[2025$BG/(B] [2024$BG/(B] [2023$BG/(B] [2022$BG/(B] [2021$BG/(B] [2020$BG/(B] [2019$BG/(B] [2018$BG/(B] [2017$BG/(B] [2016$BG/(B] [2015$BG/(B] [2014$BG/(B] [2013$BG/(B] [2012$BG/(B] [2011$BG/(B] [2010$BG/(B] [2009$BG/(B] [2008$BG/(B] [2007$BG/(B] [2006$BG/(B] [2005$BG/(B]
Takashi Norimatsu, Yuichi Nakamura, Toshihiro Yamauchi,
"Developing the Flexible Conformance Test Execution Platform for OAuth 2.0-based Security Profiles$B!$(B"
Journal of Information Processing, Vol.33, (1, 2025). (accepted)
$BBgGwM&B@O:!$;3FbMx9(!$5H2,9n@.!$F#66BnLi!$EOJU!!>0!$1nEO=S2p!$(B
"CPU$B%"!<%-%F%/%A%c$K0MB8$7$J$$(BIoT$B%^%k%&%'%"J,N`LZ@8@.
Hiroki Kuzuno, Tomohiko Yano, Kazuki Omo, Jeroen van der Ham, Toshihiro Yamauchi,
"Proposal of Open Source Software Security Risk Indicator based on Vulnerability Management Interview, "
Journal of Information Processing, Vol.32,(12, 2024). (accepted)
$BBg?9!!Bn!$:4F#>-Li!$;3FbMx9(!$C+8}=(IW!$(B
"$B2>A[7W;;5!%b%K%?$K$h$kJ#?t(BOS$B$KBP1~$7$?%7%9%F%`%3!<%k8!CN2U=j?dDj
https://doi.org/10.20729/00239255
Masato Miki, Toshihiro Yamauchi, Satoru Kobayashi,
"Effectiveness of MAC Systems Based on LSM and Their Security Policy Configuration for Protecting IoT Devices$B!$(B"
Journal of Internet Services and Information Security (JISIS), Vol.14, Issue 3, pp. 293-315 (8, 2024).
https://doi.org/10.58346/JISIS.2024.I3.018
Hiroki Kuzuno, Toshihiro Yamauchi,
"Mitigation of Privilege Escalation Attack Using Kernel Data Relocation Mechanism, "
International Journal of Information Security, (7, 2024).
https://doi.org/10.1007/s10207-024-00890-4
Shota Fujii, Nobutaka Kawaguchi, Tomoya Suzuki,Toshihiro Yamauchi,
"Automatic URL Signature Construction and Impact Assessment, "
Information Engineering Express (IEE), Vol.10, No.1, (5, 2024).
https://doi.org/10.52731/iee.v10.i1.794
Hiroki Kuzuno, Toshihiro Yamauchi,
"kdMonitor: Kernel Data Monitor for Detecting Kernel Memory Corruption, "
2024 7th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2024), (11, 2024). (accepted)
Hiroki Kuzuno, Toshihiro Yamauchi,
"RKPM: Restricted Kernel Page Mechanism to Mitigate Privilege Escalation Attacks, "
18th International Conference on Network and System Security (NSS 2024), (11, 2024).
Liang Zhao, Satoru Kobayashi, Kensuke Fukuda,
"Exploring the Discovery Process of Fresh IPv6 Prefixes: An Analysis of Scanning Behavior in Darknet and Honeynet, "
Passive and Active Measurement Conference (PAM 2024),
Lecture Notes in Computer Science (LNCS), vol.14537, pp.95-111, Springer, Cham, (3, 2024).
https://doi.org/10.1007/978-3-031-56249-5_4
Hiroki Kuzuno, Tomohiko Yano, Kazuki Omo, Jeroen van der Ham, Toshihiro Yamauchi,
"Security Risk Indicator for Open Source Software to Measure Software Development Status, "
The 24th World Conference on Information Security Applications (WISA 2023),
Lecture Notes in Computer Science(LNCS), vol.14402, pp.143-156, (1, 2024).
https://doi.org/10.1007/978-981-99-8024-6_12
$B?@J]7<9,!$;3FbMx9(!$C+8}=(IW!$(B
"$B8DJL7?(BTender$B$N%3%"4V1s3V8F=P@)8f$N0MMjB?=E2=$N
2024$BG/EY(B($BBh(B75$B2s(B)$BEE5$!&>pJs4XO"3X2qCf9q;YItO"9gBg2q!$(B(10, 2024)$B!%(B($BH/I=M=Dj(B)
$BEgK\M5Bg!$(BJiratchaya Phinyodom$B!$5H85Ne@n@hG7!$=);3K~>
"IoT$B5!4o$K$*$1$k5/F0;~<+F0
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2024 (CSS2024) $BO@J8=8!$(B(10, 2024)$B!%(B($BH/I=M=Dj(B)
$B:4<#OBGO!$;3FbMx9(!$>.NS!!M!!$C+8}=(IW!$(B
"$B
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2024 (CSS2024) $BO@J8=8!$(B(10, 2024)$B!%(B($BH/I=M=Dj(B)
$BLpGkUrGO!$;3FbMx9(!$(B
"32bit Arm$B%P%$%J%j$K$*$1$k4V@\E*$K8F$S=P$5$l$k4X?t8F$S=P$74X78$H%7%9%F%`%3!<%k$N8!=P!$(B"
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2024 (CSS2024) $BO@J8=8!$(B(10, 2024)$B!%(B($BH/I=M=Dj(B)
$BF;2
"$B56%7%g%C%T%s%0%5%$%H$XM6F3$9$kF'$_Bf%5%$%H$N8!=P$N$?$a$N
$B3kLn90
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2024 (CSS2024) $BO@J8=8!$(B(10, 2024)$B!%(B($BH/I=M=Dj(B)
$B?9;31QL@!$;3FbMx9(!$:4F#>-Li!$C+8}=(IW!$(B
"$B5!L)>pJs$N3H;6DI@W5!G=$K$*$1$k(Bprocfs$B$rMQ$$$?4IM}BP>]$NF0E*DI2C!&:o=|5!9=$NDs0F!$(B"
$BEE5$!&>pJs4X783X2q6e=#;YItBh(B77$B2sO"9gBg2q!$(B(9, 2024)$B!%(B($BH/I=M=Dj(B)
$B3kLn90
$BBh(B23$B2s>pJs2J3X5;=Q%U%)!<%i%`(B(FIT2024)$B!$Bh(B4$BJ,:}!$(Bpp.1-8 (9, 2024)$B!%(B
$BCfEh:LG5!$=?!!91;J!$9bEDM:B@!$c7F#9(B@O:!$7'C+M5;V!$?@1r2m5*!$;3FbMx9(!$(B
"$B%P%$%J%j%U%!%8%s%0$K$h$k%H%m%$2=(BIoT$B5!4o$K$*$1$k%H%j%,!<%Y!<%9$N?6$kIq$$8!=P
$BEgK\M5Bg!$5H85N
"OpenWrt$B%Y!<%9$N(BIoT$B5!4o5/F0;~$K
$B3kLn90
$BEE;R>pJsDL?.3X2q(B $BBh(B66$B2s>pJsDL?.%7%9%F%`%;%-%e%j%F%#8&5f2q(B (ICSS)$B!$EE;R>pJsDL?.3X2q5;=Q8&5fJs9p!$(Bvol.123, no.448, ICSS2023-84$B!$(Bpp.108-115$B!$(B(3, 2024)$B!%(B
$B>.NSM!!$(B $B@P0f(B $B9(E5!$(B $B;3Fb(B $BMx9(!$(B $BL@@P(B $B=$!$(B $BJ!ED(B $B7r2p!$(B
"$B%M%C%H%o!<%/%m%0$NBPOCE*0x2L2r@O$N8!F$!$(B"
$BEE;R>pJsDL?.3X2q(B $B%$%s%?!<%M%C%H%"!<%-%F%/%A%c8&5f2q(B (IA)$B!$(B $BEE;R>pJsDL?.3X2q5;=QJs9p!$(Bvol.123$B!$(Bno.422$B!$(Bpp.233-240$B!$(B(3, 2024)$B!%(B
$BBgLn(B $BM5H~;R!$;3Fb(B $BMx9(!$>.NS(B $BM!!$C+8}=(IW!$(B
"$B%7%0%J%k
$B>pJs=hM}3X2qBh(B86$B2sA49qBg2q!$>pJs=hM}3X2qBh(B86$B2sA49qBg2q9V1iO@J8=8!$(Bpp.55-56$B!$(B(3, 2024)$B!%(B
$B@P0f9(E5!$>.NSM!!$J!ED7r2p!$;3FbMx9(!$(B
"$B%M%C%H%o!<%/%m%02r@O$K$*$1$k%$%Y%s%H4V0x2L>pJs2D;k2=$N8!F$!$(B"
2024$BG/EE;R>pJsDL?.3X2qAm9gBg2q!$EE;RG^BN!$(B(3, 2024)$B!%(B
$B:4F#>-Li!$Bg?9Bn!$;3FbMx9(!$C+8}=(IW!$(B
"$B2>A[7W;;5!%b%K%?$K$h$kJ#?t(BOS$B$KBP1~$7$?%7%9%F%`%3!<%k8!CN2U=j?dDj
$BBh(B162$B2s%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2024-OS-162$B!$(Bno.11$B!$(Bpp.1-7$B!$(B(2, 2024)$B!%(B
$B@>K\0K?%!$;3FbMx9(!$>.NSM!!$2CF#=c!$;0NX??90!$C+8}=(IW!$(B
"HPC$B$K$*$1$k(BGang Scheduling$B$N@ZBX4V3VF0E*JQ99
$B=?91;J!$CfEh:LG5!$9bEDM:B@!$7'C+M5;V!$?@1r2m5*!$;3FbMx9(!$(B
"$B%W%m%H%3%k%U%!%8%s%0$K$h$k%H%m%$2=(B IoT $B5!4o$K$*$1$k%H%j%,!<%Y!<%9$N?6$kIq$$8!=P
Hiroki Kuzuno, Toshihiro Yamauchi,
"Identification of Vulnerable Kernel Code Using Kernel Tracing Mechanism, "
Journal of Information Processing, Vol.31, No.12, pp.788-801, (12, 2023).
https://doi.org/10.2197/ipsjjip.31.788
Mitsuaki Akiyama, Shugo Shiraishi, Akifumi Fukumoto, Ryota Yoshimoto, Eitaro Shioji, Toshihiro Yamauchi,
"Seeing is not always believing: Insights on IoT manufacturing from firmware composition analysis and vendor survey, "
Computers & Security, Vol.133, p.103389, (10, 2023).
https://doi.org/10.1016/j.cose.2023.103389
Shota Fujii, Nobutaka Kawaguchi, Tomohiro Shigemoto, Toshihiro Yamauchi,
"Extracting and Analyzing Cybersecurity Named Entity and its Relationship with Noncontextual IOCs from Unstructured Text of CTI Sources, "
Journal of Information Processing,Vol.31, No.9, pp.578-590, (9, 2023).
https://doi.org/10.2197/ipsjjip.31.578
Takashi Norimatsu, Yuichi Nakamura, Toshihiro Yamauchi,
"Policy-Based Method for Applying OAuth 2.0-Based Security Profiles, "
IEICE Transactions on Information and Systems, Vol.E106-D, No.9, pp.1364-1379, (9, 2023).
https://doi.org/10.1587/transinf.2022ICP0004
Hiroki Kuzuno, Toshihiro Yamauchi,
"Protection Mechanism of Kernel Data Using Memory Protection Key, "
IEICE Transactions on Information and Systems, Vol.E106-D, No.9, pp.1326-1338, (9, 2023).
https://doi.org/10.1587/transinf.2022ICP0013
Masaya Sato, Taku Omori, Toshihiro Yamauchi, Hideo Taniguchi,
"Memory Analysis Based Estimation of Hook Point by Virtual Machine Monitor, "
International Journal of Networking and Computing, Vol.13, No.2, pp.273-286, (7, 2023).
https://doi.org/10.15803/ijnc.13.2_273
$B;T2,=(0l!$@nEg@iL@!$:4F#>-Li!$;3FbMx9(!$(B
"Android$B$K$*$1$k0-@-(BWeb$B%5%$%H%"%/%;%9$N%m%0<}=8$H2D;k2=
$B>pJs=hM}3X2qO@J8;o!$(BVol.64$B!$(BNo.4$B!$(Bpp.892-903$B!$(B(4, 2023)$B!%(B
https://doi.org/10.20729/00225497
Colin Regal-Mezin, Satoru Kobayashi, Toshihiro Yamauchi,
"netroub: Towards an Emulation Platform for Network Trouble Scenarios, "
19th International Conference on emerging Networking EXperiments and Technologies Student Workshop,
Proceedings of 19th International Conference on emerging Networking EXperiments and Technologies Student Workshop Student Workshop 2023 (CoNEXT 2023), pp.17-18, (12, 2023).
https://doi.org/10.1145/3630202.3630222
Masato Miki, Toshihiro Yamauchi, Satoru Kobayashi,
"Evaluation of Effectiveness of MAC Systems Based on LSM for Protecting IoT Devices, "
11th International Symposium on Computing and Networking,
Proceedings of 2023 11th International Symposium on Computing and Networking (CANDAR2023), pp.161-167, (11, 2023).
https://doi.org/10.1109/CANDAR60563.2023.00029
Hervet Victor, Satoru Kobayashi, Toshihiro Yamauchi,
"Analyzing Post-injection Attacker Activities in IoT Devices: A Comprehensive Log Analysis Approach, "
10th International Workshop on Information and Communication Security (WICS 2023),
Proceedings of 2023 11th International Symposium on Computing and Networking Workshops (CANDARW2023), pp.292-297, (11, 2023).
https://doi.org/10.1109/CANDARW60564.2023.00055
Kaito Shiba, Hiroki Kuzuno, Toshihiro Yamauchi,
"Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE, "
10th International Workshop on Information and Communication Security (WICS 2023),
Proceedings of 2023 11th International Symposium on Computing and Networking Workshops (CANDARW2023), pp.274-278, (11, 2023).
https://doi.org/10.1109/CANDARW60564.2023.00052
Masaya Sato, Taku Omori, Toshihiro Yamauchi, Hideo Taniguchi,
"Supporting multiple OS types on estimation of system call hook point by virtual machine monitor, "
10th International Workshop on Information and Communication Security (WICS 2023),
Proceedings of 2023 11th International Symposium on Computing and Networking Workshops (CANDARW2023), pp.267-278, (11, 2023).
https://doi.org/10.1109/CANDARW60564.2023.00051
Satoru Kobayashi, Ryusei Shiiba, Ryosuke Miura, Shinsuke Miwa, Toshiyuki Miyachi, Kensuke Fukuda,
"dot2net: A labeled graph approach for template-based configuration of emulation networks, "
Proceedings of the 19th International Conference on Network and Service Management (CNSM 2023), pp.342-350, (10, 2023).
https://doi.org/10.23919/CNSM59352.2023.10327865
Hiroki Kuzuno, Toshihiro Yamauchi,
"KDRM: Kernel Data Relocation Mechanism to Mitigate Privilege Escalation Attack, "
17th International Conference on Network and System Security (NSS 2023),
Lecture Notes in Computer Science (LNCS), vol.13983, pp.61-76, (8, 2023).
https://doi.org/10.1007/978-3-031-39828-5_4
Takashi Norimatsu, Toshihiro Yamauchi,
"Non Real-Time Data Transmission Performance Analysis of PROFINET for Assuring Data Transmission Quality, "
Proceedings of 2023 5th International Conference on Computer Communication and the Internet (ICCCI), pp.236-244 (6, 2023).
https://doi.org/10.1109/ICCCI59363.2023.10210171
Hiroki Kuzuno, Toshihiro Yamauchi,
"vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel Vulnerability, "
The 23rd World Conference on Information Security Applications (WISA 2022),
Lecture Notes in Computer Science (LNCS), vol.13720, pp.222-234, (1, 2023).
https://doi.org/10.1007/978-3-031-25659-2_16
$B;3FbMx9(!$(B
"WarpDrive$B$N%b%P%$%k%;%s%5%(%s%8%s$KEk:\$5$l$F$$$k2,;3Bg3X$,8&5f3+H/$7$?5!G=$N>R2p!$(B"
WarpDrive Workshop 2023$B!$(B(12$B!$(B2023)$B!%(B
$B=?91;J!$(B
"Android$B$K$*$1$k0U?^$7$J$$(BWeb$B%5%$%HA+0\$N8m8!CN$N:o8:
$BBg?9(B $BBn!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B2>A[7W;;5!%b%K%?$K$h$k%7%9%F%`%3!<%k8!CN2U=j$N?dDj2DG=$J(BOS$B
$B3kLn(B $B90
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2023 (CSS2023) $BO@J8=8!$(Bvol.2023$B!$(Bpp.308-315$B!$(B(10, 2023)$B!%(B
$B:4<#(B $BOBGO!$;3Fb(B $BMx9(!$>.NS(B $BM!!$C+8}(B $B=(IW!$(B
"$B
$B?9;3(B $B1QL@!$;3Fb(B $BMx9(!$:4F#(B $B>-Li!$C+8}(B $B=(IW!$(B
"$B5!L)>pJs$N3H;6DI@W5!G=$K$*$1$k(Bproc$B%U%!%$%k%7%9%F%`$rMQ$$$?4IM}BP>]GD0.
$B3kLn(B $B90
"$B%+!<%M%k%a%b%j2r@O$rMQ$$$?FC8">:3J967b8!=P
$BBh(B22$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT 2023) $B9V1iO@J8=8!$Bh(B4$BJ,:}!$(Bpp.25-30$B!$(B(9, 2023).
$BBgLn8,2p(B, $B;3FbMx9((B, $BC+8}=(IW(B,
"Tender$B$K$*$1$kB>%W%m%;%9$NF~=PNOMW5a$r9MN8$7$?F~=PNO@-G=D4@0K!$NI>2A(B, "
$BBh(B160$B2s%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2023-OS-160, no.6, pp.1-8, (8, 2023).
$B3kLn90
$B86ED??%N2p!$5H85N
"$B%U%!!<%`%&%'%"2r@O$K4p$E$$$?(BIoT$B5!4o>e$G<+F0
$B0f>e2f5W!$;3FbMx9(!$C+8}=(IW!$(B
"$B6&M-7?%^%k%A%3%"(BTender$B$K$*$1$k;q8;DI2C5!G=$N@_7W!$(B"
2023$BG/EE;R>pJsDL?.3X2qAm9gBg2q!$>pJs!&%7%9%F%`9V1iO@J8=8(B1$B!$(Bp.45$B!$(B(3, 2023)$B!%(B
$BBgC+9RJ?!$>.NSM!!$;3FbMx9(!$C+8}=(IW!$(B
"VM$B4VDL?.$KBP1~$7$?(BKVM$B>e$N5!L)>pJs$N3H;6DI@W5!G=$N
$BBgLn8,2p!$;3FbMx9(!$C+8}=(IW!$(B
"Tender$B$K$*$1$kB>%W%m%;%9$NF~=PNOMW5a$r9MN8$7$?F~=PNO@-G=D4@0K!$N
$B8VED;V>k!$;3FbMx9(!$C+8}=(IW!$(B
"Tender$B$K$*$1$k%W%m%;%94VDL?.%G!<%?0h$rMxMQ$7$?%3%"4V1s3V
$B@>K\0K?%!$>.NSM!!$;3FbMx9(!$2CF#=c!$:4F#=
"HPC$B%/%i%&%I$K$*$1$k3d$j9~$_=hM}$K$h$k(BOS$B%N%$%:$N1F6A$NI>2A!$(B"
$BBh(B158$B2s%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2023-OS-158$B!$(Bno.28$B!$(Bpp.1-7$B!$EE;RG^BN!$(B(2, 2023)$B!%(B
$B
$BM.LZ9'J8!$5H85N
"LKM$B$r2p$7$?%7%9%F%`%3!<%k$N%"%/%;%9@)8f$K$*$1$k(BSeccomp$B%U%#%k%?@8@.
2023$BG/0E9f$H>pJs%;%-%e%j%F%#%7%s%]%8%&%`!J(BSCIS2023$B!KO@J8=8(B, $BEE;RG^BN!$(B(1, 2023)$B!%(B
Shota Fujii, Rei Yamagishi, Toshihiro Yamauchi,
"Survey and Analysis on ATT&CK Mapping Function of Online Sandbox for Understanding and Efficient Using,"
Journal of Information Processing, Vol.30, pp.807-821, (12, 2022).
https://doi.org/10.2197/ipsjjip.30.807
Hiroki Kuzuno, Toshihiro Yamauchi,
"Mitigating Foreshadow Side-Channel Attack Using Dedicated Kernel Memory Mechanism,"
Journal of Information Processing, Vol.30, pp.796-806, (12, 2022).
https://doi.org/10.2197/ipsjjip.30.796
Hiroki Kuzuno, Toshihiro Yamauchi,
"Prevention of Kernel Memory Corruption Using Kernel Page Restriction Mechanism,"
Journal of Information Processing, vol.30, pp.563-576, (9, 2022).
https://doi.org/10.2197/ipsjjip.30.563
Shuichi Ichioka, Estelle Pouget, Takao Mimura, Jun Nakajima, Toshihiro Yamauchi,
"Analysis of Android Applications Shared on Twitter Focusing on Accessibility Services,"
Journal of Information Processing, vol.30, pp.601-612, (9, 2022).
https://doi.org/10.2197/ipsjjip.30.601
$BBgC+9RJ?!$2,:j=S
"$BJ#?t$N%3%"$H(BVM$B$KBP1~$7$?(BKVM$B>e$N5!L)>pJs$N3H;6DI@W5!G=$N
$B>pJs=hM}3X2qO@J8;o(B, vol.63, no.9, pp.1398-1409 (9, 2022).
https://doi.org/10.20729/00220078
$BC+8}(B $B=(IW!$(B $B9b?y(B $Bps!$(B $B3[ED(B $BE/>4!$(B $B:4F#(B $B>-Li!$(B
"$B4xH/@-(B/$BIT4xH/@-%a%b%j:.:\7W;;5!$G$N9bB.$J%W%m%0%i%`
$B>pJs=hM}3X2qO@J8;o!$(Bvol.63$B!$(Bno.2$B!$(Bpp.515-525 (2, 2022).
https://doi.org/10.20729/00216260
Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi,
"Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM,"
Journal of Internet Services and Information Security (JISIS), vol.12, no.1, pp.26-43. (2, 2022).
https://doi.org/10.22667/JISIS.2022.02.28.026
Toshihiro Yamauchi,
"FOREWORD - Special Section on Forefront Computing, "
IEICE Transactions on Information and Systems, Vol.E105-D, No.12, p.1998, (12, 2022).
Masaya Sato, Taku Omori, Toshihiro Yamauchi, Hideo Taniguchi,
"Hook Point Estimation of Monitoring Address for System Call Detection by Virtual Machine Monitor,"
9th International Workshop on Information and Communication Security (WICS 2022),
Proceedings of 2022 Tenth International Symposium on Computing and Networking Workshops, pp.358-362 IEEE (11, 2022).
https://doi.org/10.1109/CANDARW57323.2022.00069
Hiroki Kuzuno, Toshihiro Yamauchi,
"KDPM: Kernel Data Protection Mechanism Using a Memory Protection Key,"
17th International Workshop on Security (IWSEC 2022),
Lecture Notes in Computer Science (LNCS), vol.13504, pp.66-84, (8, 2022).
https://doi.org/10.1007/978-3-031-15255-9_4
Shota Fujii, Nobutaka Kawaguchi, Tomohiro Shigemoto, Toshihiro Yamauchi,
"CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCs,"
17th International Workshop on Security (IWSEC 2022),
Lecture Notes in Computer Science (LNCS), vol.13504, pp.85-104, (8, 2022).
https://doi.org/10.1007/978-3-031-15255-9_5
Masaya Sato, Ryosuke Nakamura, Toshihiro Yamauchi, Hideo Taniguchi,
"Improving Transparency of Hardware Breakpoints with Virtual Machine Introspection,"
Proceedings of 2022 11th International Congress on Advanced Applied Informatics (IIAI-AAI 2022), pp.113-117 (7, 2022).
