{"id":3243,"date":"2017-07-10T12:05:16","date_gmt":"2017-07-10T03:05:16","guid":{"rendered":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/?p=3243"},"modified":"2020-12-25T09:33:08","modified_gmt":"2020-12-25T00:33:08","slug":"workshop2017-iot","status":"publish","type":"post","link":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/2017\/07\/10\/workshop2017-iot\/","title":{"rendered":"Workshop on Cybersecurity for IoT &#8211; Towards Secure Smart Buildings"},"content":{"rendered":"<h2 style=\"text-align: left;\"><span style=\"color: #0000ff; font-family: arial,helvetica,sans-serif; font-size: 14pt;\"><strong>Workshop on Cybersecurity for IoT &#8211; Towards Secure Smart Building<\/strong><\/span><span style=\"color: #000000; font-family: book antiqua,palatino,serif; font-size: 10pt;\">\u00a0<\/span><\/h2>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-family: book antiqua,palatino,serif; font-size: 10pt;\">We held &#8220;Workshop on Cybersecurity for IoT &#8211; Towards Secure Smart Building&#8221; for the student mainly at Kyushu University (Ito Campus) on July 10th, 2017.\u00a0We could have the opportunity to discuss an issue about IoT from now on and receive respective feedback on it. We were able to have a very meaningful time.<\/span><\/p>\n<p>local<\/p>\n<h2><span style=\"color: #0000ff; font-family: times new roman,times,serif; font-size: 14pt;\">Program<\/span><\/h2>\n<table style=\"width: 614.52px;\">\n<tbody>\n<tr>\n<td style=\"width: 151px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 8pt;\"><strong>13:00-<\/strong><\/span><\/td>\n<td style=\"width: 408.52px;\"><span style=\"color: #993366; font-family: times new roman,times,serif; font-size: 10pt;\"><strong>Opening Remarks &#8211;<a href=\"http:\/\/okaweb.ec.kyushu-u.ac.jp\/\" target=\"_blank\" rel=\"noopener noreferrer\">Koji Okamura<\/a> (Kyushu Univ.)<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 151px;\"><span style=\"color: #993366; font-family: times new roman,times,serif; font-size: 8pt;\"><strong>Session.1<\/strong><\/span><\/td>\n<td style=\"width: 408.52px;\"><span style=\"color: #993366; font-family: times new roman,times,serif; font-size: 10pt;\"><strong>Chair: <a href=\"http:\/\/itslab.csce.kyushu-u.ac.jp\/~vargas\/\" target=\"_blank\" rel=\"noopener noreferrer\">Danilo V. Vargas<\/a><\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 151px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 8pt;\"><strong>13:10-<\/strong><\/span><\/td>\n<td style=\"width: 408.52px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\"><strong><a href=\"https:\/\/www.csee.umbc.edu\/~joshi\/\" target=\"_blank\" rel=\"noopener noreferrer\">Anupam Joshi<\/a> (UMBC): On Securing IoT\/CPS systems\u3000<\/strong><\/span><\/p>\n<table style=\"width: 522px;\">\n<tbody>\n<tr>\n<td style=\"width: 66px;\"><span style=\"color: #333333; font-family: 'times new roman', times, serif; font-size: 10pt;\"><strong><em>-biography-<\/em><\/strong><\/span><\/td>\n<td style=\"width: 415px;\"><span style=\"font-family: times new roman,times,serif; font-size: 10pt;\"><span style=\"color: #33cccc;\"><strong>\u00a0<\/strong><\/span><span style=\"font-size: 8pt;\"><em><strong>Anupam Joshi<\/strong> is the Oros Family Professor and Chair of Computer Science and Electrical Engineering Department at the University of Maryland, Baltimore County(UMBC).<\/em><\/span><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> <em>He is the Director of UMBC\u2019s Center for Cybersecurity, and the Co-Technical Director of the National Cybersecurity FFRDC.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> <em>He is a Fellow of IEEE.<\/em><\/span><span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> \u00a0<em>Dr. Joshi obtained a B.Tech degree from IIT Delhi in 1989, and a Masters and Ph.D. from Purdue University in 1991 and 1993 respectively.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> <em>His research interests are in the broad area of networked computing and intelligent systems.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> \u00a0<em>His primary focus has been on data management and security\/privacy in mobile\/pervasive computing environments, and policy driven approaches to security and privacy.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> \u00a0<em>He is also interested in Semantic Web and Data\/Text\/Web Analytics, especially their applications to (cyber) security.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> \u00a0<em>He has published over 225 technical papers with an h-index of 76 and over 20000 citations (per Google scholar), filed and been granted several patents, and has obtained research support from National Science Foundation (NSF), NASA, Defense Advanced Research Projects Agency(DARPA), US Dept of Defense (DoD), NIST, IBM, Microsoft, Qualcom, Northrop Grumman, and Lockheed Martin amongst others.<\/em><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 151px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 8pt;\"><strong>13:30-<\/strong><\/span><\/td>\n<td style=\"width: 408.52px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\"><strong><a href=\"https:\/\/www.danielesgandurra.