Masaya Sato

According to our database1, Masaya Sato authored at least 28 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Memory Analysis Based Estimation of Hook Point by Virtual Machine Monitor.
Int. J. Netw. Comput., 2023

Caption Unification for Multiple Viewpoint Lifelogging Images and Its Verification.
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023

Supporting Multiple OS Types on Estimation of System Call Hook Point by Virtual Machine Monitor.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023

2022
Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM.
J. Internet Serv. Inf. Secur., 2022

Improving Transparency of Hardware Breakpoints with Virtual Machine Introspection.
Proceedings of the 12th International Congress on Advanced Applied Informatics, 2022

Hook Point Estimation for System Call Detection by Virtual Machine Monitor.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022

2021
Web access monitoring mechanism via Android WebView for threat analysis.
Int. J. Inf. Sec., 2021

Function for Tracing Diffusion of Classified Information to Support Multiple VMs with KVM.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

2020
Virtual Machine Monitor-based Hiding Method for Access to Debug Registers.
Proceedings of the Eighth International Symposium on Computing and Networking, 2020

Method of Generating a Blacklist for Mobile Devices by Searching Malicious Websites.
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020

2019
Design and implementation of hiding method for file manipulation of essential services by system call proxy using virtual machine monitor.
Int. J. Space Based Situated Comput., 2019

Implementation and Evaluation of Communication-Hiding Method by System Call Proxy.
Int. J. Netw. Comput., 2019

(Short Paper) Method for Preventing Suspicious Web Access in Android WebView.
Proceedings of the Advances in Information and Computer Security, 2019

Evaluation of Processing Distribution for Application Program and OS in Microkernel OS.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019

Threat Analysis of Fake Virus Alerts Using WebView Monitor.
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019

2018
Hiding File Manipulation of Essential Services by System Call Proxy.
Proceedings of the Advances in Network-Based Information Systems, 2018

Hiding Communication of Essential Services by System Call Proxy.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Segmentation of Cell Membrane and Nucleus by Improving Pix2pix.
Proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2018), 2018

Web access monitoring mechanism for Android webview.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
Performance Improvement and Evaluation of Function for Tracing Diffusion of Classified Information on KVM.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

2016
Evaluation and design of function for tracing diffusion of classified information for file operations with KVM.
J. Supercomput., 2016

Design of Function for Tracing Diffusion of Classified Information for IPC on KVM.
J. Inf. Process., 2016

Memory Access Monitoring and Disguising of Process Information to Avoid Attacks to Essential Services.
Proceedings of the Fourth International Symposium on Computing and Networking, 2016

2015
Process Hiding by Virtual Machine Monitor for Attack Avoidance.
J. Inf. Process., 2015

2014
Secure and Fast Log Transfer Mechanism for Virtual Machine.
J. Inf. Process., 2014

Complicating Process Identification by Replacing Process Information for Attack Avoidance.
Proceedings of the Advances in Information and Computer Security, 2014

2013
Secure Log Transfer by Replacing a Library in a Virtual Machine.
Proceedings of the Advances in Information and Computer Security, 2013

2011
VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011


  Loading...