14th International Conference on E-Service and Knowledge Management (ESKM 2022)
https://doi.org/10.1109/IIAIAAI55812.2022.00031
Shota Fujii, Nobutaka Kawaguchi, Shoya Kojima, Tomoya Suzuki, Toshihiro Yamauchi,
"Design and Implementation of System for URL Signature Construction and Impact Assessment,"
Proceedings of 2022 11th International Congress on Advanced Applied Informatics (IIAI-AAI 2022), pp.95-100 (7, 2022).
14th International Conference on E-Service and Knowledge Management (ESKM 2022)
https://doi.org/10.1109/IIAIAAI55812.2022.00028
Takashi Norimatsu, Yuichi Nakamura, Toshihiro Yamauchi,
"Flexible Method for Supporting OAuth 2.0 Based Security Profiles in Keycloak,"
Open Identity Summit 2022,
Lecture Notes in Informatics (LNI), Vol.P-325, pp.87-98, (6, 2022).
https://doi.org/10.18420/OID2022_07
Takahiro Baba, Kensuke Baba, Toshihiro Yamauchi,
"Malware Classification by Deep Learning Using Characteristics of Hash Functions,"
Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022), vol.2, pp.480-481 Springer Nature (3, 2022).
The 36th International Conference on Advanced Information Networking and Applications (AINA-2022)
https://doi.org/10.1007/978-3-030-99587-4_40
$B=?(B $B91;J!$@^8M(B $BQ[B@O:!$;3Fb(B $BMx9(!$(B
"Android$B$K$*$1$k0U?^$7$J$$(BWeb$B%5%$%HA+0\$N8m8!CN$N:o8:
$B3kLn(B $B90
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2022 (CSS2022) $BO@J8=8!$(Bvol.2022$B!$(Bpp.784-791$B!$(B(10, 2022)$B!%(B
$B
$B>h>>(B $BN4;V!$CfB<(B $BM:0l!$;3Fb(B $BMx9(!$(B
"Keycloak$B$KBP$9$k=@Fp$J%3%s%U%)!<%^%s%9%F%9%H
$B;0LZ(B $B2mEP!$;3Fb(B $BMx9(!$(B
"$B5!3#3X=,$rMQ$$$?(BIoT$B5!4o8~$1%;%-%e%"(BOS$B$N@_7W!$(B"
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2022 (CSS2022) $BO@J8=8!$(Bvol.2022$B!$(Bpp.546-553$B!$(B(10, 2022)$B!%(B
$B;3Fb(B $BMx9(!$5H85(B $BN
"IoT$B%^%k%&%'%"$N46@w=hM}$KCeL\$7$?%"%/%;%9@)8f
$BBgLn(B $B8,2p!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender$B$K$*$1$kJ#?t%W%m%;%9$N@-G=D4@0F~=PNO$ND4@0@:EY$NI>2A!$(B"
$BBh(B21$B2s>pJs2J3X5;=Q%U%)!<%i%`!J(BFIT2022$B!K9V1iO@J8=8!$Bh(B1$BJ,:}!$(B pp.223-224$B!$(B(9, 2022).
$BBg?9(B $BBn!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B2>A[7W;;5!%b%K%?$K$h$k%7%9%F%`%3!<%k8!CN2U=j$N?dDj!$(B"
$BBh(B21$B2s>pJs2J3X5;=Q%U%)!<%i%`!J(BFIT2022$B!K9V1iO@J8=8!$Bh(B4$BJ,:}!$(Bpp.153-154$B!$(B(9, 2022).
$B3kLn(B $B90
$BBh(B21$B2s>pJs2J3X5;=Q%U%)!<%i%`!J(BFIT2022$B!K9V1iO@J8=8!$Bh(B4$BJ,:}!$(Bpp.25-32$B!$(B(9, 2022)$B!%!J(BFIT$BO@J8>^(B $B^!K(B
$B@>K\(B $B0K?%!$2CF#(B $B=c!$:4F#(B $B=
"10GbE$B4D6-$K$*$1$kDL?.=hM}@-G=$NJ,@O!$(B"
$BBh(B21$B2s>pJs2J3X5;=Q%U%)!<%i%`!J(BFIT2022$B!K9V1iO@J8=8!$Bh(B1$BJ,:}!$(Bpp.215-216$B!$(B(9, 2022).
$BF#0f(B $BfFB@!$:4F#(B $BN49T!$@DLZ(B $BfF!$DEED(B $BPR!$@n8}(B $B?.N4!$=EK\(B $BNQ9(!$;{ED(B $B??IR!$(B
"$B7QB3E*$+$DJ#?t5rE@$+$i$N4QB,$K4p$E$/0-@-%5%$%H$N%/%m!<%-%s%0D4::!$(B"
$BBh(B21$B2s>pJs2J3X5;=Q%U%)!<%i%`!J(BFIT2022$B!K9V1iO@J8=8!$Bh(B4$BJ,:}!$(Bpp.9-16$B!$(B(9, 2022)$B!%!J(BFIT$BA%0f%Y%9%H%Z!<%Q!<>^(B $B^!K(B
$B;0LZ(B $B2mEP!$;3Fb(B $BMx9(!$(B
"IoT$B5!4o$K$*$1$k%;%-%e%"(BOS$B$NE,MQ2DH]$HJ]8n5!G=$NI>2A!$(B"
$BBh(B21$B2s>pJs2J3X5;=Q%U%)!<%i%`!J(BFIT2022$B!K9V1iO@J8=8!$Bh(B4$BJ,:}!$(Bpp.147-150$B!$(B(9, 2022).
Shota Fujii, Nobutaka Kawaguchi, Tomohiro Shigemoto, Toshihiro Yamauchi,
"Towards (Re)constructing Attack Flow from Threat Report,"
31st USENIX Security Symposium Poster Session (USENIX Security '22 Posters), (8, 2022).
Yutaro Osako, Toshihiro Yamauchi, Katsunari Yoshioka, Takuya Fujihashi, Takashi Watanabe, Shunsuke Saruwatari,
"Visualization Result of String-based CPU Architecture Independent IoT Malware Clustering,"
Network and Distributed System Security Symposium (NDSS 2022), poster, (4, 2022).
$B3kLn90
$B>pJs=hM}3X2q8&5fJs9p(B, vol.2022-CSEC-96, no.14, pp.1-8 (3, 2022).
$BBh(B190$B2s%^%k%A%a%G%#%"DL?.$HJ,;6=hM}!&Bh(B96$B2s%3%s%T%e!<%?%;%-%e%j%F%#9gF18&5fH/I=2q(B
$BGr@P<~8k!$5H85N
"$B%=%U%H%&%'%":9J,$KCeL\$7$?(BIoT$B5!4o%5%W%i%$%A%'!<%s%;%-%e%j%F%#>e$N2]BjH/8+$HBg5,LO
$BEE;R>pJsDL?.3X2q(B $BBh(B58$B2s>pJsDL?.%7%9%F%`%;%-%e%j%F%#8&5f2q!J(BICSS 2021$BG/EY8&5f>^(B $B^!K(B
$BF#0f(B $BfFB@!$@n8}(B $B?.N4!$>.Eg(B $B>-Lm!$NkLZ(B $BCRLi!$;3Fb(B $BMx9(!$(B
"$B@5>oDL?.$X$N1F6A$r9MN8$7$?(BURL$B%7%0%M%A%c$N<+F0@8@.$*$h$S1F6AI>2A%7%9%F%`$N@_7W$H
2022$BG/EE;R>pJsDL?.3X2qAm9gBg2q(B
$BCgB<(B $BN
"$B4F;k%W%m%0%i%`$N%G%P%C%0%l%8%9%?MxMQ$r(BAP$B$+$i1#JC$9$k
$BEE;R>pJsDL?.3X2q(B 2022$BG/Am9gBg2q(B $B>pJs!&%7%9%F%`9V1iO@J8=8(B1, p.48 (3, 2022).
$BEE;R>pJsDL?.3X2q(B 2022$BG/Am9gBg2q(B
$BNS(B $BN$:i!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender$B$K$*$1$k;q8;%W!<%kMxMQ2DH]5!G=$NI>2A!$(B"
$B>pJs=hM}3X2qBh(B84$B2sA49qBg2q9V1iO@J8=8(B, vol.2022, no.1, pp.117-118 (2, 2022).
$B>pJs=hM}3X2qBh(B84$B2sA49qBg2q(B
$B3[ED(B $BE/>4!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B4xH/@-(B/$BIT4xH/@-%a%b%j$N%"%/%;%9B.EY:9$r9MN8$7$?(BOFF2F$B$N@-G=M=B,!$(B"
$B>pJs=hM}3X2qBh(B84$B2sA49qBg2q9V1iO@J8=8(B, vol.2022, no.1, pp.121-122 (2, 2022).
$B>pJs=hM}3X2qBh(B84$B2sA49qBg2q(B
$BEgC+(B $BH;@8!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B2>A[7W;;5!>e(BOS$B$H(BVMM$B4V$N@)8f0\9T$KCeL\$7$?@-G=I>2A!$(B"
$B>pJs=hM}3X2qBh(B84$B2sA49qBg2q9V1iO@J8=8(B, vol.2022, no.1, pp.119-120 (2, 2022).
$B>pJs=hM}3X2qBh(B84$B2sA49qBg2q(B
$BF#0f(B $BfFB@!$;34_(B $BNb!$;3Fb(B $BMx9(!$(B
"$B%*%s%i%$%s%5%s%I%\%C%/%9$K$*$1$k(BMITRE ATT&CK$B%^%C%T%s%05!G=$K78$k
$B0KF#(B $B42;K!$CfB<(B $BE0!$0k86(B $BN4>-!$;3Fb(B $BMx9(!$(B
"VMM$B$rMQ$$$?%W%m%0%i%`
2022$BG/0E9f$H>pJs%;%-%e%j%F%#%7%s%]%8%&%`!J(BSCIS2022$B!KO@J8=8!$EE;RG^BN!$(B(1, 2022)$B!%(B
Yuta Imamura, Rintaro Orito, Hiroyuki Uekawa, Kritsana Chaikaew, Pattara Leelaprute, Masaya Sato, Toshihiro Yamauchi,
"Web Access Monitoring Mechanism via Android WebView for Threat Analysis,"
International Journal of Information Security, Vol.20, Issue 6, pp.833-847, Springer Nature, (12, 2021).
https://doi.org/10.1007/s10207-020-00534-3
$B;3Fb(B $BMx9(!$(B
"$B%9%^!<%H%U%)%sC
$B6bM;8&5f!$Bh(B40$B4,!$Bh(B4$B9f!$(Bpp.25-54$B!$F|K\6d9T6bM;8&5f=j!$(B(10, 2021)$B!%(B
$B@P86(B $B@;!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$(B
"$B0-@-(BWeb$B%5%$%H$NC5:w$K$h$k%b%P%$%k8~$1%V%i%C%/%j%9%H9=C[
https://doi.org/10.20729/00212759
Hiroki Kuzuno, Toshihiro Yamauchi,
"Mitigation of Kernel Memory Corruption Using Multiple Kernel Memory Mechanism,"
IEEE Access, vol.9, pp.111651-111665, (8, 2021).
https://doi.org/10.1109/ACCESS.2021.3101452
Toshihiro Yamauchi, Yohei Akao, Ryota Yoshitani, Yuichi Nakamura, Masaki Hashimoto,
"Additional Kernel Observer: Privilege Escalation Attack Prevention Mechanism Focusing on System Call Privilege Changes,"
International Journal of Information Security, vol.20, Issue 4, pp.461-473, (8, 2021).
https://doi.org/10.1007/s10207-020-00514-7
$BC+8}(B $B=(IW!$;3Fb(B $BMx9(!$EDB<(B $BBg!$(B
"$B%W%m%;%9@8@.$r9bB.2=$9$k;q8;%W!<%k5!G=$N
$B>pJs=hM}3X2qO@J8;o!$(BVol.62$B!$(BNo.2$B!$(Bpp.443-454$B!$(B(2, 2021)$B!%(B
https://doi.org/10.20729/00209316
Kohei Otani, Toshiki Okazaki, Toshihiro Yamauchi, Hideaki Moriyama, Masaya Sato, Hideo Taniguchi,
"Function for Tracing Diffusion of Classified Information to Support Multiple VMs with KVM,"
8th International Workshop on Information and Communication Security (WICS2021),
Proceedings of 2021 Nineth International Symposium on Computing and Networking Workshops (CANDARW2021), pp.352-358 (11, 2021).
https://doi.org/10.1109/CANDARW53999.2021.00066
Hiroki Kuzuno, Toshihiro Yamauchi,
"KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption,"
The 16th International Workshop on Security (IWSEC 2021),
Lecture Notes in Computer Science (LNCS), vol.12835, pp.45-63, (9, 2021).
https://doi.org/10.1007/978-3-030-85987-9_3 (Best Paper Award)
Toru Nakamura, Hiroshi Ito, Shinsaku Kiyomoto, Toshihiro Yamauchi,
"(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring,"
The 16th International Workshop on Security (IWSEC 2021),
Lecture Notes in Computer Science (LNCS), vol.12835, pp.64-73, (9, 2021).
https://doi.org/10.1007/978-3-030-85987-9_4
Koki Kusunoki, Toshihiro Yamauchi, Hideo Taniguchi,
"Physical Memory Management with Two Page Sizes in Tender OS,"
The 10th International Workshop on Advances in Data Engineering and Mobile Computing (DEMoC-2021),
Advances in Networked-Based Information Systems, NBiS 2021, Lecture Notes in Networks and Systems, vol.313, pp.238-248, (9, 2021).
https://doi.org/10.1007/978-3-030-84913-9_22
Toshihiro Yamauchi, Ryota Yoshimoto, Takahiro Baba, Katsunari Yoshioka,
"Analysis of commands of Telnet logs illegally connected to IoT devices,"
12th International Conference on E-Service and Knowledge Management (ESKM 2021), poster,
Proceedings of 2021 10th International Congress on Advanced Applied Informatics (IIAI-AAI 2021), pp.913-915, (7, 2021).
https://doi.org/10.1109/IIAI-AAI53430.2021.00160
Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi,
"Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM,"
The 9th International Workshop on Advances in Data Engineering and Mobile Computing (DEMoC-2020),
Advances in Networked-Based Information Systems, NBiS 2020, Advances in Intelligent Systems and Computing, vol.1264, pp.338-349, Springer, Cham, (1, 2021).
https://doi.org/10.1007/978-3-030-57811-4_32
$BGO>l(B $BN442!$GO>l(B $B8,2p!$5H2,(B $B9n@.!$;3Fb(B $BMx9(!$(B
"IoT$B5!4o$X$N(BTelnet$B@\B3%m%0$N%3%^%s%I$KCeL\$7$?%/%i%9%?%j%s%0$K$h$kJ,@O!$(B"
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2021 (CSS2021) $BO@J8=8!$(Bvol.2021$B!$(Bpp.692-696$B!$(B(10, 2021)$B!%(B
$BBgC+(B $B9RJ?!$;3Fb(B $BMx9(!$?9;3(B $B1QL@!$:4F#(B $B>-Li!$C+8}(B $B=(IW!$(B
"$B%^%k%A%3%"$GF0:n$9$k(BVM$B$KBP1~$7$?(BKVM$B>e$N5!L)>pJs$N3H;6DI@W5!G=$NI>2A!$(B"
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2021 (CSS2021) $BO@J8=8!$(Bvol.2021$B!$(Bpp.403-410$B!$(B(10, 2021)$B!%(B
$B
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2021 (CSS2021) $BO@J8=8!$(Bvol.2021$B!$(Bpp.661-667$B!$(B(10, 2021)$B!%(B
$B3kLn(B $B90
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2021 (CSS2021) $BO@J8=8!$(Bvol.2021$B!$(Bpp.647-654$B!$(B(10, 2021)$B!%(B
$BF#0f(B $BfFB@!$@n8}(B $B?.N4!$=EK\(B $BNQ9(!$;3Fb(B $BMx9(!$(B
"$B5!3#3X=,$rMQ$$$?(BCyber Threat Intelligence $B$N9=B$2=$H2#CGE*J,@O!$(B"
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2021 (CSS2021) $BO@J8=8!$(Bvol.2021$B!$(Bpp.906-913$B!$(B(10, 2021).$B!J(BCSS2021 $BM%=(O@J8>^(B $B^!K(B
$BF#0f(B $BfFB@!$:4F#(B $BN49T!$@DLZ(B $BfF!$DEED(B $BPR!$@n8}(B $B?.N4!$(B $B=EK\(B $BNQ9(!$;{ED(B $B??IR!$(B
"$B0-@-%[%9%H$NB?5rE@$+$i$N7QB3E*$J4QB,$K4p$E$/;~7ONs$*$h$SCO0h@-$NJ,@O!$(B"
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2021 (CSS2021) $BO@J8=8!$(Bvol.2021$B!$(Bpp.357-364$B!$(B(10, 2021)$B!%(B
$BBgGw(B $BM&B@O:!$;3Fb(B $BMx9(!$5H2,(B $B9n@.!$F#66(B $BBnLi!$EOJU(B $B>0!$1nEO(B $B=S2p!$(B
"IoT$B%^%k%&%'%"$NJ,N`J}K!$K4X$9$k8!F$!$(B"
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2021 (CSS2021) $BO@J8=8!$(Bvol.2021$B!$(Bpp.697-704$B!$(B(10, 2021)$B!%(B
$B8VED(B $B;V>k!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender$B$K$*$1$k%W%m%;%94VDL?.%G!<%?0h$rMxMQ$7$?%3%s%F%J%\%C%/%9DL?.$N@-G=J,@O!$(B"
2021$BG/EYEE5$!&>pJs4XO"3X2qCf9q;YItBh(B72$B2sO"9gBg2q!$EE;RG^BN!$(B(10, 2021)$B!%(B
Shugo Shiraishi, Akifumi Fukumoto, Ryota Yoshimoto, Eitaro Shioji, Mitsuaki Akiyama, Toshihiro Yamauchi,
"Large-scale Survey on Secure Development of IoT Devices by Software Analysis and Vendor Interview,"
The 16th International Workshop on Security (IWSEC 2021), Invited session (9, 2021).
$B3kLn(B $B90
$BBh(B20$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT2021) $B9V1iO@J8=8!$Bh(B4$BJ,:}!$(Bpp.21-28$B!$(B(8, 2021)$B!%(B
$BGO>l(B $BN442!$GO>l(B $B8,2p!$;3Fb(B $BMx9(!$(B
"$B%O%C%7%e4X?t$NFCD'$rMQ$$$??
$BEgC+(B $BH;@8!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$:4F#(B $B>-Li!$(B
"NUMA$B9=@.$N7W;;5!$K$*$1$k%a%b%jA`:nB.EY$KCeL\$7$?I>2A!$(B"
$BBh(B20$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT2021) $B9V1iO@J8=8!$Bh(B1$BJ,:}!$(Bpp.169-170$B!$(B(8, 2021)$B!%(B
$BNS(B $BN$:i!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender$B$K$*$1$k;q8;%W!<%k5!G=$NA*BrMxMQJ}<0!$(B"
$BBh(B20$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT2021) $B9V1iO@J8=8!$Bh(B1$BJ,:}!$(Bpp.171-172$B!$(B(8, 2021)$B!%(B
$B3[ED(B $BE/>4!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B5<;wIT4xH/@-%a%b%j$rMQ$$$?(BOFF2F$B%W%m%0%i%`$NI>2A!$(B"
$BBh(B20$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT2021) $B9V1iO@J8=8!$Bh(B1$BJ,:}!$(Bpp.173-174$B!$(B(8, 2021)$B!%(B(FIT$B>)Ne>^(B $B^(B)
$B;T2,(B $B=(0l!$;0B<(B $BN4IW!$CfEh(B $B=_!$;3Fb(B $BMx9(!$(B
"Twitter$B$G<}=8$5$l$?(BAndroid$B%"%W%j$N%"%/%;%7%S%j%F%#%5!<%S%9$NMxMQN($H(BAPI Level$B$NJ,@O!$(B"
$BEE;R>pJsDL?.3X2q(B $BBh(B56$B2s>pJsDL?.%7%9%F%`%;%-%e%j%F%#8&5f2q(B (ICSS)$B!$EE;R>pJsDL?.3X2q5;=Q8&5fJs9p!$(Bvol.121$B!$(Bno.122$B!$(Bpp.141-146$B!$(B(7, 2021)$B!%(B
$B;3Fb(B $BMx9(!$5H85(B $BN
"LKM$B$r2p$7$?(BSeccomp$B%U%#%k%?$NE,MQ$K$h$k%"%/%;%9@)8f
$B>pJs=hM}3X2qBh(B93$B2s(BCSEC$B!&Bh(B53$B2s(BIOT$B9gF18&5fH/I=2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2021-CSEC-93$B!$(Bno.12$B!$(Bpp.1-6$B!$(B(5, 2021)$B!%(B
$B;3Fb(B $BMx9(!$5H85(B $BN
"IoT$B5!4o$X$NIT@5$J(BTelnet$B@\B3%m%0$N%3%^%s%I$KCeL\$7$?J,@O!$(B"
$B>pJs=hM}3X2qBh(B83$B2sA49qBg2q!$>pJs=hM}3X2qBh(B83$B2sA49qBg2q9V1iO@J8=8!$Bh(B3$BJ,:}!$(Bpp.393-394$B!$(B(3, 2021)$B!%(B
$B@nEg(B $B@iL@!$;T2,(B $B=(0l!$;3Fb(B $BMx9(!$(B
"Android$B$K$*$1$kA+0\85(BWeb$B%5%$%H$+$iMxMQ
$BF#0f(B $BfFB@!$@n8}(B $B?.N4!$=EK\(B $BNQ9(!$;3Fb(B $BMx9(!$(B
"Cyber Threat Intelligence$B$N9=B$2=$K$h$kJ,@O;Y1g
$B3kLn(B $B90
$BEE;R>pJsDL?.3X2q(B $BBh(B54$B2s>pJsDL?.%7%9%F%`%;%-%e%j%F%#8&5f2q(B(ICSS)$B!$EE;R>pJsDL?.3X2q5;=Q8&5fJs9p!$(Bvol.120$B!$(Bno.384$B!$(Bpp.138-143$B!$(B(3, 2021)$B!%(B
$BFo(B $B9151!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender$B$K$*$1$k(B2$B
$BEDCf(B $B2mBg!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B7W;;5!>uBV$N9bB.$JJ]B8$HI|85$r2DG=$K$9$kIT4xH/@-%a%b%j8~$1(BTender$B$N%W%l!<%H5!G=$N
$B@P86(B $B@;!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$(B
"$BZ
2021$BG/0E9f$H>pJs%;%-%e%j%F%#%7%s%]%8%&%`!J(BSCIS2021$B!KO@J8=8!$EE;RG^BN!$(B(1, 2021)$B!%(B
$B0KF#(B $B42;K!$CfB<(B $BE0!$@6K\(B $B?8:n!$;3Fb(B $BMx9(!$(B
"VMM$B$K$h$k%W%m%0%i%`
$BJ!K\(B $B=_J8!$;3Fb(B $BMx9(!$(B
"KVM$B>e$N%2%9%H(BOS$B$K$*$1$k8"8B$NJQ99$KCeL\$7$?8"8B>:3J967bKI;_
http://doi.org/10.20729/00206800
$Bc7F#(B $BN?Li!$;3Fb(B $BMx9(!$(B
"SELinux CIL$B$rMxMQ$7$?ITMW$J%;%-%e%j%F%#%]%j%7:o8:
http://doi.org/10.20729/00206801
$B5HC+(B $BN
http://doi.org/10.20729/00206802
Hiroki Kuzuno, Toshihiro Yamauchi,
"Identification of Kernel Memory Corruption Using Kernel Memory Secret Observation Mechanism,"
IEICE Transactions on Information and Systems, vol.E103-D, no.7,
pp.1462-1475, (7, 2020).