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Daniele Sgandurra<\/a> (Royal Holloway): Threat Modelling for IoT Devices<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 151px;\"><span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"><strong>\u00a0<\/strong><\/span><\/td>\n<td style=\"width: 408.52px;\">\n<table style=\"width: 524px;\">\n<tbody>\n<tr>\n<td style=\"width: 71px;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 10pt;\"><strong><em>\u00a0-biography-<\/em><\/strong><\/span><\/td>\n<td style=\"width: 409px;\"><span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"><em>\u00a0<strong>Daniele Sgandurra<\/strong> is a Lecturer at the Information Security Group at Royal Holloway, University of London, where is associated with the Smart Card and IoT Security Centre.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> <em>He received his PhD in Computer Science from the University of Pisa, with a thesis on virtual machine introspection-based security.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> <em>Daniele has been a visiting researcher at IBM Zurich Research Laboratory, a PostDoc researcher at the National Research Council of Italy, and a Research Associate at Imperial College London.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> \u00a0<em>His current research focuses on cybersecurity of systems, in particular mobile and virtualisation, threat modelling for IoT, and ransomware analysis.<\/em><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 151px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 8pt;\"><strong>13:50-<\/strong><\/span><\/td>\n<td style=\"width: 408.52px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\"><strong><a href=\"https:\/\/www.csee.umbc.edu\/~kjoshi1\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">Karuna Joshi<\/a> (UMBC): IoT and Cloud Data Security and Privacy<\/strong><\/span><\/p>\n<table style=\"width: 523px;\">\n<tbody>\n<tr>\n<td style=\"width: 68.91px;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 10pt;\"><strong><em>-biography-<\/em><\/strong><\/span><\/td>\n<td style=\"width: 409.09px;\"><span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"><em>\u00a0<strong>Karuna P. Joshi<\/strong> is a Research Associate Professor of Computer Science and Electrical Engineering at the University of Maryland, Baltimore County.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> \u00a0<em>Her research focuses on Data Science and Big Data Analytics, especially legal text analytics; privacy and security of Big Data and Cloud; and cloud enabled Health IT services.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> <em>She has published over 30 papers, including in journals like IEEE Transactions on Service Computing and conferences like IEEE Big Data and IEEE CLOUD.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> \u00a0<em>Her research is supported by organizations like DoD, ONR, NIST, NSF, GE and IBM.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> \u00a0<em>She was also awarded the TEDCO MII award for exploring the commercialization of her research.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> <em>She has been awarded the prestigious IBM PhD Fellowship.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> <em>She also has over 15 years of industrial experience, primarily as an IT project manager.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> \u00a0<em>She worked at the International Monetary Fund for nearly a decade.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> <em>Her managerial experience includes portfolio\/program\/project management across various domains.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> \u00a0<em>She received the MS and PhD degrees in Computer Science from UMBC and bachelor\u2019s degree in Computer Engineering from the University of Mumbai,India.<\/em><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 151px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 8pt;\"><strong>14:10-<\/strong><\/span><\/td>\n<td style=\"width: 408.52px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\"><strong>Awny M. El-Mohandes (E-JUST): Lightweight Encryption Algorithms for Resource Limited Devices<\/strong><\/span><\/p>\n<table style=\"width: 518px;\">\n<tbody>\n<tr>\n<td style=\"width: 69.92px;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 10pt;\"><strong><em>-biography-<\/em><\/strong><\/span><\/td>\n<td style=\"width: 403.08px;\"><span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"><em>\u00a0<strong>Awny El-Mohandes<\/strong> received the BSc degree in Electronics and Communications Engineering from Mansoura University, Mansoura, Egypt, in 2008, and the MSc degree in Electronics and Communications Engineering from Mansoura University, Mansoura, Egypt, in 2013.