| Author | Denno, Satoshi| Ohba, Yuto| Hou, Yafei| |
|---|---|
| Keywords | non-orthogonal multiple access frequency domain linear search low complexity |
| Note | © 2025 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Mar. 2027.| |
| Published Date | 2025-01-11 |
| Publication Title | 2025 IEEE International Conference on Consumer Electronics (ICCE) |
| Publisher | IEEE |
| ISSN | 2158-4001 |
| Content Type | Conference Paper |
| language | English |
| OAI-PMH Set | 岡山大学 |
| Copyright Holders | © 2025 IEEE. |
| File Version | author |
| DOI | 10.1109/icce63647.2025.10930111 |
| Related Url | isVersionOf https://doi.org/10.1109/icce63647.2025.10930111 |
| Author | Damoiseau-Malraux, Gaspard| Kobayashi, Satoru| Fukuda, Kensuke| |
|---|---|
| Keywords | log analysis regular expression source code analysis parsing static code analysis |
| Note | © 2025 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Aug. 2027.| |
| Published Date | 2025-07-08 |
| Publication Title | 2025 IEEE 49th Annual Computers, Software, and Applications Conference (COMPSAC) |
| Publisher | IEEE |
| ISSN | 2836-3795 |
| Content Type | Conference Paper |
| language | English |
| OAI-PMH Set | 岡山大学 |
| Copyright Holders | © 2025 IEEE. |
| File Version | author |
| DOI | 10.1109/compsac65507.2025.00104 |
| Related Url | isVersionOf https://doi.org/10.1109/compsac65507.2025.00104 |
| Author | Kuzuno, Hiroki| Yamauchi, Toshihiro| |
|---|---|
| Abstract | Privilege escalation attacks through memory corruption via kernel vulnerabilities pose significant threats to operating systems. Although the extended Berkley Packet Filter has been employed to trace kernel code execution by inserting interrupts before and after kernel code invocations, it does not track operations before and after kernel data writes, thus hindering effective kernel data monitoring. In this study, we introduce a kernel data monitor (kdMonitor), which is a novel security mechanism designed to detect unauthorized alterations in the monitored kernel data of a dedicated kernel page. The kdMonitor incorporates two distinct methods. The first is periodic monitoring which regularly outputs the monitored kernel data of the dedicated kernel pages. The second is dynamic monitoring, which restricts write access to a dedicated kernel page, supplements any write operations with page faults, and outputs the monitored kernel data of dedicated kernel pages. kdMonitor enables real-time tracking of specified kernel data of the dedicated kernel page residing in the kernel's virtual memory space from the separated machine. Using kdMonitor, we demonstrated its capability to pinpoint tampering with user process privileged information stemming from privilege escalation attacks on the kernel. Through an empirical evaluation, we validated the effectiveness of kdMonitor in detecting privilege escalation attacks by user processes on Linux. Performance assessments revealed that kdMonitor achieved an attack detection time of 0.83 seconds with an overhead of 0.726 %. |
| Keywords | Vulnerability countermeasure Operating system security System security |
| Published Date | 2024-11-06 |
| Publication Title | 2024 IEEE Conference on Dependable and Secure Computing (DSC) |
| Start Page | 66 |
| End Page | 73 |
| ISBN | 979-8-3315-4028-9 |
| language | English |
| Copyright Holders | © 2024 IEEE. |
| File Version | author |
| DOI | 10.1109/dsc63325.2024.00022 |
| Author | Victor, Hervet| Kobayashi, Satoru| Yamauchi, Toshihiro| |
|---|---|
| Keywords | Malware analysis IoT Honeypot Log analysis Attack patterns |
| Note | © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Feb. 2026.| |
| Published Date | 2023-11-27 |
| Publication Title | 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW) |
| Publisher | IEEE |
| Start Page | 292 |
| End Page | 297 |
| ISSN | 2832-1324 |
| Content Type | Conference Paper |
| language | English |
| OAI-PMH Set | 岡山大学 |
| Copyright Holders | © 2023 IEEE. |
| File Version | author |
| DOI | 10.1109/candarw60564.2023.00055 |
| Related Url | isVersionOf https://doi.org/10.1109/candarw60564.2023.00055 |
| Author | Shiba, Kaito| Kuzuno, Hiroki| Yamauchi, Toshihiro| |
|---|---|
| Keywords | Trusted execution environment Stack overflow prevention method System security |
| Note | © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Feb. 2026.| |
| Published Date | 2023-11-27 |