https://doi.org/10.1587/transinf.2019ICP0011
$B>e@n(B $B@hG7!$=);3(B $BK~>
"Proxy$B%*%V%8%'%/%H$rMQ$$$?2r@OK832(BJavaScript$B%3!<%I2r@O;Y1g%7%9%F%`$N
http://doi.org/10.20729/00204778
$B;3Fb(B $BMx9((B,
"$BBh(B3$BJT!=>pJs5;=Q$NH/E8$HE8K>(B $B!N(BCSEC$B!O%3%s%T%e!<%?%;%-%e%j%F%#8&5f2q!$(B"
$B>pJs=hM}3X2q(B60$BG/$N$"$f$_!$(B(2020)$B!%(B
Takashi Ishihara, Masaya Sato, Toshihiro Yamauchi,
"Method of Generating a Blacklist for Mobile Devices by Searching Malicious Websites,"
7th International Workshop on Information and Communication Security (WICS2020),
Proceedings of 2020 Eighth International Symposium on Computing and Networking Workshops (CANDARW 2020), pp.328-333 (11, 2020).
https://doi.org/10.1109/CANDARW51189.2020.00070
Shota Fujii, Takayuki Sato, Sho Aoki, Yu Tsuda, Yusuke Okano, Tomohiro Shigemoto, Nobutaka Kawaguchi, Masato Terada,
"POSTER: Continuous and Multiregional Monitoring of Malicious Hosts,"
The 27th ACM Conference on Computer and Communications Security (CCS 2020),
Proceedings of the 2020 ACM SIGSAC Conference on Computer and
Communications Security (CCS 2020), pp.2101-2103 (10, 2020).
https://doi.org/10.1145/3372297.3420018
Hiroki Kuzuno, Toshihiro Yamauchi,
"MKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption,"
15th International Workshop on Security (IWSEC 2020),
Lecture Notes in Computer Science (LNCS), vol.12231, pp.97-116 (9, 2020).
https://doi.org/10.1007/978-3-030-58208-1_6
Shuichi Ichioka, Estelle Pouget, Takao Mimura, Jun Nakajima, Toshihiro Yamauchi,
"Accessibility Service Utilization Rates in Android Applications Shared on Twitter,"
The 21st World Conference on Information Security Applications (WISA 2020),
Lecture Notes in Computer Science (LNCS), vol.12583, pp.101-111 (8, 2020).
https://doi.org/10.1007/978-3-030-65299-9_8
$B@^8M(B $Bt%B@O:!$:4F#(B $B>-Li!$G_K\(B $B=S!$CfEh(B $B=_!$;3Fb(B $BMx9(!$(B
"URL$B%P!<$N@Z$jBX$o$j4V3V$KCeL\$7$?0U?^$7$J$$(BWeb$B%5%$%HA+0\$N8!CN
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2020 (CSS2020) $BO@J8=8!$(Bpp.9-16$B!$(B(10, 2020)$B!%(B(CSS2020 $B3X@8O@J8>^(B $B^(B)
$B@P86(B $B@;!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$(B
"$B0-@-(BWeb$B%5%$%H$NC5:w$K$h$k%b%P%$%k8~$1%V%i%C%/%j%9%H9=C[
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2020 (CSS2020) $BO@J8=8!$(Bpp.21-28$B!$(B(10, 2020)$B!%(B
$B;T2,(B $B=(0l!$@nEg(B $B@iL@!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$(B
"Android$B$K$*$1$k0-@-(BWeb$B%5%$%H%"%/%;%9$N2D;k2=
$B3kLn(B $B90
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2020 (CSS2020) $BO@J8=8!$(Bpp.859-866$B!$(B(10, 2020)$B!%(B
$BGr@P(B $B<~8k!$J!K\(B $B=_J8!$5H85(B $BN
"$B%=%U%H%&%'%"2r@O$H%Y%s%@%$%s%?%S%e!<$K$h$k(BIoT$B5!4o$N%;%-%e%j%F%#$K4X$9$kBg5,LO
$BFo(B $B9151!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender $B$K$*$1$k;q8;!V
2020$BG/EYEE5$!&>pJs4XO"3X2qCf9q;YItBh(B71$B2sO"9gBg2q!$EE;RG^BN!$(B(10, 2020)$B!%(B
$B3kLn(B $B90
$BBh(B19$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT2020) $B9V1iO@J8=8!$Bh(B4$BJ,:}!$(Bpp.1-6$B!$(B(9, 2020)$B!%(B(FIT$BO@J8>^(B $B^(B)
Takashi Ishihara, Masaya Sato, Toshihiro Yamauchi,
"Method of Generating a Blacklist for Mobile Devices by Searching Malicious Websites,"
The 21st World Conference on Information Security Applications (WISA2020), poster$B!$(B(8, 2020).
$BMxJf(B $BFz4u!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender $B$K$*$1$k;q8;!VF~=PNO!W$N%9%k!<%W%C%H8~>e
$B;T2,(B $B=(0l!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$(B
"Android WebView$B$K$*$1$kMxMQ
$B>>2<(B $B1MM$!$;3Fb(B $BMx9(!$(B
"Seccomp$B$rMxMQ$7$?(BIoT$B5!4o$N%;%-%e%j%F%#5!G=$N8~>e
$B0KF#(B $B42;K!$CfB<(B $BE0!$66K\(B $B??9,!$;3Fb(B $BMx9(!$(B
"$B2>A[7W;;5!%b%K%?$K$h$k%W%m%0%i%`
2020$BG/EE;R>pJsDL?.3X2qAm9gBg2q(B $B>pJs!&%7%9%F%`9V1iO@J8=8(B2$B!$(Bpp.119$B!$(B(3, 2020)$B!%(B
$BNS(B $BN$:i!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender $B$N;q8;%W!<%k5!G=$K$*$1$k;q8;NL$N2D;k2=5!G=!$(B"
$B>pJs=hM}3X2qBh(B82$B2sA49qBg2q!$>pJs=hM}3X2qBh(B82$B2sA49qBg2q9V1iO@J8=8!$Bh(B1$BJ,:}!$(Bpp.39-40$B!$(B(3, 2020)$B!%(B
$BFo(B $B9151!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender $B$K$*$1$k;q8;!V
$B>pJs=hM}3X2qBh(B82$B2sA49qBg2q!$>pJs=hM}3X2qBh(B82$B2sA49qBg2q9V1iO@J8=8!$Bh(B1$BJ,:}!$(Bpp.51-52$B!$(B(3, 2020)$B!%(B
$B@P86(B $B@;!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$(B
"$B0-@-(BWeb$B%5%$%H$NC5:w$K$h$k%b%P%$%k8~$1%V%i%C%/%j%9%H9=C[
$B>pJs=hM}3X2qBh(B82$B2sA49qBg2q!$>pJs=hM}3X2qBh(B82$B2sA49qBg2q9V1iO@J8=8!$Bh(B3$BJ,:}!$(Bpp.441-442$B!$(B(3, 2020)$B!%(B($B>pJs=hM}3X2q(B $BBh(B82$B2sA49qBg2q(B $B3X@8>)Ne>^(B $B^(B)
$BGr@P(B $B<~8k!$J!K\(B $B=_J8!$1v<#(B $B\FB@O/!$=);3(B $BK~>
"$B%U%!!<%`%&%'%"$KCeL\$7$?(BIoT$B5!4o$N%;%-%e%j%F%#5!G=$ND4::!$(B"
$BEE;R>pJsDL?.3X2q(B $BBh(B50$B2s>pJsDL?.%7%9%F%`%;%-%e%j%F%#8&5f2q(B(ICSS)$B!$EE;R>pJsDL?.3X2q5;=Q8&5fJs9p!$(Bvol.119$B!$(Bno.437$B!$(Bpp.37-42$B!$(B(3, 2020)$B!%(B
$BF#8M(B $B9(MN!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%^%k%A%3%"(BTender $B$K$*$1$k%3%"4V1s3V
$B@^8M(B $Bt%B@O:!$@P86(B $B@;!$:4F#(B $B>-Li!$G_K\(B $B=S!$CfEh(B $B=_!$;3Fb(B $BMx9(!$(B
"Android$B$K$*$1$k(BURL$B%P!<$N@Z$jBX$o$j4V3V$KCeL\$7$?MxMQ
2020$BG/0E9f$H>pJs%;%-%e%j%F%#%7%s%]%8%&%`!J(BSCIS2020$B!KO@J8=8!$EE;RG^BN!$(B(1, 2020)$B!%(B
$B;3ED(B $BL@!$:4Ln(B $B0<2;!$7&ED(B $BJb!$V:ED(B $B0lO:!$CfEh(B $B=_!$5H2,(B $B9n@.!$@%Hx(B $B9@FsO:!$K~J](B $B2m9@!$:4F#(B $B>-Li!$(B
$B>>B<(B $BNi1{!$EDJU(B $BN\0N!$>._7(B $B@?0l!$EDCf(B $BfF??!$G_K\(B $B=S!$>>ED(B $BAT!$;3Fb(B $BMx9(!$_7C+(B $B@c;R!$(B
"$B%9%^!<%H%U%)%s$K$*$1$k(BWeb$BG^2p7?%5%$%P!<967b$N4QB,5!9=!'@_7W$H
$B;3Fb(B $BMx9(!$J!Eg(B $BM-51!$G5B<(B $BG=@.!$C+8}(B $B=(IW!$(B
"AnT $B%*%Z%l!<%F%#%s%0%7%9%F%`$K$*$1$k(BLinux$BF~=PNOA`:n5!G=$NMxMQ
$B;3K\(B $B>;@8!$CfEg(B $B9LB@!$;3Fb(B $BMx9(!$L>8E20(B $B>4!$C+8}(B $B=(IW!$(B
"$B2>A[7W;;5!$rMxMQ$7$?@-G=%W%m%U%!%$%j%s%0%7%9%F%`$NJ,;62=$H%G!<%?<}=8Dd;_;~4V$NC;=L!$(B"
$BEE;R>pJsDL?.3X2qO@J8;o(BD$B!$(BVol.J102-D$B!$(BNo.10$B!$(Bpp.674-684$B!$(B(10, 2019)$B!%(B
https://doi.org/10.14923/transinfj.2018JDP7035
Masaya Sato, Hideo Taniguchi, Toshihiro Yamauchi,
"Design and Implementation of Hiding Method for File Manipulation of Essential Services by System Call Proxy using Virtual Machine Monitor$B!$(B"
International Journal of Space-Based and Situated Computing, vol.9, no.1, pp.1-10, (5, 2019).
https://doi.org/10.1504/IJSSC.2019.100007
$B:4F#(B $B>-Li!$C+8}(B $B=(IW!$B<2,(B $BM&4u!$;3Fb(B $BMx9(!$(B
"OS$B=hM}$NJ,;6
$B>pJs=hM}3X2qO@J8;o!$(BVol.60, No.2, pp.430-439, (2, 2019)$B!%(B
$B;3Fb(B $BMx9(!$;~>>(B $BM&2p!$C+8}(B $B=(IW!$(B
"$B2DMQ@-$r9MN8$7$?%W%m%;%9$NJ#@=$K$h$k%i%$%V%U%)%l%s%8%C%/
Yuta Imamura, Rintaro Orito, Kritsana Chaikaew, Celia Manardo, Pattara Leelaprute, Masaya Sato, Toshihiro Yamauchi,
"Threat Analysis of Fake Virus Alerts Using WebView Monitor,"
The Seventh International Symposium on Computing and Networking,
Proceedings of 2019 Seventh International Symposium on Computing and Networking (CANDAR 2019), pp.28-36, (11, 2019).
https://doi.org/10.1109/CANDAR.2019.00012
Hiroki Kuzuno, Toshihiro Yamauchi,
"KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism,"
The 15th International Conference on Information Security Practice and Experience (ISPEC 2019),
Lecture Notes in Computer Science (LNCS), vol.11879, pp.75-94, (11, 2019).
https://doi.org/10.1007/978-3-030-34339-2_5
Masaya Sato, Yuta Imamura, Rintaro Orito, Toshihiro Yamauchi,
"(Short Paper) Method for Preventing Suspicious Web Access in Android WebView,"
The 14th International Workshop on Security (IWSEC 2019),
Lecture Notes in Computer Science (LNCS), vol.11689, pp.241-250, (8, 2019).
https://doi.org/10.1007/978-3-030-26834-3_14
$BJ!K\(B $B=_J8!$;3Fb(B $BMx9(!$(B
"$BC10l%U%C%/%]%$%s%H$N%2%9%H(BOS$B4F;k$K$h$k8!CN2DG=$J8"8B>:3J967b$N3HBg$H%*!<%P%X%C%I:o8:$N
$B5HC+(B $BN
$B3kLn(B $B90
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2019 (CSS2019) $BO@J8=8!$(Bpp.660-667$B!$(B(10, 2019).
$Bc7F#(B $BN?Li!$;3Fb(B $BMx9(!$(B
"typeattributeset$B@k8@$NCV$-49$($K$h$k(BSELinux$B$NITMW$J%]%j%7$N:YN3EY$J:o8:
$BMxJf(B $BFz4u!$@^8M(B $Bt%B@O:!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$(B
"Android$B$rBP>]$H$7$?MxMQ
$B@^8M(B $Bt%B@O:!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$(B
"Android$B$K$*$1$k(BURL$B%P!<$N@Z$jBX$o$j4V3V$KCeL\$7$?MxMQ
$B@P86(B $B@;!$@^8M(B $Bt%B@O:!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$(B
"$B%b%P%$%k8~$10-@-(BWeb$B%5%$%H$NC5:w$K$h$k%V%i%C%/%j%9%H9=C[
$B?9;3(B $B1QL@!$;3Fb(B $BMx9(!$:4F#(B $B>-Li!$C+8}(B $B=(IW!$(B
"$B5!L)>pJs$N3H;6DI@W5!G=$K$*$1$k%m%0I=<(5!G=$N
$BF#8M(B $B9(MN!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%^%k%A%3%"(BTender$B$N%3%"4V1s3V
$BEDCf(B $B2mBg!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$BIT4xH/@-%a%b%j$rMxMQ$7$?(BTender$B$K$*$1$kF0:n7QB3@)8f$N4pK\I>2A!$(B"
$BBh(B18$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT2019) $B9V1iO@J8=8!$Bh(B1$BJ,:}!$(Bpp.159-160$B!$(B(9, 2019).
$B3kLn(B $B90
$BBh(B18$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT2019) $B9V1iO@J8=8!$Bh(B4$BJ,:}!$(Bpp.9-16$B!$(B(9, 2019).$B!J(BFIT$BO@J8>^(B $B^!K(B
$B@^8M(B $Bt%B@O:!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$(B
"Android$B8~$1%;%-%e%j%F%#%"%W%j$K$*$1$k0-@-(BWeb$B%5%$%H8!CNN($ND4::!$(B"
$BBh(B18$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT2019) $B9V1iO@J8=8!$Bh(B4$BJ,:}!$(Bpp.181-182$B!$(B(9, 2019).
$BJ!K\(B $B=_J8!$;3Fb(B $BMx9(!$(B
"KVM$B>e$N%2%9%H(BOS$B$K$*$1$k8"8B$NJQ99$KCeL\$7$?8"8B>:3J967bKI;_
$BBh(B18$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT2019) $B9V1iO@J8=8!$Bh(B4$BJ,:}!$(Bpp.187-188$B!$(B(9, 2019).
$B5HC+(B $BN
$BBh(B18$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT2019) $B9V1iO@J8=8!$Bh(B4$BJ,:}!$(Bpp.189-190$B!$(B(9, 2019).
$Bc7F#(B $BN?Li!$;3Fb(B $BMx9(!$(B
"SELinux CIL$B$rMxMQ$7$?ITMW$J%]%j%7$N:o8:8z2L$NI>2A!$(B"
$BBh(B18$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT2019) $B9V1iO@J8=8!$Bh(B4$BJ,:}!$(Bpp.205-206$B!$(B(9, 2019).
Rintaro Orito, Koki Riho, Yuta Imamura, Masaya Sato, Toshihiro Yamauchi,
"Threat Analysis of Fake Virus Alerts by Using Web Access Monitoring Mechanism for Android WebView,"
The 14th International Workshop on Security (IWSEC 2019), poster (8, 2019).
Hiroki Kuzuno, Toshihiro Yamauchi,
"Kernel Memory Inspection Capability for Malicious Kernel Module Detection,"
The 14th International Workshop on Security (IWSEC 2019), Invited session (8, 2019).
$BEDCf(B $B2mBg!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$BIT4xH/@-%a%b%j$rMxMQ$7$?(BTender$B$K$*$1$kF0:n7QB3@)8f$N
$B;3Fb(B $BMx9(!$(B
"$B4pHW%=%U%H%&%'%"$K$*$1$k%;%-%e%j%F%#5;=Q!$(B"
$BBh(B1$B2s(B ATR-KDDI$BAm9g8&5f=j%;%-%e%j%F%#5;=Q%;%_%J!<(B, (6, 2019)$B!%(B
$B?9;3(B $B1QL@!$;3Fb(B $BMx9(!$:4F#(B $B>-Li!$C+8}(B $B=(IW!$(B
"$B5!L)>pJs$N3H;6DI@W5!G=$K$*$1$k%?%$%`%j!<$J4IM}BP>]GD0.K!!$(B"
$B>pJs=hM}3X2qBh(B81$B2sA49qBg2q9V1iO@J8=8Bh(B1$BJ,:}!$(Bpp.25-26, (3$B!$(B2019)$B!%(B
$B2,:j(B $B=S
"KVM$B$K$*$1$k5!L)>pJs$N3H;6DI@W5!G=$rMQ$$$?J#?t(BVM$B4F;k
$B>pJs=hM}3X2qBh(B81$B2sA49qBg2q9V1iO@J8=8Bh(B3$BJ,:}!$(Bpp.429-430, (3$B!$(B2019)$B!%(B
$BK\ED(B $B>"!$?9;3(B $B1QL@!$;3Fb(B $BMx9(!$(B
"KVM$B$K$*$1$k5!L)>pJs$N3H;6DI@W5!G=$r;Y1g$9$k2D;k2=5!9=$N8!F$!$(B"
$B>pJs=hM}3X2qBh(B81$B2sA49qBg2q9V1iO@J8=8Bh(B3$BJ,:}!$(Bpp.431-432, (3$B!$(B2019)$B!%(B
$B9SLZ(B $BNC!$?9;3(B $B1QL@!$;3Fb(B $BMx9(!$(B
"KVM$B$rMxMQ$7$?5!L)>pJs$N3H;6DI@W5!G=$K$*$1$k%U%!%$%k%Q%9
$B>pJs=hM}3X2qBh(B81$B2sA49qBg2q9V1iO@J8=8Bh(B3$BJ,:}!$(Bpp.433-434, (3$B!$(B2019)$B!%(B
$BJ!K\(B $B=_J8!$;3Fb(B $BMx9(!$(B
"KVM$B>e$N%2%9%H(BOS$B$K$*$1$k8"8B$NJQ99$KCeL\$7$?8"8B>:3J967bKI;_
$B3kLn(B $B90
$B>e86(B $B7L0lO:!$;3Fb(B $BMx9(!$(B
"$BFqFI2=(BJavaScript$B%3!<%I2r@O;Y1g%7%9%F%`$N<+F02=$N
$BF#8M(B $B9(MN!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%^%k%A%3%"(BTender$B$K$*$1$k%a%b%j$r2p$7$?1s3V
$B3{@8(B $BM*E_!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%^%k%A%3%"4D6-$K$*$1$k%9%1%8%e!<%iO"7H$K$h$kM%@hEY5UE>M^@)K!!$(B"
$BEE;R>pJsDL?.3X2qO@J8;o(BD$B!$(BVol.J101-D, No.6, pp.998-1008, (6, 2018)$B!%(B
https://doi.org/10.14923/transinfj.2017JDP7061
Naoki Kudo, Toshihiro Yamauchi, Thomas H. Austin,
"Access Control Mechanism to Mitigate Cordova Plugin Attacks in Hybrid Applications, "
Journal of Information Processing, Vol.26, pp.396-405, (5, 2018).
https://doi.org/10.2197/ipsjjip.26.396
$B2#;3(B $BOB=S!$EZC+(B $B>45A!$;3K\(B $B8w0l!$2OJU(B $B@?Lo!$;3Fb(B $BMx9(!$G5B<(B $BG=@.!$C+8}(B $B=(IW!$(B
"$B%G%#%l%/%H%jM%@hJ}<0$K$*$1$kL$;2>H%P%C%U%!?t$KCeL\$7$?F~=PNO%P%C%U%!J,3dK!!$(B"
$BEE;R>pJsDL?.3X2qO@J8;o(BD$B!$(Bvol.J101-D, no.1, pp.46-56, (1, 2018)$B!%(B
https://doi.org/10.14923/transinfj.2017SKP0012
Toshihiro Yamauchi, Yohei Akao, Ryota Yoshitani, Yuichi Nakamura and Masaki Hashimoto,
"Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes,"
the 2018 IEEE Conference on Dependable and Secure Computing,
Proceedings of the 2018 IEEE Conference on Dependable and Secure Computing (IEEE DSC 2018), pp.172-179, (12, 2018).
https://doi.org/10.1109/DESEC.2018.8625137
Masao Yamamoto, Kohta Nakashima, Toshihiro Yamauchi, Akira Nagoya, Hideo Taniguchi,
"Acceleration of Analysis Processing on Decentralized Performance Profiling System Using Virtual Machines,"
6th International Workshop on Computer Systems and Architecture (CSA2018),
Proceedings of 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW2018), pp.152-158, (11, 2018).
https://doi.org/10.1109/CANDARW.2018.00035
Yuya Ban, Toshihiro Yamauchi,
"Mitigating Use-After-Free Attack using Library Considering Size and Number of Freed Memory,"
5th International Workshop on Information and Communication Security (WICS 2018),
Proceedings of 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW), pp.398-404, (11, 2018).
https://doi.org/10.1109/CANDARW.2018.00080
Masaya Sato, Hideo Taniguchi, Toshihiro Yamauchi,
"Hiding File Manipulation of Essential Services by System Call Proxy,"
the 7th International Workshop on Advances in Data Engineering and Mobile Computing (DEMoC-2018),
Lecture Notes on Data Engineering and Communications Technologies, vol.22, pp.853-863, (9, 2018).
https://doi.org/10.1007/978-3-319-98530-5_76
Yuta Imamura, Hiroyuki Uekawa, Yasuhiro Ishihara, Masaya Sato, Toshihiro Yamauchi,
"Web Access Monitoring Mechanism for Android WebView,"
Australasian Information Security Conference (AISC 2018),
Proceedings of the Australasian Computer Science Week Multiconference (ACSW 2018), no.1, (1, 2018).
https://doi.org/10.1145/3167918.3167942 (AISC 2018 Best Paper Award)
$BC+8}(B $B=(IW!$5HED(B $BBY;0!$;3Fb(B $BMx9(!$:4F#(B $B>-Li!$(B
"$B2a5n$N(BNIC$BIi2Y$H%W%m%;%9$N%G!<%?Aw?.NL$r9MN8$7$?J#?t(BNIC$B4V$G$NIi2YJ,;6K!!$(B"
$BBh(B26$B2s%^%k%A%a%G%#%"DL?.$HJ,;6=hM}%o!<%/%7%g%C%W(B (DPSWS2018)$BO@J8=8!$(Bpp.68-73$B!$(B(11$B!$(B2018)$B!%(B
$B:#B<(B $BM4B@!$@^8M(B $Bt%B@O:!$(BChaikaew Kritsana$B!$(BManardo Celia$B!$(BLeelaprute Pattara$B!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$(B
"Android$B$K$*$1$k(BWebView$B$N(BWeb$B%"%/%;%94QB,5!9=$rMxMQ$7$?0-@-(BWeb$B%5%$%H$N6<0RJ,@O$HBP:v$NDs0F!$(B"
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2018 (CSS2018) $BO@J8=8!$(Bpp.137-144$B!$(B(10, 2018).
