佐藤 将也(Masaya Sato)

Photo

経歴

研究テーマ

発表論文

学術論文

  1. Shota Fujii, Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi,
    "Design of Function for Tracing Diffusion of Classified Information for IPC on KVM,"
    Journal of Information Processing, Vol. 24, No. 5, pp. 781–792 (09, 2016).
    [DOI: 10.2197/ipsjjip24.781] (Open Access)
  2. Shota Fujii, Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi,
    "Evaluation and Design of Function for Tracing Diffusion of Classified Information for File Operations with KVM,"
    Journal of Supercomputing (SUPE), Vol. 72, Issue 5, pp. 1841–1881 (02, 2016).
    [DOI: 10.1007/s11227-016-1671-5]
  3. Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi,
    "Process Hiding by Virtual Machine Monitor for Attack Avoidance,"
    Journal of Information Processing, Vol. 23, No. 5, pp. 673–682 (09, 2015).
    [DOI: 10.2197/ipsjjip23.673] (Open Access)
    Specially Selected Paper
  4. Masaya Sato, Toshihiro Yamauchi,
    "Secure and Fast Log Transfer Mechanism for Virtual Machine,"
    Journal of Information Processing, Vol. 22, No. 4, pp. 597–608 (09, 2014).
    [DOI: 10.2197/ipsjjip.22.597] (Open Access)
  5. Masaya Sato, Toshihiro Yamauchi,
    "VMM-Based Log-Tampering and Loss Detection Scheme,"
    Journal of Internet Technology, Vol. 13, No. 4, pp. 655–666, (07, 2012). [draft]
    (辻井重男セキュリティ学生論文賞 情報セキュリティ学生賞受賞)
  6. 佐藤 将也,山内 利宏,
    "ログの改ざんと喪失を防止するシステムの仮想計算機モニタによる実現, "
    情報処理学会論文誌, vol. 53, no. 2, pp. 847–856, (02, 2012).
    (2012年度情報処理学会論文賞受賞)

国際会議(査読有り)

  1. Yuta Imamura, Hiroyuki Uekawa, Yasuhiro Ishihara, Masaya Sato, Toshihiro Yamauchi,
    "Web Access Monitoring Mechanism for Android WebView,"
    Australasian Information Security Conference 2018 (AISC 2018),
    Proceedings of the Australasian Compuer Science Week Multiconference, No. 1, pp. 1:1–1:8 (01, 2018)
    (AISC 2018 Best Paper Award)
  2. Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi,
    "Performance Improvement and Evaluation of Function for Tracing Diffusion of Classified Information on KVM,"
    4th International Workshop on Information and Communication Security (WICS2017),
    2017 Fifth International Symposium on Computing and Networking, pp. 463–468 (11, 2017).
  3. Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi,
    "Memory Access Monitoring and Disguising of Process Information to Avoid Attacks to Essential Services,"
    3rd International Workshop on Information and Communication Security (WICS2016),
    2016 Fourth International Symposium on Computing and Networking, pp.635–641 (11, 2016).
  4. Masaya Sato, Toshihiro Yamauchi,
    "Complicating Process Identification by Replacing Process Information for Attack Avoidance,"
    The 9th International Workshop on Security (IWSEC2014),
    Lecture Notes in Computer Science (LNCS), vol. 8639, pp. 33–47 (08, 2014).
  5. Masaya Sato, Toshihiro Yamauchi,
    "Secure Log Transfer by Replacing a Library in a Virtual Machine,"
    The 8th International Workshop on Security (IWSEC2013),
    Lecture Notes in Computer Science (LNCS), Vol. 8231, pp. 1–18, (11, 2013).
  6. Masaya Sato, Toshihiro Yamauchi,
    "VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss,"
    2011 International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD'11) (In conjunction with ARES 2011),
    Lecture Notes in Computer Science (LNCS), vol. 6908, pp. 176–190, (08, 2011).

国内会議・シンポジウム(査読有り)

  1. 佐藤 将也,山内 利宏,
    "仮想計算機モニタによるログの改ざんと喪失防止システムの設計, "
    マルチメディア, 分散, 協調とモバイルシンポジウム(DICOMO2010) 論文集, pp. 213–220, (07, 2010).

研究会・シンポジウム(査読無し)

国内会議(査読なし)はこちら

ポスタ発表

  1. Masaya Sato and Toshihiro Yamauchi,
    "Mitigating Attacks Based on Process Identification by Disguising Process Information,"
    9th ACM Symposium on Information, Computer and Communications Security (ASIACCS2014), (06, 2014).
  2. Masaya Sato and Toshihiro Yamauchi,
    "Secure log transfer in virtual machine with minimal modification to library,"
    The 7th International Workshop on Security (IWSEC2012), (11, 2012).

Invited Session

  1. Masaya Sato
    "Attack Avoiding Method Obscuring Process Identification by Making Process Information Invisible,"
    The 9th International Workshop on Security (IWSEC2014), (08, 2014).

受賞

その他

所属学会


谷口研究室
計算機ソフトウェアグループ(SWLAB)
Last update: 2018/03/28 09:31:19