Toshihiro Yamauchi
Orcid: 0000-0001-6226-5715
According to our database1,
Toshihiro Yamauchi
authored at least 89 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2010
2012
2014
2016
2018
2020
2022
2024
0
5
10
15
4
6
5
3
1
1
1
3
4
4
2
1
2
1
7
8
4
3
3
5
2
3
3
2
5
1
2
3
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Int. J. Inf. Sec., October, 2024
Effectiveness of MAC Systems based on LSM and their Security Policy Configuration for Protecting IoT Devices.
J. Internet Serv. Inf. Secur., 2024
Proposal of Open Source Software Security Risk Indicator Based on Vulnerability Management Interview.
J. Inf. Process., 2024
Detecting Unintended Redirects to Malicious Websites on Android Devices Based on URL-Switching Interval.
IEEE Access, 2024
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024
2023
Seeing is not always believing: Insights on IoT manufacturing from firmware composition analysis and vendor survey.
Comput. Secur., October, 2023
IEICE Trans. Inf. Syst., September, 2023
IEICE Trans. Inf. Syst., September, 2023
J. Inf. Process., 2023
Extracting and Analyzing Cybersecurity Named Entity and its Relationship with Noncontextual IOCs from Unstructured Text of CTI Sources.
J. Inf. Process., 2023
Int. J. Netw. Comput., 2023
Security Risk Indicator for Open Source Software to Measure Software Development Status.
Proceedings of the Information Security Applications - 24th International Conference, 2023
Proceedings of the Network and System Security - 17th International Conference, 2023
Proceedings of the on CoNEXT Student Workshop 2023, 2023
Analyzing Post-injection Attacker Activities in IoT Devices: A Comprehensive Log Analysis Approach.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023
Supporting Multiple OS Types on Estimation of System Call Hook Point by Virtual Machine Monitor.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023
2022
Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM.
J. Internet Serv. Inf. Secur., 2022
J. Inf. Process., 2022
J. Inf. Process., 2022
Analysis of Android Applications Shared on Twitter Focusing on Accessibility Services.
J. Inf. Process., 2022
Survey and Analysis on ATT&CK Mapping Function of Online Sandbox for Understanding and Efficient Using.
J. Inf. Process., 2022
vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel Vulnerability.
Proceedings of the Information Security Applications - 23rd International Conference, 2022
Proceedings of the Open Identity Summit 2022, Copenhagen, Denmark, July 7-8, 2022., 2022
Proceedings of the Advances in Information and Computer Security, 2022
CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCs.
Proceedings of the Advances in Information and Computer Security, 2022
Proceedings of the 12th International Congress on Advanced Applied Informatics, 2022
Design and Implementation of System for URL Signature Construction and Impact Assessment.
Proceedings of the 12th International Congress on Advanced Applied Informatics, 2022
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022
Proceedings of the Advanced Information Networking and Applications, 2022
2021
Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes.
Int. J. Inf. Sec., 2021
Int. J. Inf. Sec., 2021
IEEE Access, 2021
Proceedings of the Advances in Networked-Based Information Systems, 2021
(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring.
Proceedings of the Advances in Information and Computer Security, 2021
Proceedings of the Advances in Information and Computer Security, 2021
Function for Tracing Diffusion of Classified Information to Support Multiple VMs with KVM.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021
2020
Identification of Kernel Memory Corruption Using Kernel Memory Secret Observation Mechanism.
IEICE Trans. Inf. Syst., 2020
Proceedings of the Information Security Applications - 21st International Conference, 2020
MKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption.
Proceedings of the Advances in Information and Computer Security, 2020
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020
2019
Design and implementation of hiding method for file manipulation of essential services by system call proxy using virtual machine monitor.
Int. J. Space Based Situated Comput., 2019
Proceedings of the Advances in Information and Computer Security, 2019
KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism.
Proceedings of the Information Security Practice and Experience, 2019
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019
2018
J. Inf. Process., 2018
Proceedings of the Advances in Network-Based Information Systems, 2018
Acceleration of Analysis Processing on Decentralized Performance Profiling System Using Virtual Machines.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
Mitigating Use-after-Free Attack Using Library Considering Size and Number of Freed Memory.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
Proceedings of the Australasian Computer Science Week Multiconference, 2018
2017
Editor's Message to Special Issue of Computer Security Technologies against Sophisticated Cyber Attacks.
J. Inf. Process., 2017
IEICE Trans. Inf. Syst., 2017
IEICE Trans. Inf. Syst., 2017
Performance Improvement and Evaluation of Function for Tracing Diffusion of Classified Information on KVM.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
2016
Evaluation and design of function for tracing diffusion of classified information for file operations with KVM.
J. Supercomput., 2016
J. Inf. Process., 2016
IEICE Trans. Inf. Syst., 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks.
Proceedings of the Network and System Security - 10th International Conference, 2016
Memory Access Monitoring and Disguising of Process Information to Avoid Attacks to Essential Services.
Proceedings of the Fourth International Symposium on Computing and Networking, 2016
2015
J. Inf. Process., 2015
Reducing Resource Consumption of SELinux for Embedded Systems with Contributions to Open-Source Ecosystems.
J. Inf. Process., 2015
Access Control to Prevent Malicious JavaScript Code Exploiting Vulnerabilities of WebView in Android OS.
IEICE Trans. Inf. Syst., 2015
Fast Control Method of Software-Managed TLB for Reducing Zero-Copy Communication Overhead.
IEICE Trans. Inf. Syst., 2015
Proceedings of the IIAI 4th International Congress on Advanced Applied Informatics, 2015
Proposal of Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features.
Proceedings of the IIAI 4th International Congress on Advanced Applied Informatics, 2015
Proceedings of the Eighth International Conference on Mobile Computing and Ubiquitous Networking, 2015
2014
DroidTrack: Tracking and Visualizing Information Diffusion for Preventing Information Leakage on Android.
J. Internet Serv. Inf. Secur., 2014
Complicating Process Identification by Replacing Process Information for Attack Avoidance.
Proceedings of the Advances in Information and Computer Security, 2014
Proceedings of the Second International Symposium on Computing and Networking, 2014
2013
A mechanism for achieving a bound on execution performance of process group to limit CPU abuse.
J. Supercomput., 2013
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013
DroidTrack: Tracking Information Diffusion and Preventing Information Leakage on Android.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013
Design and Evaluation of a Diffusion Tracing Function for Classified Information Among Multiple Computers.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013
Proceedings of the Advances in Information and Computer Security, 2013
Access Control to Prevent Attacks Exploiting Vulnerabilities of WebView in Android OS.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
2012
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012
2011
Proceedings of the 4th International Conference on Interaction Sciences: Information Technology, 2011
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011
2010
J. Next Gener. Inf. Technol., 2010
J. Inf. Process., 2010
A Mechanism That Bounds Execution Performance for Process Group for Mitigating CPU Abuse.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
Proceedings of the Future Generation Information Technology, 2010