$Bc7F#(B $BN?Li!$;3Fb(B $BMx9(!$(B
"$B%m%0=PNO$NM^@)$K$h$k(BSELinux$B$NITMW$J%]%j%7:o8:
$B5HC+(B $BN
$B3kLn(B $B90
$B9)F#(B $B7r!$;3Fb(B $BMx9(!$(B
"$BF0:n%m%0$r3hMQ$7$?%^%k%&%'%"$N%/%i%9%?%j%s%0
$B?9;3(B $B1QL@!$;3Fb(B $BMx9(!$:4F#(B $B>-Li!$C+8}(B $B=(IW!$(B
"KVM$B$rMxMQ$7$?5!L)>pJs$N3H;6DI@W5!G=$K$*$1$k%U%!%$%k%"%/%;%9@-G=$NI>2A!$(B"
$BBh(B17$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT2018) $B9V1iO@J8=8!$Bh(B1$BJ,:}!$(Bpp.147-148$B!$(B(9, 2018).
$B:4F#(B $B>-Li!$C+8}(B $B=(IW!$;3Fb(B $BMx9(!$(B
"$B2>A[7W;;5!$rMQ$$$?=EMW%U%!%$%kJ]8n
$BBh(B17$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT2018) $B9V1iO@J8=8!$Bh(B4$BJ,:}!$(Bpp.171-172$B!$(B(9, 2018).
$B;3Fb(B $BMx9(!$(B
"$B%7%9%F%`%=%U%H%&%'%"$K$h$k%;%-%e%j%F%#5;=Q$N8&5f!$(B"
2018 IEEE SMC Hiroshima Chapter $B
$BF#8M(B $B9(MN!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%^%k%A%3%"(BTender$B$K$*$1$k%a%b%j$r2p$7$?1s3V
$B;{K\(B $BBgIw!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"OS$B%5!<%P=hM}$NIi2YJ,;6$r2DG=$K$9$k(BAnT $B$NMW5aH"DL?.5!G=!$(B"
2018$BG/JBNs(B/$BJ,;6(B/$B6(D4=hM}$K4X$9$k!X7'K\!Y%5%^!pJs=hM}3X2q8&5fJs9p!$(Bvol.2018-OS-144$B!$(Bno.6$B!$(Bpp.1-8$B!$(B(7, 2018)$B!%(B
$B5HC+(B $BN
$Bc7F#(B $BN?Li!$;3Fb(B $BMx9(!$(B
"SELinux CIL$B$rMxMQ$7$?ITMW$J%]%j%7:o8:
$BK\ED(B $B9I5.!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"AnT$B$NMW5aH"DL?.5!G=$rMxMQ$7$?=hM}$NB?=E2=!$(B"
$B>pJs=hM}3X2qBh(B80$B2sA49qBg2q9V1iO@J8=8Bh(B1$BJ,:}(B, pp.127-128$B!$(B(3, 2018).
$B?9;3(B $B1QL@!$;3Fb(B $BMx9(!$:4F#(B $B>-Li!$C+8}(B $B=(IW!$(B
"KVM$B$rMxMQ$7$?5!L)>pJs$N3H;6DI@W5!G=$K$*$1$k9bB.2=$NI>2A!$(B"
$B>pJs=hM}3X2qBh(B80$B2sA49qBg2q9V1iO@J8=8Bh(B1$BJ,:}!$(Bpp.1-2$B!$(B(3, 2018).
$B9BFb(B $B9d!$>e@n(B $B@hG7!$;3Fb(B $BMx9(!$(B
"$B%9%?%C%/NN0h$X$N%,!<%I%Z!<%8A^F~$K$h$kLa$j%"%I%l%9=q$-49$(KI;_
$BEDB<(B $BBg!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender$B%*%Z%l!<%F%#%s%0%7%9%F%`$N;q8;%W!<%k5!G=$NI>2A!$(B"
$B>pJs=hM}3X2qBh(B142$B2s%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$(B
$B>pJs=hM}3X2q8&5fJs9p!$(Bvol.2018-OS-142$B!$(Bno.5$B!$(Bpp.1-8$B!$(B(2, 2018).
$B>e@n(B $B@hG7!$;3Fb(B $BMx9(!$(B
"$B%3!<%I$X$N
Toshihiro Yamauchi, Yohei Akao,
"Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features ,"
IEICE Transactions on Information and Systems, vol.E100-D, No.10, pp.2377-2381, (10, 2017).
https://doi.org/10.1587/transinf.2016INL0003
Toshihiro Yamauchi, Yuta Ikegami, Yuya Ban,
"Mitigating Use-After-Free Attacks Using Memory-Reuse-Prohibited Library ,"
IEICE Transactions on Information and Systems, vol.E100-D, No.10, pp.2295-2306, (10, 2017).
https://doi.org/10.1587/transinf.2016INP0020
Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi,
"Performance Improvement and Evaluation of Function for Tracing Diffusion of Classified Information on KVM, "
4th International Workshop on Information and Communication Security (WICS 2017),
2017 Fifth International Symposium on Computing and Networking, pp.463-468 (11, 2017).
https://doi.org/10.1109/CANDAR.2017.91
Naoki Kudo, Toshihiro Yamauchi, Thomas H. Austin,
"Access Control for Plugins in Cordova-based Hybrid Applications, "
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications (AINA-2017), pp.1063-1069, (3, 2017).
https://doi.org/10.1109/AINA.2017.61
$B:4F#(B $B>-Li!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B2>A[7W;;5!$rMQ$$$?=EMW%U%!%$%kJ]8n
$B2,(B﨑 $B=S
"KVM$B>e$NJ#?t(BVM$B$NF0:n$KBP1~$7$?5!L)>pJs$N3H;6DI@W5!G=!$(B"
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2017 (CSS2017) $BO@J8=8(B, pp.1295-1301$B!$(B(10$B!$(B2017)$B!%(B
$BH<(B $BPRLo!$;3Fb(B $BMx9(!$(B
"Windows$B$K$*$1$k(BUse-After-Free$B@H
$B:#B<(B $BM4B@!$>e@n(B $B@hG7!$@P86(B $BLw90!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$(B
"Android$B$K$*$1$k(BWebView$B$N(BWeb$B%"%/%;%94QB,5!9=!$(B"
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2017 (CSS2017) $BO@J8=8(B, pp.545-552$B!$(B(10$B!$(B2017)$B!%(B
$B>e@n(B $B@hG7!$;3Fb(B $BMx9(!$(B
"API$BA`:n%m%0
$B;~>>(B $BM&2p!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%W%m%;%9$NJ#@=$K$h$k2DMQ@-$r9MN8$7$?%i%$%V%U%)%l%s%8%C%/
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2017 (CSS2017) $BO@J8=8(B, pp.237-244$B!$(B(10$B!$(B2017)$B!%(B(CSS2017 $B3X@8O@J8>^(B $B^(B) ($B%G%8%?%k!&%U%)%l%s%8%C%/8&5f2q(B $B%G%8%?%k!&%U%)%l%s%8%C%/M%=(
$B5HED(B $BBY;0!$2,K\(B $BM5G7!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%W%m%;%9$N%G!<%?Aw?.NL$r9MN8$7$?J#?t(BNIC$B4V$G$NIi2YJ,;6K!$NDs0F!$(B"
$BJ?@.(B29$BG/EY(B $BEE5$!&>pJs4XO"3X2qCf9q;YItBh(B68$B2sO"9gBg2q!$EE;RG^BN(B, (10$B!$(B2017)$B!%(B
$B@n4_(B $B>:!$EOJU(B $BM%!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"QEMU$B$rMxMQ$7$?IT4xH/@-%a%b%jEk:\7W;;5!$N
$B;{K\(B $BBgIw!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"OS$B%5!<%P=hM}$NIi2YJ,;6$r2DG=$K$9$k(BAnT$B$NMW5aH"DL?.J}<0!$(B"
$BJ?@.(B29$BG/EY(B $BEE5$!&>pJs4XO"3X2qCf9q;YItBh(B68$B2sO"9gBg2q!$EE;RG^BN(B, (10$B!$(B2017)$B!%(B
$BEDB<(B $BBg!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender$B$K$*$1$k;q8;?tA}2C$K$h$k;q8;:n@.;~4V$ND9Bg2=$rM^@)$9$k
$B?9;3(B $B1QL@!$;3Fb(B $BMx9(!$:4F#(B $B>-Li!$C+8}(B $B=(IW!$(B
"KVM$B$K$*$1$k5!L)>pJs$N3H;6DI@W5!G=$N9bB.2=!$(B"
$BBh(B16$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT2017) $B9V1iO@J8=8(B, $BBh(B1$BJ,:}(B, pp.191-192$B!$(B(9, 2017).
Yuichi Nakamura, Toshihiro Yamauchi,
"Proposal of a Method to Prevent Privilege Escalation Attacks for Linux Kernel, "
Linux Security Summit North America 2017, (9, 2017)$B!%(B
Toshihiro Yamauchi,
"Privilege Escalation Attack Prevention Method Based on System Call Processing, "
SCIS & CSS Award Session of the 12th International Workshop on Security (IWSEC 2017), (9, 2017).
$BB<2,(B $BM&4u!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"AnT$B$N0l3g0MMjJBNs=hM}5!G=!$(B"
2017$BG/JBNs(B/$BJ,;6(B/$B6(D4=hM}$K4X$9$k!X=)ED!Y%5%^!pJs=hM}3X2q8&5fJs9p!$(Bvol.2017-OS-141$B!$(Bno.2$B!$(Bpp.1-8$B!$(B(7$B!$(B2017)$B!%(B
$B:4F#(B $B>-Li!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%W%m%;%94IM}I=$X$N%"%/%;%9@)8f5!G=$NI>2A!$(B"
$B>pJs=hM}3X2qBh(B78$B2s%3%s%T%e!<%?%;%-%e%j%F%#!&Bh(B24$B2s%;%-%e%j%F%#?4M}3X$H%H%i%9%H9gF18&5fH/I=2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2017-CSEC-78$B!$(Bno.27$B!$(Bpp.1-7$B!$(B(7$B!$(B2017)$B!%(B
$BH<(B $BPRLo!$;3Fb(B $BMx9(!$(B
"Use-After-Free$B@H
$B>pJs=hM}3X2qBh(B78$B2s%3%s%T%e!<%?%;%-%e%j%F%#!&Bh(B24$B2s%;%-%e%j%F%#?4M}3X$H%H%i%9%H9gF18&5fH/I=2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2017-CSEC-78$B!$(Bno.26$B!$(Bpp.1-7$B!$(B(7$B!$(B2017)$B!%(B
$B;3K\(B $B>;@8!$CfEg(B $B9LB@!$;3Fb(B $BMx9(!$L>8E20(B $B>4!$C+8}(B $B=(IW!$(B
"$B2>A[7W;;5!$rMxMQ$7$?@-G=%W%m%U%!%$%j%s%0%7%9%F%`$NJ,;62=!$(B"
$B>pJs=hM}3X2qBh(B139$B2s%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2017-OS-139$B!$(Bno.8$B!$(Bpp.1-8 (3, 2017).
$B>>2,(B $BIp;K!$:4Ln(B $B90>0!$2,K\(B $BM5G7!$J!0f(B $B1QM}!$4d(B﨑 $B=(;J!$@DLZ(B $BW=6W!$;3Fb(B $BMx9(!$(B
"RTAI$B$N%?%9%/4V%$%Y%s%HDLCN@-G=$NI>2A!$(B"
$BEE;R>pJsDL?.3X2q(B 2017$BG/Am9gBg2q!$>pJs!&%7%9%F%`9V1iO@J8=8(B1$B!$(Bp.43$B!$(B(3$B!$(B2017)$B!%(B
$B@DLZ(B $BW=6W!$:4Ln(B $B90>0!$2,K\(B $BM5G7!$;3Fb(B $BMx9(!$>>2,(B $BIp;K!$J!0f(B $B1QM}!$4d(B﨑 $B=(;J!$(B
"Linux$B$H(BRTAI$B$,Ds6!$9$k%?%$%^$N@:EY$NHf3S!$(B"
$BEE;R>pJsDL?.3X2q(B 2017$BG/Am9gBg2q!$>pJs!&%7%9%F%`9V1iO@J8=8(B1$B!$(Bp.42$B!$(B(3$B!$(B2017)$B!%(B
$B:#B<(B $BM4B@!$>e@n(B $B@hG7!$9)F#(B $BD>
"Android$B$K$*$1$k(BWebView$B$N(BWeb$B%"%/%;%94QB,5!9=$NDs0F!$(B"
$B>pJs=hM}3X2qBh(B79$B2sA49qBg2q9V1iO@J8=8Bh(B3$BJ,:}!$(Bpp.551-552$B!$(B(3$B!$(B2017)$B!%(B($B>pJs=hM}3X2q(B $BBh(B79$B2sA49qBg2q(B $B3X@8>)Ne>^(B $B^(B)
$B2OJU(B $B@?Lo!$;3Fb(B $BMx9(!$G5B<(B $BG=@.!$C+8}(B $B=(IW!$(B
"$BL$;2>H%P%C%U%!?t$KCeL\$7$?F~=PNO%P%C%U%!J,3dK!$K$*$1$k(BWeb$B%5!<%PJ?6Q1~Ez;~4V$NI>2A!$(B"
$B>pJs=hM}3X2qBh(B79$B2sA49qBg2q9V1iO@J8=8Bh(B1$BJ,:}!$(Bpp.171-172$B!$(B(3$B!$(B2017)$B!%(B
$BJ!5o(B $B@?Fs!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%W%m%;%C%5$N0c$$$KCeL\$7$?Av9T%b!<%IJQ995!9=$NI>2A!$(B"
$B>pJs=hM}3X2qBh(B79$B2sA49qBg2q9V1iO@J8=8Bh(B1$BJ,:}!$(Bpp.169-170$B!$(B(3$B!$(B2017)$B!%(B
$BEDB<(B $BBg!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender$B$N:FMxMQ5!G=$K$*$1$kL$;HMQ;q8;$N:o=|5!G=!$(B"
$B>pJs=hM}3X2qBh(B79$B2sA49qBg2q9V1iO@J8=8Bh(B1$BJ,:}!$(Bpp.167-168$B!$(B(3$B!$(B2017)$B!%(B
$B?\F,(B $B^fJ?!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"OS$B;q8;$r%N!<%IKh$K4IM}$9$k(BTender$B$N9=@.!$(B"
$B>pJs=hM}3X2qBh(B79$B2sA49qBg2q9V1iO@J8=8Bh(B1$BJ,:}!$(Bpp.165-166$B!$(B(3$B!$(B2017)$B!%(B
$BB<2,(B $BM&4u!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%5!<%P$NJBNs=hM}$rB%?J$9$k(BAnT$B$N0l3g0MMjJBNs=hM}5!G=!$(B"
$B>pJs=hM}3X2qBh(B79$B2sA49qBg2q9V1iO@J8=8Bh(B1$BJ,:}!$(Bpp.163-164$B!$(B(3$B!$(B2017)$B!%(B
$B_7ED(B $B=_!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%^%$%/%m%+!<%M%k(BOS$B$K$*$1$k(BNIC$B%I%i%$%P%W%m%;%9$NF~BX$(@-G=$NHf3S!$(B"
$B>pJs=hM}3X2qBh(B79$B2sA49qBg2q9V1iO@J8=8Bh(B1$BJ,:}!$(Bpp.161-162$B!$(B(3$B!$(B2017)$B!%(B
$B3{@8(B $BM*E_!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%^%k%A%3%"(BAnT$B$N%9%1%8%e!<%k5!9=$K$*$1$kM%@hEY5UE>M^@)8z2L!$(B"
$B>pJs=hM}3X2qBh(B79$B2sA49qBg2q9V1iO@J8=8Bh(B1$BJ,:}!$(Bpp.157-158$B!$(B(3$B!$(B2017)$B!%(B
$B?9;3(B $B1QL@!$;3Fb(B $BMx9(!$:4F#(B $B>-Li!$C+8}(B $B=(IW!$(B
"KVM$B$K$*$1$k5!L)>pJs$N3H;6DI@W5!G=$K$*$1$k@-G=2~A1:v!$(B"
$B>pJs=hM}3X2qBh(B79$B2sA49qBg2q9V1iO@J8=8Bh(B1$BJ,:}!$(Bpp.13-14$B!$(B(3$B!$(B2017)$B!%(B
$B3{@8(B $BM*E_!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%^%k%A%3%"4D6-MQ%9%1%8%e!<%i$NM%@hEY5UE>$H%*!<%P%X%C%I$N%H%l!<%I%*%UI>2A!$(B"
$B>pJs=hM}3X2qBh(B169$B2s%^%k%A%a%G%#%"DL?.$HJ,;6=hM}8&5fH/I=2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2017-DPS-169$B!$(Bno.4$B!$(Bpp.1-8$B!$(B(1$B!$(B2017)$B!%(B
Yuichi Nakamura, Akira Moriguchi, Masanori Irie, Taizo Kinoshita, Toshihiro Yamauchi,
"Rule-based sensor data aggregation system for M2M gateways,"
IEICE Transactions on Information and Systems, Vol.E99-D, No.12, pp.2943-2955, (12, 2016).
https://doi.org/10.1587/transinf.2016PAP0020
$B9>86(B $B42?M!$[FED(B $B7=M4!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%W%m%;%94VDL?.$rM^@)$7%G!<%?6&M-$9$k%^%$%/%m%+!<%M%k9=B$(BOS $B8~$1%U%!%$%kA`:n5!G=$N
$BEE;R>pJsDL?.3X2qO@J8;o(BD$B!$(BVol.J99-D$B!$(BNo.10$B!$(Bpp.1069-1079$B!$(B(10$B!$(B2016)$B!%(B
https://doi.org/10.14923/transinfj.2016JDP7013
Shota Fujii, Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi,
"Design of Function for Tracing Diffusion of Classified Information for IPC on KVM, "
Journal of Information Processing, Vol.24, No.5, pp.781-792, (9, 2016).
https://doi.org/10.2197/ipsjjip.24.781
$BEZC+(B $B>45A!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%-%c%C%7%e%R%C%HN($KCeL\$7$?F~=PNO%P%C%U%!$NJ,3dK!$N
$B>pJs=hM}3X2qO@J8;o!$(BVol.57$B!$(BNo.6$B!$(Bpp.1539-1553$B!$(B(6$B!$(B2016)$B!%(B
Shota Fujii, Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi,
"Evaluation and Design of Function for Tracing Diffusion of Classified Information for File Operations with KVM, "
The Journal of Supercomputing, Vol.72, Issue 5, pp.1841-1861, (2, 2016).
https://doi.org/10.1007/s11227-016-1671-5
Toshihiro Yamauchi,
"FOREWORD - Special Section on Information and Communication System
Security, "
IEICE Transactions on Information and Systems, Vol.E99-D, No.4, pp.785-786, (4, 2016).
Yohei Akao, Toshihiro Yamauchi,
"KRGuard: Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features, "
Proceedings of 2016 International Conference on Information Science and Security (ICISS), pp.22-26, (12, 2016).
https://doi.org/10.1109/ICISSEC.2016.7885860
Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi,
"Memory Access Monitoring and Disguising of Process Information to Avoid Attacks to Essential Services,"
3rd International Workshop on Information and Communication Security (WICS2016),
2016 Fourth International Symposium on Computing and Networking, pp.635-641, (11, 2016).
https://doi.org/10.1109/CANDAR.2016.0114
Toshihiro Yamauchi, Yuta Ikegami,
"HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks, "
10th International Conference on Network and System Security (NSS2016),
Lecture Notes in Computer Science (LNCS), vol.9955, pp.219-234, (9, 2016).
https://doi.org/10.1007/978-3-319-46298-1_15 (Best Paper Award)
Toshihiro Yamauchi, Yuta Yamamoto, Kengo Nagai, Tsukasa Matono, Shinji Inamoto, Masaya Ichikawa, Masataka Goto, Hideo Taniguchi,
"Plate: Persistent Memory Management for Nonvolatile Main Memory, "
Proceedings of 31st ACM Symposium on Applied Computing (SAC 2016), pp.1885-1892, (4, 2016).
https://doi.org/10.1145/2851613.2851744
$B>e@n(B $B@hG7!$;3Fb(B $BMx9(!$(B
"CPU$B%(%_%e%l!<%?$rMxMQ$7$?