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> \u00a0<em>In 2015, he joined Egypt-Japan University of Science and Technology (E-JUST), Egypt, as a PhD student with the Department of Electronics and Communications Engineering.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> \u00a0<em>His research interests include the areas of cryptography algorithms, digital signal processing for communication and biomedical applications, and low-power ASIC design and implementation.<\/em><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 151px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 8pt;\"><strong>14:30-<\/strong><\/span><\/td>\n<td style=\"width: 408.52px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\"><strong>Break<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 151px;\"><span style=\"color: #993366; font-family: times new roman,times,serif; font-size: 8pt;\"><strong>Session.2<\/strong><\/span><\/td>\n<td style=\"width: 408.52px;\"><span style=\"color: #993366; font-family: times new roman,times,serif; font-size: 10pt;\"><strong>Chair: Awny M. El-Mohandes<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 151px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 8pt;\"><strong>14:50-<\/strong><\/span><\/td>\n<td style=\"width: 408.52px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\"><strong>Ikuta Tanigawa (Kyushu Univ., WP1): <\/strong><\/span><\/p>\n<p><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\"><strong>IoT Robot Simulator for Secure Context-Sensitive and Live-Adaptive Software Developments<\/strong><\/span><\/p>\n<table style=\"width: 505px;\">\n<tbody>\n<tr>\n<td style=\"width: 67.95px;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 10pt;\"><strong><em>-biography-<\/em><\/strong><\/span><\/td>\n<td style=\"width: 392.05px;\"><span style=\"font-family: times new roman,times,serif; font-size: 10pt;\"><em>\u00a0<span style=\"font-size: 8pt;\"><strong>Ikuta Tanigawa<\/strong> received his bachelor degree in engineering from Tokai University Japan in 2013, and his master degree in engineering from Tokai University Japan in 2015.<\/span><\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> \u00a0<em>He is now a Ph.D. candidate student of Kyushu University.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> \u00a0<em>His research interests include software engineering and embedded systems.<\/em><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 151px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 8pt;\"><strong>15:10-<\/strong><\/span><\/td>\n<td style=\"width: 408.52px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\"><strong>Ismi Abidi (IITD, WP2): Potential security threats in the IoT world<\/strong><\/span><\/p>\n<table style=\"width: 501px;\">\n<tbody>\n<tr>\n<td style=\"width: 65.95px;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 10pt;\"><strong><em>-biography-<\/em><\/strong><\/span><\/td>\n<td style=\"width: 390.05px;\"><span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"><em>\u00a0<strong>Ismi Abidi<\/strong> is currently working under Dr. S R Sarangi as a PhD scholar in Dept of Computer Science &amp; Engg.at IIT Delhi, New Delhi, India.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> <i>\u00a0She has<\/i><em> received my Mtech (Gold Medalist) and Btech degrees in Computer Engineering from Aligarh Muslim University, UP, India in 2015 and 2013 respectively.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> <i>\u00a0Her<\/i><em> current research interests include systems security, pattern recognition, architecture, and Internet of Things.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> \u00a0<em>Please do not hesitate to contact her if you have any further questions or clarifications.<\/em><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 151px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 8pt;\"><strong>15:30-<\/strong><\/span><\/td>\n<td style=\"width: 408.52px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\"><strong>Yuuki Nishida,\u00a0Shota Johjima,\u00a0Kazuya Nakayama,\u00a0Yusuke Tsutsumi\u00a0<\/strong><\/span><\/p>\n<p><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\"><strong>(Kyushu Univ., WP3): <\/strong><\/span><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\"><strong>A Study on Blockchain for IoT Security<\/strong><\/span><\/p>\n<table style=\"width: 497px;\">\n<tbody>\n<tr>\n<td style=\"width: 65.95px;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 10pt;\"><strong><em>-biography-<\/em><\/strong><\/span><\/td>\n<td style=\"width: 386.05px;\"><span style=\"font-family: times new roman,times,serif; font-size: 10pt;\"><em><strong>\u00a0<span style=\"font-size: 8pt;\">Yuki Nishida<\/span><\/strong><span style=\"font-size: 8pt;\"> is a master student of Kyushu graduate school. He graduated from Kyushu University in 2017.His research interest is IoT security.<strong>Shota Johjima<\/strong> is a master student of Kyushu guraduate school. He graduated from Kyushu University in 2017.His research interests are IoT security and Artificial Intelligence. <\/span><\/em><\/span><\/p>\n<p><span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"><em><strong>\u00a0Kazuya Nakayama<\/strong> is a bachelor student of Kyushu University. His research is secure data-communication using blockchain.