FullText URL fulltext20220204-1.pdf
Author Nakamura, Toru| Ito, Hiroshi| Kiyomoto, Shinsaku| Yamauchi, Toshihiro|
Keywords Virtual machine introspection Forensics OS security
Note This is the version of the book manuscript accepted for publication after peer review, but prior to copyediting and typesetting.
This fulltext is available in Aug. 2023.|
IWSEC 2021: Advances in Information and Computer Security pp 64-73|
Published Date 2021-08-27
Publication Title Advances in Information and Computer Security|Lecture Notes in Computer Science
Volume volume12835
Publisher Springer International Publishing
Start Page 64
End Page 73
ISSN 0302-9743
NCID BC11247320
Content Type Book
language English
OAI-PMH Set 岡山大学
Copyright Holders © Springer Nature Switzerland AG 2021
File Version author
DOI 10.1007/978-3-030-85987-9_4
Web of Science KeyUT 000708084400004
Related Url isVersionOf https://doi.org/10.1007/978-3-030-85987-9_4
FullText URL fulltext20220201-3.pdf
Author Kusunoki, Koki| Yamauchi, Toshihiro| Taniguchi, Hideo|
Abstract Physical memory capacity has increased owing to large-scale integration. In addition, memory footprints have increased in size, as multiple programs are executed on a single computer. Many operating systems manage physical memory by paging a 4 KB page. Therefore, the number of entries in the virtual address translation table for virtual to physical increases along with the size of the memory footprints. This cause a decrease in the translation lookaside buffer (TLB) hit ratio, resulting in the performance degradation of the application. To address this problem, we propose the implementation of physical memory management with two page sizes: 4 KB and 4 MB. This allows us to expand range of addresses to be translated by a single TLB entry, thereby improving the TLB hit rate. This paper describes the design and implementation of the physical memory management mechanism that manages physical memory using two page sizes on The ENduring operating system for Distributed EnviRonment (Tender OS). Our results showed that when the page size is 4 MB, the processing time of the memory allocation can be reduced by as much as approximately 99.7%, and the processing time for process creation can be reduced by as much as approximately 51%, and the processing time of the memory operation could be reduced by as much as 91.9%.
Published Date 2021-08-08
Publication Title Advances in Networked-Based Information Systems|Lecture Notes in Networks and Systems
Volume volume313
Start Page 238
End Page 248
ISBN 978-3-030-84912-2
language English
Copyright Holders © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
File Version author
DOI 10.1007/978-3-030-84913-9_22
FullText URL fulltext20220201-2.pdf
Author Otani, Kohei| Okazaki, Toshiki| Yamauchi, Toshihiro| Moriyama, Hideaki| Sato, Masaya| Taniguchi, Hideo|
Abstract To handle information leaks caused by administrative errors or mishandling, a function for tracing the diffusion of classified information using a virtual machine monitor (VMM) was proposed. However, the proposed function has not been investigated in cases in which virtual machines (VMs) allocated by multiple virtual central processing units (vCPUs) are to be monitored. In addition, cases in which multiple VMs are monitored have not been examined. In this study, we describe the support of multiple VMs for the proposed VMM-based tracing function. We also show how to deal with VMs allocated by multiple vCPUs. Furthermore, we report the evaluation results from assessing the traceability of the improved proposed method and its overhead for classified information when a VM with multiple vCPUs is monitored.
Keywords Information leak prevention Virtualization VMM
Published Date 2021-11
Publication Title 2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)
Start Page 352
End Page 358
ISBN 978-1-6654-2835-4
language English
Copyright Holders © 2021 IEEE
File Version author
DOI 10.1109/candarw53999.2021.00066
FullText URL Mitigation_of_Kernel_Memory_Corruption_Using_Multiple_Kernel_Memory_Mechanism.pdf
Author Kuzuno, Hiroki| Yamauchi, Toshihiro|
Keywords Memory corruption kernel vulnerability system security operating system
Published Date 2021
Publication Title IEEE Access
Volume volume9
Publisher Institute of Electrical and Electronics Engineers (IEEE)
Start Page 111651
End Page 111665
ISSN 2169-3536
Content Type Journal Article
language English
OAI-PMH Set 岡山大学
File Version publisher
DOI 10.1109/access.2021.3101452
Related Url isVersionOf https://doi.org/10.1109/access.2021.3101452
Author Ichioka, Shuichi| Pouget, Estelle| Mimura, Takao| Nakajima, Jun| Yamauchi, Toshihiro|
Published Date 2020-12-09
Publication Title Information Security Applications|Lecture Notes in Computer Science
Volume volume12583
Content Type Journal Article
Author Ban, Yuya| Yamauchi, Toshihiro|
Published Date 2018-11
Publication Title 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)
Content Type Conference Paper
Author Imamura, Yuta| Uekawa, Hiroyuki| Ishihara, Yasuhiro| Sato, Masaya| Yamauchi, Toshihiro|
Published Date 2018-1-29
Publication Title Proceedings of the Australasian Computer Science Week Multiconference
Content Type Conference Paper
FullText URL fulltext20210811-12.pdf
Author Kudo, Naoki| Yamauchi, Toshihiro| Austin, Thomas H.|
Keywords hybrid Application Android Access Control
Note ここに掲載した著作物の利用に関する注意
本著作物の著作権は情報処理学会に帰属します。本著作物は著作権者である情報処理学会の許可のもとに掲載するものです。ご利用に当たっては「著作権法」ならびに「情報処理学会倫理綱領」に従うことをお願いいたします。

Notice for the use of this material
The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the author (s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of the IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof. |
Published Date 2018
Publication Title Journal of Information Processing
Volume volume26
Publisher Information Processing Society of Japan
Start Page 396
End Page 405
ISSN 1882-6652
Content Type Journal Article
language English
Copyright Holders Copyright (C) Information Processing Society of Japan.
File Version publisher
DOI 10.2197/ipsjjip.26.396
Related Url isVersionOf https://doi.org/10.2197/ipsjjip.26.396
FullText URL fulltext20210811-11.pdf
Author Kudo, Naoki| Yamauchi, Toshihiro| Austin, Thomas H.|
Note © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| The 31st IEEE International Conference on Advanced Information Networking and Applications (AINA-2017) Tamkang University, Taipei, Taiwan, March 27 to March 29, 2017|
Published Date 2017-3
Publication Title 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA)
Publisher IEEE
Start Page 1063
End Page 1069
ISSN 1550-445X
Content Type Conference Paper
language Japanese
OAI-PMH Set 岡山大学
Copyright Holders © 2017 IEEE
File Version author
DOI 10.1109/aina.2017.61
Web of Science KeyUT 000403329000143
Related Url isVersionOf https://doi.org/10.1109/aina.2017.61
FullText URL fulltext20210811-10.pdf
Author Yamauchi, Toshihiro| Akao, Yohei|
Keywords kernel rootkit detection last branch record operating system system security
Published Date 2017-10-01
Publication Title IEICE Transactions on Information and Systems
Volume volumeE100.D
Issue issue10
Publisher Institute of Electronics, Information and Communications Engineers (IEICE)
Start Page 2377
End Page 2381
ISSN 0916-8532
Content Type Journal Article
language English
Copyright Holders © 2017 The Institute of Electronics, Information and Communication Engineers
File Version publisher
DOI 10.1587/transinf.2016inl0003
Web of Science KeyUT 000417988600014
Related Url isVersionOf https://doi.org/10.1587/transinf.2016inl0003
Author Yamauchi, Toshihiro| Ikegami, Yuta| Ban, Yuya|
Published Date 2017
Publication Title IEICE Transactions on Information and Systems
Volume volumeE100.D
Issue issue10
Content Type Journal Article
Author Akao, Yohei| Yamauchi, Toshihiro|
Published Date 2016-12
Publication Title 2016 International Conference on Information Science and Security (ICISS)
Content Type Conference Paper
Author Sato, Masaya| Yamauchi, Toshihiro| Taniguchi, Hideo|