$B@VHx(B $BMNJ?!$;3Fb(B $BMx9(!$(B
"$B%7%9%F%`%3!<%k=hM}$K$h$k8"8B$NJQ2=$KCeL\$7$?8"8B>:3J967b$NKI;_
$B9)F#(B $BD>
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2016$B!J(BCSS2016$B!KO@J8=8!$(Bpp.450-457$B!$(B(10$B!$(B2016)$B!%(B
$B:4F#(B $B>-Li!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B967b2sHr$N$?$a$N%U%!%$%kIT2D;k2=
$B;~>>(B $BM&2p!$;3Fb(B $BMx9(!$(B
"$B@)8f%7%9%F%`$N2DMQ@-$r9MN8$7$?%W%m%;%9$NJ#@=$K$h$k%i%$%V%U%)%l%s%8%C%/
$B3{@8(B $BM*E_!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%^%k%A%3%"4D6-$K$*$1$kM%@hEY7Q>5>r7o$N:YJ,2=$K$h$kM%@hEY5UE>$H%*!<%P%X%C%I$NM^@)!$(B"
$BBh(B15$B2s>pJs2J3X5;=Q%U%)!<%i%`!J(BFIT2016$B!K!$9V1iO@J8=8!$Bh(B1$BJ,:}!$(Bpp.187-188$B!$(B(9$B!$(B2016)$B!%(B
$B_7ED(B $B=_!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%^%$%/%m%+!<%M%k(BOS$B$K$*$1$k(BNIC$B%I%i%$%P%W%m%;%9F~BX$($NHf3SI>2A!$(B"
$BBh(B15$B2s>pJs2J3X5;=Q%U%)!<%i%`!J(BFIT2016$B!K!$9V1iO@J8=8!$Bh(B1$BJ,:}!$(Bpp.175-176$B!$(B(9$B!$(B2016)$B!%(B
$B3{@8(B $BM*E_!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%^%k%A%3%"4D6-$K$*$1$kM%@hEY5UE>$rM^@)$9$k(BAnT$B$N%9%1%8%e!<%k5!9=$NI>2A!$(B"
2016$BG/JBNs(B/$BJ,;6(B/$B6(D4=hM}$K4X$9$k!X>>K\!Y%5%^!>K\(B2016$B!K!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2016-OS-138$B!$(Bno.4$B!$(Bpp.1-8$B!$(B(8$B!$(B2016)$B!%(B
$B:4F#(B $B>-Li!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%W%m%;%9>pJsIT2D;k2=$N$?$a$N2>A[7W;;5!%b%K%?$K$h$k%a%b%j%"%/%;%9@)8f5!G=$NI>2A!$(B"
$B>pJs=hM}3X2qBh(B74$B2s%3%s%T%e!<%?%;%-%e%j%F%#!&Bh(B19$B2s%;%-%e%j%F%#?4M}3X$H%H%i%9%H9gF18&5fH/I=2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2016-CSEC-74$B!$(Bno.25$B!$(Bpp.1-7$B!$(B(7$B!$(B2016)$B!%(B
$BEDB<(B $BBg!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender$B$K$*$1$k%W%m%;%99=@.;q8;$N;vA0@8@.$K$h$k9bB.%W%m%;%9@8@.5!G=!$(B"
$B>pJs=hM}3X2qBh(B137$B2s%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2016-OS-137$B!$(Bno.10$B!$(Bpp.1-8$B!$(B(5$B!$(B2016)$B!%(B
$B:4Ln(B $B90>0!$F#0f(B $BfFB@!$KY0f(B $B4p;K!$;{2,(B $BL@I'!$;3Fb(B $BMx9(!$>>2,(B $BIp;K!$9>F#(B $BJ8<#!$J!0f(B $B1QM}!$4d(B﨑 $B=(;J!$(B
"$B%^%k%A%3%"7W;;5!$K$*$1$k%3%"4V$N%?%$%`%9%?%s%W%+%&%s%?$NI>2A!$(B"
$BEE;R>pJsDL?.3X2q(B 2016$BG/Am9gBg2q!$>pJs!&%7%9%F%`9V1iO@J8=8(B1$B!$(Bp.78$B!$(B(3$B!$(B2016)$B!%(B
$BF#0f(B $BfFB@!$KY0f(B $B4p;K!$:4Ln(B $B90>0!$;{2,(B $BL@I'!$;3Fb(B $BMx9(!$>>2,(B $BIp;K!$9>F#(B $BJ8<#!$J!0f(B $B1QM}!$4d(B﨑 $B=(;J!$(B
"$B%^%k%A%3%"7W;;5!$K$*$1$k%3%"4VDL?.$N@-G=I>2A!$(B"
$BEE;R>pJsDL?.3X2q(B 2016$BG/Am9gBg2q!$>pJs!&%7%9%F%`9V1iO@J8=8(B1$B!$(Bp.77$B!$(B(3$B!$(B2016)$B!%(B
$B9)F#(B $BD>
$B>pJs=hM}3X2qBh(B166$B2s%^%k%A%a%G%#%"DL?.$HJ,;6=hM}!&Bh(B72$B2s%3%s%T%e!<%?%;%-%e%j%F%#9gF18&5fH/I=2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2016-CSEC-72$B!$(Bno.1$B!$(Bpp.1-8$B!$(B(3$B!$(B2016)$B!%(B
$B3{@8(B $BM*E_!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%^%k%A%3%"4D6-$K$*$1$kM%@hEY5UE>$rM^@)$9$k(BAnT $B%*%Z%l!<%F%#%s%0%7%9%F%`$N%9%1%8%e!<%k5!9=!$(B"
$B>pJs=hM}3X2qBh(B136$B2s%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2016-OS-136$B!$(Bno.17$B!$(Bpp.1-8$B!$(B(3$B!$(B2016)$B!%(B
$BKY0f(B $B4p;K!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender$B$K$*$1$k%3%"!]%a%b%j4V$N4X78$,@-G=$KM?$($k1F6A!$(B"
$B>pJs=hM}3X2qBh(B136$B2s%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2016-OS-136$B!$(Bno.14$B!$(Bpp.1-7$B!$(B(3$B!$(B2016)$B!%(B
Toshihiro Yamauchi, Masahiro Tsuruya, Hideo Taniguchi,
"Fast Control Method of Software-Managed TLB for Reducing Zero-Copy Communication Overhead,"
IEICE Transactions on Information and Systems, Vol.E98-D, No.12, pp.2187-2191, (12, 2015).
https://doi.org/10.1587/transinf.2015PAL0003
Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi,
"Process Hiding by Virtual Machine Monitor for Attack Avoidance,"
Journal of Information Processing, Vol.23, No.5, pp.673-682, (9, 2015).
https://doi.org/10.2197/ipsjjip.23.673 (Specially Selected Paper)
Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Yamauchi,
"Reducing Resource Consumption of SELinux for Embedded Systems with Contributions to Open-Source Ecosystems,"
Journal of Information Processing, Vol.23, No.5, pp.664-672, (9, 2015).
https://doi.org/10.2197/ipsjjip.23.664
$B>.AR(B $BDw9,!$;3Fb(B $BMx9(!$(B
"TaintDroid$B$rMQ$$$?MxMQ
$B;3Fb(B $BMx9(!$2#;3(B $BOB=S!$G5B<(B $BG=@.!$C+8}(B $B=(IW!$02DM(B $B@5M:!$(B
"$B%U%!%$%kA`:n$N%7%9%F%`%3!<%kH/9TIQEY$K4p$E$/%P%C%U%!%-%c%C%7%e@)8fK!$K$*$1$k=EMWEY99?77@5!$N@_DjK!!$(B"
$B>pJs=hM}3X2qO@J8;o!$(Bvol.56$B!$(BNo.6$B!$(Bpp.1451-1462$B!$(B(6$B!$(B2015)$B!%(B
Jing Yu, Toshihiro Yamauchi,
"Access Control to Prevent Malicious JavaScript Code Exploiting Vulnerabilities of WebView in Android OS,"
IEICE Transactions on Information and Systems, Vol.E98-D, No.4, pp.807-811, (4, 2015).
https://doi.org/10.1587/transinf.2014ICL0001
Yuta Ikegami, Toshihiro Yamauchi,
"Attacker Investigation System Triggered by Information Leakage,"
6th International Conference on E-Service and Knowledge Management (ESKM 2015),
Proceedings of 2015 IIAI 4th International Congress on Advanced Applied Informatics (AAI 2015), pp.24-27 (7, 2015).
https://doi.org/10.1109/IIAI-AAI.2015.247
Yohei Akao, Toshihiro Yamauchi,
"Proposal of Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features,"
4th International Congress on Advanced Applied Informatics, poster,
Proceedings of 2015 IIAI 4th International Congress on Advanced Applied Informatics (AAI 2015), pp.721-722 (7, 2015).
https://doi.org/10.1109/IIAI-AAI.2015.243
Shota Fujii, Toshihiro Yamauchi, Hideo Taniguchi,
"Design of a Function for Tracing the Diffusion of Classified Information for File Operations with a KVM,"
The 2015 International Symposium on Advances in Computing, Communications, Security, and Applications for Future Computing (ACSA 2015),
Proceedings of The 2015 World Congress on Information Technology Applications and Services, (2, 2015).
Yuichi Nakamura, Akira Moriguchi, Toshihiro Yamauchi,
"CSDA: Rule-based Complex Sensor Data Aggregation System for M2M Gateway,"
The Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU 2015),
Proceedings of the Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU 2015), pp.110-115, (1, 2015).
https://doi.org/10.1109/ICMU.2015.7061051
$B2O>e(B $BM5B@!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%^%k%A%3%"8~$1(BAnT$B%*%Z%l!<%F%#%s%0%7%9%F%`$N%U%!%$%kA`:n$K$*$1$kJ,;68z2L$NI>2A!$(B"
$BBh(B23$B2s%^%k%A%a%G%#%"DL?.$HJ,;6=hM}%o!<%/%7%g%C%W(B (DPSWS2015)$BO@J8=8!$(BVol.2015$B!$(BNo.14$B!$(Bpp.100-106$B!$(B(10$B!$(B2015)$B!%(B
$BKY0f(B $B4p;K!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"OS$B;q8;$r%3%"Kh$K4IM}$9$k(BTender$B$N@-G=I>2A!$(B"
$B>pJs=hM}3X2qBh(B135$B2s%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2015-OS-135$B!$(Bno.15$B!$(Bpp.1-6$B!$(B(11$B!$(B2015).
$B:4F#(B $B>-Li!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%W%m%;%9>pJsIT2D;k2=$N$?$a$N2>A[7W;;5!%b%K%?$h$k%a%b%j%"%/%;%9@)8f!$(B"
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2015 (CSS2015)$BO@J8=8!$(Bpp.855-860$B!$(B(10$B!$(B2015)$B!%(B
$BF#0ffFB@!$:4F#>-Li!$;3FbMx9(!$C+8}=(IW!$(B
"$B%W%m%;%94VDL?.$K$h$k5!L)>pJs3H;6$r(BKVM$B>e$GDI@W$9$k5!G=$N@_7W!$(B"
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2015 (CSS2015)$BO@J8=8!$(Bpp.191-198$B!$(B(10$B!$(B2015)$B!%(B(CSS2015 $B3X@8O@J8>^(B $B^(B)
$B3{@8(B $BM*E_!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%U%!%$%kFI$_9~$_=hM}$K$*$1$k(BAnT$B%*%Z%l!<%F%#%s%0%7%9%F%`$N(BOS$B%5!<%P$NM%@hEY5UE>M^@)K!$NI>2A!$(B"
$BBh(B14$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT2015)$B!$9V1iO@J8=8!$Bh(B1$BJ,:}!$(Bpp.221-222$B!$(B(9$B!$(B2015)$B!%(B
$B_7ED(B $B=_!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$BDL?.@)8f%5!<%P$rMQ$$$?(BAnT$B$N(BOS$B%5!<%PF~BX$(5!G=$NI>2A!$(B"
$BBh(B14$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT2015)$B!$9V1iO@J8=8!$Bh(B1$BJ,:}!$(Bpp.219-220$B!$(B(9$B!$(B2015)$B!%(B
$B?9;3(B $B1QL@!$LZ2<(B $BL:;J!$?{>B(B $BL@!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"CPU$B;q8;$N3dEv$F@)8f$K$h$k(BKVM$B$NF0:n@)8fI>2A!$(B"
$BBh(B14$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT2015)$B!$9V1iO@J8=8!$Bh(B1$BJ,:}!$(Bpp.217-218$B!$(B(9$B!$(B2015)$B!%(B
$B;{2,(B $BL@I'!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%7%9%F%`%3!<%kH/9TIQEY$K4p$E$/%P%C%U%!%-%c%C%7%e@)8fK!$K$*$1$k=EMWEY99?7$NCY1dJ}<0!$(B"
$BBh(B14$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT2015)$B!$9V1iO@J8=8!$Bh(B1$BJ,:}!$(Bpp.209-210$B!$(B(9$B!$(B2015)$B!%(B
Toshihiro Yamauchi,
"Use-After-Free Prevention Method Using Memory Reuse Prohibited Library,"
The 10th International Workshop on Security (IWSEC 2015), Invited talk (8, 2015).
$BJ!Eg(B $BM-51!$;3Fb(B $BMx9(!$G5B<(B $BG=@.!$C+8}(B $B=(IW!$(B
"Linux$B$H(BAnT$B$NO"7H5!9=$K$*$1$kBe9T
$BJBNs(B/$BJ,;6(B/$B6(D4=hM}$K4X$9$k!XJLI\!Y%5%^!pJs=hM}3X2q8&5fJs9p!$(Bvol.2015-OS-134$B!$(Bno.13$B!$(Bpp.1-8$B!$(B(8$B!$(B2015)$B!%(B
$B9>86(B $B42?M!$[FED(B $B7=M4!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%^%$%/%m%+!<%M%k8~$1%<%m%3%T!<%U%!%$%kA`:n5!G=$NI>2A!$(B"
$BJBNs(B/$BJ,;6(B/$B6(D4=hM}$K4X$9$k!XJLI\!Y%5%^!pJs=hM}3X2q8&5fJs9p!$(Bvol.2015-OS-134$B!$(Bno.12$B!$(Bpp.1-7$B!$(B(8$B!$(B2015)$B!%(B
$B:4F#(B $B>-Li!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%W%m%;%9FCDj:$Fq2=$N$?$a$N%W%m%;%9>pJs$NCV49
$B>pJs=hM}3X2qBh(B70$B2s%3%s%T%e!<%?%;%-%e%j%F%#!&Bh(B14$B2s>pJs%;%-%e%j%F%#?4M}3X$H%H%i%9%H9gF18&5fH/I=2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2015-CSEC-70$B!$(Bno.25$B!$(Bpp.1-7 (7$B!$(B2015)$B!%(B
$B3{@8(B $BM*E_!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"AnT$B%*%Z%l!<%F%#%s%0%7%9%F%`$K$*$1$k(BOS$B%5!<%P4VDL?.$G$NM%@hEY7Q>5$K$h$kM%@hEY5UE>$NM^@)K!!$(B"
$BBh(B133$B2s%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2015-OS-133$B!$(Bno.15$B!$(Bpp.1-8$B!$(B(5$B!$(B2015)$B!%(B
$B_7ED(B $B=_!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"AnT$B$N(BOS$B%5!<%PF~BX$(5!G=$K$*$1$kF~BX$(;~4V$H1~Ez;~4V$NJ,@O!$(B"
$BBh(B133$B2s%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2015-OS-133$B!$(Bno.14$B!$(Bpp.1-7$B!$(B(5$B!$(B2015)$B!%(B
$B;3Fb(B $BMx9(!$CS>e(B $BM4B@(B
"$B%a%b%j:FMxMQ6X;_$K$h$k(BUse-After-Free$B@H
$B>pJs=hM}3X2qBh(B69$B2s%3%s%T%e!<%?%;%-%e%j%F%#!&Bh(B29$B2s%$%s%?!<%M%C%H$H1?MQ5;=Q9gF18&5fH/I=2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2015-IOT-29$B!$(Bno.21$B!$(Bpp.1-8 (5$B!$(B2015)$B!%(B
$B@VHx(B $BMNJ?!$;3Fb(B $BMx9(!$(B
"$BJ,4t%H%l!<%9;Y1g5!G=$rMQ$$$?%+!<%M%k%k!<%H%-%C%H8!CN
$BEDB<(B $B=_!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%^%k%A%3%"8~$1(BOS$B$K$*$1$k3d$j9~$_@)8fK!$NHf3SI>2A!$(B"
$BEE;R>pJsDL?.3X2q(B 2015$BG/Am9gBg2q!$>pJs!&%7%9%F%`9V1iO@J8=8(B1$B!$(Bp.77$B!$(B(3$B!$(B2015)$B!%(B
$B2O>e(B $BM5B@!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"AnT$B%*%Z%l!<%F%#%s%0%7%9%F%`$K$*$1$k8zN(E*$J%5!<%P4VDL?.5!9=!$(B"
$BBh(B132$B2s%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2015-OS-132$B!$(Bno.12$B!$(Bpp.1-7$B!$(B(2$B!$(B2015)$B!%(B
$BJ!Eg(B $BM-51!$;3Fb(B $BMx9(!$G5B<(B $BG=@.!$C+8}(B $B=(IW!$(B
"Linux$B$H(BAnT$B%*%Z%l!<%F%#%s%0%7%9%F%`$NO"7H5!9=$NI>2A!$(B"
$BBh(B132$B2s%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2015-OS-132$B!$(Bno.11$B!$(Bpp.1-7$B!$(B(2$B!$(B2015)$B!%(B
$B9>86(B $B42?M!$2O>e(B $BM5B@!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%U%!%$%kA`:n$KCeL\$7$?(BOS$B=hM}J,;6K!!$(B"
$BBh(B132$B2s%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2015-OS-132$B!$(Bno.7$B!$(Bpp.1-7$B!$(B(2$B!$(B2015)$B!%(B
$BC]Cf(B $BK(!$;3Fb(B $BMx9(!$:M=j(B $BIRL@!$(B
"$B%9%^!<%H%U%)%s8~$10B?4!&0BA4%=%U%HN.DL%U%l!<%`%o!<%/$NDs0F!$(B"
2015$BG/0E9f$H>pJs%;%-%e%j%F%#%7%s%]%8%&%`(B(SCIS2015)$BO@J8=8!$(Bpp.1-7$B!$(B(1$B!$(B2015).
Masaya Sato, Toshihiro Yamauchi,
"Secure and Fast Log Transfer Mechanism for Virtual Machine,"
Journal of Information Processing, Vol.22, No.4, pp.597-608, (10, 2014).
$BCS>eM4B@!$;3FbMx9(!$(B
"$B%+!<%M%k%9%?%C%/$NHf3S$K$h$k%+!<%M%k%k!<%H%-%C%H8!CN
$B;3K\5.Bg!$;3FbMx9(!$C+8}=(IW!$(B
"$B;q8;$NFHN)2=5!9=$K$h$jGSB>@)8f$r6I=j2=$9$k%^%k%A%3%"8~$1(BTender$B$N
Syunya Sakamoto, Kenji Okuda, Ryo Nakatsuka, Toshihiro Yamauchi,
"DroidTrack: Tracking and Visualizing Information Diffusion for Preventing Information Leakage on Android,"
Journal of Internet Services and Information Security (JISIS), Vol.4, No.2, pp.55-69, (5, 2014).
Toshihiro Yamauchi, Akira Kinoshita, Taisuke Kawahara, Hideo Taniguchi,
"A New OS Structure for Simplifying Understanding of Operating System Behavior,"
INFORMATION-An International Interdisciplinary Journal, Vol.17, No.5, pp.1945-1950, (5, 2014).
$BDaC+(B $B>;90!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%^%$%/%m%+!<%M%k(BOS $B$K$*$1$k(BTLB $B$N%=%U%H%&%'%"@)8fK!$N
$BEE;R>pJsDL?.3X2qO@J8;o(BD$B!$(BVol.J97-D$B!$(BNo.1$B!$(Bpp.216-225$B!$(B(1$B!$(B2014)$B!%(B
Kota Yoshizaki, Toshihiro Yamauchi,
"Malware Detection Method Focusing on Anti-Debugging Functions,"
1st International Workshop on Information and Communication Security (WICS'14), poster,
Proceedings of 2014 Second International Symposium on Computing and Networking (CANDAR 2014), pp.563-566 (12, 2014).
https://doi.org/10.1109/CANDAR.2014.36
Masaya Sato, Toshihiro Yamauchi,
"Complicating Process Identification by Replacing Process Information for Attack Avoidance,"
The 9th International Workshop on Security (IWSEC2014),
Lecture Notes in Computer Science(LNCS), vol.8639, pp.33-47, (8, 2014).
https://doi.org/10.1007/978-3-319-09843-2_3
$BKY0f(B $B4p;K!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender$B$K$*$1$k%3%"$4$H$K;q8;$rMQ0U$78DJL$K4IM}$9$k(BOS$B9=B$$N@_7W!$(B"
$B>pJs=hM}3X2qBh(B131$B2s%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2014-OS-131$B!$(Bno.7$B!$(Bpp.1-8$B!$(B(11$B!$(B2014).
$BCS>e(B $BM4B@!$;3Fb(B $BMx9(!$(B
"$B%a%b%j:FMxMQ$r6X;_$9$k%i%$%V%i%j$K$h$j(B Use-After-Free $B@H
$BF#0f(B $BfFB@!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%U%!%$%kA`:n$K$h$k5!L)>pJs3H;6$r(BKVM$B>e$GDI@W$9$k5!G=$NI>2A!$(B"
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2014 (CSS2014)$BO@J8=8!$(Bpp.751-758$B!$(B(10$B!$(B2014)$B!%(B
$B>.AR(B $BDw9,!$;3Fb(B $BMx9(!$(B
"TaintDroid$B$rMQ$$$?MxMQ
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2014 (CSS2014)$BO@J8=8!$(Bpp.789-796$B!$(B(10$B!$(B2014)$B!%(B(CSS2014 $B3X@8O@J8>^(B $B^(B)
$B7jED(B $B7<98!$:4F#(B $B>-Li!$;3Fb(B $BMx9(!$KY(B $BNI>4!$@99g(B $B;VHA!$]/0f(B $B9,0l!$(B
"$B9q:]2q5D(B ASIACCS 2014$BJs9p!$(B"
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B 2014 (CSS2014)$BO@J8=8!$(Bpp.1327-1334$B!$(B(10$B!$(B2014)$B!%(B
$B5HED(B $BBY;0!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$BJ#?t(BNIC$B$rO"7H@)8f$9$k4{B8
$BBh(B161$B2s%^%k%A%a%G%#%"DL?.$HJ,;6=hM}8&5f2q(B(DPS)$B!&Bh(B65$B2sEE;R2=CN:b:b;:!&
$BJ!Eg(B $BM-51!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Linux$B$H(BAnT$B%*%Z%l!<%F%#%s%0%7%9%F%`$N:.:\$HO"7H!$(B"
$BBh(B161$B2s%^%k%A%a%G%#%"DL?.$HJ,;6=hM}8&5f2q(B(DPS)$B!&Bh(B65$B2sEE;R2=CN:b:b;:!&
$B@nLn(B $BD>
$BJBNs(B/$BJ,;6(B/$B6(D4=hM}$K4X$9$k!X?73c!Y%5%^!pJs=hM}3X2q8&5fJs9p!$(Bvol.2014-OS-130$B!$(Bno.22$B!$(Bpp.1-8$B!$(B(7$B!$(B2014)$B!%(B
$B;3K\(B $B8w0l!$EZC+(B $B>45A!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$BL$;2>H%P%C%U%!?t$KCeL\$7$?F~=PNO%P%C%U%!J,3dK!!$(B"
$BJBNs(B/$BJ,;6(B/$B6(D4=hM}$K4X$9$k!X?73c!Y%5%^!pJs=hM}3X2q8&5fJs9p!$(Bvol.2014-OS-130$B!$(Bno.5$B!$(Bpp.1-8$B!$(B(7$B!$(B2014)$B!%(B
$BF#0f(B $BfFB@!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"KVM$B$K$*$1$k5!L)>pJs$N3H;6DI@W5!G=$N@_7W!$(B"
$B>pJs=hM}3X2qBh(B66$B2s%3%s%T%e!<%?%;%-%e%j%F%#!&Bh(B10$B2s%;%-%e%j%F%#?4M}3X$H%H%i%9%H9gF18&5fH/I=2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2014-CSEC-66$B!$(Bno.28$B!$(Bpp.1-7$B!$(B(7$B!$(B2014)$B!%(B
Masaya Sato, Toshihiro Yamauchi,
"Mitigating Attacks Based on Process Identification by Disguising Process Information, "
9th ACM Symposium on Information, Computer and Communications Security (ASIACCS2014), poster (6, 2014).
