default search action
Toshihiro Yamauchi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Toshihiro Yamauchi, Rintaro Orito, Koji Ebisu, Masaya Sato:
Detecting Unintended Redirects to Malicious Websites on Android Devices Based on URL-Switching Interval. IEEE Access 12: 153285-153294 (2024) - [j36]Hiroki Kuzuno, Toshihiro Yamauchi:
Mitigation of privilege escalation attack using kernel data relocation mechanism. Int. J. Inf. Sec. 23(5): 3351-3367 (2024) - 2023
- [j35]Mitsuaki Akiyama, Shugo Shiraishi, Akifumi Fukumoto, Ryota Yoshimoto, Eitaro Shioji, Toshihiro Yamauchi:
Seeing is not always believing: Insights on IoT manufacturing from firmware composition analysis and vendor survey. Comput. Secur. 133: 103389 (2023) - [j34]Hiroki Kuzuno, Toshihiro Yamauchi:
Protection Mechanism of Kernel Data Using Memory Protection Key. IEICE Trans. Inf. Syst. 106(9): 1326-1338 (2023) - [j33]Takashi Norimatsu, Yuichi Nakamura, Toshihiro Yamauchi:
Policy-Based Method for Applying OAuth 2.0-Based Security Profiles. IEICE Trans. Inf. Syst. 106(9): 1364-1379 (2023) - [j32]Masaya Sato, Taku Omori, Toshihiro Yamauchi, Hideo Taniguchi:
Memory Analysis Based Estimation of Hook Point by Virtual Machine Monitor. Int. J. Netw. Comput. 13(2): 273-286 (2023) - [j31]Shota Fujii, Nobutaka Kawaguchi, Tomohiro Shigemoto, Toshihiro Yamauchi:
Extracting and Analyzing Cybersecurity Named Entity and its Relationship with Noncontextual IOCs from Unstructured Text of CTI Sources. J. Inf. Process. 31: 578-590 (2023) - [j30]Hiroki Kuzuno, Toshihiro Yamauchi:
Identification of Vulnerable Kernel Code Using Kernel Tracing Mechanism. J. Inf. Process. 31: 788-801 (2023) - [c52]Masato Miki, Toshihiro Yamauchi, Satoru Kobayashi:
Evaluation of Effectiveness of MAC Systems Based on LSM for Protecting IoT Devices. candar 2023: 161-167 - [c51]Masaya Sato, Taku Omori, Toshihiro Yamauchi, Hideo Taniguchi:
Supporting Multiple OS Types on Estimation of System Call Hook Point by Virtual Machine Monitor. CANDARW 2023: 267-273 - [c50]Kaito Shiba, Hiroki Kuzuno, Toshihiro Yamauchi:
Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE. CANDARW 2023: 274-278 - [c49]Hervet Victor, Satoru Kobayashi, Toshihiro Yamauchi:
Analyzing Post-injection Attacker Activities in IoT Devices: A Comprehensive Log Analysis Approach. CANDARW 2023: 292-297 - [c48]Colin Regal-Mezin, Satoru Kobayashi, Toshihiro Yamauchi:
netroub: Towards an Emulation Platform for Network Trouble Scenarios. StudentWorkshop@CoNEXT 2023: 17-18 - [c47]Hiroki Kuzuno, Toshihiro Yamauchi:
KDRM: Kernel Data Relocation Mechanism to Mitigate Privilege Escalation Attack. NSS 2023: 61-76 - [c46]Hiroki Kuzuno, Tomohiko Yano, Kazuki Omo, Jeroen van der Ham, Toshihiro Yamauchi:
Security Risk Indicator for Open Source Software to Measure Software Development Status. WISA 2023: 143-156 - 2022
- [j29]Toshihiro Yamauchi:
Foreword. IEICE Trans. Inf. Syst. 105-D(12): 1998 (2022) - [j28]Hiroki Kuzuno, Toshihiro Yamauchi:
Prevention of Kernel Memory Corruption Using Kernel Page Restriction Mechanism. J. Inf. Process. 30: 563-576 (2022) - [j27]Shuichi Ichioka, Estelle Pouget, Takao Mimura, Jun Nakajima, Toshihiro Yamauchi:
Analysis of Android Applications Shared on Twitter Focusing on Accessibility Services. J. Inf. Process. 30: 601-612 (2022) - [j26]Hiroki Kuzuno, Toshihiro Yamauchi:
Mitigating Foreshadow Side-channel Attack Using Dedicated Kernel Memory Mechanism. J. Inf. Process. 30: 796-806 (2022) - [j25]Shota Fujii, Rei Yamagishi, Toshihiro Yamauchi:
Survey and Analysis on ATT&CK Mapping Function of Online Sandbox for Understanding and Efficient Using. J. Inf. Process. 30: 807-821 (2022) - [j24]Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi:
Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM. J. Internet Serv. Inf. Secur. 12(1): 26-43 (2022) - [c45]Takahiro Baba, Kensuke Baba, Toshihiro Yamauchi:
Malware Classification by Deep Learning Using Characteristics of Hash Functions. AINA (2) 2022: 480-491 - [c44]Masaya Sato, Taku Omori, Toshihiro Yamauchi, Hideo Taniguchi:
Hook Point Estimation for System Call Detection by Virtual Machine Monitor. CANDARW 2022: 358-362 - [c43]Shota Fujii, Nobutaka Kawaguchi, Shoya Kojima, Tomoya Suzuki, Toshihiro Yamauchi:
Design and Implementation of System for URL Signature Construction and Impact Assessment. IIAI-AAI 2022: 95-100 - [c42]Masaya Sato, Ryosuke Nakamura, Toshihiro Yamauchi, Hideo Taniguchi:
Improving Transparency of Hardware Breakpoints with Virtual Machine Introspection. IIAI-AAI 2022: 113-117 - [c41]Hiroki Kuzuno, Toshihiro Yamauchi:
KDPM: Kernel Data Protection Mechanism Using a Memory Protection Key. IWSEC 2022: 66-84 - [c40]Shota Fujii, Nobutaka Kawaguchi, Tomohiro Shigemoto, Toshihiro Yamauchi:
CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCs. IWSEC 2022: 85-104 - [c39]Takashi Norimatsu, Yuichi Nakamura, Toshihiro Yamauchi:
Flexible Method for Supporting OAuth 2.0 Based Security Profiles in Keycloak. Open Identity Summit 2022: 87-98 - [c38]Hiroki Kuzuno, Toshihiro Yamauchi:
vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel Vulnerability. WISA 2022: 222-234 - 2021
- [j23]Hiroki Kuzuno, Toshihiro Yamauchi:
Mitigation of Kernel Memory Corruption Using Multiple Kernel Memory Mechanism. IEEE Access 9: 111651-111665 (2021) - [j22]Toshihiro Yamauchi, Yohei Akao, Ryota Yoshitani, Yuichi Nakamura, Masaki Hashimoto:
Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes. Int. J. Inf. Sec. 20(4): 461-473 (2021) - [j21]Yuta Imamura, Rintaro Orito, Hiroyuki Uekawa, Kritsana Chaikaew, Pattara Leelaprute, Masaya Sato, Toshihiro Yamauchi:
Web access monitoring mechanism via Android WebView for threat analysis. Int. J. Inf. Sec. 20(6): 833-847 (2021) - [c37]Kohei Otani, Toshiki Okazaki, Toshihiro Yamauchi, Hideaki Moriyama, Masaya Sato, Hideo Taniguchi:
Function for Tracing Diffusion of Classified Information to Support Multiple VMs with KVM. CANDAR (Workshops) 2021: 352-358 - [c36]Hiroki Kuzuno, Toshihiro Yamauchi:
KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption. IWSEC 2021: 45-63 - [c35]Toru Nakamura, Hiroshi Ito, Shinsaku Kiyomoto, Toshihiro Yamauchi:
(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring. IWSEC 2021: 64-73 - [c34]Koki Kusunoki, Toshihiro Yamauchi, Hideo Taniguchi:
Physical Memory Management with Two Page Sizes in Tender OS. NBiS 2021: 238-248 - 2020
- [j20]Hiroki Kuzuno, Toshihiro Yamauchi:
Identification of Kernel Memory Corruption Using Kernel Memory Secret Observation Mechanism. IEICE Trans. Inf. Syst. 103-D(7): 1462-1475 (2020) - [c33]Takashi Ishihara, Masaya Sato, Toshihiro Yamauchi:
Method of Generating a Blacklist for Mobile Devices by Searching Malicious Websites. CANDAR (Workshops) 2020: 328-333 - [c32]Hiroki Kuzuno, Toshihiro Yamauchi:
MKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption. IWSEC 2020: 97-116 - [c31]Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi:
Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM. NBiS 2020: 338-349 - [c30]Shuichi Ichioka, Estelle Pouget, Takao Mimura, Jun Nakajima, Toshihiro Yamauchi:
Accessibility Service Utilization Rates in Android Applications Shared on Twitter. WISA 2020: 101-111
2010 – 2019
- 2019
- [j19]Masaya Sato, Hideo Taniguchi, Toshihiro Yamauchi:
Design and implementation of hiding method for file manipulation of essential services by system call proxy using virtual machine monitor. Int. J. Space Based Situated Comput. 9(1): 1-10 (2019) - [c29]Yuta Imamura, Rintaro Orito, Kritsana Chaikaew, Célia Manardo, Pattara Leelaprute, Masaya Sato, Toshihiro Yamauchi:
Threat Analysis of Fake Virus Alerts Using WebView Monitor. CANDAR 2019: 28-36 - [c28]Hiroki Kuzuno, Toshihiro Yamauchi:
KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism. ISPEC 2019: 75-94 - [c27]Masaya Sato, Yuta Imamura, Rintaro Orito, Toshihiro Yamauchi:
(Short Paper) Method for Preventing Suspicious Web Access in Android WebView. IWSEC 2019: 241-250 - 2018
- [j18]Naoki Kudo, Toshihiro Yamauchi, Thomas H. Austin:
Access Control Mechanism to Mitigate Cordova Plugin Attacks in Hybrid Applications. J. Inf. Process. 26: 396-405 (2018) - [c26]Yuta Imamura, Hiroyuki Uekawa, Yasuhiro Ishihara, Masaya Sato, Toshihiro Yamauchi:
Web access monitoring mechanism for Android webview. ACSW 2018: 1:1-1:8 - [c25]Toshihiro Yamauchi, Yohei Akao, Ryota Yoshitani, Yuichi Nakamura, Masaki Hashimoto:
Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes. DSC 2018: 1-8 - [c24]Masao Yamamoto, Kohta Nakashima, Toshihiro Yamauchi, Akira Nagoya, Hideo Taniguchi:
Acceleration of Analysis Processing on Decentralized Performance Profiling System Using Virtual Machines. CANDAR Workshops 2018: 152-158 - [c23]Yuya Ban, Toshihiro Yamauchi:
Mitigating Use-after-Free Attack Using Library Considering Size and Number of Freed Memory. CANDAR Workshops 2018: 398-404 - [c22]Masaya Sato, Hideo Taniguchi, Toshihiro Yamauchi:
Hiding File Manipulation of Essential Services by System Call Proxy. NBiS 2018: 853-863 - 2017
- [j17]Toshihiro Yamauchi, Yuta Ikegami, Yuya Ban:
Mitigating Use-After-Free Attacks Using Memory-Reuse-Prohibited Library. IEICE Trans. Inf. Syst. 100-D(10): 2295-2306 (2017) - [j16]Toshihiro Yamauchi, Yohei Akao:
Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features. IEICE Trans. Inf. Syst. 100-D(10): 2377-2381 (2017) - [j15]Toshihiro Yamauchi:
Editor's Message to Special Issue of Computer Security Technologies against Sophisticated Cyber Attacks. J. Inf. Process. 25: 852-853 (2017) - [c21]Naoki Kudo, Toshihiro Yamauchi, Thomas H. Austin:
Access Control for Plugins in Cordova-Based Hybrid Applications. AINA 2017: 1063-1069 - [c20]Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi:
Performance Improvement and Evaluation of Function for Tracing Diffusion of Classified Information on KVM. CANDAR 2017: 463-468 - 2016
- [j14]Toshihiro Yamauchi:
Foreword. IEICE Trans. Inf. Syst. 99-D(4): 785-786 (2016) - [j13]Yuichi Nakamura, Akira Moriguchi, Masanori Irie, Taizo Kinoshita, Toshihiro Yamauchi:
Rule-Based Sensor Data Aggregation System for M2M Gateways. IEICE Trans. Inf. Syst. 99-D(12): 2943-2955 (2016) - [j12]Shota Fujii, Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi:
Design of Function for Tracing Diffusion of Classified Information for IPC on KVM. J. Inf. Process. 24(5): 781-792 (2016) - [j11]Shota Fujii, Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi:
Evaluation and design of function for tracing diffusion of classified information for file operations with KVM. J. Supercomput. 72(5): 1841-1861 (2016) - [c19]Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi:
Memory Access Monitoring and Disguising of Process Information to Avoid Attacks to Essential Services. CANDAR 2016: 635-641 - [c18]Toshihiro Yamauchi, Yuta Ikegami:
HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks. NSS 2016: 219-234 - [c17]Toshihiro Yamauchi, Yuta Yamamoto, Kengo Nagai, Tsukasa Matono, Shinji Inamoto, Masaya Ichikawa, Masataka Goto, Hideo Taniguchi:
Plate: persistent memory management for nonvolatile main memory. SAC 2016: 1885-1892 - 2015
- [j10]Jing Yu, Toshihiro Yamauchi:
Access Control to Prevent Malicious JavaScript Code Exploiting Vulnerabilities of WebView in Android OS. IEICE Trans. Inf. Syst. 98-D(4): 807-811 (2015) - [j9]Toshihiro Yamauchi, Masahiro Tsuruya, Hideo Taniguchi:
Fast Control Method of Software-Managed TLB for Reducing Zero-Copy Communication Overhead. IEICE Trans. Inf. Syst. 98-D(12): 2187-2191 (2015) - [j8]Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Yamauchi:
Reducing Resource Consumption of SELinux for Embedded Systems with Contributions to Open-Source Ecosystems. J. Inf. Process. 23(5): 664-672 (2015) - [j7]Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi:
