"Flexible Way for Supporting OAuth 2.0 Based Security Profiles to Keycloak," Open Identity Summit 2022 (OID 2022), (7, 2022). (to appear)
"Visualization Result of String-based CPU Architecture Independent IoT Malware Clustering," Network and Distributed System Security Symposium (NDSS 2022), poster, (4, 2022).
"Malware Classification by Deep Learning Using Characteristics of Hash Functions," Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022), vol.2, pp.480-481 Springer Nature (2022.03).
"Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM," Journal of Internet Services and Information Security (JISIS), vol.12, no.1, pp.26-43 Innovative Information Science & Technology Research Group (ISYOU) (2022.02).
"Web Access Monitoring Mechanism via Android WebView for Threat Analysis," International Journal of Information Security, Vol.20, Issue 6, pp.833-847, Springer Nature, (12, 2021).
"Function for Tracing Diffusion of Classified Information to Support Multiple VMs with KVM," 8th International Workshop on Information and Communication Security (WICS2021), Proceedings of 2021 Nineth International Symposium on Computing and Networking Workshops (CANDARW2021), pp.352-358 (11, 2021).
"KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption," The 16th International Workshop on Security (IWSEC 2021), Lecture Notes in Computer Science (LNCS), vol.12835, pp.45-63, (9, 2021).
"(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring," The 16th International Workshop on Security (IWSEC 2021), Lecture Notes in Computer Science (LNCS), vol.12835, pp.64-73, (9, 2021).
"Large-scale Survey on Secure Development of IoT Devices by Software Analysis and Vendor Interview," The 16th International Workshop on Security (IWSEC 2021), Invited session (9, 2021).
"Mitigation of Kernel Memory Corruption Using Multiple Kernel Memory Mechanism," IEEE Access, vol.9, pp.111651-111665, (8, 2021).
"Additional Kernel Observer: Privilege Escalation Attack Prevention Mechanism Focusing on System Call Privilege Changes," International Journal of Information Security, vol.20, Issue 4, pp.461-473, (8, 2021).
"Analysis of commands of Telnet logs illegally connected to IoT devices," 12th International Conference on E-Service and Knowledge Management (ESKM 2021), poster, Proceedings of 2021 10th International Congress on Advanced Applied Informatics (IIAI-AAI 2021), pp.913-915, (7, 2021).
"Web Access Monitoring Mechanism via Android WebView for Threat Analysis," International Journal of Information Security. 電子媒体 Springer Nature, (1, 2021).
"Accessibility Service Utilization Rates in Android Applications Shared on Twitter," The 21st World Conference on Information Security Applications (WISA 2020), Lecture Notes in Computer Science (LNCS), Vol.12583, pp.101-111 (12, 2020).
"POSTER: Continuous and Multiregional Monitoring of Malicious Hosts," The 27th ACM Conference on Computer and Communications Security (CCS 2020), Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS 2020), pp.2101-2103 (10, 2020).
"Method of Generating a Blacklist for Mobile Devices by Searching Malicious Websites," The 21st World Conference on Information Security Applications (WISA2020), poster, (8, 2020).
"Threat Analysis of Fake Virus Alerts Using WebView Monitor," Proceedings of 2019 Seventh International Symposium on Computing and Networking (CANDAR 2019), pp.28-36, (11, 2019).
"KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism," Lecture Notes in Computer Science (LNCS), vol.11879, pp.75-94, (11, 2019).
"Threat Analysis of Fake Virus Alerts by Using Web Access Monitoring Mechanism for Android WebView," The 14th International Workshop on Security (IWSEC 2019), poster (8, 2019).
"Kernel Memory Inspection Capability for Malicious Kernel Module Detection," The 14th International Workshop on Security (IWSEC 2019), Invited session (8, 2019).
"Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes," Proceedings of the 2018 IEEE Conference on Dependable and Secure Computing (IEEE DSC 2018), pp.172-179, (12, 2018).
"Mitigating Use-After-Free Attack using Library Considering Size and Number of Freed Memory," Proceedings of 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW), pp.398-404, (11, 2018).
"Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features ," IEICE Transactions on Information and Systems, vol.E100-D, No.10, pp.2377-2381, (10, 2017).
"Mitigating Use-After-Free Attacks Using Memory-Reuse-Prohibited Library ," IEICE Transactions on Information and Systems, vol.E100-D, No.10, pp.2295-2306, (10, 2017).
"Privilege Escalation Attack Prevention Method Based on System Call Processing, " SCIS & CSS Award Session of the 12th International Workshop on Security (IWSEC 2017), (9, 2017).
"Access Control for Plugins in Cordova-based Hybrid Applications, " Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications (AINA-2017), pp.1063-1069, (3, 2017).
"Access Control for Plugins in Cordova-based Hybrid Applications, " 31st IEEE International Conference on Advanced Information Networking and Applications (AINA-2017), pp.1063-1069, (3, 2017).
"KRGuard: Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features, " Proceedings of 2016 International Conference on Information Science and Security (ICISS), pp.22-26 (12, 2016).
"HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks, " Lecture Notes in Computer Science (LNCS), vol.9955, pp.219-234, (9, 2016).
"Design of Function for Tracing Diffusion of Classified Information for IPC on KVM, " Journal of Information Processing, Vol.24, No.5, pp.781-792, (9, 2016).
"Evaluation and Design of Function for Tracing Diffusion of Classified Information for File Operations with KVM, " The Journal of Supercomputing, Vol.72, Issue 5, pp.1841-1861, (2, 2016).
"Use-After-Free Prevention Method Using Memory Reuse Prohibited Library," The 10th International Workshop on Security (IWSEC 2015), Invited talk (8, 2015).
"Attacker Investigation System Triggered by Information Leakage," 6th International Conference on E-Service and Knowledge Management (ESKM 2015), Proceedings of 2015 IIAI 4th International Congress on Advanced Applied Informatics (AAI 2015), pp.24-27 (7, 2015).
"Proposal of Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features," 4th International Congress on Advanced Applied Informatics, poster, Proceedings of 2015 IIAI 4th International Congress on Advanced Applied Informatics (AAI 2015), pp.721-722 (7, 2015).
"Access Control to Prevent Malicious JavaScript Code Exploiting Vulnerabilities of WebView in Android OS," IEICE Transactions on Information and Systems, Vol.E98-D, No.4, pp.807-811, (4, 2015).
"Design of a Function for Tracing the Diffusion of Classified Information for File Operations with a KVM," The 2015 International Symposium on Advances in Computing, Communications, Security, and Applications for Future Computing (ACSA 2015), Proceedings of The 2015 World Congress on Information Technology Applications and Services, (2, 2015).
"Malware Detection Method Focusing on Anti-Debugging Functions," 1st International Workshop on Information and Communication Security (WICS'14), poster, Proceedings of 2014 Second International Symposium on Computing and Networking (CANDAR 2014), pp.563-566 (12, 2014).
"Secure and Fast Log Transfer Mechanism for Virtual Machine," Journal of Information Processing, Vol.22, No.4, pp.597-608, (10, 2014).
"Complicating Process Identification by Replacing Process Information for Attack Avoidance," The 9th International Workshop on Security (IWSEC2014), Lecture Notes in Computer Science(LNCS), vol.8639, pp.33-47, (8, 2014).
"Mitigating Attacks Based on Process Identification by Disguising Process Information, " 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS2014), poster (6, 2014).
"DroidTrack: Tracking and Visualizing Information Diffusion for Preventing Information Leakage on Android," Journal of Internet Services and Information Security (JISIS), Vol.4, No.2, pp.55-69, (5, 2014).
"Secure Log Transfer by Replacing a Library in a Virtual Machine," Lecture Notes in Computer Science, vol.8231, pp.1-18 Springer, (11, 2013).
"Access Control to Prevent Attacks Exploiting Vulnerabilities of WebView in Android OS," Proceedings of 2013 IEEE International Conference on High Performance Computing and Communications(HPCC-2013) and 2013 IEEE International Conference on Embedded and Ubiquitous Computing (EUC-2013), pp.1628-1633 IEEE Computer Society, (11, 2013).
"DroidTrack: Tracking Information Diffusion and Preventing Information Leakage on Android," Lecture Notes in Electrical Engineering (LNEE), vol.240, pp.243-251 Springer, (5, 2013).
"Design and Evaluation of a Diffusion Tracing Function for Classified Information Among Multiple Computers," Lecture Notes in Electrical Engineering (LNEE), vol.240, pp.235-242 Springer, (5, 2013).
"VMM-Based Log-Tampering and Loss Detection Scheme," Journal of Internet Technology, Vol.13, No.4, pp.655-666, (7, 2012).
"LSMPMON: Performance Evaluation Mechanism of LSM-based Secure OS," International Journal of Security and Its Applications (IJSIA), Vol.6, No.2, pp.81-89, (4, 2012).
"VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss," 2011 International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD'11),Vol.6908, pp.176-190 Springer Berlin / Heidelberg, (8,2011).
"Evaluation of Performance of Secure OS using Performance Evaluation Mechanism of LSM-based LSMPMON,"Communications in Computer and Information Science (CCIS), vol.122, pp.57-67, (12,2010).
"Design and Evaluation of a Bayesian-filter-based Image Spam Filtering Method," Japan-Taiwan Joint Research on Cryptography and Information Security towards Next IT-society,pp.133-137,(10,2008).
"Design and Evaluation of a Bayesian-filter-based Image Spam Filtering Method," Proc. of the 2nd International Conference on Information Security and Assurance (ISA2008), (4, 2008).
"Integrated Access Permission: Secure and Simple Policy Description by Integration of File Access Vector Permission," Proc. of the 2nd International Conference on Information Security and Assurance (ISA2008), (4, 2008).
"Proposal of File Access Permission which has both Security and Simplified Configuration", PreProc. of the 7th International Workshop on Information Security Applications (WISA2006), pp.151-161, (8, 2006).