$BJ!Eg(B $BM-51!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Linux$B$H(BAnT$B%*%Z%l!<%F%#%s%0%7%9%F%`$N:.:\%7%9%F%`!$(B"
$B>pJs=hM}3X2qBh(B129$B2s%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2014-OS-129$B!$(Bno.13$B!$(Bpp.1-8$B!$EE;RG^BN!$(B(5$B!$(B2014)$B!%(B
$B;3K\5.Bg!$;3FbMx9(!$C+8}=(IW!$(B
"$B%^%k%A%3%"(BTender$B$K$*$1$k@-G=8~>eN($NI>2A!$(B"
$BAH9~$_5;=Q$H%M%C%H%o!<%/$K4X$9$k%o!<%/%7%g%C%W(B(ETNET2014)$B!$EE;R>pJsDL?.3X2q5;=Q8&5fJs9p!$(Bvol.113$B!$(Bno.497$B!$(Bpp.277-282$B!$(B(3$B!$(B2014)$B!%(B
$B:48EED7r;V!$;3FbMx9(!$C+8}=(IW!$(B
"OS$B=hM}$NJ,;6$r2DG=$K$9$k%^%k%A%3%"8~$1%^%$%/%m%+!<%M%k9=B$(BOS$B$NI>2A!$(B"
$BAH9~$_5;=Q$H%M%C%H%o!<%/$K4X$9$k%o!<%/%7%g%C%W(B(ETNET2014)$B!$EE;R>pJsDL?.3X2q5;=Q8&5fJs9p!$(Bvol.113$B!$(Bno.497$B!$(Bpp.283-288$B!$(B(3$B!$(B2014)$B!%(B
$B?98}>
"$B%3!<%G%#%s%0%l%9$J(BM2M$B%2!<%H%&%'%$>e$N%;%s%5%G!<%?=8Ls$r
$B:4F#(B $B>-Li!$;3Fb(B $BMx9(!$(B
"$B%W%m%;%9FCDj:$Fq2=$N$?$a$N%W%m%;%94XO">pJs$NCV49
$BLp57??Li!$;3FbMx9(!$(B
"SEAndroid$B$N3HD%$K$h$k(BAP$B$NF0E*@)8f
Toshihiro Yamauchi, Takayuki Hara, Hideo Taniguchi,
"A mechanism for achieving a bound on execution performance of process group to limit CPU abuse,"
The Journal of Supercomputing, Vol.65, Issue 1, pp.38-60, (7, 2013).
https://doi.org/10.1007/s11227-011-0707-0
$BEZC+>45A!$>>86?rM5!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%G%#%l%/%H%jM%@hJ}<0$K$*$1$k8z2LE*$JM%@h%G%#%l%/%H%j@_DjK!$NDs0F$HI>2A!$(B"
$BEE;R>pJsDL?.3X2qO@J8;o(BD$B!$(BVol.J96-D$B!$(BNo.3$B!$(Bpp.506-518$B!$(B(3$B!$(B2013)$B!%(B
$B0BF#N`1{!$66K\@5
$B>pJs=hM}3X2qO@J8;o!$(BVol.54$B!$(BNo.2$B!$(Bpp.585-595$B!$(B(2$B!$(B2013)$B!%(B
Masaya Sato, Toshihiro Yamauchi,
"Secure Log Transfer by Replacing a Library in a Virtual Machine,"
The 8th International Workshop on Security (IWSEC2013), Lecture Notes in Computer Science, vol.8231, pp.1-18, (11, 2013).
https://doi.org/10.1007/978-3-642-41383-4_1
Jing Yu, Toshihiro Yamauchi,
"Access Control to Prevent Attacks Exploiting Vulnerabilities of WebView in Android OS,"
The 4th IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-13),
Proceedings of 2013 IEEE International Conference on High PerformanceComputing and Communications (HPCC-2013)
and 2013 IEEE InternationalConference on Embedded and Ubiquitous Computing (EUC-2013), pp.1628-1633, (11, 2013).
https://doi.org/10.1109/HPCC.and.EUC.2013.229
Takeshi Sakoda, Toshihiro Yamauchi, Hideo Taniguchi,
"Evaluation of Load Balancing in Multicore Processor for AnT,"
The 2nd Workshop on Advances in Data Engineering and Mobile Computing (DEMoC-2013),
Proceedings of the 2013 16th International Conference on Network-Based Information Systems, pp.360-365, (9, 2013).
https://doi.org/10.1109/NBiS.2013.57
Syunya Sakamoto, Kenji Okuda, Ryo Nakatsuka, Toshihiro Yamauchi,
"DroidTrack: Tracking Information Diffusion and Preventing Information Leakage on Android,"
7th FTRA International Conference on Multimedia and Ubiquitous Engineering (MUE 2013),
Lecture Notes in Electrical Engineering (LNEE), Vol.240, pp.243-251, (5, 2013).
https://doi.org/10.1007/978-94-007-6738-6_31
Nobuto Otsubo, Shinichiro Uemura, Toshihiro Yamauchi, Hideo Taniguchi,
"Design and Evaluation of a Diffusion Tracing Function for Classified Information among Multiple Computers,"
7th FTRA International Conference on Multimedia and Ubiquitous Engineering (MUE 2013),
Lecture Notes in Electrical Engineering (LNEE), Vol.240, pp.235-242, (5, 2013).
https://doi.org/10.1007/978-94-007-6738-6_30
$B;3K\5.Bg!$;3FbMx9(!$C+8}=(IW!$(B
"$BGSB>@)8f$r6I=j2=$9$k%^%k%A%3%"8~$1(BTender$B$N
$BCS>e(B $BM4B@!$;3Fb(B $BMx9(!$(B
"$B%+!<%M%k%9%?%C%/$NHf3S$K$h$k%+!<%M%k%l%Y%k%k!<%H%-%C%H8!CN%7%9%F%`!$(B"
$BBh(B12$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT2013)$B!$9V1iO@J8=8!$Bh(B4$BJ,:}!$(Bpp.1-6$B!$(B(9$B!$(B2013)$B!%(B
$B:48EED(B $B7r;V!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B9b%9%k!<%W%C%H$r
$B02DM(B $B@5M:!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%U%!%$%kA`:n$N%7%9%F%`%3!<%kH/9TIQEY$K4p$E$/%P%C%U%!%-%c%C%7%e@)8fK!$K$*$1$k=EMWEY99?77@5!$N@_DjK!!$(B"
$BJ?@.(B25$BG/EY(B $BEE5$!&>pJs4XO"3X2qCf9q;YItBh(B64$B2sO"9gBg2q!$Bh(B64$B2sO"9gBg2q9V1iO@J8=8!$(Bp.176$B!$(B(10$B!$(B2013)$B!%(B
$BCS>e(B $BM4B@!$;3Fb(B $BMx9(!$(B
"$B>pJsO31L$r7@5!$H$7$?967b
$B:4F#(B $B>-Li!$;3Fb(B $BMx9(!$(B
"$B%W%m%;%94XO">pJs$NIT2D;k2=$K$h$j%W%m%;%9$N<1JL$r:$Fq$K$9$k967b2sHr
$B5H:j(B $B9-B@!$;3Fb(B $BMx9(!$(B
"$B%"%s%A%G%P%C%05!G=$KCeL\$7$?%^%k%&%'%"8!=P
$B?9;3(B $B1QL@!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"KVM$B$K$*$1$kM%@hEY@)8fK!$NM-8z@-!$(B"
$BBh(B12$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT2013)$B!$9V1iO@J8=8!$Bh(B1$BJ,:}!$(Bpp.225-226$B!$(B(9$B!$(B2013)$B!%(B
(I;M$B8}(B $BCNG7!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender$B$K$*$1$k8zN(E*$J%Z!<%8%"%&%H5,B'$N
$B:4F#(B $B>-Li!$;3Fb(B $BMx9(!$(B
"$B%i%$%V%i%j$NCV$-49$($K$h$k(BVM$B30It$X$N0BA4$J%m%0E>AwJ}<0$K$*$1$k1~MQ%W%m%0%i%`$rMQ$$$?@-G=I>2A!$(B"
$BBh(B12$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT2013)$B!$9V1iO@J8=8!$Bh(B4$BJ,:}!$(Bpp.185-186$B!$(B(9$B!$(B2013)$B!%(B($BBh(B12$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT2013) FIT$B>)Ne>^(B $B^(B)
$B;3K\(B $B5.Bg!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%^%k%A%3%"(BTender$B$K$*$1$kGSB>@)8f$N:YN3EY2=$K$h$kJBNs@-8~>e
$B:4F#(B $B>-Li!$;3FbMx9(!$(B
"$B%i%$%V%i%j$NCV$-49$($K$h$k(BVM$B30It$X$N0BA4$J%m%0E>AwJ}<0$NI>2A!$(B"
$BBh(B62$B2s%3%s%T%e!<%?%;%-%e%j%F%#!&Bh(B6$B2s%;%-%e%j%F%#?4M}3X$H%H%i%9%H9gF18&5fH/I=2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2013-CSEC-62$B!$(Bno.18$B!$(Bpp.1-8$B!$(B(7$B!$(B2013)$B!%(B
$B>.AR(B $BDw9,!$;3FbMx9(!$(B
"$B:YN3EY$N>pJsDI@W$K$h$k5!L)>pJsAw?.$NF0E*@)8f
$B>>0f(B $B9(N
"AnT$B%*%Z%l!<%F%#%s%0%7%9%F%`$K$*$1$k9bB.%U%!%$%kE>Aw=hM}5!9=!$(B"
$B>pJs=hM}3X2qBh(B125$B2s%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2013-OS-125$B!$(Bno.9$B!$(Bpp.1-7$B!$EE;RG^BN!$(B(4$B!$(B2013)$B!%(B
$BP26%!$;3FbMx9(!$(B
"Android$B$K$*$1$k(BWebView$B$N@H
$BDaC+>;90!$;3FbMx9(!$C+8}=(IW!$(B
"AnT$B%*%Z%l!<%F%#%s%0%7%9%F%`$K$*$1$kDc5!G=(BMMU$B$N@)8fK!!$(B"
$B>pJs=hM}3X2qBh(B124$B2s%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2013-OS-124$B!$(Bno.11$B!$(Bpp.1-7$B!$EE;RG^BN!$(B(3$B!$(B2013)$B!%(B
Goichiro Hanaoka$B!$(BToshihiro Yamauchi$B!$(B
Advances in Information and Computer Security - IWSEC 2012$B!$(B
Lecture Notes in Computer Science, Vol.7631, Springer-Verlag (10, 2012).
$BJ!Eg7rB@!$;3FbMx9(!$C+8}=(IW!$(B
"$B2D;k2=$H%U%#%k%?%j%s%05!G=$K$h$j5!L)>pJs$N3H;6DI@W$r;Y1g$9$k5!9=$N
Masaya Sato, Toshihiro Yamauchi,
"VMM-Based Log-Tampering and Loss Detection Scheme,"
Journal of Internet Technology, Vol.13, No.4, pp.655-666, (7, 2012).($BDT0f=ECK%;%-%e%j%F%#3X@8O@J8>^(B $B>pJs%;%-%e%j%F%#3X@8>^(B $B^(B)
Toshihiro Yamauchi, Kenji Yamamoto,
"LSMPMON: Performance Evaluation Mechanism of LSM-based Secure OS,"
International Journal of Security and Its Applications (IJSIA), Vol.6, No.2, pp.81-89 (4, 2012).
$BLp57??Li!$CfB
$B?9;3(B $B1QL@!$;3Fb(B $BMx9(!$G5B<(B $BG=@.!$C+8}(B $B=(IW!$(B
"$B7QB335G0$K4p$E$/(BCMP $B8~$1%9%1%8%e!<%i$N
$BEE;R>pJsDL?.3X2qO@J8;o(BD$B!$(Bvol.J95-D$B!$(Bno.3$B!$(Bpp.400-411$B!$(B(3$B!$(B2012)$B!%(B
$B:4F#(B $B>-Li!$;3Fb(B $BMx9(!$(B
"$B%m%0$N2~$6$s$HAS<:$rKI;_$9$k%7%9%F%`$N2>A[7W;;5!%b%K%?$K$h$k
Yuuki Furukawa, Toshihiro Yamauchi, Hideo Taniguchi,
"Novel Control Method for Preventing Missed Deadlines in Periodic Scheduling,"
The 1st Workshop on Advances in Data Engineering and Mobile Computing (DEMoC-2012),
Proceedings of the 2012 15th International Conference on Network-Based Information Systems, pp.459-464, (9, 2012).
Toshihiro Yamauchi, Akira Kinoshita, Taisuke Kawahara, Hideo Taniguchi,
"Design of an OS Architecture that Simplifies Understanding of Operating System Behavior,"
Proceedings of 2012 International Conference on Information Technology and Computer Science (ITCS 2012), pp.51-58, (7, 2012).
$BO!2,(B $B59L@!$DaC+(B $B>;90!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"AnT$B%*%Z%l!<%F%#%s%0%7%9%F%`$K$*$1$k%I%i%$%P%W%m%;%9F~BX$(5!G=!$(B"
$BBh(B20$B2s%^%k%A%a%G%#%"DL?.$HJ,;6=hM}%o!<%/%7%g%C%W(B (DPSWS2012)$BO@J8=8!$(Bvol.2012$B!$(Bno.4$B!$(Bpp.202-209$B!$(B(10$B!$(B2012)$B!%(B
$B:4F#(B $B>-Li!$;3Fb(B $BMx9(!$(B
"$B%i%$%V%i%j$NCV$-49$($K$h$k(BVM$B30It$X$N0BA4$J%m%0E>AwJ}<0$NDs0F!$(B"
$BBh(B59$B2s%3%s%T%e!<%?%;%-%e%j%F%#8&5fH/I=2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2012-CSEC-59$B!$(Bno.6$B!$EE;RG^BN!$(B(12$B!$(B2012)$B!%(B
Masaya Sato, Toshihiro Yamauchi,
"Secure log transfer in virtual machine with minimal modification to library,"
The 7th International Workshop on Security (IWSEC2012), poster (11, 2012).
$BLp57??Li!$;3FbMx9(!$(B
"SEAndroid$B$N3HD%$K$h$k(BAP$B$NF0E*@)8f
$B:48EED7r;V!$[FED7=M4!$O!2,59L@!$;3FbMx9(!$C+8}=(IW!$(B
"AnT$B%*%Z%l!<%F%#%s%0%7%9%F%`$K$*$1$k%^%k%A%3%"4D6-$G$NIi2YJ,;6I>2A!$(B"
$BBh(B152$B2s%^%k%A%a%G%#%"DL?.$HJ,;6=hM}8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2012-DPS-152$B!$(Bno.31$B!$EE;RG^BN!$(B(9$B!$(B2012)$B!%(B
$B;3K\(B $B5.Bg!$D90f(B $B7r8g!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%^%k%A%3%"(BTender$B$N3+H/!$(B"
$BJBNs(B/$BJ,;6(B/$B6(D4=hM}$K4X$9$k!XD;
$BDaC+(B $B>;90!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"AnT$B$K$*$1$k(BSH-4$B8~$1%5!<%P%W%m%0%i%`4VDL?.5!9=$N9bB.2=
$B>pJs=hM}3X2q%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2012-OS-121$B!$(Bno.7$B!$EE;RG^BN!$(B(5$B!$(B2012)$B!%(B
$B0l0f(B $B@2Fa!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender$B%*%Z%l!<%F%#%s%0%7%9%F%`$K$*$1$kF~=PNO@-G=D4@05!G=$NI>2A!$(B"
$B>pJs=hM}3X2q%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2012-OS-121$B!$(Bno.6$B!$EE;RG^BN!$(B(5$B!$(B2012)$B!%(B
$BBgDZ(B $BE8?M!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B5!L)>pJs$N3H;6DI@W5!G=$NJ,;64D6-$X$NBP=hK!!$(B"
$BEE;R>pJsDL?.3X2q(B 2012$BG/Am9gBg2q(B $B>pJs!&%7%9%F%`9V1iO@J8=8(B2$B!$(Bp.213$B!$(B(3$B!$(B2012)$B!%(B
$B8E@nM'
$BEE;R>pJsDL?.3X2q(B 2012$BG/Am9gBg2q(B $B>pJs!&%7%9%F%`9V1iO@J8=8(B1$B!$(Bp.79$B!$(B(3$B!$(B2012)$B!%(B
$BDaC+>;90!$;3FbMx9(!$C+8}=(IW!$(B
"AnT$B$K$*$1$k(BSH-4$B8~$1%5!<%P%W%m%0%i%`4VDL?.$N9bB.2=
$BO!2,(B $B59L@!$DaC+(B $B>;90!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"AnT$B%*%Z%l!<%F%#%s%0%7%9%F%`$K$*$1$k(BNIC$B%I%i%$%P%W%m%;%9F~$lBX$(5!G=!$(B"
$BEE;R>pJsDL?.3X2q(B 2012$BG/Am9gBg2q(B $B>pJs!&%7%9%F%`9V1iO@J8=8(B1$B!$(Bp.76$B!$(B(3$B!$(B2012)$B!%(B
$B;3K\(B $B5.Bg!$D90f(B $B7r8g!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%^%k%A%3%"(BTender$B$K$*$1$k;q8;!V<~4|%?%$%^!W$N
$BD90f(B $B7r8g!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%^%k%A%3%"8~$1(BTender$B$N3+H/!$(B"
$BEE;R>pJsDL?.3X2q(B 2012$BG/Am9gBg2q(B $B>pJs!&%7%9%F%`9V1iO@J8=8(B1$B!$(Bp.74$B!$(B(3$B!$(B2012)$B!%(B
$B1|ED(B $B7r;L!$CfL3(B $BN
"Android$B$K$*$1$k>pJsEAHB$NDI@W$HO31LKI;_
$B>>86(B $B?rM5!$EZC+(B $B>45A!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%G%#%l%/%H%jM%@hJ}<0$K$*$1$k8z2LE*$JM%@h%G%#%l%/%H%j$N@_DjK!!$(B"
$B>pJs=hM}3X2q%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2012-OS-120$B!$(Bno.9$B!$EE;RG^BN!$(B(2$B!$(B2012)$B!%(B
$B:4F#(B $B>-Li!$;3Fb(B $BMx9(!$(B
"$B2>A[7W;;5!%b%K%?$K$h$j%m%0$N2~$6$s$d>C<:$r8!CN$9$kJ}<0$N
$B;3Fb(B $BMx9(!$>eB<(B $B>;M5!$H*Cf(B $BNIB@!$(B
"$BH=Dj$KMxMQ$9$k%H!<%/%s$N8BDj$K$h$k%Y%$%8%"%s%U%#%k%?$NH=Dj@:EY8~>e
$B;3K\(B $B8-<#!$;3Fb(B $BMx9(!$(B
"$B@-G=I>2A5!9=(BLSMPMON$B$K$h$k%;%-%e%"(BOS$B$NI>2A!$(B"
$B>pJs=hM}3X2qO@J8;o!J%F%/%K%+%k%N!<%H!K!$(BVol.52$B!$(BNo.9$B!$(Bpp.2596-2601$B!$(B(9, 2011)$B!%(B
Yuuki Furukawa, Toshihiro Yamauchi, Hideo Taniguchi,
"Implementation and Evaluation for Sophisticated Periodic Execution Control in Embedded Systems,"
International Journal of Control and Automation, vol.4, no.2, pp.59-78, (6, 2011).
Masaya Sato, Toshihiro Yamauchi,
"VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss,"
2011 International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD'11),
Lecture Notes in Computer Science, vol.6908, pp.176-190, (8$B!$(B2011).
Hideaki Moriyama, Toshihiro Yamauchi, Hideo Taniguchi,
"Control Method of Multiple Services for CMP Based on Continuation Model,"
Proceedings of the 4th International Conference on Interaction Sciences: IT, Human and Digital Content (ICIS 2011), pp.83-89, (8, 2011).
$BEZC+(B $B>45A!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%-%c%C%7%e%R%C%HN($KCeL\$7$?F~=PNO%P%C%U%!$N<+F0J,3d!$(B"
$B>pJs=hM}3X2q(B $B%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2011)$BO@J8=8!$(Bvol.2011$B!$(Bpp.62-72$B!$(B(11$B!$(B2011)$B!%(B
$BLp57(B $B??Li!$CfB<(B $BM:0l!$;3Fb(B $BMx9(!$(B
"SELinux$B$NITMW$J%;%-%e%j%F%#%]%j%7:o8:$N<+F02=
$BJ!Eg(B $B7rB@!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B5!L)>pJs$N3H;67PO)$r2D;k2=$9$k5!G=$NDs0F!$(B"
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B2011 $BO@J8=8(B(CSS2011)$B!$(Bvol.2011$B!$(Bno.3$B!$(Bpp.367-372$B!$(B(10$B!$(B2011)$B!%(B
$B8E@n(B $BM'
$B2F$N%W%m%0%i%_%s%0!&%7%s%]%8%&%`(B2011$BJs9p=8!$(Bpp.57-64$B!$(B(9$B!$(B2011)$B!%(B
$B;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B7W;;5!$N5!L)>pJs$NO31LKI;_$H%m%0$N3N
$BBh(B16$B2s2,;3%j%5!<%A%Q!<%/8&5f!&E8<(H/I=2q!$(B(9$B!$(B2011)$B!%(B
$BDaC+(B $B>;90!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"SH-4$B>e$GF0:n$9$k(BAnT $B%*%Z%l!<%F%#%s%0%7%9%F%`$N%5!<%P%W%m%0%i%`4VDL?.5!9=$NI>2A!$(B"
$BJBNs(B/$BJ,;6(B/$B6(D4=hM}$K4X$9$k!X;yEg!Y%5%^!pJs=hM}3X2q8&5fJs9p!$(Bvol.2011-OS-118$B!$(Bno.12$B!$EE;RG^BN!$(B(7$B!$(B2011)$B!%(B
$BFqGH(B $B9(B'!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender $B%*%Z%l!<%F%#%s%0%7%9%F%`$K$*$1$k
$BJBNs(B/$BJ,;6(B/$B6(D4=hM}$K4X$9$k!X;yEg!Y%5%^!pJs=hM}3X2q8&5fJs9p!$(Bvol.2011-OS-118$B!$(Bno.13$B!$EE;RG^BN!$(B(7$B!$(B2011)$B!%(B
$BEZC+(B $B>45A!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%-%c%C%7%e%R%C%HN($KCeL\$7$?F~=PNO%P%C%U%!J,3dK!!$(B"
$BJBNs(B/$BJ,;6(B/$B6(D4=hM}$K4X$9$k!X;yEg!Y%5%^!pJs=hM}3X2q8&5fJs9p!$(Bvol.2011-OS-118$B!$(Bno.18$B!$EE;RG^BN!$(B(7$B!$(B2011)$B!%(B
$B0l0f(B $B@2Fa!$D9Hx(B $B>0!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender $B%*%Z%l!<%F%#%s%0%7%9%F%`$K$*$1$k;q8;!VF~=PNO!W$N
$BJBNs(B/$BJ,;6(B/$B6(D4=hM}$K4X$9$k!X;yEg!Y%5%^!pJs=hM}3X2q8&5fJs9p!$(Bvol.2011-OS-118$B!$(Bno.19$B!$EE;RG^BN!$(B(7$B!$(B2011)$B!%(B
$B:4F#(B $B>-Li!$;3Fb(B $BMx9(!$(B
"$B2>A[7W;;5!%b%K%?$K$h$k%+!<%M%k%m%0
$BBh(B54$B2s%3%s%T%e!<%?%;%-%e%j%F%#!&Bh(B1$B2s>pJs%;%-%e%j%F%#?4M}3X$H%H%i%9%H9gF18&5fH/I=2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2011-CSEC-54 2011-SPT-1$B!$(Bno.28$B!$EE;RG^BN!$(B(7$B!$(B2011)$B!%(B
$BLp57(B $B??Li(B, $BCfB<(B $BM:0l(B, $B;3Fb(B $BMx9((B,
"SELinux$B$NITMW$J%;%-%e%j%F%#%]%j%7:o8:
$BBh(B53$B2s%3%s%T%e!<%?%;%-%e%j%F%#!&Bh(B13$B2s%$%s%?!<%M%C%H$H1?MQ5;=Q9gF18&5fH/I=2q!$>pJs=hM}3X2q8&5fJs9p(B, vol.2011-CSEC-53 2011-IOT-13, no.13, $BEE;RG^BN(B (5$B!$(B2011). (IOT$B8&5f2q(B $B3X@8>)Ne>^(B $B^(B)
$BDaC+(B $B>;90!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"AnT $B%*%Z%l!<%F%#%s%0%7%9%F%`$N(BSH-4$B$X$N0\?"!$(B"
$B>pJs=hM}3X2q%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2011-OS-117$B!$(Bno.3$B!$EE;RG^BN(B (4$B!$(B2011)$B!%(B
$B?9;3(B $B1QL@!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B7QB335G0$K4p$E$/(BCMP$B$K$*$1$kJ#?t%5!<%S%9$N@)8f!$(B"
$B>pJs=hM}3X2q%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2011-OS-117$B!$(Bno.29$B!$EE;RG^BN(B (4$B!$(B2011)$B!%(B
$B8E@n(B $BM'
$B>pJs=hM}3X2qBh(B73$B2sA49qBg2q9V1iO@J8=8(B ($BJ,:}(B1)$B!$(Bpp.39-40$B!$(B(3$B!$(B2011)$B!%(B
$BD9Hx(B $B>0!$0l0f(B $B@2Fa!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender $B%*%Z%l!<%F%#%s%0%7%9%F%`$K$*$1$k;q8;!VF~=PNO!W$NDs0F!$(B"
$B>pJs=hM}3X2q%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2011-OS-116$B!$(Bno.4$B!$EE;RG^BN!$(B(1$B!$(B2011)$B!%(B
Toshihiro Yamauchi, Kazuhiro Fukutomi, Hideo Taniguchi,
"ISIPC: Instant Synchronous Interprocess Communication,"
Journal of Next Generation Information Technology, vol.1, no.3, pp.75-83, (11, 2010).