Process Hiding by Virtual Machine Monitor for Attack Avoidance. J. Inf. Process. 23(5): 673-682 (2015) - [c16]Yuichi Nakamura, Akira Moriguchi, Toshihiro Yamauchi:
CSDA: Rule-based complex sensor data aggregation system for M2M gateway. ICMU 2015: 108-113 - [c15]Yuta Ikegami, Toshihiro Yamauchi:
Attacker Investigation System Triggered by Information Leakage. IIAI-AAI 2015: 24-27 - [c14]Yohei Akao, Toshihiro Yamauchi:
Proposal of Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features. IIAI-AAI 2015: 721-722 - 2014
- [j6]Masaya Sato, Toshihiro Yamauchi:
Secure and Fast Log Transfer Mechanism for Virtual Machine. J. Inf. Process. 22(4): 597-608 (2014) - [j5]Shunya Sakamoto, Kenji Okuda, Ryo Nakatsuka, Toshihiro Yamauchi:
DroidTrack: Tracking and Visualizing Information Diffusion for Preventing Information Leakage on Android. J. Internet Serv. Inf. Secur. 4(2): 55-69 (2014) - [c13]Kota Yoshizaki, Toshihiro Yamauchi:
Malware Detection Method Focusing on Anti-debugging Functions. CANDAR 2014: 563-566 - [c12]Masaya Sato, Toshihiro Yamauchi:
Complicating Process Identification by Replacing Process Information for Attack Avoidance. IWSEC 2014: 33-47 - 2013
- [j4]Toshihiro Yamauchi, Takayuki Hara, Hideo Taniguchi:
A mechanism for achieving a bound on execution performance of process group to limit CPU abuse. J. Supercomput. 65(1): 38-60 (2013) - [c11]Jing Yu, Toshihiro Yamauchi:
Access Control to Prevent Attacks Exploiting Vulnerabilities of WebView in Android OS. HPCC/EUC 2013: 1628-1633 - [c10]Masaya Sato, Toshihiro Yamauchi:
Secure Log Transfer by Replacing a Library in a Virtual Machine. IWSEC 2013: 1-18 - [c9]Nobuto Otsubo, Shinichiro Uemura, Toshihiro Yamauchi, Hideo Taniguchi:
Design and Evaluation of a Diffusion Tracing Function for Classified Information Among Multiple Computers. MUE 2013: 235-242 - [c8]Syunya Sakamoto, Kenji Okuda, Ryo Nakatsuka, Toshihiro Yamauchi:
DroidTrack: Tracking Information Diffusion and Preventing Information Leakage on Android. MUE 2013: 243-251 - [c7]Takeshi Sakoda, Toshihiro Yamauchi, Hideo Taniguchi:
Evaluation of Load Balancing in Multicore Processor for AnT. NBiS 2013: 360-365 - 2012
- [c6]Yuuki Furukawa, Toshihiro Yamauchi, Hideo Taniguchi:
Novel Control Method for Preventing Missed Deadlines in Periodic Scheduling. NBiS 2012: 459-464 - [e1]Goichiro Hanaoka, Toshihiro Yamauchi:
Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings. Lecture Notes in Computer Science 7631, Springer 2012, ISBN 978-3-642-34116-8 [contents] - 2011
- [c5]Masaya Sato, Toshihiro Yamauchi:
VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss. ARES 2011: 176-190 - [c4]Hideaki Moriyama, Toshihiro Yamauchi, Hideo Taniguchi:
Control method of multiple services for CMP based on continuation model. ICIS 2011: 83-89 - 2010
- [j3]Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Yamauchi:
SELinux Security Policy Configuration System with Higher Level Language. Inf. Media Technol. 5(4): 1349-1360 (2010) - [j2]Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Yamauchi:
SELinux Security Policy Configuration System with Higher Level Language. J. Inf. Process. 18: 201-212 (2010) - [j1]Toshihiro Yamauchi, Kazuhiro Fukutomi, Hideo Taniguchi:
ISIPC: Instant Synchronous Interprocess Communication. J. Next Gener. Inf. Technol. 1(3): 75-83 (2010) - [c3]Kenji Yamamoto, Toshihiro Yamauchi:
Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON. FGIT-SecTech/DRBC 2010: 57-67 - [c2]Toshihiro Yamauchi, Takayuki Hara, Hideo Taniguchi:
A Mechanism That Bounds Execution Performance for Process Group for Mitigating CPU Abuse. FGIT-SecTech/DRBC 2010: 84-93 - [c1]Yuuki Furukawa, Toshihiro Yamauchi, Hideo Taniguchi:
Proposal for Sophisticated Periodic Execution Control in Embedded Systems. FGIT 2010: 549-563
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint