Yuhei Kawakoya

Orcid: 0009-0005-9310-0493

According to our database1, Yuhei Kawakoya authored at least 18 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Xunpack: Cross-Architecture Unpacking for Linux IoT Malware.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

2022
Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

2020
ROPminer: Learning-Based Static Detection of ROP Chain Considering Linkability of ROP Gadgets.
IEICE Trans. Inf. Syst., 2020

Is stateful packrat parsing really linear in practice? a counter-example, an improved grammar, and its parsing algorithms.
Proceedings of the CC '20: 29th International Conference on Compiler Construction, 2020

2019
API Chaser: Taint-Assisted Sandbox for Evasive Malware Analysis.
J. Inf. Process., 2019

Toward the Analysis of Distributed Code Injection in Post-mortem Forensics.
Proceedings of the Advances in Information and Computer Security, 2019

My script engines know what you did in the dark: converting engines into script API tracers.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

EIGER: automated IOC generation for accurate and interpretable endpoint malware detection.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Stealth Loader: Trace-free Program Loading for Analysis Evasion.
J. Inf. Process., 2018

Taint-assisted IAT Reconstruction against Position Obfuscation.
J. Inf. Process., 2018

Building stack traces from memory dump of Windows x64.
Digit. Investig., 2018

2017
Stealth Loader: Trace-Free Program Loading for API Obfuscation.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

2013
API Chaser: Anti-analysis Resistant Malware Analyzer.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

2012
Scalable and Performance-Efficient Client Honeypot on High Interaction System.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2010
Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks.
IEICE Trans. Commun., 2010

Memory behavior-based automatic malware unpacking in stealth debugging environment.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

2004
Proposal and Implementation of Router-Based Traceback Technique.
Proceedings of the International Conference on Security and Management, 2004


  Loading...