| Publication Title | 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW) |
| Publisher | IEEE |
| Start Page | 274 |
| End Page | 278 |
| ISSN | 2832-1324 |
| Content Type | Conference Paper |
| language | English |
| OAI-PMH Set | 岡山大学 |
| Copyright Holders | © 2023 IEEE. |
| File Version | author |
| DOI | 10.1109/candarw60564.2023.00052 |
| Related Url | isVersionOf https://doi.org/10.1109/candarw60564.2023.00052 |
| Author | Miki, Masato| Yamauchi, Toshihiro| Kobayashi, Satoru| |
|---|---|
| Keywords | Mandatory Access Control System IoT Security Linux Security Modules |
| Note | © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Jan. 2026.| |
| Published Date | 2023-11-28 |
| Publication Title | 2023 Eleventh International Symposium on Computing and Networking (CANDAR) |
| Publisher | IEEE |
| Start Page | 161 |
| End Page | 167 |
| ISSN | 2379-1896 |
| Content Type | Conference Paper |
| language | English |
| OAI-PMH Set | 岡山大学 |
| Copyright Holders | © 2023 IEEE. |
| File Version | author |
| DOI | 10.1109/candar60563.2023.00029 |
| Related Url | isVersionOf https://doi.org/10.1109/candar60563.2023.00029 |
| FullText URL | fulltext20250512-02.pdf |
|---|---|
| Author | Norimatsu, Takashi| Yamauchi, Toshihiro| |
| Keywords | Industrial Ethernet PROFINET Non Real Time Real-Time Isochronous Real Time |
| Note | © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Arg. 2025.| |
| Published Date | 2023-06-23 |
| Publication Title | 2023 5th International Conference on Computer Communication and the Internet (ICCCI) |
| Publisher | IEEE |
| Start Page | 236 |
| End Page | 244 |
| ISSN | 2833-2350 |
| Content Type | Conference Paper |
| language | English |
| OAI-PMH Set | 岡山大学 |
| Copyright Holders | © 2023 IEEE. |
| File Version | author |
| DOI | 10.1109/iccci59363.2023.10210171 |
| Related Url | isVersionOf https://doi.org/10.1109/iccci59363.2023.10210171 |
| Author | Sato, Masaya| Omori, Taku| Yamauchi, Toshihiro| Taniguchi, Hideo| |
|---|---|
| Keywords | system call virtual machine monitor operating system |
| Note | © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Feb. 2026.| |
| Published Date | 2023-11-27 |
| Publication Title | 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW) |
| Publisher | IEEE |
| Start Page | 267 |
| End Page | 273 |
| ISSN | 2832-1324 |
| Content Type | Conference Paper |
| language | English |
| OAI-PMH Set | 岡山大学 |
| Copyright Holders | © 2023 IEEE. |
| File Version | author |
| DOI | 10.1109/candarw60564.2023.00051 |
| Related Url | isVersionOf https://doi.org/10.1109/candarw60564.2023.00051 |
| FullText URL | fulltext20230213-2.pdf |
|---|---|
| Author | Tao, Xianji| Takemoto, Masatsugu| Tsunata, Ren| Ogasawara, Satoshi| |
| Keywords | IPMSM IPMSG high-torque concentrated windings rectangular windings eddy current loss wind generator |
| Published Date | 2023-01-11 |
| Publication Title | IEEE Access |
| Volume | volume11 |
| Publisher | IEEE |
| Start Page | 4740 |
| End Page | 4751 |
| ISSN | 2169-3536 |
| Content Type | Journal Article |
| language | English |
| OAI-PMH Set | 岡山大学 |
| File Version | publisher |
| DOI | 10.1109/ACCESS.2023.3236105 |
| Related Url | isVersionOf https://doi.org/10.1109/ACCESS.2023.3236105 |
| FullText URL | fulltext.pdf |
|---|---|
| Author | Zhu, Junjie| Hou, Pengcheng| Nagayama, Kenta| Hou, Yafei| Denno, Satoshi| Ferdian, Rian| |
| Keywords | Leaky coaxial cable(LCX) localization RSSI neural network |
| Published Date | 2022 |
| Publication Title | IEEE Access |
| Volume | volume10 |
| Publisher | IEEE |
| Start Page | 21109 |
| End Page | 21119 |
| ISSN | 2169-3536 |
| Content Type | Journal Article |
| language | English |
| OAI-PMH Set | 岡山大学 |
| Copyright Holders | © 2022 authors. |
| File Version | publisher |
| DOI | 10.1109/ACCESS.2022.3153083 |
| Web of Science KeyUT | 000764062300001 |
| Related Url | isVersionOf https://doi.org/10.1109/ACCESS.2022.3153083 |
| FullText URL | fulltext20220201-2.pdf |
|---|---|
| Author | Otani, Kohei| Okazaki, Toshiki| Yamauchi, Toshihiro| Moriyama, Hideaki| Sato, Masaya| Taniguchi, Hideo| |
