@techreport{jpcert-ipv6vullnerability-check-02, number = {draft-jpcert-ipv6vullnerability-check-02}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-jpcert-ipv6vullnerability-check/02/}, author = {Shikano Keisuke and Yoshiaki Kitaguchi and Kenichi Nagami and Masataka Kosugi and Ruri Hiromi}, title = {{Introducing IPv6 vulnerability test program in Japan}}, pagetotal = 19, year = 2014, month = dec, day = 1, abstract = {Japan Computer Emergency Response Team Coordination Center, known as JPCERT/CC have been researching about vulnerability in use of IPv6. JPCERT/CC provided the information toward vendors in Japan. They also verified the occurring those security incidents with several products. In 2013, JPCERT/CC called for vendors to participate their IPv6 security program. JPCERT/CC collects the results of equipments and open to the public for an user reference of procurement. In this document we describe about the program to share the experiment of activity.}, }