• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Fundamental Models and Common Datasets for the Infrastructure of Cybersecurity Science

Research Project

Project/Area Number 25280045
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypePartial Multi-year Fund
Section一般
Research Field Information security
Research InstitutionThe University of Tokyo

Principal Investigator

Matsuura Kanta  東京大学, 生産技術研究所, 教授 (00292756)

Research Collaborator HOSOI Takuro  東京大学, 生産技術研究所, 技術専門職員
Project Period (FY) 2013-04-01 – 2017-03-31
Project Status Completed (Fiscal Year 2016)
Budget Amount *help
¥10,660,000 (Direct Cost: ¥8,200,000、Indirect Cost: ¥2,460,000)
Fiscal Year 2016: ¥2,210,000 (Direct Cost: ¥1,700,000、Indirect Cost: ¥510,000)
Fiscal Year 2015: ¥2,860,000 (Direct Cost: ¥2,200,000、Indirect Cost: ¥660,000)
Fiscal Year 2014: ¥2,470,000 (Direct Cost: ¥1,900,000、Indirect Cost: ¥570,000)
Fiscal Year 2013: ¥3,120,000 (Direct Cost: ¥2,400,000、Indirect Cost: ¥720,000)
Keywords暗号・認証等 / セキュリティ評価・監査 / サイバーセキュリティ / マルウェア / 仮想通貨 / セキュリティ経済学 / セキュア・ネットワーク / 情報通信工学
Outline of Final Research Achievements

For the purpose of objective and reproducible evaluation regarding cyber security, this project established basic social scientific models and data infrastructure models. The models are based mainly on security investment theories and mechanism design theories. Their applications in actual cybersecurity activities and implementations supported their effectiveness; successful empirical studies include case studies in data sharing for anti-malware researches, hypothesis testing regarding security investment into virtual currencies, and systematic evaluation of anonymous communication systems.

Report

(5 results)
  • 2016 Annual Research Report   Final Research Report ( PDF )
  • 2015 Annual Research Report
  • 2014 Annual Research Report
  • 2013 Annual Research Report
  • Research Products

    (39 results)

All 2017 2016 2015 2014 2013 Other

All Int'l Joint Research (2 results) Journal Article (6 results) (of which Int'l Joint Research: 1 results,  Peer Reviewed: 5 results,  Open Access: 3 results,  Acknowledgement Compliant: 2 results) Presentation (30 results) (of which Int'l Joint Research: 3 results,  Invited: 3 results) Book (1 results)

  • [Int'l Joint Research] セルビア科学芸術院(セルビア)

    • Related Report
      2016 Annual Research Report
  • [Int'l Joint Research] インド工科大学ルールキー校(インド)

    • Related Report
      2016 Annual Research Report
  • [Journal Article] An Encryption Technique for Provably Secure Transmission from a High Performance Computing Entity to a Tiny One2016

    • Author(s)
      Miodrag J. Mihaljevic, Aleksandar Kavcic, Kanta Matsuura
    • Journal Title

      Mathematical Problems in Engineering

      Volume: 2016 Pages: 1-10

    • DOI

      10.1155/2016/7920495

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] Empirical Investigation of Threats to Loyalty Programs by Using Models Inspired by the Gordon-Loeb's Formulation of Security Investment2016

    • Author(s)
      Shiori Shinoda, Kanta Matsuura
    • Journal Title

      Journal of Information Security

      Volume: 7 Issue: 02 Pages: 29-48

    • DOI

      10.4236/jis.2016.72003

    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Open Access / Acknowledgement Compliant
  • [Journal Article] Stronger Bridge Mechanisms of Tor which Take into Consideration Exhaustive Adversarial Models2015

    • Author(s)
      Fei Feng, Kanta Matsuura
    • Journal Title

      Journal of Information Processing

      Volume: 23 Issue: 5 Pages: 646-654

    • DOI

      10.2197/ipsjjip.23.646

    • NAID

      130005100086

    • ISSN
      1882-6652
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Open Access / Acknowledgement Compliant
  • [Journal Article] セキュリティ技術の人間的側面に関する研究領域の紹介2015

