Kenji Kono

Orcid: 0000-0002-8650-9822

According to our database1, Kenji Kono authored at least 86 papers between 1994 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Revisiting VM-Agnostic KVM vCPU Scheduler for Mitigating Excessive vCPU Spinning.
IEEE Trans. Parallel Distributed Syst., October, 2023

Nioh-PT: Virtual I/O Filtering for Agile Protection against Vulnerability Windows.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

Accelerating Multilingual Applications with In-memory Array Sharing.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Crash Injection to Persistent Memory for Recovery Code Validation.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022

2021
Alleviating File System Journaling Problem in Containers for DBMS Consolidation.
IEICE Trans. Inf. Syst., 2021

Native Build System for Unity Builds with Sophisticated Bundle Strategies.
IEICE Trans. Inf. Syst., 2021

Mitigating excessive vCPU spinning in VM-agnostic KVM.
Proceedings of the VEE '21: 17th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2021

2020
When the Virtual Machine Wins over the Container: DBMS Performance and Isolation in Virtualized Environments.
J. Inf. Process., 2020

Logging Inter-Thread Data Dependencies in Linux Kernel.
IEICE Trans. Inf. Syst., 2020

Instruction Filters for Mitigating Attacks on Instruction Emulation in Hypervisors.
IEICE Trans. Inf. Syst., 2020

Poster: No More Slow Messages: Programmable Packet Handling in Hard IRQ.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

Detecting Struct Member-Related Memory Leaks Using Error Code Analysis in Linux Kernel.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020

Application to Operating Systems.
Proceedings of the Handbook of Software Aging and Rejuvenation, 2020

2019
File Systems are Hard to Test - Learning from Xfstests.
IEICE Trans. Inf. Syst., 2019

Detecting and Analyzing Year 2038 Problem Bugs in User-Level Applications.
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019

Short-Liveness of Error Propagation in Kernel Can Improve Operating Systems Availability.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

A Framework for Building Linux-Based Single-Purpose Appliances Optimized for the Cloud.
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019

To unify or not to unify: a case study on unified builds (in WebKit).
Proceedings of the 28th International Conference on Compiler Construction, 2019

2018
Cooperative GPGPU Scheduling for Consolidating Server Workloads.
IEICE Trans. Inf. Syst., 2018

Hardening Hypervisors against Vulnerabilities in Instruction Emulators.
Proceedings of the 11th European Workshop on Systems Security, 2018

An Application Framework for Migrating GPGPU Cloud Applications.
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018

2017
GLoop: an event-driven runtime for consolidating GPGPU applications.
Proceedings of the 2017 Symposium on Cloud Computing, SoCC 2017, Santa Clara, CA, USA, 2017

Nioh: Hardening The Hypervisor by Filtering Illegal I/O Requests to Virtual Devices.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
GPUvm: GPU Virtualization at the Hypervisor.
IEEE Trans. Computers, 2016

Report on the Asia-Pacific Systems Workshop 2015 (APSys'15).
ACM SIGOPS Oper. Syst. Rev., 2016

A Case for Static Analysis of Linux to Find Faults in Interrupt Request Handlers.
J. Inf. Process., 2016

Containers or Hypervisors: Which Is Better for Database Consolidation?
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

2015
Detection of Visual Clickjacking Vulnerabilities in Incomplete Defenses.
J. Inf. Process., 2015

2014
Efficient Update Activation for Virtual Machines in IaaS Cloud Computing Environments.
IEICE Trans. Inf. Syst., 2014

A VMM-Level Approach to Shortening Downtime of Operating Systems Reboots in Software Updates.
IEICE Trans. Inf. Syst., 2014

GPUvm: Why Not Virtualizing GPUs at the Hypervisor?
Proceedings of the 2014 USENIX Annual Technical Conference, 2014

Clickjuggler: Checking for incomplete defenses against clickjacking.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

FoxyFeed: Forging Device-Level Asynchronous Events for Kernel Development.
Proceedings of the 20th IEEE Pacific Rim International Symposium on Dependable Computing, 2014

Do Injected Faults Cause Real Failures? A Case Study of Linux.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

Who Writes What Checkers? - Learning from Bug Repositories.
Proceedings of the 10th Workshop on Hot Topics in System Dependability, 2014

A Guideline for Selecting Live Migration Policies and Implementations in Clouds.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

Minimizing WAN Communications in Inter-datacenter Key-Value Stores.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
Honeyguide: A VM Migration-Aware Network Topology for Saving Energy Consumption in Data Center Networks.
IEICE Trans. Inf. Syst., 2013

Pangaea: A Single Key Space, Inter-datacenter Key-Value Store.
Proceedings of the 19th IEEE International Conference on Parallel and Distributed Systems, 2013

Request dispatching for cheap energy prices in cloud data centers.
Proceedings of the IEEE 2nd International Conference on Cloud Networking, 2013

