Keyword : vulnerability


Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library
Takuya WATANABE Mitsuaki AKIYAMA Fumihiro KANEI Eitaro SHIOJI Yuta TAKATA Bo SUN Yuta ISHII Toshiki SHIBAHARA Takeshi YAGI Tatsuya MORI 
Publication:   
Publication Date: 2020/02/01
Vol. E103-D  No. 2 ; pp. 276-291
Type of Manuscript:  Special Section PAPER (Special Section on Security, Privacy, Anonymity and Trust in Cyberspace Computing and Communications)
Category: Network Security
Keyword: 
mobile appsoftware libraryvulnerability
 Summary | Full Text:PDF(1.7MB)

Search-Based Concolic Execution for SW Vulnerability Discovery
Rustamov FAYOZBEK Minjun CHOI Joobeom YUN 
Publication:   
Publication Date: 2018/10/01
Vol. E101-D  No. 10 ; pp. 2526-2529
Type of Manuscript:  LETTER
Category: Data Engineering, Web Information Systems
Keyword: 
search-basedconcolic executionvulnerability
 Summary | Full Text:PDF(621KB)

The Structural Vulnerability Analysis of Power Grids Based on Second-Order Centrality
Zhong-Jian KANG Yi-Jia ZHANG Xin-Ling GUO Zhe-Ming LU 
Publication:   
Publication Date: 2017/07/01
Vol. E100-A  No. 7 ; pp. 1567-1570
Type of Manuscript:  LETTER
Category: Systems and Control
Keyword: 
power gridscomplex networksvulnerabilitycentralitysecond-order centrality
 Summary | Full Text:PDF(273.2KB)

Designing and Implementing a Diversity Policy for Intrusion-Tolerant Systems
Seondong HEO Soojin LEE Bumsoon JANG Hyunsoo YOON 
Publication:   
Publication Date: 2017/01/01
Vol. E100-D  No. 1 ; pp. 118-129
Type of Manuscript:  PAPER
Category: Dependable Computing
Keyword: 
intrusion-tolerant systemdiversityvirtual machinevulnerabilitysoftware
 Summary | Full Text:PDF(723.8KB)

The Structural Vulnerability Analysis of Power Grids Based on Overall Information Centrality
Yi-Jia ZHANG Zhong-Jian KANG Xin-Ling GUO Zhe-Ming LU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/03/01
Vol. E99-D  No. 3 ; pp. 769-772
Type of Manuscript:  LETTER
Category: Artificial Intelligence, Data Mining
Keyword: 
power gridscomplex networksvulnerabilitycentralityoverall information
 Summary | Full Text:PDF(265.3KB)

Falsification Attacks against WPA-TKIP in a Realistic Environment
Yosuke TODO Yuki OZAWA Toshihiro OHIGASHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/02/01
Vol. E95-D  No. 2 ; pp. 588-595
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
wireless LAN networkWPA-TKIPfalsification attackQoSvulnerability
 Summary | Full Text:PDF(642.8KB)

A Dynamic Continuous Signature Monitoring Technique for Reliable Microprocessors
Makoto SUGIHARA 
Publication:   IEICE TRANSACTIONS on Electronics
Publication Date: 2011/04/01
Vol. E94-C  No. 4 ; pp. 477-486
Type of Manuscript:  Special Section PAPER (Special Section on Circuits and Design Techniques for Advanced Large Scale Integration)
Category: 
Keyword: 
soft errorNBTISEUSETcontrol signal errorcontinuous signature monitoringreliabilityvulnerabilitymicroprocessor
 Summary | Full Text:PDF(485.3KB)

Design of Provider-Provisioned Website Protection Scheme against Malware Distribution
Takeshi YAGI Naoto TANIMOTO Takeo HARIU Mitsutaka ITOH 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2010/05/01
Vol. E93-B  No. 5 ; pp. 1122-1130
Type of Manuscript:  Special Section PAPER (Special Section on Technology and Architecture for Sustainable Growth of the Internet)
Category: 
Keyword: 
securitywebvulnerabilityapplicationmalware
 Summary | Full Text:PDF(877.3KB)

Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks
Daigo MURAMATSU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/03/01
Vol. E93-D  No. 3 ; pp. 448-457
Type of Manuscript:  Special Section PAPER (Special Section on Trust, Security and Privacy for Pervasive Applications)
Category: 
Keyword: 
hill-climbing attackonline signature verificationbiometricsvulnerabilityoffline attack
 Summary | Full Text:PDF(972.9KB)

Quantum-Dot Cellular Automata Design Guideline
Kyosun KIM Kaijie WU Ramesh KARRI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/06/01
Vol. E89-A  No. 6 ; pp. 1607-1614
Type of Manuscript:  Special Section PAPER (Special Section on Papers Selected from 2005 International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC2005))
Category: 
Keyword: 
quantum-dot cellular automatavulnerabilityunbalanced input pathsneak noise pathdisciplinary guideline
 Summary | Full Text:PDF(983.9KB)

Swiss Cheese Test Case Generation for Web Services Testing
Wei-Tek TSAI Xiao WEI Yinong CHEN Ray PAUL Bingnan XIAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/12/01
Vol. E88-D  No. 12 ; pp. 2691-2698
Type of Manuscript:  Special Section PAPER (IEICE/IEEE Joint Special Section on Autonomous Decentralized Systems)
Category: 
Keyword: 
Web servicesWeb services testingtest case generationvulnerabilitymodel checking
 Summary | Full Text:PDF(963KB)