"Toru;Nakamura|Hiroshi;Ito|Shinsaku;Kiyomoto|Toshihiro;Yamauchi|","(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring","Advances in Information and Computer Security|Lecture Notes in Computer Science","0302-9743","2021-08-27","12835","","64","73","isVersionOf https://doi.org/10.1007/978-3-030-85987-9_4","","000708084400004","http://escholarship.lib.okayama-u.ac.jp/63165","10.1007/978-3-030-85987-9_4" "Koki;Kusunoki|Toshihiro;Yamauchi|Hideo;Taniguchi|","Physical Memory Management with Two Page Sizes in Tender OS","Advances in Networked-Based Information Systems|Lecture Notes in Networks and Systems","","2021-08-08","313","","238","248","isVersionOf https://doi.org/10.1007/978-3-030-84913-9_22","","","https://ousar.lib.okayama-u.ac.jp/63148","10.1007/978-3-030-84913-9_22" "Kohei;Otani|Toshiki;Okazaki|Toshihiro;Yamauchi|Hideaki;Moriyama|Masaya;Sato|Hideo;Taniguchi|","Function for Tracing Diffusion of Classified Information to Support Multiple VMs with KVM","2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)","","2021-11","","","352","358","isVersionOf https://doi.org/10.1109/candarw53999.2021.00066","","","http://escholarship.lib.okayama-u.ac.jp/63147","10.1109/candarw53999.2021.00066" "Hiroki;Kuzuno|Toshihiro;Yamauchi|","Mitigation of Kernel Memory Corruption Using Multiple Kernel Memory Mechanism","IEEE Access","2169-3536","2021","9","","111651","111665","isVersionOf https://doi.org/10.1109/access.2021.3101452","","","http://escholarship.lib.okayama-u.ac.jp/63146","10.1109/access.2021.3101452" "Shuichi;Ichioka|Estelle;Pouget|Takao;Mimura|Jun;Nakajima|Toshihiro;Yamauchi|","Accessibility Service Utilization Rates in Android Applications Shared on Twitter","Information Security Applications|Lecture Notes in Computer Science","0302-9743","2020-12-09","12583","","","","isVersionOf https://doi.org/10.1007/978-3-030-65299-9_8","","","http://escholarship.lib.okayama-u.ac.jp/62359","10.1007/978-3-030-65299-9_8" "Yuya;Ban|Toshihiro;Yamauchi|","Mitigating Use-after-Free Attack Using Library Considering Size and Number of Freed Memory","2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","","2018-11","","","398","404","isVersionOf https://doi.org/10.1109/candarw.2018.00080","","","http://escholarship.lib.okayama-u.ac.jp/62358","10.1109/candarw.2018.00080" "Yuta;Imamura|Hiroyuki;Uekawa|Yasuhiro;Ishihara|Masaya;Sato|Toshihiro;Yamauchi|","Web access monitoring mechanism for Android webview","Proceedings of the Australasian Computer Science Week Multiconference","","2018-1-29","","","1","","isVersionOf https://doi.org/10.1145/3167918.3167942","","","http://escholarship.lib.okayama-u.ac.jp/62357","10.1145/3167918.3167942" "Naoki;Kudo|Toshihiro;Yamauchi|Thomas H.;Austin|","Access Control Mechanism to Mitigate Cordova Plugin Attacks in Hybrid Applications","Journal of Information Processing","1882-6652","2018","26","","396","405","isVersionOf https://doi.org/10.2197/ipsjjip.26.396","","","https://ousar.lib.okayama-u.ac.jp/62356","10.2197/ipsjjip.26.396" "Naoki;Kudo|Toshihiro;Yamauchi|Thomas H.;Austin|","Access Control for Plugins in Cordova-Based Hybrid Applications","2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA)","1550-445X","2017-3","","","1063","1069","isVersionOf https://doi.org/10.1109/aina.2017.61","","000403329000143","http://escholarship.lib.okayama-u.ac.jp/62355","10.1109/aina.2017.61" "Toshihiro;Yamauchi|Yohei;Akao|","Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features","IEICE