Toshihiro Yamauchi

Orcid: 0000-0001-6226-5715

According to our database1, Toshihiro Yamauchi authored at least 84 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Seeing is not always believing: Insights on IoT manufacturing from firmware composition analysis and vendor survey.
Comput. Secur., October, 2023

Policy-Based Method for Applying OAuth 2.0-Based Security Profiles.
IEICE Trans. Inf. Syst., September, 2023

Protection Mechanism of Kernel Data Using Memory Protection Key.
IEICE Trans. Inf. Syst., September, 2023

Identification of Vulnerable Kernel Code Using Kernel Tracing Mechanism.
J. Inf. Process., 2023

Extracting and Analyzing Cybersecurity Named Entity and its Relationship with Noncontextual IOCs from Unstructured Text of CTI Sources.
J. Inf. Process., 2023

Memory Analysis Based Estimation of Hook Point by Virtual Machine Monitor.
Int. J. Netw. Comput., 2023

Security Risk Indicator for Open Source Software to Measure Software Development Status.
Proceedings of the Information Security Applications - 24th International Conference, 2023

KDRM: Kernel Data Relocation Mechanism to Mitigate Privilege Escalation Attack.
Proceedings of the Network and System Security - 17th International Conference, 2023

netroub: Towards an Emulation Platform for Network Trouble Scenarios.
Proceedings of the on CoNEXT Student Workshop 2023, 2023

Analyzing Post-injection Attacker Activities in IoT Devices: A Comprehensive Log Analysis Approach.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023

Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023

Supporting Multiple OS Types on Estimation of System Call Hook Point by Virtual Machine Monitor.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023

Evaluation of Effectiveness of MAC Systems Based on LSM for Protecting IoT Devices.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023

2022
Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM.
J. Internet Serv. Inf. Secur., 2022

Mitigating Foreshadow Side-channel Attack Using Dedicated Kernel Memory Mechanism.
J. Inf. Process., 2022

Prevention of Kernel Memory Corruption Using Kernel Page Restriction Mechanism.
J. Inf. Process., 2022

Analysis of Android Applications Shared on Twitter Focusing on Accessibility Services.
J. Inf. Process., 2022

Survey and Analysis on ATT&CK Mapping Function of Online Sandbox for Understanding and Efficient Using.
J. Inf. Process., 2022

vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel Vulnerability.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

Flexible Method for Supporting OAuth 2.0 Based Security Profiles in Keycloak.
Proceedings of the Open Identity Summit 2022, Copenhagen, Denmark, July 7-8, 2022., 2022

KDPM: Kernel Data Protection Mechanism Using a Memory Protection Key.
Proceedings of the Advances in Information and Computer Security, 2022

CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCs.
Proceedings of the Advances in Information and Computer Security, 2022

Improving Transparency of Hardware Breakpoints with Virtual Machine Introspection.
Proceedings of the 12th International Congress on Advanced Applied Informatics, 2022

Design and Implementation of System for URL Signature Construction and Impact Assessment.
Proceedings of the 12th International Congress on Advanced Applied Informatics, 2022

Hook Point Estimation for System Call Detection by Virtual Machine Monitor.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022

Malware Classification by Deep Learning Using Characteristics of Hash Functions.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes.
Int. J. Inf. Sec., 2021

Web access monitoring mechanism via Android WebView for threat analysis.
Int. J. Inf. Sec., 2021

Mitigation of Kernel Memory Corruption Using Multiple Kernel Memory Mechanism.
IEEE Access, 2021

Physical Memory Management with Two Page Sizes in Tender OS.
Proceedings of the Advances in Networked-Based Information Systems, 2021

(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring.
Proceedings of the Advances in Information and Computer Security, 2021

KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption.
Proceedings of the Advances in Information and Computer Security, 2021

Function for Tracing Diffusion of Classified Information to Support Multiple VMs with KVM.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

2020
Identification of Kernel Memory Corruption Using Kernel Memory Secret Observation Mechanism.
IEICE Trans. Inf. Syst., 2020

Accessibility Service Utilization Rates in Android Applications Shared on Twitter.
Proceedings of the Information Security Applications - 21st International Conference, 2020

MKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption.
Proceedings of the Advances in Information and Computer Security, 2020

Method of Generating a Blacklist for Mobile Devices by Searching Malicious Websites.
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020

2019
Design and implementation of hiding method for file manipulation of essential services by system call proxy using virtual machine monitor.
Int. J. Space Based Situated Comput., 2019

(Short Paper) Method for Preventing Suspicious Web Access in Android WebView.
Proceedings of the Advances in Information and Computer Security, 2019

KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism.
Proceedings of the Information Security Practice and Experience, 2019

Threat Analysis of Fake Virus Alerts Using WebView Monitor.
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019

2018
Access Control Mechanism to Mitigate Cordova Plugin Attacks in Hybrid Applications.
J. Inf. Process., 2018

Hiding File Manipulation of Essential Services by System Call Proxy.
Proceedings of the Advances in Network-Based Information Systems, 2018

Acceleration of Analysis Processing on Decentralized Performance Profiling System Using Virtual Machines.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Mitigating Use-after-Free Attack Using Library Considering Size and Number of Freed Memory.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Web access monitoring mechanism for Android webview.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
Editor's Message to Special Issue of Computer Security Technologies against Sophisticated Cyber Attacks.
J. Inf. Process., 2017

Mitigating Use-After-Free Attacks Using Memory-Reuse-Prohibited Library.
IEICE Trans. Inf. Syst., 2017

Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features.
IEICE Trans. Inf. Syst., 2017

Performance Improvement and Evaluation of Function for Tracing Diffusion of Classified Information on KVM.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

Access Control for Plugins in Cordova-Based Hybrid Applications.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Evaluation and design of function for tracing diffusion of classified information for file operations with KVM.
J. Supercomput., 2016

Design of Function for Tracing Diffusion of Classified Information for IPC on KVM.
J. Inf. Process., 2016

Foreword.
IEICE Trans. Inf. Syst., 2016

Rule-Based Sensor Data Aggregation System for M2M Gateways.
IEICE Trans. Inf. Syst., 2016

Plate: persistent memory management for nonvolatile main memory.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks.
Proceedings of the Network and System Security - 10th International Conference, 2016

Memory Access Monitoring and Disguising of Process Information to Avoid Attacks to Essential Services.
Proceedings of the Fourth International Symposium on Computing and Networking, 2016

2015
Process Hiding by Virtual Machine Monitor for Attack Avoidance.
J. Inf. Process., 2015

Reducing Resource Consumption of SELinux for Embedded Systems with Contributions to Open-Source Ecosystems.
J. Inf. Process., 2015

Access Control to Prevent Malicious JavaScript Code Exploiting Vulnerabilities of WebView in Android OS.
IEICE Trans. Inf. Syst., 2015

Fast Control Method of Software-Managed TLB for Reducing Zero-Copy Communication Overhead.
IEICE Trans. Inf. Syst., 2015

Attacker Investigation System Triggered by Information Leakage.
Proceedings of the IIAI 4th International Congress on Advanced Applied Informatics, 2015

Proposal of Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features.
Proceedings of the IIAI 4th International Congress on Advanced Applied Informatics, 2015

CSDA: Rule-based complex sensor data aggregation system for M2M gateway.
Proceedings of the Eighth International Conference on Mobile Computing and Ubiquitous Networking, 2015

2014
DroidTrack: Tracking and Visualizing Information Diffusion for Preventing Information Leakage on Android.
J. Internet Serv. Inf. Secur., 2014

Secure and Fast Log Transfer Mechanism for Virtual Machine.
J. Inf. Process., 2014

Complicating Process Identification by Replacing Process Information for Attack Avoidance.
Proceedings of the Advances in Information and Computer Security, 2014

Malware Detection Method Focusing on Anti-debugging Functions.
Proceedings of the Second International Symposium on Computing and Networking, 2014

2013
A mechanism for achieving a bound on execution performance of process group to limit CPU abuse.
J. Supercomput., 2013

Evaluation of Load Balancing in Multicore Processor for AnT.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

DroidTrack: Tracking Information Diffusion and Preventing Information Leakage on Android.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

Design and Evaluation of a Diffusion Tracing Function for Classified Information Among Multiple Computers.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

Secure Log Transfer by Replacing a Library in a Virtual Machine.
Proceedings of the Advances in Information and Computer Security, 2013

Access Control to Prevent Attacks Exploiting Vulnerabilities of WebView in Android OS.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2012
Novel Control Method for Preventing Missed Deadlines in Periodic Scheduling.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

2011
Control method of multiple services for CMP based on continuation model.
Proceedings of the 4th International Conference on Interaction Sciences: Information Technology, 2011

VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
ISIPC: Instant Synchronous Interprocess Communication.
J. Next Gener. Inf. Technol., 2010

SELinux Security Policy Configuration System with Higher Level Language.
J. Inf. Process., 2010

A Mechanism That Bounds Execution Performance for Process Group for Mitigating CPU Abuse.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Proposal for Sophisticated Periodic Execution Control in Embedded Systems.
Proceedings of the Future Generation Information Technology, 2010


  Loading...