$BLg(B $BD>;K!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B2A!$(B"
$BEE;R>pJsDL?.3X2qO@J8;o(BD$B!$(BVol.J93-D$B!$(BNo.11$B!$(Bpp.2380-2389$B!$(B(11$B!$(B2010)$B!%(B
$BEg:j(B $BBY!$;3Fb(B $BMx9(!$G5B<(B $BG=@.!$C+8}(B $B=(IW!$(B
"AnT $B%*%Z%l!<%F%#%s%0%7%9%F%`$K$*$1$k(BLinux$B$N(BLKM$B7A<0%I%i%$%P$N%W%m%;%92=
Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Yamauchi,
"SELinux Security Policy Configuration System with Higher Level Language,"
Journal of Information Processing, Vol.18, pp.201-212, (9, 2010).
$BJR>e(B $BC#Li!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%U%!%$%kA`:n$N%7%9%F%`%3!<%kH/9TIQEY$K4p$E$/%P%C%U%!%-%c%C%7%e@)8fK!$NDs0F!$(B"
$B>pJs=hM}3X2qO@J8;o!'%3%s%T%e!<%F%#%s%0%7%9%F%`(B(ACS)$B!$(Bvol.3$B!$(Bno.1$B!$(Bpp.50-60$B!$(B(3$B!$(B2010)$B!%(B
$BCfB<(B $BM:0l!$;3Fb(B $BMx9(!$(B
"$B%;%-%e%j%F%#%]%j%7!<@_Dj4J0W2=
Toshihiro Yamauchi, Takayuki Hara, Hideo Taniguchi,
"A Mechanism that Bounds Execution Performance for Process Group for Mitigating CPU Abuse,"
2010 International Conference on Security Technology (SecTech2010),
Communications in Computer and Information Science (CCIS), vol.122, pp.84-93, (12, 2010).
The Second International Mega-Conference on Future Generation Information Technology(FGIT2010), (Best Paper Award)
Kenji Yamamoto, Toshihiro Yamauchi,
"Evaluation of Performance of Secure OS using Performance Evaluation Mechanism of LSM-based LSMPMON,"
2010 International Conference on Security Technology (SecTech2010),
Communications in Computer and Information Science (CCIS), vol.122, pp.57-67, (12, 2010).
Yuuki Furukawa, Toshihiro Yamauchi, Hideo Taniguchi,
"Proposal for Sophisticated Periodic Execution Control in Embedded Systems,"
The 2nd International Conference on Advanced Science and Technology(AST2010),
Lecture Notes in Computer Science (LNCS), vol.6485, pp.549-563, (12, 2010).
$BEZC+(B $B>45A!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$BM%@h(B/$BHsM%@h=hM}$N
$BF#86(B $B9/9T!$0f>e(B $B4n90!$8eF#(B $BM$2p!$;3Fb(B $BMx9(!$G5B<(B $BG=@.!$C+8}(B $B=(IW!$(B
"AnT $B$K$*$1$kDL?.@)8f%5!<%PF~$lBX$(=hM}$NI>2A!$(B"
$BBh(B18$B2s%^%k%A%a%G%#%"DL?.$HJ,;6=hM}%o!<%/%7%g%C%W(B (DPSWS2010)$BO@J8=8!$(Bvol.2010$B!$(Bno.11$B!$(Bpp.101-106$B!$(B(10$B!$(B2010)$B!%(B
$B:4F#(B $B>-Li!$;3Fb(B $BMx9(!$(B
"$B2>A[7W;;5!%b%K%?$K$h$k%m%0$N2~$6$s$HAS<:KI;_%7%9%F%`$N@_7W!$(B"
$B>pJs=hM}3X2q(B $B%^%k%A%a%G%#%"!$J,;6!$6(D4$H%b%P%$%k(B(DICOMO2010)$B%7%s%]%8%&%`!$(Bpp.213-220$B!$(B(7$B!$(B2010)$B!%(B
$B8E@n(B $BM'
$BEE;R>pJsDL?.3X2q%3%s%T%e!<%?%7%9%F%`(B(CPSY)$B8&5f2q!$(Bvol.110$B!$(Bno. 278$B!$(Bpp.23-28$B!$(B(11$B!$(B2010)$B!%(B
$B;3K\(B $B8-<#!$;3Fb(B $BMx9(!$(B
"LIM$B$rMQ$$$?@-G=I>2A5!9=(BLIMPMON$B$N@_7W!$(B"
$B>pJs=hM}3X2q(B $B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B2010(CSS2010)$B!$(Bvol.2010$B!$(Bno.9$B!$(Bpp.255-259$B!$(B(10$B!$(B2010)$B!%(B
$B:4F#(B $B>-Li!$;3Fb(B $BMx9(!$(B
"$B2>A[7W;;5!%b%K%?$K$h$k%m%0$N2~$6$s$HAS<:KI;_%7%9%F%`$NDs0F$HI>2A!$(B"
$B>pJs=hM}3X2q(B $B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B2010(CSS2010)$B!$(Bvol.2010$B!$(Bno.9$B!$(Bpp.261-266$B!$(B(10$B!$(B2010)$B!%(B
$BCfL3(B $BN
"$B%U%!%$%kA`:n$K$h$k>pJsEAHB$NDI@W5!G=$H2D;k2=5!G=!$(B"
$BBh(B9$B2s>pJs2J3X5;=Q%U%)!<%i%`(B(FIT2010)$B!$9V1iO@J8=8(B $BBh(B4$BJ,:}!$(Bpp.251-252$B!$(B(9$B!$(B2010)$B!%(B
$B8E@n(B $BM'
$B8E@n(B $BM'
$B0f>e(B $B4n90!$C+8}(B $B=(IW!$;3Fb(B $BMx9(!$(B
"AnT $B%*%Z%l!<%F%#%s%0%7%9%F%`$K$*$1$k(BTCP/IP $BDL?.5!G=$N
$BD90f(B $B7r8g!$;3K\(B $BM*B@!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender $B$N@$Be4IM}5!G=$N
$B8E@n(B $BM'
$B>pJs=hM}3X2q(B $BBh(B168$B2s%=%U%H%&%'%"9)3X!&Bh(B17$B2sAH9~$_%7%9%F%`(B $B9gF18&5fH/I=2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2010-EMB-17$B!$(Bno.1$B!$(Bpp.1-7$B!$(B(6$B!$(B2010)$B!%(B
$BD90f(B $B7r8g!$;3K\(B $BM*B@!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender $B$N@$Be4IM}5!G=$N@_7W!$(B"
$B>pJs=hM}3X2q%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2010-OS-114$B!$(Bno.14$B!$EE;RG^BN!$(B(4$B!$(B2010)$B!%(B
$BD9Hx(B $B>0!$;3Fb(B $BMx9(!$C+8}(B $B=(IW!$(B
"$BF~=PNOMW5a?t$N@)8f$K$h$j%5!<%S%9;~4V$rD4@0$9$k@)8fK!$NI>2A!$(B"
$B>pJs=hM}3X2q%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2010-OS-114$B!$(Bno.10$B!$EE;RG^BN!$(B(4$B!$(B2010)$B!%(B
$BEg:j(B $BBY!$EDC<(B $BMx9(!$G5B<(B $BG=@.!$C+8}(B $B=(IW!$(B
"AnT $B%*%Z%l!<%F%#%s%0%7%9%F%`$K$*$1$k(BLinux$B$N(BLKM$B7A<0%I%i%$%P$N%W%m%;%92=
$B8E@n(B $BM'
$BEZC+(B $B>45A!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$(B
"$BM%@h=hM}$N
$B6-(B $B9V0l!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$H"
"$B%i%$%V%i%j
$B>pJs=hM}3X2q%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(Bvol.2010-OS-113$B!$(Bno.14$B!$EE;RG^BN!$(B(1$B!$(B2010)$B!%(B
$BLg(B $BD>;K!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%<%m%3%T!
$B;3K\(B $B8-<#!$EDC<(B $BMx9(!$(B
"LSM$B$rMQ$$$?@-G=I>2A5!9=(BLSMPMON$B$K$h$k%;%-%e%"(BOS$B$NI>2A!$(B"
2010$BG/0E9f$H>pJs%;%-%e%j%F%#%7%s%]%8%&%`(B(SCIS2010)$BO@J8=8!$(BCD-ROM$B!$(B(1$B!$(B2010)$B!%(B
$B?"B<(B $B?80lO:!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$(B
"$BJ#?t7W;;5!4V$K$*$1$k5!L)>pJs$N3H;6DI@W5!G=$N@_7W!$(B"
2010$BG/0E9f$H>pJs%;%-%e%j%F%#%7%s%]%8%&%`(B(SCIS2010)$BO@J8=8!$(BCD-ROM$B!$(B(1$B!$(B2010)$B!%(B
$B86(B $B?rG7!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$(B
"$BITEv$J%W%m%;%C%5;HMQ$rM^@)$9$k%W%m%;%9%0%k!<%W
2010$BG/0E9f$H>pJs%;%-%e%j%F%#%7%s%]%8%&%`(B(SCIS2010)$BO@J8=8!$(BCD-ROM$B!$(B(1$B!$(B2010)$B!%(B
$BEDC<(B $BMx9(!$H"
"$B5!L)>pJs$N3H;6DI@W5!G=$K$h$k>pJsO3$($$$NKI;_5!9=!$(B"
$B>pJs=hM}3X2qO@J8;o!$(BVol.50$B!$(BNo.9$B!$(Bpp.2088-2102$B!$(B(9, 2009)$B!%(B
$B>>ED(B $BD>?M!$:4F#(B $BOB:H!$EDC<(B $BMx9(!$=!F#(B $B@?<#!$(B
"LSM$B$rMxMQ$7$?%;%-%e%"(BOS$B$N@-G=I>2A5!G=$N
$BEE;R>pJsDL?.3X2qO@J8;o(BD$B!$(BVol.J92-D$B!$(BNo.7$B!$(Bpp.963-974$B!$(B(7$B!$(B2009)$B!%(B
$BEDC<(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender $B%*%Z%l!<%F%#%s%0%7%9%F%`$K$*$1$k%X%F%m2>A[5-21!J(BHVS$B!K$N
$BEE;R>pJsDL?.3X2qO@J8;o(BD$B!$(BVol.J92-D$B!$(BNo.1$B!$(Bpp.12-24$B!$(B(1$B!$(B2009)$B!%(B
Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Tabata,
"SEEdit: SELinux Security Policy Configuration System with Higher Level Language,"
Proc. of LISA'09: 23rd Large Installation System Administration Conference, pp.107-117, (11, 2009).
$BJR>e(B $BC#Li!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%U%!%$%kA`:n$N%7%9%F%`%3!<%kH/9TIQEY$K4p$E$/%P%C%U%!%-%c%C%7%e@)8fK!$NDs0F!$(B"
$B>pJs=hM}3X2q(B $B%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2009)$BO@J8=8!$(Bvol.2009$B!$(BNo.13$B!$(Bpp.111-118$B!$(B(11$B!$(B2009)$B!%(B
$BC+8}(B $B=(IW!$F#86(B $B9/9T!$8eF#(B $BM$2p!$EDC<(B $BMx9(!$G5B<(B $BG=@.!$(B
"AnT $B$K$*$1$k(BOS$B%5!<%PF~$lBX$(5!G=$NI>2A!$(B"
$BBh(B17$B2s%^%k%A%a%G%#%"DL?.$HJ,;6=hM}%o!<%/%7%g%C%W(B (DPSWS2009)$B!$%^%k%A%a%G%#%"DL?.$HJ,;6=hM}%o!<%/%7%g%C%WO@J8=8!$(Bvol.2009$B!$(Bno.9$B!$(Bpp.261-266$B!$(B(10$B!$(B2009)$B!%(B
$BEDC<(B $BMx9(!$EZC+(B $B>45A!$;3ED(B $B9nBY!$C+8}(B $B=(IW!$(B
"$B%G%#%l%/%H%jM%@hJ}<0$K$*$1$kJ]8n%W!<%k%5%$%:@)8B5!G=$H%P%C%U%!0\F05!G=$N@_7W!$(B"
$BEE;R>pJsDL?.3X2q%3%s%T%e!<%?%7%9%F%`(B(CPSY)$B8&5f2q!$EE;R>pJsDL?.3X2q5;=Q8&5fJs9p!$(Bvol.109$B!$(BNo.296$B!$(Bpp.43-48$B!$(B(11$B!$(B2009)$B!%(B
$B0BF#(B $BN`1{!$9b66(B $B0l;V!$EDC<(B $BMx9(!$?\:j(B $BM-9/!$(B
"$BE}9g2>A[2=%7%9%F%`%b%K%?$rMQ$$$?%^%k%&%'%"$N%W%m%U%!%$%j%s%0!$(B"
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`O@J8=8!$BhFsJ,:}!$(Bpp.793-798$B!$(B(10$B!$(B2009)$B!%(B
$B>eB<(B $B>;M5!$EDC<(B $BMx9(!$(B
"$BFCD'E*$J%H!<%/%s$,A4%H!<%/%s$K@j$a$k3d9g$r4p$K$7$?LBOG%a!<%kH=DjK!$NDs0F!$(B"
$B>pJsDL?.%7%9%F%`%;%-%e%j%F%#(B(ICSS)$B8&5f2q!$EE;R>pJsDL?.3X2q5;=Q8&5fJs9p!$(BVol.109$B!$(BNo.33$B!$(Bpp.27-32$B!$(B(5$B!$(B2009)$B!%(B
$B6-(B $B9V0l!$EDC<(B $BMx9(!$C+8}=(IW!$H"
"$B%W%m%0%i%`$NAv9T%b!<%I$r9MN8$7$?
$B>pJs=hM}3X2q%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(BVol.2009-OS-111$B!$(BNo.6$B!$(Bpp.99-106$B!$(B(4$B!$(B2009)$B!%(B
$BLZ2<(B $B>4!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%W%m%;%9$NAv9T%b!<%I$r9MN8$7$?2D;k2=I=<(It$N
$B6-(B $B9V0l!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$H"
"$B%W%m%0%i%`
$BD9Hx(B $B>0!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$(B
"$BF~=PNO%9%m%C%H$rMQ$$$?F~=PNO@-G=$ND4@05!G=$NDs0F!$(B"
$BEE;R>pJsDL?.3X2q(B2009$BG/Am9gBg2q9V1iO@J8=8!$(BVol.2009$B!$(BNo.4$B!$(Bp.70$B!$(B(3$B!$(B2009)$B!%(B
$B86(B $B?rG7!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender $B$K$*$1$k;q8;!V1i;;!W$rMxMQ$7$?%W%m%;%9%0%k!<%W
$BJ!Eg(B $B7rB@!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B5!L)>pJs$N3H;6DI@W5!G=$K$*$1$k2D;k2=5!G=$N@_7W!$(B"
$BEE;R>pJsDL?.3X2q(B2009$BG/Am9gBg2q9V1iO@J8=8!$(BVol.2009$B!$(BNo.4$B!$(Bp.67$B!$(B(3$B!$(B2009)$B!%(B
$B:4Gl82<#!$EDC
$BBh(B138$B2s%^%k%A%a%G%#%"DL?.$HJ,;6=hM}!&(B $BBh(B44$B2s%3%s%T%e!<%?%;%-%e%j%F%#9gF18&5fH/I=2q!$(BVol.2009$B!$(BNo.20$B!$(Bpp.55-60$B!$(B(3$B!$(B2009)$B!%(B
$B6-(B $B9V0l!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$H"
"$B%W%m%0%i%`$NAv9T%b!<%I$r9MN8$7$?
$B>eB<(B $B>;M5!$EDC<(B $BMx9(!$(B
"$BMxMQ$9$k%H!<%/%s$r8BDj$7$?%Y%$%8%"%s%U%#%k%?$K$h$kLBOG%a!<%kBP:v$N@_7W$HI>2A!$(B"
2009$BG/0E9f$H>pJs%;%-%e%j%F%#%7%s%]%8%&%`(B(SCIS2009)$B!$(B(1$B!$(B2009)$B!%(B
$B:4Gl(B $B82<#!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender $B$N;q8;:FMxMQ5!G=$rMxMQ$7$?9bB.(Bfork&exec$B=hM}$N
$BEE;R>pJsDL?.3X2qO@J8;o(BD$B!$(BVol.J91-D$B!$(BNo.12$B!$(Bpp.2892-2903$B!$(B(12, 2008)$B!%(B
$B>eB<(B $B>;M5!$EDC<(B $BMx9(!$(B
"$B%Y%$%8%"%s%U%#%k%?$K$*$1$k2hA|%9%Q%`$N%U%#%k%?%j%s%0J}<0$N
$BEDC<(B $BMx9(!$>.F=(B $B$_$f$-!$G5B<(B $BG=@.!$C+8}(B $B=(IW!$(B
"$B%U%!%$%k$N3JG<%G%#%l%/%H%j$r9MN8$7$?%P%C%U%!%-%c%C%7%e@)8fK!$N
$BEE;R>pJsDL?.3X2qO@J8;o(BD$B!$(BVol.J91-D$B!$(BNo.2$B!$(Bpp.435-448$B!$(B(2, 2008)$B!%(B
Toshihiro Tabata, Hideo Taniguchi,
"An Improved Recyclable Resource Management Method for Fast Process Creation and Reduced Memory Consumption,"
International Journal of Hybrid Information Technology (IJHIT), Vol.1, No.1, pp.31-44, (1, 2008).
Tatsuya Katakami, Toshihiro Tabata, Hideo Taniguchi,
"I/O Buffer Cache Mechanism Based on the Frequency of File Usage,"
Proc. of the third International Conference on Convergence and hybrid Information Technology (ICCIT2008)$B!$(BVol.2$B!$(Bpp.76-82$B!$(B(11, 2008).
Toshihiro Tabata, Kazuhiro Fukutomi, Hideo Taniguchi,
"Proposal of Instant Synchronous Interprocess Communication,"
Proc. of the third International Conference on Convergence and hybrid Information Technology (ICCIT2008), Vol.2$B!$(Bpp.146-149$B!$(B(11, 2008).
Masahiro Uemura, Toshihiro Tabata,
"Design and Evaluation of a Bayesian-filter-based Image Spam Filtering Method,"
Proc. of the 2nd International Conference on Information Security and Assurance (ISA2008), pp.46-51$B!$(B(4, 2008).
Takuto Yamaguchi, Yuichi Nakamura, Toshihiro Tabata,
"Integrated Access Permission: Secure and Simple Policy Description by Integration of File Access Vector Permission,"
Proc. of the 2nd International Conference on Information Security and Assurance (ISA2008), pp.40-45$B!$(B(4, 2008).
$BF#869/9T!$2,K\9,Bg!$EDC
$BBh(B16$B2s%^%k%A%a%G%#%"DL?.$HJ,;6=hM}%o!<%/%7%g%C%W!$(BVol.2008$B!$(BNo.14$B!$(Bpp.201-206$B!$(B(12$B!$(B2008)$B!%(B($B3X@8>)Ne>^(B $B^(B)
$B?"B<(B $B?80lO:!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$2#;3(B $BOB=S!$H"
"$B5!L)>pJs$N3H;6DI@W5!G=$N%=%1%C%HDL?.$X$NE,MQ
$BJR>e(B $BC#Li!$EDC
$B>pJs=hM}3X2q(B $BBh(B27$B2s%7%9%F%`I>2A8&5f2q!$>pJs=hM}3X2q8&5fJs9p!$(BVol.2008$B!$(BNo.119$B!$(Bpp.13-18$B!$(B(12$B!$(B2008)$B!%(B
$BJR>e(B $BC#Li!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%U%!%$%k$N;HMQIQEY$K4p$E$/%P%C%U%!%-%c%C%7%e@)8fK!$NI>2A(B, "
Joint Symposium for Advanced System Software 2008 (JSASS2008)$B!$(BVol.2$B!$(BNo.1$B!$(Bpp.11-24$B!$(B(11$B!$(B2008)$B!%(B
$BLg(B $BD>;K!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender $B$K$*$1$k%a%b%j%Z!<%8$r0U<1$7$?9bB.$J%G!<%?DL?.5!9=!$(B"
$BEE;R>pJsDL?.3X2q%3%s%T%e!<%?%7%9%F%`(B(CPSY)$B8&5f2q!$(BVol.108$B!$(BNo.273$B!$(Bpp.1-6$B!$(B(10$B!$(B2008)$B!%(B
$B;3ED(B $B9nBY!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$G5B<(B $BG=@.!$(B
"$B%U%!%$%k$N3JG<%G%#%l%/%H%j$r9MN8$7$?%P%C%U%!%-%c%C%7%e@)8fK!$N5!G=3H=
$BJ?@.(B20$BG/EY(B $BEE5$!&>pJs4XO"3X2qCf9q;YItO"9gBg2q!$(Bpp.530-531$B!$(B(10$B!$(B2008)$B!%(B
Toshihiro Tabata$B!$(BMasahiro Uemura,
"Design and Evaluation of a Bayesian-filter-based Image Spam Filtering Method$B!$(B"
Japan-Taiwan Joint Research on Cryptography and Information Security towards Next IT-society$B!$(Bpp.133-137$B!$(B(10$B!$(B2008)$B!%(B
$B@P0f(B $B9(
$B%^%k%&%'%"BP:v8&5f?M:`0i@.%o!<%/%7%g%C%W(B2008(MWS 2008)$B!$(BVol.2008$B!$(BNo.8$B!$(Bpp.97-102$B!$(B(10$B!$(B2008)$B!%(B(MWS2008 $B%W%m%0%i%`0Q0wD9>^(B $B^(B)
$B6-(B $B9V0l!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$H"
"$B%i%$%V%i%j
$B>pJs=hM}3X2q%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B2008(CSS2008)$B!$(BVol.2008$B!$(BNo.8$B!$(Bpp.361-366$B!$(B(10$B!$(B2008)$B!%(B
$BEg:j(B $BBY!$C+8}(B $B=(IW!$EDC<(B $BMx9(!$G5B<(B $BG=@.!$(B
"AnT $B%*%Z%l!<%F%#%s%0%7%9%F%`$K$*$1$k(BLinux $B$N(BFD $B%I%i%$%P$N%W%m%;%92=
$B8E@n(B $BM'
$B6-(B $B9V0l!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$H"
"$B%7%9%F%`%3!<%kH/9T4V3V$N@)8f$K$h$k%W%m%;%C%5;HMQNL$ND4@0!$(B"
$B>pJs=hM}3X2q%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p(B 2008-OS-109$B!$(BVol.2008$B!$(BNo.77$B!$(Bpp.101-108$B!$(B(8$B!$(B2008)
$B;3K\(B $BM*B@!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender $B$NF0:n7QB3@)8f5!G=$K$*$1$kF~=PNO%G%P%$%9$N07$$!$(B"
$B>pJs=hM}3X2q%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p(B 2008-OS-109$B!$(BVol.2008$B!$(BNo.77$B!$(Bpp.61-68$B!$(B(8$B!$(B2008)
$BJR>e(B $BC#Li!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$EOJU(B $B90;V!$G5B<(B $BG=@.!$(B
"$B%U%!%$%k$N;HMQIQEY$K4p$E$/%P%C%U%!%-%c%C%7%e@)8fK!!$(B"
$B>pJs=hM}3X2q%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p(B 2008-OS-108$B!$(BVol.2008$B!$(Bpp.115-122 (4$B!$(B2008)
$BBl8}(B $B??0l!$G5B<(B $BG=@.!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$(B
"AnT $B$K$*$1$kF~=PNO5!4oF0:nMzNr$r9MN8$7$?%I%i%$%P%W%m%0%i%`5/F0@)8fK!!$(B"
$BAH$_9~$_5;=Q$H%M%C%H%o!<%/$K4X$9$k%o!<%/%7%g%C%W!$EE;R>pJsDL?.3X2q5;=Q8&5fJs9p!$(BVol.107$B!$(BNo.558$B!$(Bpp.43-48 (3, 2008)$B!%(B
$BLg(B $BD>;K!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$(B
"Tender$B$K$*$1$k;q8;!VF~=PNO!W$rMQ$$$?(BEthernet$BDL?.$N@_7W!$(B"
$BEE;R>pJsDL?.3X2q(B2008$BG/Am9gBg2q!$(Bp.94$B!$(B(3$B!$(B2008)$B!%(B
$BBg66(B $B7D!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$2#;3(B $BOB=S!$H"
"$B5!L)>pJs$N3H;6DI@W5!G=$K$*$1$k>pJsO3$($$$N8!CN@:EY$N8~>e
$B;38}(B $BBs?M!$CfB<(B $BM:0l!$EDC<(B $BMx9(!$(B
"SELinux$B$NITMW$J%;%-%e%j%F%#%]%j%7$N:o8:
$B6-(B $B9V0l!$EDC<(B $BMx9(!$H"
"$B%W%m%;%C%5;HMQNL$N@)8f$K$h$k%W%m%0%i%`
$BJR>e(B $BC#Li!$EDC<(B $BMx9(!$C+8}(B $B=(IW!$(B
"$B%U%!%$%k$N;HMQIQEY$K4p$E$/%P%C%U%!%-%c%C%7%e@)8fK!$NDs0F!$(B"
$B>pJs=hM}3X2qBh(B70$B2sA49qBg2q9V1iO@J8=8(B($BJ,:}(B1)$B!$(Bpp.35-36$B!$(B(3$B!$(B2008)$B!%(B
$BFqGH(B $B90
$B>pJs=hM}3X2q%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p(B 2008-OS-107$B!$(Bvol.2008$B!$(Bno.9$B!$(Bpp.87-94$B!$(B(1$B!$(B2008).