Transactions on Information and Systems","0916-8532","2017-10-01","E100.D","10","2377","2381","isVersionOf https://doi.org/10.1587/transinf.2016inl0003","","000417988600014","http://escholarship.lib.okayama-u.ac.jp/62354","10.1587/transinf.2016inl0003" "Toshihiro;Yamauchi|Yuta;Ikegami|Yuya;Ban|","Mitigating Use-After-Free Attacks Using Memory-Reuse-Prohibited Library","IEICE Transactions on Information and Systems","0916-8532","2017","E100.D","10","2295","2306","isVersionOf https://doi.org/10.1587/transinf.2016inp0020","","000417988600005","https://ousar.lib.okayama-u.ac.jp/62351","10.1587/transinf.2016inp0020" "Yohei;Akao|Toshihiro;Yamauchi|","KRGuard: Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features","2016 International Conference on Information Science and Security (ICISS)","","2016-12","","","22","26","isVersionOf https://doi.org/10.1109/icissec.2016.7885860","","000411612300005","https://ousar.lib.okayama-u.ac.jp/62323","10.1109/icissec.2016.7885860" "Masaya;Sato|Toshihiro;Yamauchi|Hideo;Taniguchi|","Memory Access Monitoring and Disguising of Process Information to Avoid Attacks to Essential Services","2016 Fourth International Symposium on Computing and Networking (CANDAR)","2379-1888","2016-11","","","635","641","isVersionOf https://doi.org/10.1109/candar.2016.0114","","000393284200097","http://escholarship.lib.okayama-u.ac.jp/62322","10.1109/candar.2016.0114" "Toshihiro;Yamauchi|Yuta;Yamamoto|Kengo;Nagai|Tsukasa;Matono|Shinji;Inamoto|Masaya;Ichikawa|Masataka;Goto|Hideo;Taniguchi|","Plate : persistent memory management for nonvolatile main memory","Proceedings of the 31st Annual ACM Symposium on Applied Computing","","2016-4-4","","","1885","1892","isVersionOf https://doi.org/10.1145/2851613.2851744","","","https://ousar.lib.okayama-u.ac.jp/62320","10.1145/2851613.2851744" "Yuichi;Nakamura|Akira;Moriguchi|Masanori;Irie|Taizo;Kinoshita|Toshihiro;Yamauchi|","Rule-Based Sensor Data Aggregation System for M2M Gateways","IEICE Transactions on Information and Systems","0916-8532","2016","E99.D","12","2943","2955","isVersionOf https://doi.org/10.1587/transinf.2016pap0020","","","http://escholarship.lib.okayama-u.ac.jp/62319","10.1587/transinf.2016pap0020" "Shota;Fujii|Masaya;Sato|Toshihiro;Yamauchi|Hideo;Taniguchi|","Evaluation and design of function for tracing diffusion of classified information for file operations with KVM","The Journal of Supercomputing","0920-8542","2016-2-23","72","5","1841","1861","isVersionOf https://doi.org/10.1007/s11227-016-1671-5","","000374967100011","https://ousar.lib.okayama-u.ac.jp/62317","10.1007/s11227-016-1671-5" "Toshihiro;Yamauchi|Ryota;Yoshimoto|Takahiro;Baba|Katsunari;Yoshioka|","Analysis of commands of Telnet logs illegally connected to IoT devices","Proceedings of 2021 10th International Congress on Advanced Applied Informatics","","2021","","","913","915","isVersionOf https://doi.org/10.1109/IIAI-AAI53430.2021.00160","","","http://escholarship.lib.okayama-u.ac.jp/62292","10.1109/IIAI-AAI53430.2021.00160" "Yuta;Imamura|Rintaro;Orito|Hiroyuki;Uekawa|Kritsana;Chaikaew|Pattara;Leelaprute|Masaya;Sato|Toshihiro;Yamauchi|","Web access monitoring mechanism via Android WebView for threat analysis","International Journal of Information