| Abstract | To handle information leaks caused by administrative errors or mishandling, a function for tracing the diffusion of classified information using a virtual machine monitor (VMM) was proposed. However, the proposed function has not been investigated in cases in which virtual machines (VMs) allocated by multiple virtual central processing units (vCPUs) are to be monitored. In addition, cases in which multiple VMs are monitored have not been examined. In this study, we describe the support of multiple VMs for the proposed VMM-based tracing function. We also show how to deal with VMs allocated by multiple vCPUs. Furthermore, we report the evaluation results from assessing the traceability of the improved proposed method and its overhead for classified information when a VM with multiple vCPUs is monitored. |
| Keywords | Information leak prevention Virtualization VMM |
| Published Date | 2021-11 |
| Publication Title | 2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW) |
| Start Page | 352 |
| End Page | 358 |
| ISBN | 978-1-6654-2835-4 |
| language | English |
| Copyright Holders | © 2021 IEEE |
| File Version | author |
| DOI | 10.1109/candarw53999.2021.00066 |
| FullText URL | fulltext20210811-16.pdf |
|---|---|
| Author | Ishihara, Takashi| Sato, Masaya| Yamauchi, Toshihiro| |
| Keywords | Malicious Websites Blacklist Web-based Attack Android |
| Note | © 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. This fulltext is available in Nov. 2022.| 7th International Workshop on Information and Communication Security (WICS 2020), Naha, Japan, 24-27 Nov. 2020| |
| Published Date | 2020-11 |
| Publication Title | 2020 Eighth International Symposium on Computing and Networking Workshops (CANDARW) |
| Publisher | IEEE |
| Start Page | 20489448 |
| Content Type | Conference Paper |
| language | English |
| OAI-PMH Set | 岡山大学 |
| Copyright Holders | © 2020 IEEE |
| File Version | author |
| DOI | 10.1109/candarw51189.2020.00070 |
| Related Url | isVersionOf https://doi.org/10.1109/candarw51189.2020.00070 |
| Author | Ban, Yuya| Yamauchi, Toshihiro| |
|---|---|
| Published Date | 2018-11 |
| Publication Title | 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW) |
| Content Type | Conference Paper |
| FullText URL | fulltext20210811-11.pdf |
|---|---|
| Author | Kudo, Naoki| Yamauchi, Toshihiro| Austin, Thomas H.| |
| Note | © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| The 31st IEEE International Conference on Advanced Information Networking and Applications (AINA-2017) Tamkang University, Taipei, Taiwan, March 27 to March 29, 2017| |
| Published Date | 2017-3 |
| Publication Title | 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA) |
| Publisher | IEEE |
| Start Page | 1063 |
| End Page | 1069 |
| ISSN | 1550-445X |
| Content Type | Conference Paper |
| language | Japanese |
| OAI-PMH Set | 岡山大学 |
| Copyright Holders | © 2017 IEEE |
| File Version | author |
| DOI | 10.1109/aina.2017.61 |
| Web of Science KeyUT | 000403329000143 |
| Related Url | isVersionOf https://doi.org/10.1109/aina.2017.61 |
| Author | Akao, Yohei| Yamauchi, Toshihiro| |
|---|---|
| Published Date | 2016-12 |
| Publication Title | 2016 International Conference on Information Science and Security (ICISS) |
| Content Type | Conference Paper |
| Author | Sato, Masaya| Yamauchi, Toshihiro| Taniguchi, Hideo| |
|---|---|
| Published Date | 2016-11 |
| Publication Title | 2016 Fourth International Symposium on Computing and Networking (CANDAR) |
| Content Type | Conference Paper |
| Author | Yu, Jing| Yamauchi, Toshihiro| |
|---|---|
| Published Date | 2013 |
| Publication Title | 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing |
| Content Type | Conference Paper |
| FullText URL | ISA2008.pdf |
|---|---|
| Author | Uemura, Masahiro| Tabata, Toshihiro| |
| Keywords | image spam bayesian filter image information token |
| Published Date | 2008 |
| Publication Title | International Conference on Information Security and Assurance |
| Volume | volume2008 |
| Publisher | IEEE |
| Start Page | 46 |
| End Page | 51 |
| Content Type | Conference Paper |
| language | English |
| OAI-PMH Set | 岡山大学 |
| File Version | author |
| DOI | 10.1109/ISA.2008.84 |
| Related Url | isVersionOf https://doi.org/10.1109/ISA.2008.84 |
| Author | Murakami, Hiroki| |
|---|---|
| Published Date | 2019-11 |
| Publication Title | Proceedings of APSIPA Annual Summit and Conference |
| Volume | volume2019 |
| Content Type | Conference Paper |
| Author | Matsumoto, Kento| Hara, Sunao| Abe, Masanobu| |
|---|---|
| Published Date | 2019-11 |
| Publication Title | Proceedings of APSIPA Annual Summit and Conference |
| Volume | volume2019 |
| Content Type | Conference Paper |