Ryoichi Isawa

According to our database1, Ryoichi Isawa authored at least 26 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Scalable and Fast Algorithm for Constructing Phylogenetic Trees With Application to IoT Malware Clustering.
IEEE Access, 2023

2022
Disposable Botnets: Long-term Analysis of IoT Botnet Infrastructure.
J. Inf. Process., 2022

NEMIANA: Cross-Platform Execution Migration for Debugging.
Proceedings of the IEEE/ACM International Conference on Automation of Software Test, 2022

An HDL Simulator with Direct Register Access for Improving Code Coverage.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

Message from the Program Co-Chairs: AsiaJCIS 2022.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

2021
Investigating behavioral differences between IoT malware via function call sequence graphs.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

2020
Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files.
IEEE Open J. Comput. Soc., 2020

Threat Alert Prioritization Using Isolation Forest and Stacked Auto Encoder With Day-Forward-Chaining Analysis.
IEEE Access, 2020

Cross Platform IoT- Malware Family Classification based on Printable Strings.
Proceedings of the 19th IEEE International Conference on Trust, 2020

IoT-Malware Detection Based on Byte Sequences of Executable Files.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

Disposable botnets: examining the anatomy of IoT botnet infrastructure.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
A Cross-Platform Study on Emerging Malicious Programs Targeting IoT Devices.
IEICE Trans. Inf. Syst., 2019

Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation Forest.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

A Fast Algorithm for Constructing Phylogenetic Trees with Application to IoT Malware Clustering.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Combating Threat-Alert Fatigue with Online Anomaly Detection Using Isolation Forest.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
FCReducer: Locating Symmetric Cryptographic Functions on the Memory.
IEICE Trans. Inf. Syst., 2018

A Cross-Platform Study on IoT Malware.
Proceedings of the Eleventh International Conference on Mobile Computing and Ubiquitous Network, 2018

Evaluating Disassembly-Code Based Similarity between IoT Malware Samples.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

2016
Comparing Malware Samples for Unpacking: A Feasibility Study.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
An Original Entry Point Detection Method with Candidate-Sorting for More Effective Generic Unpacking.
IEICE Trans. Inf. Syst., 2015

2014
An Accurate Packer Identification Method Using Support Vector Machine.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

2013
Application of string kernel based support vector machine for malware packer identification.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013

Generic Unpacking Method Based on Detecting Original Entry Point.
Proceedings of the Neural Information Processing - 20th International Conference, 2013

Efficient Malware Packer Identification Using Support Vector Machines with Spectrum Kernel.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Anonymous Authentication Scheme without Verification Table for Wireless Environments.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012


  Loading...