"KRGuard: Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features, " Proceedings of 2016 International Conference on Information Science and Security (ICISS), pp.22-26 (12, 2016).
"Use-After-Free Prevention Method Using Memory Reuse Prohibited Library," The 10th International Workshop on Security (IWSEC 2015), Invited talk (8, 2015).
"Attacker Investigation System Triggered by Information Leakage," 6th International Conference on E-Service and Knowledge Management (ESKM 2015), Proceedings of 2015 IIAI 4th International Congress on Advanced Applied Informatics (AAI 2015), pp.24-27 (7, 2015).
"Proposal of Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features," 4th International Congress on Advanced Applied Informatics, poster, Proceedings of 2015 IIAI 4th International Congress on Advanced Applied Informatics (AAI 2015), pp.721-722 (7, 2015).
"Design of a Function for Tracing the Diffusion of Classified Information for File Operations with a KVM," The 2015 International Symposium on Advances in Computing, Communications, Security, and Applications for Future Computing (ACSA 2015), Proceedings of The 2015 World Congress on Information Technology Applications and Services, (2, 2015).
"Malware Detection Method Focusing on Anti-Debugging Functions," 1st International Workshop on Information and Communication Security (WICS'14), poster, Proceedings of 2014 Second International Symposium on Computing and Networking (CANDAR 2014), pp.563-566 (12, 2014).
"Secure and Fast Log Transfer Mechanism for Virtual Machine," Journal of Information Processing, Vol.22, No.4, pp.597-608, (10, 2014).
"Complicating Process Identification by Replacing Process Information for Attack Avoidance," The 9th International Workshop on Security (IWSEC2014), Lecture Notes in Computer Science(LNCS), vol.8639, pp.33-47, (8, 2014).
"Mitigating Attacks Based on Process Identification by Disguising Process Information, " 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS2014), poster (6, 2014).
"DroidTrack: Tracking and Visualizing Information Diffusion for Preventing Information Leakage on Android," Journal of Internet Services and Information Security (JISIS), Vol.4, No.2, pp.55-69, (5, 2014).
"Secure Log Transfer by Replacing a Library in a Virtual Machine," Lecture Notes in Computer Science, vol.8231, pp.1-18 Springer, (11, 2013).
"Access Control to Prevent Attacks Exploiting Vulnerabilities of WebView in Android OS," Proceedings of 2013 IEEE International Conference on High Performance Computing and Communications(HPCC-2013) and 2013 IEEE International Conference on Embedded and Ubiquitous Computing (EUC-2013), pp.1628-1633 IEEE Computer Society, (11, 2013).
"VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss，"2011 International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD'11)，Vol.6908, pp.176-190 Springer Berlin / Heidelberg, (8，2011)．
"Design and Evaluation of a Bayesian-filter-based Image Spam Filtering Method，"Proc. of the 2nd International Conference on Information Security and Assurance (ISA2008), (4, 2008).
"Integrated Access Permission: Secure and Simple Policy Description by Integration of File Access Vector Permission，"Proc. of the 2nd International Conference on Information Security and Assurance (ISA2008), (4, 2008).
"Proposal of File Access Permission which has both Security and Simplified Configuration",PreProc. of the 7th International Workshop on Information Security Applications (WISA2006), pp.151-161, (8, 2006).