Toshihiro Tabata, Yoshinari Nomura and Hideo Taniguchi:
"A Mechanism of Regulating Execution Performance for Process Group by Execution Resource on Tender Operating System,"
Systems and Computers in Japan, Vol. 38, No. 4, pp. 63-78, (12, 2007).
($BEE;R>pJsDL?.3X2qO@J8;o(B(D-I), Vol.J87-D-I, No.11, pp.961-974, (11, 2004)$B$N1Q8lHG(B)
Toshihiro Tabata, Satoshi Hakomori, Kazutoshi Yokoyama, Hideo Taniguchi,
"A CPU Usage Control Mechanism for Processes with Execution Resource for Mitigating CPU DoS Attack,"
International Journal of Smart Home, Vol. 1, No. 2, pp.109-128 (7, 2007).
Toshihiro Tabata, Hideo Taniguchi,
"A Recyclable Resource Management Method for Fast Process Creation and Reduced Memory Consumption,"
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing IPC-07, pp.194-199, (10, 2007).
Toshihiro Tabata, Satoshi Hakomori, Kazutoshi Yokoyama, Hideo Taniguchi:
"Controlling CPU Usage for Processes with Execution Resource for Mitigating CPU DoS Attack,"
Proceedings of 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007),
The 2007 International Workshop on Interactive Multimedia & Intelligent Services in Mobile and Ubiquitous Computing 2007 (IMIS2007), pp. 141-146, (4, 2007).
Fumiaki Nagano, Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai:
"An Intrusion Detection System which can Restore Altered Data,"
Proc. of the 4th International Conference in IT and Applications (ICITA2007), pp.29-34 (1, 2007).
$BH"
"$B%W%m%0%i%`
$B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B2007$B!$(B(11$B!$(B2007)$B!%(B
$BBg66(B $B7D!$H"
"$B5!L)>pJs$N3H;6DI@W5!G=$rMxMQ$7$?=q$-=P$7@)8f
$B>>EDD>?M!$(B
"LSM$B$rMxMQ$7$?%;%-%e%"(BOS$B$N@-G=I>2A5!9=!$(B"
CELinux Japan Technical Jamboree #18$B!$(B(12$B!$(B2007)$B!%(B
$B>>ED(B $BD>?M!$EDC<(B $BMx9(!$=!F#(B $B@?<#!$(B
"LSM$B$N%*!<%P!<%X%C%IB,Dj$K$h$k%;%-%e%"(BOS$B$N@-G=I>2A!$(B"
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B2007$B!J(BCSS2007)$BO@J8=8!$(Bpp.637-642$B!$(B(11$B!$(B2007)$B!%(B
$B;38}(B $BBs?M!$CfB<(B $BM:0l!$EDC<(B $BMx9(!$(B
"$B%U%!%$%k$N%"%/%;%9%Y%/%?%Q!<%_%C%7%g%s$rE}9g$7$?%"%/%;%9%Q!<%_%C%7%g%s$N0BA4@-I>2A!$(B"
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B2007(CSS2007)$BO@J8=8!$(Bpp.625-630$B!$(B(11$B!$(B2007)$B!%(B
$BLZ2<(B $B>4!$2O86(B $BB@2p!$EDC<(B $BMx9(!$C+8}(B $B=(IW(B:
"Tender $B$K$*$1$k(BOS$BF0:n$N2D;k2=$N$?$a$N2r@O$HI=<(
$B@n9>(B $B=cJ?!$EDC<(B $BMx9(!$C+8}(B $B=(IW(B:
"Tender $B$K$*$1$k(BOS $BF0:n$NGD0.$rL\E*$H$7$?2D;k2=>pJs$N2r@OIt$N
$BBh(B6$B2s>pJs2J3X5;=Q%U%)!<%i%`9V1iO@J8=8!$(Bpp.105-106$B!$(B(9$B!$(B2007)$B!%(B
$B>.F=(B $B$_$f$-!$EDC<(B $BMx9(!$C+8}(B $B=(IW(B:
"$B%[!<%`%Z!<%8$N9=@.%U%!%$%k$rM%@hE*$K%P%C%U%!%-%c%C%7%e$KJ];}$9$k@)8fK!$NI>2A!$(B"
$B>pJs=hM}3X2q%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p(B 2007-OS-106$B!$(Bvol.2007$B!$(Bno.83$B!$(Bpp.95-102$B!$(B(8$B!$(B2007)$B!%(B
$B>eB<(B $B>;M5!$EDC<(B $BMx9((B:
"$B%Y%$%8%"%s%U%#%k%?$K$*$1$k2hA|%9%Q%`$N%U%#%k%?%j%s%0J}<0$N@_7W$HI>2A(B"
$B>pJs=hM}3X2q%3%s%T%e!<%?%;%-%e%j%F%#(B(CSEC)$B8&5f2q!$>pJs=hM}3X2q8&5fJs9p(B 2007-CSEC-38$B!$(Bvol.2007$B!$(Bno.71$B!$(Bpp.311-318$B!$(B(7$B!$(B2007)$B!%(B
$BLZ2<(B $B>4!$2O86(B $BB@2p!$EDC<(B $BMx9(!$C+8}(B $B=(IW(B:
"Tender $B$K$*$1$k(BOS $BF0:n$N2D;k2=$N$?$a$N>pJs<}=8$HI=<($NJ}<0!$(B"
$B>pJs=hM}3X2q%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p(B 2007-OS-105$B!$(Bvol.2007$B!$(Bno.36$B!$(Bpp.31-38$B!$(B(4$B!$(B2007)$B!%(B
$B:4Gl(B $B82<#!$EDC<(B $BMx9(!$C+8}(B $B=(IW(B:
"Tender $B$N;q8;:FMxMQ5!G=$rMxMQ$7$?(Bfork&exec$B=hM}$N9bB.2=!$(B"
$B>pJs=hM}3X2q%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p(B 2007-OS-105$B!$(Bvol.2007$B!$(Bno.36$B!$(Bpp.23-30$B!$(B(4$B!$(B2007)$B!%(B
$B?N2J(B $B6)?M!$LnB<(B $BM5M$!$EDC<(B $BMx9(!$G5B<(B $BG=@.!$C+8}(B $B=(IW(B:
"AnT $B%*%Z%l!<%F%#%s%0%7%9%F%`$K$*$1$k(B $B%W%m%;%9@8@.@)8f5!9=!$(B"
$B>pJs=hM}3X2q%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p(B 2007-OS-105$B!$(Bvol.2007$B!$(Bno.36$B!$(Bpp.7-14$B!$(B(4$B!$(B2007)$B!%(B
$B?N2J(B $B6)?M!$LnB<(B $BM5M$!$EDC<(B $BMx9(!$C+8}(B $B=(IW(B:
"AnT $B$K$*$1$kMxMQMW5a$r7@5!$H$7$?%I%i%$%P%W%m%;%9$N5/F0J}K!!$(B"
$BEE;R>pJsDL?.3X2q(B2007$BG/Am9gBg2q9V1iO@J8=8!$(Bp.22$B!$(B(3$B!$(B2007)$B!%(B
$BBl8}(B $B??0l!$EDC<(B $BMx9(!$G5B<(B $BG=@.!$C+8}(B $B=(IW(B:
"$B%I%i%$%P%W%m%0%i%`$N8zN(E*$J9=@.@)8fK!!$(B"
$B>pJs=hM}3X2qBh(B69$B2sA49qBg2q9V1iO@J8=8!$Bh(B1$BJ,:}!$(Bpp.27-28$B!$(B(3$B!$(B2007)$B!%(B
$B2,K\(B $B9,Bg!$G5B<(B $BG=@.!$EDC<(B $BMx9(!$C+8}(B $B=(IW(B:
"AnT $B$K$*$1$k(BNIC$B%I%i%$%P%W%m%;%9$N
$B:4Gl(B $B82<#!$EDC<(B $BMx9(!$C+8}(B $B=(IW(B:
"Tender $B>e$N(BWeb $B%5!<%P$K$*$1$k;q8;:FMxMQ5!G=$N8z2L!$(B"
$B>pJs=hM}3X2qBh(B69$B2sA49qBg2q9V1iO@J8=8Bh(B1$BJ,:}!$(Bpp.35-36$B!$(B(3$B!$(B2007)$B!%(B
$BG_K\(B $B>;E5!$EDC<(B $BMx9(!$G5B<(B $BG=@.!$C+8}(B $B=(IW(B:
"AnT $B%*%Z%l!<%F%#%s%0%7%9%F%`$K$*$1$k%a%b%jNN0h4IM}$N@_7W$H
$BBgK\(B $BBs
"$B2>A[5-216u4V>e$N%G!<%?IT4xH/@-2=$K$h$k7W;;5!=hM}1JB32=J}<0$NDs0F!$(B"
$B>pJs=hM}3X2q%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p(B 2007-OS-104$B!$(Bvol.2007$B!$(Bno.10$B!$(Bpp.25-32$B!$(B(1$B!$(B2007)$B!%(B
Amril Syalim, Toshihiro Tabata, Kouichi Sakurai
"Usage Control Model and Architecture for Data Confidentiality in Database Service Provider,"
IPSJ Journal (Technical Note)$B!$(BVol.47$B!$(BNo.2$B!$(Bpp.621-626 (2, 2006).
$BEDC<(B $BMx9(!$(B
"SPAM$B%a!<%k%U%#%k%?%j%s%0(B: $B%Y%$%8%"%s%U%#%k%?$N2r@b!$(B"
$B>pJs$N2J3X$H5;=Q!$(BVol.56$B!$(BNo.10$B!$(Bpp.464-468 (10$B!$(B2006)$B!%(B
Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai,
"Actively Modifying Control Flow of Program for Efficient Anormaly Detection,"
10th International Conference on Knowledge-Based & Intelligent Information & Engineering Systems (KES 2006),
Lecture Notes in Computer Science (LNCS), Vol.4252, pp.737-744, (10, 2006).
Takuto Yamaguchi, Yuichi Nakamura, Toshihiro TABATA:
"Proposal of File Access Permission which has both Security and Simplified Configuration,"
PreProc. of the 7th International Workshop on Information Security Applications (WISA2006), pp.151-161 (8, 2006).
Fumiaki Nagano, Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai:
"An Intrusion Detection System using Alteration of Data,"
The IEEE 20th International Conference on Advanced Information Networking and Applications (AINA2006), Vol.1, pp.243-248 (4, 2006).
$BEDC<(B $BMx9(!$>.F=$_$f$-!$snF#(B $B7=!$G5B<(B $BG=@.!$C+8}(B $B=(IW(B:
"$B%U%!%$%k$N3JG<%G%#%l%/%H%j$r9MN8$7$?%P%C%U%!%-%c%C%7%e@)8fK!!$(B"
$B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`%7%s%]%8%&%`O@J8=8!$(Bvol.2006$B!$(Bno.14$B!$(Bpp.53-62$B!$(B(11$B!$(B2006).
$BEDC<(B $BMx9(!$H"
"$B5!L)>pJs$N3H;6DI@W$K$h$kO31L8!CN
$B>>ED(B $BD>?M!$EDC<(B $BMx9(!$(B
"$BFH<+%-%c%C%7%e5!9=$rMQ$$$?0E9f2=%U%!%$%k%7%9%F%`$N9bB.2=
$B;38}(B $BBs?M!$EDC<(B $BMx9((B:
"$B%"%/%;%9%Y%/%?%Q!<%_%C%7%g%s$H6<0R$N4X78$K4X$9$kD4::!$(B"
$BJ?@.(B18$BG/EY(B $BEE5$!&>pJs4XO"3X2qCf9q;YItBh(B57$B2sO"9gBg2q!$(B(10$B!$(B2006).
$B>.F=$_$f$-!$EDC<(B $BMx9(!$C+8}(B $B=(IW(B:
"$B%U%!%$%k$N3JG<%G%#%l%/%H%j$r9MN8$7$?%P%C%U%!%-%c%C%7%e@)8fK!$NI>2A!$(B"
$BJ?@.(B18$BG/EY(B $BEE5$!&>pJs4XO"3X2qCf9q;YItBh(B57$B2sO"9gBg2q!$Bh(B57$B2sO"9gBg2q9V1iO@J8=8!$(Bpp.248-249$B!$(B(10$B!$(B2006).
$B0BC#(B $B=S8w!$EDC<(B $BMx9(!$G5B<(B $BG=@.!$C+8}(B $B=(IW(B:
"AnT $B$K$*$1$k%W%i%0%"%s%I%W%l%$5!G=$N
$BBgK\(B $BBs
"Tender $B$K$*$1$kF0:n7QB3@)8f@Z$jBX$(5!G=$N
$BG_K\(B $B>;E5!$EDC<(B $BMx9(!$G5B<(B $BG=@.!$C+8}(B $B=(IW(B:
"AnT $B$K$*$1$k9bB.$J%W%m%;%94VDL?.$N
$B>.F=(B $B$_$f$-!$snF#(B $B7=!$EDC<(B $BMx9(!$G5B<(B $BG=@.!$C+8}(B $B=(IW(B:
"$B%G%#%l%/%H%j$KCeL\$7$?%P%C%U%!%-%c%C%7%e@)8fK!$NI>2A!$(B"
$BBh(B5$B2s>pJs2J3X5;=Q%U%)!<%i%`9V1iO@J8=8!$(Bpp.147-148$B!$(B(9$B!$(B2006).
$BFqGH(B $B90
$BBh(B5$B2s>pJs2J3X5;=Q%U%)!<%i%`9V1iO@J8=8!$(Bpp.131-132$B!$(B(9$B!$(B2006).
$B>>ED(B $BD>?M!$EDC<(B $BMx9((B:
"$BCY1d=q$-9~$_$rMQ$$$?0E9f2=%U%!%$%k%7%9%F%`$N9bB.2=
$BC+8}(B $B=(IW!$G5B<(B $BG=@.!$EDC<(B $BMx9(!$0BC#(B $B=S8w!$LnB<(B $BM5M$!$G_K\(B $B>;E5!$?N2J(B $B6)?M(B:
"$BE,1~@-$H7xO4@-$r$"$o$;;}$D(BAnT $B%*%Z%l!<%F%#%s%0%7%9%F%`!$(B"
$B>pJs=hM}3X2q%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p(B 2006-OS-103$B!$(Bvol.2006$B!$(Bno.86$B!$(Bpp.71-78$B!$(B(7$B!$(B2006)$B!%(B
$BEDC<(B $BMx9(!$C+8}(B $B=(IW(B:
"$B%X%F%m2>A[5-21(B(HVS)$B$NI>2A!$(B"
$B>pJs=hM}3X2q%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q!$>pJs=hM}3X2q8&5fJs9p(B 2006-OS-102$B!$(Bvol.2006$B!$(Bno.44$B!$(Bpp.29-36$B!$(B(5$B!$(B2006)$B!%(B
$BC+8}(B $B=(IW!$G5B<(B $BG=@.!$EDC<(B $BMx9((B:
"AnT $B%*%Z%l!<%F%#%s%0%7%9%F%`$N@_7W!$(B"
$B>pJs=hM}3X2qBh(B68$B2sA49qBg2q9V1iO@J8=8Bh(B1$BJ,:}!$(Bpp.41-42$B!$(B(3$B!$(B2006)$B!%(B
$BEDC<(B $BMx9(!$G_K\(B $B>;E5!$0BC#(B $B=S8w!$C+8}(B $B=(IW(B:
"AnT $B%*%Z%l!<%F%#%s%0%7%9%F%`$N%a%b%jNN0h4IM}!$(B"
$B>pJs=hM}3X2qBh(B68$B2sA49qBg2q9V1iO@J8=8Bh(B1$BJ,:}!$(Bpp.45-46$B!$(B(3$B!$(B2006)$B!%(B
$B;38}(B $BBs?M!$CfB<(B $BM:0l!$EDC<(B $BMx9((B:
"$B0BA4@-$H@_Dj$N4J0W2=$rN>N)$5$;$?%U%!%$%k%"%/%;%9%Q!<%_%C%7%g%s$NDs0F!$(B"
2006$BG/0E9f$H>pJs%;%-%e%j%F%#%7%s%]%8%&%`(B(SCIS2006)$B!$(B(1$B!$(B2006)$B!%(B
$BK-J!(B $BC#Li!$EDC<(B $BMx9(!$]/0f(B $B9,0l(B:
"$B%a%=%C%I
Amril Syalim$B!$(BToshihiro Tabata$B!$(BKouichi Sakurai:
"Controlling Access in Databases by Outsourcing Access Control to Trusted Third Parties$B!$(B"
2006$BG/0E9f$H>pJs%;%-%e%j%F%#%7%s%]%8%&%`(B(SCIS2006)$B!$(B(1$B!$(B2006)$B!%(B
$BJ!Eg(B $BOB1Q!$EDC<(B $BMx9((B, $BEDCf(B $B=S>
"$B%/%i%99=B$JQ49
$BoN(B $B9VJ?!$EDC<(B $BMx9((B, $B]/0f(B $B9,0l(B:
"$B%7%9%F%`%3!<%k$K4p$E$/0[>o8!CN%7%9%F%`$N@_7W$HI>2A(B,"
$B>pJs=hM}3X2qO@J8;o!$(BVol.46$B!$(BNo.8$B!$(Bpp.1967-1975 (8, 2005).
$B4d1J(B $B3X!$EDC<(B $BMx9((B, $B]/0f(B $B9,0l(B:
"$B%Y%$%8%"%s%U%#%k%?%j%s%0$rMQ$$$?LBOG%a!<%kBP:v$K$*$1$kB?8@8l4D6-$G$N%3!<%Q%9J,N%
$B>pJs=hM}3X2qO@J8;o!$(BVol.46$B!$(BNo.8$B!$(Bpp.1959-1966 (8, 2005).
$BEDC<(B $BMx9(!$Kv0B(B $B9nLi!$]/0f(B $B9,0l(B:
"$B@_Dj%D!<%k$K$h$k(BSELinux$B%"%/%;%9%Q!<%_%C%7%g%sE}9g$N0BA4@-I>2A(B"
$B>pJs=hM}3X2qO@J8;o(B $B%F%/%K%+%k%N!<%H!$(BVol.46$B!$(BNo.4$B!$(Bpp.1070-1073 (4, 2005).
Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakurai:
"Program Obfuscation Scheme using Random Numbers to Complicate Control Flow,"
The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq`05),
Lecture Notes in Computer Science (LNCS), Vol.3823, pp.916-925, (12, 2005).
Toshihiro TABATA, Satoshi Hakomori, Hideo Taniguchi:
"An Abuse Prevention Technique of CPU Time by Using Execution Resource,"
PreProc. of the 6th International Workshop on Information Security Applications (WISA2005), pp.413-420 (8, 2005).
$BD9Ln(B $BJ8>
"$B2~$6$s%G!<%?$NI|852DG=$J?/F~8!CN
Amril Syalim, Toshihiro TABATA and Kouichi SAKURAI:
"A Model to Partially Outsourcing Access Control for Databases,"
Computer Security Symposium (CSS2005), (10, 2005).
$BEDC<(B $BMx9(!$H"
"$B;q8;!V1i;;!W$K$h$k(BCPU$B;q8;$N%"%/%;%9@)8fK!$NDs0F(B"
$B%3%s%T%e!<%?%;%-%e%j%F%#%7%s%]%8%&%`(B(CSS2005)$B!$(B(10, 2005).
$B4X:,(B $BLP
$BJ?@.(B17$BG/EY(B $BEE5$!&>pJs4XO"3X2qCf9q;YItO"9gBg2q!$(B(10, 2005).
$BEDC<(B $BMx9(!$C+8}(B $B=(IW(B:
"$B%W%m%;%9;q8;$N;vA0@8@.5!9=$NDs0F!$(B"
$BBh(B4$B2s>pJs2J3X5;=Q%U%)!<%i%`(B(FIT2005)$B!$(B(9, 2005).
$BD9Ln(B $BJ8>
"$B%G!<%?2~$6$s8!=P$K$h$k?/F~8!CN%7%9%F%`$N0l9M;!!$(B"
$B>pJs=hM}3X2q(B $B%3%s%T%e!<%?%;%-%e%j%F%#(B(CSEC)$B8&5f2q!$(B(7, 2005).
$BK-J!(B $BC#Li!$EDC<(B $BMx9(!$]/0f(B $B9,0l(B:
"$BMp?t$rMQ$$$?FqFI2=
Amril Syalim, Toshihiro TABATA and Kouichi SAKURAI:
"Outsourced Access Control Model for Outsourced Databases,"
2nd Japan/U.S. Workshop on Critical Information Infrastructure Protection, poster, (6, 2005).