Takahiro Shinagawa

According to our database1, Takahiro Shinagawa authored at least 24 papers between 2002 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
The Quick Migration of File Servers.
Proceedings of the 11th ACM International Systems and Storage Conference, 2018

Unified hardware abstraction layer with device masquerade.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Distributed Denial of Service Attack Prevention at Source Machines.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

FaultVisor2: Testing Hypervisor Device Drivers Against Real Hardware Failures.
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018

Live migration on ARM-based micro-datacentres.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2017
VM-Aware Adaptive Storage Cache Prefetching.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2017

BMCArmor: A Hardware Protection Scheme for Bare-Metal Clouds.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2017

Bash on Ubuntu on macOS.
Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India, September 2, 2017, 2017

2016
Testing device drivers against hardware failures in real environments.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

2015
OS-Independent Live Migration Scheme for Bare-Metal Clouds.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Improving Agility and Elasticity in Bare-metal Clouds.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015

2012
Transparent VPN failure recovery with virtualization.
Future Generation Comp. Syst., 2012

Detecting malware signatures in a thin hypervisor.
Proceedings of the ACM Symposium on Applied Computing, 2012

Hypervisor-based background encryption.
Proceedings of the ACM Symposium on Applied Computing, 2012

2010
Hypervisor-based prevention of persistent rootkits.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Using a Hypervisor to Migrate Running Operating Systems to Secure Virtual Machines.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
Reducing Security Policy Size for Internet Servers in Secure Operating Systems.
IEICE Transactions, 2009

BitVisor: a thin hypervisor for enforcing i/o device security.
Proceedings of the 5th International Conference on Virtual Execution Environments, 2009

A Two-Step Execution Mechanism for Thin Secure Hypervisors.
Proceedings of the Third International Conference on Emerging Security Information, 2009

2008
Efficient Anomaly Detection System for Mobile Handsets.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2006
SegmentShield: Exploiting Segmentation Hardware for Protecting against Buffer Overflow Attacks.
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), 2006

2004
Implementing a secure setuid program.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004

2002
Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains.
Proceedings of the Software Security -- Theories and Systems, 2002


  Loading...