Security","1615-5262","2021-01-19","20","","833","847","isVersionOf https://doi.org/10.1007/s10207-020-00534-3","","000608957200001","http://escholarship.lib.okayama-u.ac.jp/61416","10.1007/s10207-020-00534-3" "Yuichi;Nakamura|Yoshiki;Sameshima|Toshihiro;Tabata|","SEEdit: SELinux Security Policy Configuration System with Higher Level Language","Proceedings of LISA: Large Installation System Administration Conference","","2009","23","","107","117","","","","https://ousar.lib.okayama-u.ac.jp/60841","" "Jing;Yu|Toshihiro;Yamauchi|","Access Control to Prevent Malicious JavaScript Code Exploiting Vulnerabilities of WebView in Android OS","IEICE Transactions on Information and Systems","1745-1361","2015","E98D","4","807","811","isVersionOf https://doi.org/10.1587/transinf.2014ICL0001","","000356589800008","http://escholarship.lib.okayama-u.ac.jp/60839","10.1587/transinf.2014ICL0001" "Toshihiro;Yamauchi|Yuta;Ikegami|","HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks"," Network and System Security(NSS) ","","2016-09-21","2016","","219","234","isVersionOf https://doi.org/10.1007/978-3-319-46298-1_15","","000388133600015","http://escholarship.lib.okayama-u.ac.jp/60838","10.1007/978-3-319-46298-1_15" "Jing;Yu|Toshihiro;Yamauchi|","Access Control to Prevent Attacks Exploiting Vulnerabilities of WebView in Android OS","2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing","","2013","","","1628","1633","","","000356716900219","http://escholarship.lib.okayama-u.ac.jp/60837","10.1109/HPCC.and.EUC.2013.229" "Masahiro;Uemura|Toshihiro;Tabata|","Design and Evaluation of a Bayesian-filter-based Image Spam Filtering Method","International Conference on Information Security and Assurance","","2008","2008","","46","51","isVersionOf https://doi.org/10.1109/ISA.2008.84","","","https://ousar.lib.okayama-u.ac.jp/60835","10.1109/ISA.2008.84" "Hiroki;Kuzuno|Toshihiro;Yamauchi|","MKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption","Advances in Information and Computer Security","","2020-08-26","","","97","116","isVersionOf https://doi.org/10.1007/978-3-030-58208-1_6","","","http://escholarship.lib.okayama-u.ac.jp/60645","10.1007/978-3-030-58208-1_6" "Hideaki;Moriyama|Toshihiro;Yamauchi|Masaya;Sato|Hideo;Taniguchi|","Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM","Advances in Networked-Based Information Systems","","2020-08-20","","","338","349","isVersionOf https://doi.org/10.1007/978-3-030-57811-4_32","","","http://escholarship.lib.okayama-u.ac.jp/60644","10.1007/978-3-030-57811-4_32" "Toshihiro;Yamauchi|Yohei;Akao|Ryota;Yoshitani|Yuichi;Nakamura|Masaki;Hashimoto|","Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes","International Journal of Information Security","1615-5262","2020-06-25","20","","461","473","isVersionOf https://doi.org/10.1007/s10207-020-00514-7","","000543307000001","http://escholarship.lib.okayama-u.ac.jp/60101","10.1007/s10207-020-00514-7" "Masaya;Sato|Hideo;Taniguchi|Toshihiro;Yamauchi|","Design and implementation of hiding method for file manipulation of essential services by system call proxy using virtual machine monitor","International Journal of Space-Based and Situated Computing","20444893","2019-05-28","9","1","1","10","isVersionOf https://doi.org/10.1504/IJSSC.2019.100007","","000470129900001","http://escholarship.lib.okayama-u.ac.jp/57474","10.1504/IJSSC.2019.100007"