Takahiro Shinagawa

Orcid: 0000-0002-7016-7696

According to our database1, Takahiro Shinagawa authored at least 45 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Context-aware Code Segmentation for C-to-Rust Translation using Large Language Models.
CoRR, 2024

2023
Malicious DNS Tunnel Tool Recognition Using Persistent DoH Traffic Analysis.
IEEE Trans. Netw. Serv. Manag., June, 2023

Translation Pass-Through for Near-Native Paging Performance in VMs.
Proceedings of the 2023 USENIX Annual Technical Conference, 2023

ORC: Increasing Cloud Memory Density via Object Reuse with Capabilities.
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023

Detection of DGA-based Malware Communications from DoH Traffic Using Machine Learning Analysis.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
CAP-VMs: Capability-Based Isolation and Sharing for Microservices.
CoRR, 2022

LLLFS: A Low-latency Library File System for Persistent Memory.
Proceedings of the 15th IEEE/ACM International Conference on Utility and Cloud Computing, 2022

Deriving optimal deep learning models for image-based malware classification.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

DMAFV: testing device drivers against DMA faults.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

CAP-VMs: Capability-Based Isolation and Sharing in the Cloud.
Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation, 2022

Exploring Optimal Deep Learning Models for Image-based Malware Variant Classification.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Towards isolated execution at the machine level.
Proceedings of the APSys '22: 13th ACM SIGOPS Asia-Pacific Workshop on Systems, Virtual Event, Singapore, August 23, 2022

2021
Live Migration in Bare-Metal Clouds.
IEEE Trans. Cloud Comput., 2021

Identifying Malicious DNS Tunnel Tools from DoH Traffic Using Hierarchical Machine Learning Classification.
Proceedings of the Information Security - 24th International Conference, 2021

Short Paper: Highly Compatible Fast Container Startup with Lazy Layer Pull.
Proceedings of the IEEE International Conference on Cloud Engineering, 2021

POSTER: OS Independent Fuzz Testing of I/O Boundary.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Exploiting Sub-page Write Protection for VM Live Migration.
Proceedings of the 14th IEEE International Conference on Cloud Computing, 2021

2020
Practical Quick File Server Migration.
ACM Trans. Storage, 2020

High-Accuracy Malware Classification with a Malware-Optimized Deep Learning Model.
CoRR, 2020

A robust and flexible operating system compatibility architecture.
Proceedings of the VEE '20: 16th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2020

Multi-resource Low-latency Cluster Scheduling without Execution Time Estimation.
Proceedings of the 20th IEEE/ACM International Symposium on Cluster, 2020

2018
The Quick Migration of File Servers.
Proceedings of the 11th ACM International Systems and Storage Conference, 2018

Unified hardware abstraction layer with device masquerade.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Distributed Denial of Service Attack Prevention at Source Machines.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

FaultVisor2: Testing Hypervisor Device Drivers Against Real Hardware Failures.
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018

Live migration on ARM-based micro-datacentres.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2017
VM-Aware Adaptive Storage Cache Prefetching.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2017

BMCArmor: A Hardware Protection Scheme for Bare-Metal Clouds.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2017

Bash on Ubuntu on macOS.
Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India, September 2, 2017, 2017

2016
Testing device drivers against hardware failures in real environments.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

2015
OS-Independent Live Migration Scheme for Bare-Metal Clouds.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Improving Agility and Elasticity in Bare-metal Clouds.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015

2012
Transparent VPN failure recovery with virtualization.
Future Gener. Comput. Syst., 2012

Detecting malware signatures in a thin hypervisor.
Proceedings of the ACM Symposium on Applied Computing, 2012

Hypervisor-based background encryption.
Proceedings of the ACM Symposium on Applied Computing, 2012

2010
Hypervisor-based prevention of persistent rootkits.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Using a Hypervisor to Migrate Running Operating Systems to Secure Virtual Machines.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
Reducing Security Policy Size for Internet Servers in Secure Operating Systems.
IEICE Trans. Inf. Syst., 2009

BitVisor: a thin hypervisor for enforcing i/o device security.
Proceedings of the 5th International Conference on Virtual Execution Environments, 2009

A Two-Step Execution Mechanism for Thin Secure Hypervisors.
Proceedings of the Third International Conference on Emerging Security Information, 2009

2008
Efficient Anomaly Detection System for Mobile Handsets.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2006
SegmentShield: Exploiting Segmentation Hardware for Protecting against Buffer Overflow Attacks.
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), 2006

2004
Implementing a secure setuid program.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004

2002
Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains.
Proceedings of the Software Security -- Theories and Systems, 2002


  Loading...