Katsunari Yoshioka
Orcid: 0000-0003-0964-8631
According to our database1,
Katsunari Yoshioka
authored at least 86 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
J. Inf. Process., 2024
EtherWatch: A Framework for Detecting Suspicious Ethereum Accounts and Their Activities.
J. Inf. Process., 2024
Characteristics Comparison between Carpet Bombing-type and Single Target DRDoS Attacks Observed by Honeypot.
J. Inf. Process., 2024
Understanding Characteristics of Phishing Reports from Experts and Non-Experts on Twitter.
IEICE Trans. Inf. Syst., 2024
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
VT-SOS: A Cost-effective URL Warning utilizing VirusTotal as a Second Opinion Service.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024
Customized Malware: Identifying Target Systems Using Personally Identifiable Information.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
2023
Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware.
IEICE Trans. Inf. Syst., September, 2023
Simulating and Estimating the Effectiveness of Security Notification by ISP to Malware-Infected Users.
J. Inf. Process., 2023
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023
Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
J. Inf. Process., 2022
Exploring Event-synced Navigation Attacks across User-generated Content Platforms in the Wild.
J. Inf. Process., 2022
Connection Type Identification and Uplink Speed Estimation of Malware Infected Hosts.
J. Inf. Process., 2022
Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022
Amplification Chamber: Dissecting the Attack Infrastructure of Memcached DRDoS Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022
Fighting IoT Cyberattacks: Device Discovery, Attack Observation and Security Notification.
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022
Proceedings of the 17th Asia Joint Conference on Information Security, 2022
No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Editor's Message to Special Issue of Computer Security Technologies for Realizing Society 5.0.
J. Inf. Process., 2021
J. Inf. Process., 2021
Empirical Analysis of Security and Power-Saving Features of Port Knocking Technique Applied to an IoT Device.
J. Inf. Process., 2021
To Get Lost is to Learn the Way: An Analysis of Multi-Step Social Engineering Attacks on the Web.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated With Targeted Email Attacks.
IEEE Access, 2021
Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines?
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021
2020
J. Inf. Process., 2020
IEICE Trans. Inf. Syst., 2020
IEICE Trans. Commun., 2020
IoT Malware Analysis and New Pattern Discovery Through Sequence Analysis Using Meta-Feature Information.
IEICE Trans. Commun., 2020
APTGen: An Approach towards Generating Practical Dataset Labelled with Targeted Attack Sequences.
Proceedings of the 13th USENIX Workshop on Cyber Security Experimentation and Test, 2020
Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs?
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020
It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
IEICE Trans. Inf. Syst., 2019
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
2018
IoTProtect: Highly Deployable Whitelist-based Protection for Low-cost Internet-of-Things Devices.
J. Inf. Process., 2018
Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities.
IEICE Trans. Inf. Syst., 2018
Proceedings of the Eleventh International Conference on Mobile Computing and Ubiquitous Network, 2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Proceedings of the 13th Asia Joint Conference on Information Security, 2018
2017
2016
Proceedings of the 9th Workshop on Cyber Security Experimentation and Test, 2016
SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
2015
Detecting Malicious Domains and Authoritative Name Servers Based on Their Distinct Mappings to IP Addresses.
J. Inf. Process., 2015
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
2013
Catching the Behavioral Differences between Multiple Executions for Malware Detection.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
2012
J. Inf. Process., 2012
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012
2011
Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems.
J. Inf. Process., 2011
An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation.
IEICE Trans. Inf. Syst., 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis.
IEICE Trans. Inf. Syst., 2010
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
2009
IEICE Trans. Inf. Syst., 2009
Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring.
IEICE Trans. Inf. Syst., 2009
Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities.
IEICE Trans. Inf. Syst., 2009
DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
A Proposal of Malware Distinction Method Based on Scan Patterns Using Spectrum Analysis.
Proceedings of the Neural Information Processing, 16th International Conference, 2009
2008
Information Hiding on Lossless Data Compression.
J. Digit. Inf. Manag., 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
An Incident Analysis System NICTER and Its Analysis Engines Based on Data Mining Techniques.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008
Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity.
Proceedings of IEEE International Conference on Communications, 2008
2007
Information Hiding for Public Address Audio Signal using FH/FSK Spread-spectrum Scheme.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations.
Proceedings of the Information Security, 6th International Conference, 2003