Katsunari Yoshioka

Orcid: 0000-0003-0964-8631

According to our database1, Katsunari Yoshioka authored at least 86 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SPOT: In-depth Analysis of IoT Ransomware Attacks Using Bare Metal NAS Devices.
J. Inf. Process., 2024

EtherWatch: A Framework for Detecting Suspicious Ethereum Accounts and Their Activities.
J. Inf. Process., 2024

Characteristics Comparison between Carpet Bombing-type and Single Target DRDoS Attacks Observed by Honeypot.
J. Inf. Process., 2024

Understanding Characteristics of Phishing Reports from Experts and Non-Experts on Twitter.
IEICE Trans. Inf. Syst., 2024

Observation of Human-Operated Accesses Using Remote Management Device Honeypot.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

Honeypot Method to Lure Attackers Without Holding Crypto-Assets.
IEEE Access, 2024

Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

VT-SOS: A Cost-effective URL Warning utilizing VirusTotal as a Second Opinion Service.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

Customized Malware: Identifying Target Systems Using Personally Identifiable Information.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

2023
Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware.
IEICE Trans. Inf. Syst., September, 2023

Simulating and Estimating the Effectiveness of Security Notification by ISP to Malware-Infected Users.
J. Inf. Process., 2023

An Attacker's Dream? Exploring the Capabilities of ChatGPT for Developing Malware.
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023

Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Who are youƒ OSINT-based Profiling of Infrastructure Honeypot Visitors.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023

Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks.
Proceedings of the Computer Security - ESORICS 2023, 2023

Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Disposable Botnets: Long-term Analysis of IoT Botnet Infrastructure.
J. Inf. Process., 2022

Exploring Event-synced Navigation Attacks across User-generated Content Platforms in the Wild.
J. Inf. Process., 2022

Connection Type Identification and Uplink Speed Estimation of Malware Infected Hosts.
J. Inf. Process., 2022

Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Multifaceted Analysis of Malicious Ethereum Accounts and Corresponding Activities.
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022

Amplification Chamber: Dissecting the Attack Infrastructure of Memcached DRDoS Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022

Fighting IoT Cyberattacks: Device Discovery, Attack Observation and Security Notification.
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022

SPOT: Analyzing IoT Ransomware Attacks using Bare Metal NAS Devices.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

An Internet-Wide View of Connected Cars: Discovery of Exposed Automotive Devices.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Editor's Message to Special Issue of Computer Security Technologies for Realizing Society 5.0.
J. Inf. Process., 2021

Understanding the Fake Removal Information Advertisement Sites.
J. Inf. Process., 2021

Empirical Analysis of Security and Power-Saving Features of Port Knocking Technique Applied to an IoT Device.
J. Inf. Process., 2021

To Get Lost is to Learn the Way: An Analysis of Multi-Step Social Engineering Attacks on the Web.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated With Targeted Email Attacks.
IEEE Access, 2021

Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines?
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

Adaptive Observation of Emerging Cyber Attacks targeting Various IoT Devices.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

2020
ThingGate: A Gateway for Managing Traffic of Bare-metal IoT Honeypot.
J. Inf. Process., 2020

Dangers of IP Camera - An Observational Study on Peeping.
J. Inf. Process., 2020

Detecting and Understanding Online Advertising Fraud in the Wild.
IEICE Trans. Inf. Syst., 2020

Pay the Piper: DDoS Mitigation Technique to Deter Financially-Motivated Attackers.
IEICE Trans. Commun., 2020

IoT Malware Analysis and New Pattern Discovery Through Sequence Analysis Using Meta-Feature Information.
IEICE Trans. Commun., 2020

APTGen: An Approach towards Generating Practical Dataset Labelled with Targeted Attack Sequences.
Proceedings of the 13th USENIX Workshop on Cyber Security Experimentation and Test, 2020

Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs?
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

On the Origin of Scanning: The Impact of Location on Internet-Wide Scans.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

Disposable botnets: examining the anatomy of IoT botnet infrastructure.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
A Cross-Platform Study on Emerging Malicious Programs Targeting IoT Devices.
IEICE Trans. Inf. Syst., 2019

Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Detect Me If You... Oh Wait. An Internet-Wide View of Self-Revealing Honeypots.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

2018
IoTProtect: Highly Deployable Whitelist-based Protection for Low-cost Internet-of-Things Devices.
J. Inf. Process., 2018

Toward Collaborative Defense Across Organizations.
J. Inf. Process., 2018

Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities.
IEICE Trans. Inf. Syst., 2018

A Cross-Platform Study on IoT Malware.
Proceedings of the Eleventh International Conference on Mobile Computing and Ubiquitous Network, 2018

Evasive Malware via Identifier Implanting.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

Evaluating Disassembly-Code Based Similarity between IoT Malware Samples.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

2017
Traffic Measurements for Cyber Security.
IEEE Commun. Mag., 2017

2016
IoTPOT: A Novel Honeypot for Revealing Current IoT Threats.
J. Inf. Process., 2016

Evaluating Malware Mitigation by Android Market Operators.
Proceedings of the 9th Workshop on Cyber Security Experimentation and Test, 2016

SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Wamber: Defending Web Sites on Hosting Services with Self-Learning Honeypots.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
Detecting Malicious Domains and Authoritative Name Servers Based on Their Distinct Mappings to IP Addresses.
J. Inf. Process., 2015

IoTPOT: Analysing the Rise of IoT Compromises.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

AmpPot: Monitoring and Defending Against Amplification DDoS Attacks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

2013
Catching the Behavioral Differences between Multiple Executions for Malware Detection.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Search Engine Based Investigation on Misconfiguration of Zone Transfer.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Malware Sandbox Analysis with Efficient Observation of Herder's Behavior.
J. Inf. Process., 2012

A Method of Preventing Unauthorized Data Transmission in Controller Area Network.
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012

Malware Detection Method by Catching Their Random Behavior in Multiple Executions.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

An Efficient Dynamic Detection Method for Various x86 Shellcodes.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

2011
Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems.
J. Inf. Process., 2011

An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation.
IEICE Trans. Inf. Syst., 2011

2010
Multi-Pass Malware Sandbox Analysis with Controlled Internet Connection.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis.
IEICE Trans. Inf. Syst., 2010

Vulnerability in Public Malware Sandbox Analysis Systems.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

2009
Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation.
IEICE Trans. Inf. Syst., 2009

Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring.
IEICE Trans. Inf. Syst., 2009

Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities.
IEICE Trans. Inf. Syst., 2009

DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

A Proposal of Malware Distinction Method Based on Scan Patterns Using Spectrum Analysis.
Proceedings of the Neural Information Processing, 16th International Conference, 2009

2008
Information Hiding on Lossless Data Compression.
J. Digit. Inf. Manag., 2008

Fingerprinting Traffic Log.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

An Incident Analysis System NICTER and Its Analysis Engines Based on Data Mining Techniques.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008

Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity.
Proceedings of IEEE International Conference on Communications, 2008

2007
Information Hiding for Public Address Audio Signal using FH/FSK Spread-spectrum Scheme.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2005
On Collusion Security of Random Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

2003
Random-Error Resilience of a Short Collusion-Secure Code.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations.
Proceedings of the Information Security, 6th International Conference, 2003


  Loading...