    • Author(s)
      村山優子, 松浦幹太, 西垣正勝
    • Journal Title

      ヒューマンインタフェース学会誌

      Volume: 17 Pages: 188-193

    • Related Report
      2015 Annual Research Report
  • [Journal Article] Japanese Loyalty Programs: An Empirical Analysis on their Liquidity, Security Efforts, and Actual Security Levels2015

    • Author(s)
      Bongkot Jenjarrussakul, Kanta Matsuura
    • Journal Title

      日本セキュリティ・マネジメント学会誌

      Volume: 28 Pages: 17-32

    • NAID

      40020341973

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Mechanism Design of Data Sharing for Cybersecurity Research2015

    • Author(s)
      Kanta Matsuura, Takurou Hosoi
    • Journal Title

      IPSI Transactions on Advanced Research

      Volume: 11 Pages: 35-40

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Presentation] 学習データに加えられた偽装トラフィックがTor秘匿サービスへの攻撃に与える影響について2017

    • Author(s)
      竹之内玲, 松浦幹太
    • Organizer
      第22回情報処理学会セキュリティ心理学とトラスト研究会
    • Place of Presentation
      長崎県立大学シーボルト校(長崎県長与町)
    • Year and Date
      2017-03-13
    • Related Report
      2016 Annual Research Report
  • [Presentation] Tor秘匿サービスへの攻撃に対抗する偽装トラフィック生成2017

    • Author(s)
      竹之内玲, 松浦幹太
    • Organizer
      2017年暗号と情報セキュリティ・シンポジウム(SCIS2017)
    • Place of Presentation
      ロワジールホテル那覇(沖縄県那覇市)
    • Year and Date
      2017-01-24
    • Related Report
      2016 Annual Research Report
  • [Presentation] BSafe: A Blockchain Research Network2017

    • Author(s)
      Kanta Matsuura
    • Organizer
      13th Annual Forum on Financial Information Systems and Cybersecurity: A Public Policy Perspective
    • Place of Presentation
      College Park, MD (USA)
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Fundamental Principles and Evaluation of Cybersecurity2016

    • Author(s)
      Kanta Matsuura
    • Organizer
      17th Counter-cybercrime Technology and Investigation Symposium (CTINS)
    • Place of Presentation
      秋葉原コンベンションホール(東京都千代田区)
    • Year and Date
      2016-12-05
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] ダミーパケット挿入がTor秘匿サービスの匿名性に与える影響について2016

    • Author(s)
      竹之内玲, 松浦幹太
    • Organizer
      情報処理学会コンピュータセキュリティシンポジウム2016(CSS2016)
    • Place of Presentation
      秋田キャッスルホテル(秋田県秋田市)
    • Year and Date
      2016-10-11
    • Related Report
      2016 Annual Research Report
  • [Presentation] Using a Dummy Node to Protect Tor Hidden Service from the Threat of a Link Classifier2016

    • Author(s)
      Akira Takenouchi, Kanta Matsuura
    • Organizer
      The 11th International Workshop on Security (IWSEC2016), Poster Session
    • Place of Presentation
      御茶ノ水ソラシティカンファレンスセンター(東京都千代田区)
    • Year and Date
      2016-09-12
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research
  • [Presentation] 匿名通信システムTor に対する指紋攻撃の判定評価の拡張2016

    • Author(s)
      中田謙二郎, 松浦幹太
    • Organizer
      2016年暗号と情報セキュリティ・シンポジウム
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ(熊本市)
    • Year and Date
      2016-01-19
    • Related Report
      2015 Annual Research Report
  • [Presentation] 情報セキュリティにおけるイノベーションの源泉2016

    • Author(s)
      松浦幹太
    • Organizer
      2016年11月度 情報通信技術研究会(NESSY)講演会
    • Place of Presentation
      中央大学後楽園キャンパス(東京都文京区)
    • Related Report
      2016 Annual Research Report
    • Invited
  • [Presentation] ロイヤルティプログラムのセキュリティに対するネットワーク分析指標に着目した考察2015

