Yuhei Kawakoya
Orcid: 0009-0005-9310-0493
According to our database1,
Yuhei Kawakoya
authored at least 20 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
2022
Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks.
Proceedings of the 25th International Symposium on Research in Attacks, 2022
2021
Automatic Reverse Engineering of Script Engine Binaries for Building Script API Tracers.
DTRAP, 2021
2020
ROPminer: Learning-Based Static Detection of ROP Chain Considering Linkability of ROP Gadgets.
IEICE Trans. Inf. Syst., 2020
Is stateful packrat parsing really linear in practice? a counter-example, an improved grammar, and its parsing algorithms.
Proceedings of the CC '20: 29th International Conference on Compiler Construction, 2020
2019
J. Inf. Process., 2019
Proceedings of the Advances in Information and Computer Security, 2019
My script engines know what you did in the dark: converting engines into script API tracers.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
EIGER: automated IOC generation for accurate and interpretable endpoint malware detection.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
J. Inf. Process., 2018
J. Inf. Process., 2018
2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
2013
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
2012
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012
Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2010
Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks.
IEICE Trans. Commun., 2010
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010
2004
Proposal and Implementation of Router-Based Traceback Technique.
Proceedings of the International Conference on Security and Management, 2004