2012
Automated detection of session management vulnerabilities in web applications.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Is Linux Kernel Oops Useful or Not?
Proceedings of the Eighth Workshop on Hot Topics in System Dependability, HotDep 2012, 2012

Towards unobtrusive VM live migration for cloud computing platforms.
Proceedings of the Asia-Pacific Workshop on Systems, 2012

Energy-Price-Driven Request Dispatching for Cloud Data Centers.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
A State-Aware Protocol Fuzzer Based on Application-Layer Protocols.
IEICE Trans. Inf. Syst., 2011

Can Linux be Rejuvenated without Reboots?
Proceedings of the IEEE Third International Workshop on Software Aging and Rejuvenation, 2011

Clustering performance anomalies in web applications based on root causes.
Proceedings of the 8th International Conference on Autonomic Computing, 2011

Phase-based reboot: Reusing operating system execution phases for cheap reboot-based recovery.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

Efficiently Synchronizing Virtual Machines in Cloud Computing Environments.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

Traveling forward in time to newer operating systems using ShadowReboot.
Proceedings of the APSys '11 Asia Pacific Workshop on Systems, 2011

2010
P2P-Based Approach to Finding Replica Server Locations for Alleviating Flash Crowds.
IEICE Trans. Inf. Syst., 2010

Automated detection of session fixation vulnerabilities.
Proceedings of the 19th International Conference on World Wide Web, 2010

AspFuzz: A state-aware protocol fuzzer based on application-layer protocols.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Narrowing Down Possible Causes of Performance Anomaly in Web Applications.
Proceedings of the Eighth European Dependable Computing Conference, 2010

2009
Reducing Security Policy Size for Internet Servers in Secure Operating Systems.
IEICE Trans. Inf. Syst., 2009

BitVisor: a thin hypervisor for enforcing i/o device security.
Proceedings of the 5th International Conference on Virtual Execution Environments, 2009

Simplifying security policy descriptions for internet servers in secure operating systems.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Embedding Network Coordinates into the Heart of Distributed Hash Tables.
Proceedings of the Proceedings P2P 2009, 2009

Efficient Update Propagation by Speculating Replica Locations on Peer-to-Peer Networks.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks.
Proceedings of the Detection of Intrusions and Malware, 2009

Performance Improvement by Means of Collaboration between Network Intrusion Detection Systems.
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009

2008
Tuning mechanisms for two major parameters of Apache web servers.
Softw. Pract. Exp., 2008

Filtering False Positives Based on Server-Side Behaviors.
IEICE Trans. Inf. Syst., 2008

FlexBox: Sandboxing internet servers based on layer-7 contexts.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

Enforcing appropriate process execution for exploiting idle resources from outside operating systems.
Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, 2008

2007
TCP Reassembler for Layer7-Aware Network Intrusion Detection/Prevention Systems.
IEICE Trans. Inf. Syst., 2007

FoxyTechnique: tricking operating system policies with a virtual machine monitor.
Proceedings of the 3rd International Conference on Virtual Execution Environments, 2007

An Efficient TCP Reassembler Mechanism for Layer7-aware Network Intrusion Detection/Prevention Systems.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

Finding candidate spots for replica servers based on demand fluctuation.
Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007

Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Basic mechanism of elastic server groups - Dynamic adaptation to load fluctuation.
Syst. Comput. Jpn., 2006

User-level disk-bandwidth control for resource-borrowing network applications.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Using Attack Information to Reduce False Positives in Network IDS.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

2005
Exploiting mobile code for user-transparent distribution of application-level protocols.
Syst. Comput. Jpn., 2005

A Practical Approach to Automatic Parameter-Tuning of Web Servers.
Proceedings of the Advances in Computer Science, 2005

2004
An integrated laboratory for processor organization, compiler design, and computer networking.
IEEE Trans. Educ., 2004

Implementing a secure setuid program.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004

2003
Self-configurable Mirror Servers for Automatic Adaptation to Service Demand Fluctuation.
Proceedings of the Advances in Computing Science, 2003

Preemptive Resource Management: Defending against Resource Monopolizing DoS.
Proceedings of the 21st IASTED International Multi-Conference on Applied Informatics (AI 2003), 2003

2002
An integrated laboratory for computer architecture and networking.
Proceedings of the 2002 workshop on Computer architecture education, 2002

Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains.
Proceedings of the Software Security -- Theories and Systems, 2002

2001
YabAI: The First Rescue Simulation League Champion.
Proceedings of the RoboCup 2001: Robot Soccer World Cup V, 2001

2000
Efficient RMI: Dynamic Specialization of Object Serialization.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

1999
Efficient Kernel Support of Fine-Grained Protection Domains for Mobile Code.
Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31, 1999

1996
An Implementation Method of Migratable Distributed Objects Using an RPC Technique Integrated with Virtual Memory Management.
Proceedings of the ECOOP'96, 1996

1994
Smart Remote Procedure Calls: Transparent Treatment of Remote Pointers.
Proceedings of the 14th International Conference on Distributed Computing Systems, 1994


  Loading...