    • Author(s)
      篠田詩織, 松浦幹太
    • Organizer
      情報処理学会コンピュータセキュリティシンポジウム2015
    • Place of Presentation
      長崎ブリックホール(長崎市)
    • Year and Date
      2015-10-21
    • Related Report
      2015 Annual Research Report
  • [Presentation] 匿名通信システムTorにおけるウルフウェブサイトの提案2015

    • Author(s)
      中田謙二郎, 松浦幹太
    • Organizer
      第14回情報処理学会セキュリティ心理学とトラスト研究会
    • Place of Presentation
      名古屋中小企業振興会館(名古屋市)
    • Year and Date
      2015-07-02
    • Related Report
      2015 Annual Research Report
  • [Presentation] ロイヤルティプログラムのセキュリティインシデントに関する実証分析および制度設計の検討2015

    • Author(s)
      篠田詩織, 松浦幹太
    • Organizer
      第29回日本セキュリティ・マネジメント学会全国大会
    • Place of Presentation
      東京大学(東京都)
    • Year and Date
      2015-06-27
    • Related Report
      2015 Annual Research Report
  • [Presentation] Evaluation of Anti-enumeration Defenses for Tor Bridges2015

    • Author(s)
      馮菲, 松浦幹太
    • Organizer
      2015年暗号と情報セキュリティ・シンポジウム
    • Place of Presentation
      北九州
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Annual Research Report
  • [Presentation] Impact from Security Incidents and Partnership in Japanese Loyalty Program2015

    • Author(s)
      Bongkot Jenjarrussakul, Kanta Matsuura
    • Organizer
      2015年暗号と情報セキュリティ・シンポジウム
    • Place of Presentation
      北九州
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Annual Research Report
  • [Presentation] ロイヤルティプログラムのセキュリティインシデントインパクト分析に向けたポイント流動性の定義に対する考察2015

    • Author(s)
      篠田詩織, 松浦幹太
    • Organizer
      2015年暗号と情報セキュリティ・シンポジウム
    • Place of Presentation
      北九州
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Annual Research Report
  • [Presentation] マルウェア検知および分類に向けたコンパイラ再最適化2015

    • Author(s)
      碓井利宣, 松浦幹太
    • Organizer
      2015年暗号と情報セキュリティ・シンポジウム
    • Place of Presentation
      北九州
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Annual Research Report
  • [Presentation] 特徴選択によるマルウェアの最適化レベル推定精度向上2015

    • Author(s)
      包含, 碓井利宣, 松浦幹太
    • Organizer
      2015年暗号と情報セキュリティ・シンポジウム
    • Place of Presentation
      北九州
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Annual Research Report
  • [Presentation] TCP再送タイマ管理の変更による低量DoS攻撃被害緩和の実験評価2014

    • Author(s)
      細井琢朗, 松浦幹太
    • Organizer
      情報処理学会コンピュータセキュリティシンポジウム2014
    • Place of Presentation
      札幌
    • Year and Date
      2014-10-22 – 2014-10-24
    • Related Report
      2014 Annual Research Report
  • [Presentation] コンパイラ変更に対して頑強なマルウェア分類手法2014

    • Author(s)
      碓井利宣, 松浦幹太
    • Organizer
      情報処理学会コンピュータセキュリティシンポジウム2014
    • Place of Presentation
      札幌
    • Year and Date
      2014-10-22 – 2014-10-24
    • Related Report
      2014 Annual Research Report
  • [Presentation] 証明可能安全なパスワード再発行プロトコルについて2014

    • Author(s)
      大畑幸矢, 松田隆宏, 松浦幹太
    • Organizer
      情報処理学会コンピュータセキュリティシンポジウム2014
    • Place of Presentation
      札幌
    • Year and Date
      2014-10-22 – 2014-10-24
    • Related Report
      2014 Annual Research Report
  • [Presentation] 網羅的な攻撃者モデルを考慮したTorブリッジ機構の強化2014