Published Date 2016-11
Publication Title 2016 Fourth International Symposium on Computing and Networking (CANDAR)
Content Type Conference Paper
Author Yamauchi, Toshihiro| Yamamoto, Yuta| Nagai, Kengo| Matono, Tsukasa| Inamoto, Shinji| Ichikawa, Masaya| Goto, Masataka| Taniguchi, Hideo|
Published Date 2016-4-4
Publication Title Proceedings of the 31st Annual ACM Symposium on Applied Computing
Content Type Conference Paper
FullText URL fulltext20210811-5.pdf
Author Nakamura, Yuichi| Moriguchi, Akira| Irie, Masanori| Kinoshita, Taizo| Yamauchi, Toshihiro|
Keywords M2M gateway sensor data aggregation in memory processing IoT(the Internet of Things)
Published Date 2016
Publication Title IEICE Transactions on Information and Systems
Volume volumeE99.D
Issue issue12
Publisher Institute of Electronics, Information and Communications Engineers (IEICE)
Start Page 2943
End Page 2955
ISSN 0916-8532
Content Type Journal Article
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2016 The Institute of Electronics, Information and Communication Engineers
File Version publisher
DOI 10.1587/transinf.2016pap0020
Related Url isVersionOf https://doi.org/10.1587/transinf.2016pap0020
FullText URL fulltext20210811-3.pdf
Author Fujii, Shota| Sato, Masaya| Yamauchi, Toshihiro| Taniguchi, Hideo|
Keywords Information Leak Prevention Virtualization Semantic Gap VMM
Note This is a post-peer-review, pre-copyedit version of an article published in The Journal of Supercomputing. The final authenticated version is available online at: https://doi.org/10.1007/s11227-016-1671-5|
Published Date 2016-2-23
Publication Title The Journal of Supercomputing
Volume volume72
Issue issue5
Publisher Springer Science and Business Media LLC
Start Page 1841
End Page 1861
ISSN 0920-8542
Content Type Journal Article
language English
OAI-PMH Set 岡山大学
File Version author
DOI 10.1007/s11227-016-1671-5
Web of Science KeyUT 000374967100011
Related Url isVersionOf https://doi.org/10.1007/s11227-016-1671-5
FullText URL fulltext20210802-2.pdf
Author Yamauchi, Toshihiro| Yoshimoto, Ryota| Baba, Takahiro| Yoshioka, Katsunari|
Keywords IoT malware Telnet log
Note This is an Accepted Manuscript of an article published by Conference Publishing Services.
© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.|
Published Date 2021
Publication Title Proceedings of 2021 10th International Congress on Advanced Applied Informatics
Publisher Conference Publishing Services, IEEE Computer Society
Start Page 913
End Page 915
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders Copyright © 2021 IEEE.
File Version author
DOI 10.1109/IIAI-AAI53430.2021.00160
Related Url isVersionOf https://doi.org/10.1109/IIAI-AAI53430.2021.00160
FullText URL fulltext.pdf
Author Imamura, Yuta| Orito, Rintaro| Uekawa, Hiroyuki| Chaikaew, Kritsana| Leelaprute, Pattara| Sato, Masaya| Yamauchi, Toshihiro|
Keywords Android WebView Web access monitoring Web security Threat analysis Fake virus alert
Published Date 2021-01-19
Publication Title International Journal of Information Security
Volume volume20
Publisher Springer
Start Page 833
End Page 847
ISSN 1615-5262
NCID AA11872752
Content Type Journal Article
language English
OAI-PMH Set 岡山大学
Copyright Holders © The Author(s) 2021
File Version publisher
DOI 10.1007/s10207-020-00534-3
Web of Science KeyUT 000608957200001
Related Url isVersionOf https://doi.org/10.1007/s10207-020-00534-3
Author Nakamura, Yuichi| Sameshima, Yoshiki| Tabata, Toshihiro|
Published Date 2009
Publication Title Proceedings of LISA: Large Installation System Administration Conference
Volume volume23
Content Type Conference Paper
FullText URL ieice_trans_E98.D.pdf
Author Yu, Jing| Yamauchi, Toshihiro|
Keywords Android WebView static analysis access control
Published Date 2015
Publication Title IEICE Transactions on Information and Systems
Volume volumeE98D
Issue issue4
Publisher The Institute of Electronics, Information and Communication Engineers
Start Page 807
End Page 811
ISSN 1745-1361
Content Type Journal Article
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2015 The Institute of Electronics, Information and Communication Engineers
File Version publisher
DOI 10.1587/transinf.2014ICL0001
Web of Science KeyUT 000356589800008
Related Url isVersionOf https://doi.org/10.1587/transinf.2014ICL0001