Yuhei Kawakoya

Orcid: 0009-0005-9310-0493

According to our database1, Yuhei Kawakoya authored at least 20 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SmmPack: Obfuscation for SMM Modules with TPM Sealed Key.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024

2023
Xunpack: Cross-Architecture Unpacking for Linux IoT Malware.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

2022
Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

2021
Automatic Reverse Engineering of Script Engine Binaries for Building Script API Tracers.
DTRAP, 2021

2020
ROPminer: Learning-Based Static Detection of ROP Chain Considering Linkability of ROP Gadgets.
IEICE Trans. Inf. Syst., 2020

Is stateful packrat parsing really linear in practice? a counter-example, an improved grammar, and its parsing algorithms.
Proceedings of the CC '20: 29th International Conference on Compiler Construction, 2020

2019
API Chaser: Taint-Assisted Sandbox for Evasive Malware Analysis.
J. Inf. Process., 2019

Toward the Analysis of Distributed Code Injection in Post-mortem Forensics.
Proceedings of the Advances in Information and Computer Security, 2019

My script engines know what you did in the dark: converting engines into script API tracers.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

EIGER: automated IOC generation for accurate and interpretable endpoint malware detection.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Stealth Loader: Trace-free Program Loading for Analysis Evasion.
J. Inf. Process., 2018

Taint-assisted IAT Reconstruction against Position Obfuscation.
J. Inf. Process., 2018

Building stack traces from memory dump of Windows x64.
Digit. Investig., 2018

2017
Stealth Loader: Trace-Free Program Loading for API Obfuscation.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

2013
API Chaser: Anti-analysis Resistant Malware Analyzer.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

2012
Scalable and Performance-Efficient Client Honeypot on High Interaction System.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2010
Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks.
IEICE Trans. Commun., 2010

Memory behavior-based automatic malware unpacking in stealth debugging environment.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

2004
Proposal and Implementation of Router-Based Traceback Technique.
Proceedings of the International Conference on Security and Management, 2004


  Loading...