    • Author(s)
      馮菲, 松浦幹太
    • Organizer
      情報処理学会コンピュータセキュリティシンポジウム2014
    • Place of Presentation
      札幌
    • Year and Date
      2014-10-22 – 2014-10-24
    • Related Report
      2014 Annual Research Report
  • [Presentation] Analysis of Japanese Loyalty Programs Considering Liquidity, Security Efforts, and Actual Security Levels2014

    • Author(s)
      Bongkot Jenjarrussakul, Kanta Matsuura
    • Organizer
      13th Workshop on the Economics of Information Security (WEIS2014)
    • Place of Presentation
      Pennsylvania, USA
    • Year and Date
      2014-06-23 – 2014-06-24
    • Related Report
      2014 Annual Research Report
  • [Presentation] Towards Better Parameters of Tor's Entry Guard Mechanism2014

    • Author(s)
      馮菲, 松浦幹太
    • Organizer
      2014年暗号と情報セキュリティシンポジウム(SCIS2014)
    • Place of Presentation
      鹿児島
    • Related Report
      2013 Annual Research Report
  • [Presentation] 機械語命令列の差異によるマルウェア対策技術への影響の削減を目的とした隠れマルコフモデルに基づくコンパイラ推定手法2014

    • Author(s)
      碓井利宣, 松浦幹太
    • Organizer
      2014年暗号と情報セキュリティシンポジウム(SCIS2014)
    • Place of Presentation
      鹿児島
    • Related Report
      2013 Annual Research Report
  • [Presentation] Data Sharing for Cybersecurity Research and Information Sharing for Cybersecurity Practice2013

    • Author(s)
      Kanta Matsuura and Takurou Hosoi
    • Organizer
      The Eighth International Workshop on Security (Poster Session)
    • Place of Presentation
      Okinawa, Japan
    • Related Report
      2013 Annual Research Report
  • [Presentation] Effectiveness of a Change in TCP Retransmission Timer Management for Low-rate DoS Attack Mitigation and Attack Variants2013

    • Author(s)
      Takurou Hosoi and Kanta Matsuura
    • Organizer
      The Eighth International Workshop on Security (Poster Session)
    • Place of Presentation
      Okinawa, Japan
    • Related Report
      2013 Annual Research Report
  • [Presentation] TCP再送信タイマ管理の変更による低量DoS攻撃被害の緩和効果2013

    • Author(s)
      細井琢朗, 松浦幹太
    • Organizer
      コンピュータセキュリティシンポジウム2013(CSS2013)
    • Place of Presentation
      高松
    • Related Report
      2013 Annual Research Report
  • [Presentation] マルウェア対策技術の精度向上を目的としたコンパイラおよび最適化レベルの推定手法2013

    • Author(s)
      碓井利宣, 松浦幹太
    • Organizer
      マルウェア対策研究人材育成ワークショップ2013(MWS2013)
    • Place of Presentation
      高松
    • Related Report
      2013 Annual Research Report
  • [Presentation] Towards an Analysis of a Strategic Attack against the Tor Network2013

    • Author(s)
      馮菲, 松浦幹太
    • Organizer
      コンピュータセキュリティシンポジウム2013(CSS2013)
    • Place of Presentation
      高松
    • Related Report
      2013 Annual Research Report
  • [Presentation] 低量DoS攻撃を緩和するTCP再送信タイマ管理の一検討2013

    • Author(s)
      細井琢朗, 松浦幹太
    • Organizer
      第62回情報処理学会コンピュータセキュリティ研究会
    • Place of Presentation
      札幌
    • Related Report
      2013 Annual Research Report
  • [Presentation] Cybersecurity Science and Provable Security of Cryptography: Some Research Directions2013

    • Author(s)
      Kanta Matsuura
    • Organizer
      JSPS-DST Asian Academic Seminar 2013: Discrete Mathematics and its Applications
    • Place of Presentation
      Tokyo, Japan
    • Related Report
      2013 Annual Research Report
    • Invited
  • [Book] サイバーリスクの脅威に備える2015

    • Author(s)
      松浦幹太
    • Total Pages
      226
    • Publisher
      化学同人
    • Related Report
      2015 Annual Research Report

URL: 

Published: 2013-05-21   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi