute of Technology)
 
- Koichi Mouri (Ritsumeikan University)
 
3A1-3: ROPGuard Bypass Prevention Method using Last Branch Recording Facilities 
- ** Mitsunobu Tarao (Kanagawa Institute of Technology)
 
- Takeshi Okamoto (Kanagawa Institute of Technology)
 
3A1-4: Memory Access Control using Virtual Machine Monitor for Process Information Hiding
- * Masaya Sato (Graduate School of Natural Science and Technology, Okayama University)
 
- Toshihiro Yamauchi (Graduate School of Natural Science and Technology, Okayama University)
 
- Hideo Taniguchi (Graduate School of Natural Science and Technology, Okayama University)
 
3A2: Targeted Attack (1) 
    (session chair: Nobuyuki Kanaya)
3A2-1: Detection of Advanced Persistent Threat based on Cascade of Suspicious Activities over Multiple Internal Hosts 
- * Nobutaka Kawaguchi (Hitachi, Ltd.)
 
- Mamoru Tsuichihara (Hitachi Advanced Systems, Ltd.)
 
- Kota Ideguchi (Hitachi, Ltd.)
 
- Yoshinobu Tanigawa (Hitachi, Ltd.)
 
- Hideyuki Tomimura (Hitachi, Ltd.)
 
3A2-2: Evaluation of Detection Method of Targeted Malware Displaying a Decoy Document
- * Yusuke Takahashi (NEC Corporation)
 
- Masafumi Watanabe (NEC Corporation / Graduate School of Environment and Information Sciences / Institute of Advanced Sciences, Yokohama National University)
 
- Shigeyoshi Shima (NEC Corporation / Graduate School of Environment and Information Sciences / Institute of Advanced Sciences, Yokohama National University)
 
- Katsunari Yoshioka (Graduate School of Environment and Information Sciences / Institute of Advanced Sciences, Yokohama National University)
 
3A2-3: Long-term Effectiveness of File Structure Inspection to Detect Malicious Document Files
- * Yuhei Otsubo (National Police Agency, Japan / Institute of Information Security)
 
- Mamoru Mimura (Institute of Information Security)
 
- Hidehiko Tanaka (Institute of Information Security)
 
3A2-4: A study on malware characteristics and its effects observed in targeted attacks
- * Ayaka Funakoshi (Japan Computer Emergency Response Team Coordination Center)
 
- Yu Nakamura (Japan Computer Emergency Response Team Coordination Center)
 
- Haruki Takeda (Japan Computer Emergency Response Team Coordination Center)
 
3A3: Targeted Attack (2), SECCON 
    (session chair: Takahiro Matsuki)
3A3-1: Analysis result of doc, pdf, zip file malware and its consideration
- ** Kosuke Yushita (Graduate School of Information Science, Nara Institute of Science and Technology)
 
- Shun'ichiro Ito (Graduate School of Information Science, Nara Institute of Science and Technology)
 
3A3-2: Web Mining System for Security Incidents Analysis
- * Takashi Yamaguchi (Tokyo University of Information Sciences, Department of Informatics)
 
- Koudai Tanide (Tokyo University of Information Sciences, Department of Informatics)
 
- Takeshi Misu (Tokyo University of Information Sciences, Graduate School of Informatics)
 
- Shinya Iwasaki (Tokyo University of Information Sciences, Graduate School of Informatics)
 
- Yorinori Kishimoto (Tokyo University of Information Sciences, Department of Informatics)
 
- Masaki Hanada (Tokyo University of Information Sciences, Department of Informatics)
 
- Eiji Nunohiro (Tokyo University of Information Sciences, Department of Informatics)
 
3A3-3: Early Detective Method of Remote Access Trojan by Host Base
- ** Daichi Adachi (School of Information Science, Japan Advanced Institute of Science and Technology)
 
- Kazumasa Omote (School of Information Science, Japan Advanced Institute of Science and Technology)
 
3A4: Malware Distribution and Malicious Contents 
    (session chair: Takahiro Kasama)
3A4-1: Trend analysis using spatio-temporal geographical information of the Malware distribution
- ** Shinya Iwasaki (Tokyo University of Information Sciences, Graduate School of Informatics)
 
- Takashi Yamaguchi (Tokyo University of Information Sciences, Department of Informatics)
 
- Eiji Nunohiro (Tokyo University of Information Sciences, Department of Informatics)
 
3A4-2: Analysis of spam mail containing malicious attachments using SpamTrap
- ** Masaki Shimura (School of Fundamental Science and Engineering, Waseda University)
 
- Mitsuhiro Hatada (NTT Communications Corporation)
 
- Tatsuya Mori (School of Fundamental Science and Engineering, Waseda University)
 
- Shigeki Goto (School of Fundamental Science and Engineering, Waseda University)
 
3A4-3: Analysis of Similarities among Malicious Contents Generated by Exploit Kit
- ** Yuya Konno (Tohoku Institute of Technology)
 
- Hiroshi Tsunoda (Tohoku Institute of Technology)
 
3E4: Traffic Observation 
    (session chair: Tatsuya Mori)
3E4-1: A Study of Port-Based Dynamic Darknet Monitoring
- * Masaki Narita (Tohoku Bunka Gakuen University, Faculty of Science and Technology)
 
- Keisuke Kamada (Iwate Prefectural University, Graduate School of Software and Information Science)
 
- Toyoo Takata (Iwate Prefectural University, Graduate School of Software and Information Science)
 
3E4-2: An apploach for controling IRCbot's activity using IPS
- ** Ryosuke Sakai (Faculty of Informatics, Kansai University)
 
- Takashi Kobayashi (Faculty of Informatics, Kansai University)
 
3E4-3: Method of Connecting System Call Trace Log and Packet Capture Data to Analyze Malware
- ** Yuki Okura (Ritsumeikan University)
 
- Yuto Otsuki (Ritsumeikan University)
 
- Yasuyuki Tanaka (NTT Communications Corporation)
 
- Shuhei Aketa (Ritsumeikan University)
 
- Eiji Takimoto (Ritsumeikan University)
 
- Koichi Mouri (Ritsumeikan University)
 
3E4-4: Overview of Research Data Set "Behavior Observable System 2015"
- * Masato Terada (Hitachi Ltd.)
 
- Kentaro Hori (Hitachi Ltd.)
 
- Yoshitaka Narishima (Hitachi Ltd.)
 
- Ryohei Yoshino (Trend Micro Incorporated)
 
- Kenta Hagihara (Trend Micro Incorporated)
 
3E4-5: Development of Adaptive Event-Monitoring System for DDoS Attacks
- ** Nobuaki Furutani (Guraduate School of Engineering,Kobe University)
 
- Jun Kitazono (Guraduate School of Engineering,Kobe University)
 
- Seiichi Ozawa (Guraduate School of Engineering,Kobe University)
 
- Tao Ban (National Institute of Information and Communications Technology)
 
- Junji Nakazato (National Institute of Information and Communications Technology)
 
- Jumpei Shimamura (clwit Inc.)
 
Contact us
If you have any questions, please contact: csecreg 
 sdl.hitachi.co.jp
Published:   0:15 2015/06/02
Last Update: 0:15 2015/06/02
Copyright 2015 The IPSJ, Information Processing Society of Japan, All rights reserved.