Hiroki Kuzuno

Orcid: 0000-0003-2686-2541

According to our database1, Hiroki Kuzuno authored at least 34 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Mitigation of privilege escalation attack using kernel data relocation mechanism.
Int. J. Inf. Sec., October, 2024

Early mitigation of CPU-optimized ransomware using monitoring encryption instructions.
Int. J. Inf. Sec., October, 2024

Visualization Method for Open Source Software Risk Related to Vulnerability and Developmental Status Considering Dependencies.
J. Inf. Process., 2024

Breaktooth: Breaking Bluetooth Sessions Abusing Power-Saving Mode.
IACR Cryptol. ePrint Arch., 2024

2023
File Tracking and Visualization Methods Using a Network Graph to Prevent Information Leakage.
IEICE Trans. Inf. Syst., September, 2023

Protection Mechanism of Kernel Data Using Memory Protection Key.
IEICE Trans. Inf. Syst., September, 2023

Identification of Vulnerable Kernel Code Using Kernel Tracing Mechanism.
J. Inf. Process., 2023

Security Risk Indicator for Open Source Software to Measure Software Development Status.
Proceedings of the Information Security Applications - 24th International Conference, 2023

KDRM: Kernel Data Relocation Mechanism to Mitigate Privilege Escalation Attack.
Proceedings of the Network and System Security - 17th International Conference, 2023

Security Risk Visualization for Open-Source Software based on Vulnerabilities, Repositories, and Dependencies.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023

Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023

2022
Efficient Protection Mechanism for CPU Cache Flush Instruction Based Attacks.
IEICE Trans. Inf. Syst., November, 2022

DOC-IDS: A Deep Learning-Based Method for Feature Extraction and Anomaly Detection in Network Traffic.
Sensors, 2022

Mitigating Foreshadow Side-channel Attack Using Dedicated Kernel Memory Mechanism.
J. Inf. Process., 2022

Prevention of Kernel Memory Corruption Using Kernel Page Restriction Mechanism.
J. Inf. Process., 2022

vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel Vulnerability.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

KDPM: Kernel Data Protection Mechanism Using a Memory Protection Key.
Proceedings of the Advances in Information and Computer Security, 2022

Constructing a Network Graph of File Tracking Results Against Information Leakage.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

2021
Mitigation of Kernel Memory Corruption Using Multiple Kernel Memory Mechanism.
IEEE Access, 2021

KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption.
Proceedings of the Advances in Information and Computer Security, 2021

FlushBlocker: Lightweight mitigating mechanism for CPU cache flush instruction based attacks.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

2020
Identification of Kernel Memory Corruption Using Kernel Memory Secret Observation Mechanism.
IEICE Trans. Inf. Syst., 2020

MKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption.
Proceedings of the Advances in Information and Computer Security, 2020

2019
KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism.
Proceedings of the Information Security Practice and Experience, 2019

2018
Ad-hoc Analytical Framework of Bitcoin Investigations for Law Enforcement.
IEICE Trans. Inf. Syst., 2018

Constructing a Complete Timeline of a Security Incident by Aggregating Reports.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

Early Detection of Network Incident Using Open Security Information.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

2017
A Nonoutsourceable Puzzle Under GHOST Rule.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Blockchain explorer: An analytical process and investigation environment for bitcoin.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017

2016
Detecting and characterising of mobile advertisement network traffic using graph modelling.
Int. J. Space Based Situated Comput., 2016

2015
Detection of sensitive information leakage in Android applications using signature generation.
Int. J. Space Based Situated Comput., 2015

2014
Detecting Advertisement Module Network Behavior with Graph Modeling.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
Signature generation for sensitive information leakage in android applications.
Proceedings of the Workshops Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

2006
AWide Area Log Analyzing System Based on Mobile Agents.
Proceedings of the 2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November, 2006


  Loading...