<strong>Yusuke Tsutsumi<\/strong> is a bachelor student of Kyushu University. His research is realizing IoT security using hashgraph.<\/em><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 151px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 8pt;\"><strong>15:50-<\/strong><\/span><\/td>\n<td style=\"width: 408.52px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\"><strong>Break<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 151px;\"><span style=\"color: #993366; font-family: times new roman,times,serif; font-size: 8pt;\"><strong>Session.3<\/strong><\/span><\/td>\n<td style=\"width: 408.52px;\"><span style=\"color: #993366; font-family: times new roman,times,serif; font-size: 10pt;\"><strong>Chair: Ismi Abidi<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 151px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 8pt;\"><strong>16:10-<\/strong><\/span><\/td>\n<td style=\"width: 408.52px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\"><strong>Ma Chenguang (Kyushu Univ., WP4): <\/strong><\/span><\/p>\n<p><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\"><strong>Web-based Viewer for Educational Multimedia Materials of IoT Security with Learning Analytics<\/strong><\/span><\/p>\n<table style=\"width: 487px;\">\n<tbody>\n<tr>\n<td style=\"width: 65.97px;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 10pt;\"><strong><em>-biography-<\/em><\/strong><\/span><\/td>\n<td style=\"width: 376.03px;\"><span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"><em>\u00a0<strong>Ma Chenguang<\/strong> is a Master course student of Informatics Department, Graduate School of Information Science and Electrical Engineering, Kyushu University, JAPAN.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> \u00a0<em>Her current research interests include development technology such as authoring tools and frameworks based on Linked Data for e-Learning materials of IoT security with learning analytics.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> \u00a0<em>She is also interested in serious games of IoT security can be used as educational materials.<\/em><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 151px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 8pt;\"><strong>16:30-<\/strong><\/span><\/td>\n<td style=\"width: 408.52px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\"><strong>Sanouphab Phomkeona (Kyushu Univ., WP5): <\/strong><\/span><\/p>\n<p><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\"><strong>A Research on Phishing Mails Investigation and Malware Analysis<\/strong><\/span><\/p>\n<table style=\"width: 475px;\">\n<tbody>\n<tr>\n<td style=\"width: 66.99px;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 10pt;\"><strong><em>-biography-<\/em><\/strong><\/span><\/td>\n<td style=\"width: 363.01px;\"><span style=\"font-family: times new roman,times,serif; font-size: 10pt;\"><em>\u00a0<span style=\"font-size: 8pt;\"><strong>Sanouphab Phomkeona<\/strong> is a lecturer at Department of Computer Engineering and Information Technology, Faculty of Engineering, National University of Laos, Lao P.D.R.<\/span><\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> \u00a0<em>He received his Bachelor Degree (B. Science of Mathematics and Computer Science Since) from National University of Laos and obtained his Master Degree (M. Eng of Knowledge-Based Information Engineering) from Toyohashi University of Technology.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> \u00a0<em>He has been work with private company in Vientiane Capital for 2 years between 2011-2013 focus on IT specialist.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> <em>Supported by AUN SEED- Net project by JICA, he leaves as lecturer temporary and currently, he is a PhD candidate and belong to Department of Advanced Information Technology, Graduate School of Information Science and Electrical Engineering, Kyushu University, Japan.<\/em><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 151px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 8pt;\"><strong>16:50-<\/strong><\/span><\/td>\n<td style=\"width: 408.52px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\"><strong>Su Jiawei (Kyushu Univ., WP6): <\/strong><\/span><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\"><strong>A Brief Introduction to IoT Malware and its Detection<\/strong><\/span><\/p>\n<table style=\"width: 463px;\">\n<tbody>\n<tr>\n<td style=\"width: 70px;\"><span style=\"font-family: 'times new roman', times, serif; font-size: 10pt;\"><strong><em>-biography-<\/em><\/strong><\/span><\/td>\n<td style=\"width: 349px;\"><span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"><em>\u00a0<strong>Jiawei Su<\/strong> is a first year doctoral student in Information security at the Kyushu University Japan, studying under Professor Kouichi Sakurai and Assistant professor Danilo V Vargas.