FullText URL | fulltext.pdf |
---|---|
Author | Yamauchi, Toshihiro| Orito, Rintaro| Ebisu, Koji| Sato, Masaya| |
Keywords | Android accessibility services malicious websites web-based attacks web security |
Published Date | 2024 |
Publication Title | IEEE Access |
Volume | volume12 |
Publisher | Institute of Electrical and Electronics Engineers |
Start Page | 153285 |
End Page | 153294 |
ISSN | 2169-3536 |
Content Type | Journal Article |
language | English |
OAI-PMH Set | 岡山大学 |
Copyright Holders | © 2024 The Authors. |
File Version | publisher |
DOI | 10.1109/ACCESS.2024.3478748 |
Web of Science KeyUT | 001340709500001 |
Related Url | isVersionOf https://doi.org/10.1109/ACCESS.2024.3478748 |
FullText URL | fulltext20220204-1.pdf |
---|---|
Author | Nakamura, Toru| Ito, Hiroshi| Kiyomoto, Shinsaku| Yamauchi, Toshihiro| |
Keywords | Virtual machine introspection Forensics OS security |
Note | This is the version of the book manuscript accepted for publication after peer review, but prior to copyediting and typesetting. This fulltext is available in Aug. 2023.| IWSEC 2021: Advances in Information and Computer Security pp 64-73| |
Published Date | 2021-08-27 |
Publication Title | Advances in Information and Computer Security|Lecture Notes in Computer Science |
Volume | volume12835 |
Publisher | Springer International Publishing |
Start Page | 64 |
End Page | 73 |
ISSN | 0302-9743 |
NCID | BC11247320 |
Content Type | Book |
language | English |
OAI-PMH Set | 岡山大学 |
Copyright Holders | © Springer Nature Switzerland AG 2021 |
File Version | author |
DOI | 10.1007/978-3-030-85987-9_4 |
Web of Science KeyUT | 000708084400004 |
Related Url | isVersionOf https://doi.org/10.1007/978-3-030-85987-9_4 |
FullText URL | fulltext20220201-3.pdf |
---|---|
Author | Kusunoki, Koki| Yamauchi, Toshihiro| Taniguchi, Hideo| |
Abstract | Physical memory capacity has increased owing to large-scale integration. In addition, memory footprints have increased in size, as multiple programs are executed on a single computer. Many operating systems manage physical memory by paging a 4 KB page. Therefore, the number of entries in the virtual address translation table for virtual to physical increases along with the size of the memory footprints. This cause a decrease in the translation lookaside buffer (TLB) hit ratio, resulting in the performance degradation of the application. To address this problem, we propose the implementation of physical memory management with two page sizes: 4 KB and 4 MB. This allows us to expand range of addresses to be translated by a single TLB entry, thereby improving the TLB hit rate. This paper describes the design and implementation of the physical memory management mechanism that manages physical memory using two page sizes on The ENduring operating system for Distributed EnviRonment (Tender OS). Our results showed that when the page size is 4 MB, the processing time of the memory allocation can be reduced by as much as approximately 99.7%, and the processing time for process creation can be reduced by as much as approximately 51%, and the processing time of the memory operation could be reduced by as much as 91.9%. |
Published Date | 2021-08-08 |
Publication Title | Advances in Networked-Based Information Systems|Lecture Notes in Networks and Systems |
Volume | volume313 |
Start Page | 238 |
End Page | 248 |
ISBN | 978-3-030-84912-2 |
language | English |
Copyright Holders | © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022 |
File Version | author |
DOI | 10.1007/978-3-030-84913-9_22 |
FullText URL | fulltext20220201-2.pdf |
---|---|
Author | Otani, Kohei| Okazaki, Toshiki| Yamauchi, Toshihiro| Moriyama, Hideaki| Sato, Masaya| Taniguchi, Hideo| |
Abstract | To handle information leaks caused by administrative errors or mishandling, a function for tracing the diffusion of classified information using a virtual machine monitor (VMM) was proposed. However, the proposed function has not been investigated in cases in which virtual machines (VMs) allocated by multiple virtual central processing units (vCPUs) are to be monitored. In addition, cases in which multiple VMs are monitored have not been examined. In this study, we describe the support of multiple VMs for the proposed VMM-based tracing function. We also show how to deal with VMs allocated by multiple vCPUs. Furthermore, we report the evaluation results from assessing the traceability of the improved proposed method and its overhead for classified information when a VM with multiple vCPUs is monitored. |
Keywords | Information leak prevention Virtualization VMM |
Published Date | 2021-11 |
Publication Title | 2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW) |
Start Page | 352 |
End Page | 358 |
ISBN | 978-1-6654-2835-4 |
language | English |
Copyright Holders | © 2021 IEEE |
File Version | author |
DOI | 10.1109/candarw53999.2021.00066 |
FullText URL | Mitigation_of_Kernel_Memory_Corruption_Using_Multiple_Kernel_Memory_Mechanism.pdf |
---|---|
Author | Kuzuno, Hiroki| Yamauchi, Toshihiro| |
Keywords | Memory corruption kernel vulnerability system security operating system |
Published Date | 2021 |
Publication Title | IEEE Access |
Volume | volume9 |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Start Page | 111651 |
End Page | 111665 |
ISSN | 2169-3536 |
Content Type | Journal Article |
language | English |
OAI-PMH Set | 岡山大学 |
File Version | publisher |
DOI | 10.1109/access.2021.3101452 |
Related Url | isVersionOf https://doi.org/10.1109/access.2021.3101452 |
Author | Ichioka, Shuichi| Pouget, Estelle| Mimura, Takao| Nakajima, Jun| Yamauchi, Toshihiro| |
---|---|
Published Date | 2020-12-09 |
Publication Title | Information Security Applications|Lecture Notes in Computer Science |
Volume | volume12583 |
Content Type | Journal Article |
Author | Ban, Yuya| Yamauchi, Toshihiro| |
---|---|
Published Date | 2018-11 |
Publication Title | 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW) |
Content Type | Conference Paper |
Author | Imamura, Yuta| Uekawa, Hiroyuki| Ishihara, Yasuhiro| Sato, Masaya| Yamauchi, Toshihiro| |
---|---|
Published Date | 2018-1-29 |
Publication Title | Proceedings of the Australasian Computer Science Week Multiconference |
Content Type | Conference Paper |
FullText URL | fulltext20210811-12.pdf |
---|---|
Author | Kudo, Naoki| Yamauchi, Toshihiro| Austin, Thomas H.| |
Keywords | hybrid Application Android Access Control |
Note | ここに掲載した著作物の利用に関する注意 本著作物の著作権は情報処理学会に帰属します。本著作物は著作権者である情報処理学会の許可のもとに掲載するものです。ご利用に当たっては「著作権法」ならびに「情報処理学会倫理綱領」に従うことをお願いいたします。 Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the author (s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of the IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof. | |
Published Date | 2018 |
Publication Title | Journal of Information Processing |
Volume | volume26 |
Publisher | Information Processing Society of Japan |
Start Page | 396 |
End Page | 405 |
ISSN | 1882-6652 |
Content Type | Journal Article |
language | English |
Copyright Holders | Copyright (C) Information Processing Society of Japan. |
File Version | publisher |
DOI | 10.2197/ipsjjip.26.396 |
Related Url | isVersionOf https://doi.org/10.2197/ipsjjip.26.396 |
FullText URL | fulltext20210811-11.pdf |
---|---|
Author | Kudo, Naoki| Yamauchi, Toshihiro| Austin, Thomas H.| |
Note | © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| The 31st IEEE International Conference on Advanced Information Networking and Applications (AINA-2017) Tamkang University, Taipei, Taiwan, March 27 to March 29, 2017| |
Published Date | 2017-3 |
Publication Title | 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA) |
Publisher | IEEE |
Start Page | 1063 |
End Page | 1069 |
ISSN | 1550-445X |
Content Type | Conference Paper |
language | Japanese |
OAI-PMH Set | 岡山大学 |
Copyright Holders | © 2017 IEEE |
File Version | author |
DOI | 10.1109/aina.2017.61 |
Web of Science KeyUT | 000403329000143 |
Related Url | isVersionOf https://doi.org/10.1109/aina.2017.61 |
FullText URL | fulltext20210811-10.pdf |
---|---|
Author | Yamauchi, Toshihiro| Akao, Yohei| |
Keywords | kernel rootkit detection last branch record operating system system security |
Published Date | 2017-10-01 |
Publication Title | IEICE Transactions on Information and Systems |
Volume | volumeE100.D |
Issue | issue10 |
Publisher | Institute of Electronics, Information and Communications Engineers (IEICE) |
Start Page | 2377 |
End Page | 2381 |
ISSN | 0916-8532 |
Content Type | Journal Article |
language | English |
Copyright Holders | © 2017 The Institute of Electronics, Information and Communication Engineers |
File Version | publisher |
DOI | 10.1587/transinf.2016inl0003 |
Web of Science KeyUT | 000417988600014 |
Related Url | isVersionOf https://doi.org/10.1587/transinf.2016inl0003 |
Author | Yamauchi, Toshihiro| Ikegami, Yuta| Ban, Yuya| |
---|---|
Published Date | 2017 |
Publication Title | IEICE Transactions on Information and Systems |
Volume | volumeE100.D |
Issue | issue10 |
Content Type | Journal Article |
Author | Akao, Yohei| Yamauchi, Toshihiro| |
---|---|
Published Date | 2016-12 |
Publication Title | 2016 International Conference on Information Science and Security (ICISS) |
Content Type | Conference Paper |
Author | Sato, Masaya| Yamauchi, Toshihiro| Taniguchi, Hideo| |
---|---|
Published Date | 2016-11 |
Publication Title | 2016 Fourth International Symposium on Computing and Networking (CANDAR) |
Content Type | Conference Paper |
Author | Yamauchi, Toshihiro| Yamamoto, Yuta| Nagai, Kengo| Matono, Tsukasa| Inamoto, Shinji| Ichikawa, Masaya| Goto, Masataka| Taniguchi, Hideo| |
---|---|
Published Date | 2016-4-4 |
Publication Title | Proceedings of the 31st Annual ACM Symposium on Applied Computing |
Content Type | Conference Paper |
FullText URL | fulltext20210811-5.pdf |
---|---|
Author | Nakamura, Yuichi| Moriguchi, Akira| Irie, Masanori| Kinoshita, Taizo| Yamauchi, Toshihiro| |
Keywords | M2M gateway sensor data aggregation in memory processing IoT(the Internet of Things) |
Published Date | 2016 |
Publication Title | IEICE Transactions on Information and Systems |
Volume | volumeE99.D |
Issue | issue12 |
Publisher | Institute of Electronics, Information and Communications Engineers (IEICE) |
Start Page | 2943 |
End Page | 2955 |
ISSN | 0916-8532 |
Content Type | Journal Article |
language | English |
OAI-PMH Set | 岡山大学 |
Copyright Holders | © 2016 The Institute of Electronics, Information and Communication Engineers |
File Version | publisher |
DOI | 10.1587/transinf.2016pap0020 |
Related Url | isVersionOf https://doi.org/10.1587/transinf.2016pap0020 |
FullText URL | fulltext20210811-3.pdf |
---|---|
Author | Fujii, Shota| Sato, Masaya| Yamauchi, Toshihiro| Taniguchi, Hideo| |
Keywords | Information Leak Prevention Virtualization Semantic Gap VMM |
Note | This is a post-peer-review, pre-copyedit version of an article published in The Journal of Supercomputing. The final authenticated version is available online at: https://doi.org/10.1007/s11227-016-1671-5| |
Published Date | 2016-2-23 |
Publication Title | The Journal of Supercomputing |
Volume | volume72 |
Issue | issue5 |
Publisher | Springer Science and Business Media LLC |
Start Page | 1841 |
End Page | 1861 |
ISSN | 0920-8542 |
Content Type | Journal Article |
language | English |
OAI-PMH Set | 岡山大学 |
File Version | author |
DOI | 10.1007/s11227-016-1671-5 |
Web of Science KeyUT | 000374967100011 |
Related Url | isVersionOf https://doi.org/10.1007/s11227-016-1671-5 |
FullText URL | fulltext20210802-2.pdf |
---|---|
Author | Yamauchi, Toshihiro| Yoshimoto, Ryota| Baba, Takahiro| Yoshioka, Katsunari| |
Keywords | IoT malware Telnet log |
Note | This is an Accepted Manuscript of an article published by Conference Publishing Services. © 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| |
Published Date | 2021 |
Publication Title | Proceedings of 2021 10th International Congress on Advanced Applied Informatics |
Publisher | Conference Publishing Services, IEEE Computer Society |
Start Page | 913 |
End Page | 915 |
Content Type | Conference Paper |
language | English |
OAI-PMH Set | 岡山大学 |
Copyright Holders | Copyright © 2021 IEEE. |
File Version | author |
DOI | 10.1109/IIAI-AAI53430.2021.00160 |
Related Url | isVersionOf https://doi.org/10.1109/IIAI-AAI53430.2021.00160 |
FullText URL | fulltext.pdf |
---|---|
Author | Imamura, Yuta| Orito, Rintaro| Uekawa, Hiroyuki| Chaikaew, Kritsana| Leelaprute, Pattara| Sato, Masaya| Yamauchi, Toshihiro| |
Keywords | Android WebView Web access monitoring Web security Threat analysis Fake virus alert |
Published Date | 2021-01-19 |
Publication Title | International Journal of Information Security |
Volume | volume20 |
Publisher | Springer |
Start Page | 833 |
End Page | 847 |
ISSN | 1615-5262 |
NCID | AA11872752 |
Content Type | Journal Article |
language | English |
OAI-PMH Set | 岡山大学 |
Copyright Holders | © The Author(s) 2021 |
File Version | publisher |
DOI | 10.1007/s10207-020-00534-3 |
Web of Science KeyUT | 000608957200001 |
Related Url | isVersionOf https://doi.org/10.1007/s10207-020-00534-3 |
Author | Nakamura, Yuichi| Sameshima, Yoshiki| Tabata, Toshihiro| |
---|---|
Published Date | 2009 |
Publication Title | Proceedings of LISA: Large Installation System Administration Conference |
Volume | volume23 |
Content Type | Conference Paper |