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> \u00a0<em>His current research topics include adversarial machine learning specific for convolutional neuron network and application of machine learning technique on cyber security problems, such as security of Internet of things.<\/em><\/span><br \/>\n<span style=\"font-family: times new roman,times,serif; font-size: 8pt;\"> \u00a0<em>Before joining the Kyushu University, he was a master student at Yokohama National University, Japan and working with the topics of implementing machine learning techniques for solving web security problems.<\/em><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 151px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 8pt;\"><strong>17:10-<\/strong><\/span><\/td>\n<td style=\"width: 408.52px;\"><span style=\"color: #000000; font-family: times new roman,times,serif; font-size: 10pt;\"><strong>Closing -Danilo V. Vargas (Kyushu Univ.)<\/strong><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-family: times new roman,times,serif; font-size: 10pt;\"><span style=\"color: #000080;\">Venue: <a href=\"https:\/\/www.lib.kyushu-u.ac.jp\/en\/libraries\/ito\/locations\">Open Seminer Room3, Ito Library, Kyushu University<\/a><\/span>\u3000<\/span><\/p>\n<p><span style=\"color: #800080; font-family: arial,helvetica,sans-serif;\">Gallery<\/span><\/p>\n\n\t\t<style type=\"text\/css\">\n\t\t\t#gallery-1 {\n\t\t\t\tmargin: auto;\n\t\t\t}\n\t\t\t#gallery-1 .gallery-item {\n\t\t\t\tfloat: left;\n\t\t\t\tmargin-top: 10px;\n\t\t\t\ttext-align: center;\n\t\t\t\twidth: 33%;\n\t\t\t}\n\t\t\t#gallery-1 img {\n\t\t\t\tborder: 2px solid #cfcfcf;\n\t\t\t}\n\t\t\t#gallery-1 .gallery-caption {\n\t\t\t\tmargin-left: 0;\n\t\t\t}\n\t\t\t\/* see gallery_shortcode() in wp-includes\/media.php *\/\n\t\t<\/style>\n\t\t<div id='gallery-1' class='gallery galleryid-3243 gallery-columns-3 gallery-size-thumbnail'><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/ja\/2017\/07\/10\/workshop2017-iot\/cimg0621-3\/'><img width=\"150\" height=\"150\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/10\/CIMG0621-3-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/ja\/2017\/07\/10\/workshop2017-iot\/cimg0615-3\/'><img width=\"150\" height=\"150\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/10\/CIMG0615-3-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/ja\/2017\/07\/10\/workshop2017-iot\/cimg0614-2\/'><img width=\"150\" height=\"150\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/10\/CIMG0614-2-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/dt><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/ja\/2017\/07\/10\/workshop2017-iot\/cimg0612-2\/'><img width=\"150\" height=\"150\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/10\/CIMG0612-2-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/ja\/2017\/07\/10\/workshop2017-iot\/cimg0611-2\/'><img width=\"150\" height=\"150\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/10\/CIMG0611-2-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/dt><\/dl><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/ja\/2017\/07\/10\/workshop2017-iot\/cimg0609-4\/'><img width=\"150\" height=\"150\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/10\/CIMG0609-4-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/dt><\/dl><br style=\"clear: both\" \/><dl class='gallery-item'>\n\t\t\t<dt class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/ja\/2017\/07\/10\/workshop2017-iot\/cimg0608-4\/'><img width=\"150\" height=\"150\" src=\"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-content\/uploads\/sites\/3\/2017\/10\/CIMG0608-4-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/dt><\/dl>\n\t\t\t<br style='clear: both' \/>\n\t\t<\/div>\n\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Workshop on Cybersecurity for IoT &#8211; Towards Secure Smart Building\u00a0 We held &#8220;Workshop on Cybersecurity for IoT &#8211; Towards Secure Smart Building&#8221; for the student mainly at Kyushu University (Ito Campus) on July 10th, 2017.\u00a0We could have the opportunity to discuss an issue about IoT from now on and receive respective feedback on it. We [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_locale":"en_US","_original_post":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/?p=3084"},"categories":[12,13],"tags":[],"_links":{"self":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/posts\/3243"}],"collection":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/comments?post=3243"}],"version-history":[{"count":1,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/posts\/3243\/revisions"}],"predecessor-version":[{"id":3244,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/posts\/3243\/revisions\/3244"}],"wp:attachment":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/media?parent=3243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/categories?post=3243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/sicorp-in\/wp-json\/wp\/v2\/tags?post=3243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}