Author Denno, Satoshi| Ohba, Yuto| Hou, Yafei|
Keywords non-orthogonal multiple access frequency domain linear search low complexity
Note © 2025 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Mar. 2027.|
Published Date 2025-01-11
Publication Title 2025 IEEE International Conference on Consumer Electronics (ICCE)
Publisher IEEE
ISSN 2158-4001
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2025 IEEE.
File Version author
DOI 10.1109/icce63647.2025.10930111
Related Url isVersionOf https://doi.org/10.1109/icce63647.2025.10930111
Author Damoiseau-Malraux, Gaspard| Kobayashi, Satoru| Fukuda, Kensuke|
Keywords log analysis regular expression source code analysis parsing static code analysis
Note © 2025 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Aug. 2027.|
Published Date 2025-07-08
Publication Title 2025 IEEE 49th Annual Computers, Software, and Applications Conference (COMPSAC)
Publisher IEEE
ISSN 2836-3795
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2025 IEEE.
File Version author
DOI 10.1109/compsac65507.2025.00104
Related Url isVersionOf https://doi.org/10.1109/compsac65507.2025.00104
Author Kuzuno, Hiroki| Yamauchi, Toshihiro|
Abstract Privilege escalation attacks through memory corruption via kernel vulnerabilities pose significant threats to operating systems. Although the extended Berkley Packet Filter has been employed to trace kernel code execution by inserting interrupts before and after kernel code invocations, it does not track operations before and after kernel data writes, thus hindering effective kernel data monitoring. In this study, we introduce a kernel data monitor (kdMonitor), which is a novel security mechanism designed to detect unauthorized alterations in the monitored kernel data of a dedicated kernel page. The kdMonitor incorporates two distinct methods. The first is periodic monitoring which regularly outputs the monitored kernel data of the dedicated kernel pages. The second is dynamic monitoring, which restricts write access to a dedicated kernel page, supplements any write operations with page faults, and outputs the monitored kernel data of dedicated kernel pages. kdMonitor enables real-time tracking of specified kernel data of the dedicated kernel page residing in the kernel's virtual memory space from the separated machine. Using kdMonitor, we demonstrated its capability to pinpoint tampering with user process privileged information stemming from privilege escalation attacks on the kernel. Through an empirical evaluation, we validated the effectiveness of kdMonitor in detecting privilege escalation attacks by user processes on Linux. Performance assessments revealed that kdMonitor achieved an attack detection time of 0.83 seconds with an overhead of 0.726 %.
Keywords Vulnerability countermeasure Operating system security System security
Published Date 2024-11-06
Publication Title 2024 IEEE Conference on Dependable and Secure Computing (DSC)
Start Page 66
End Page 73
ISBN 979-8-3315-4028-9
language English
Copyright Holders © 2024 IEEE.
File Version author
DOI 10.1109/dsc63325.2024.00022
Author Victor, Hervet| Kobayashi, Satoru| Yamauchi, Toshihiro|
Keywords Malware analysis IoT Honeypot Log analysis Attack patterns
Note © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Feb. 2026.|
Published Date 2023-11-27
Publication Title 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW)
Publisher IEEE
Start Page 292
End Page 297
ISSN 2832-1324
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2023 IEEE.
File Version author
DOI 10.1109/candarw60564.2023.00055
Related Url isVersionOf https://doi.org/10.1109/candarw60564.2023.00055
Author Shiba, Kaito| Kuzuno, Hiroki| Yamauchi, Toshihiro|
Keywords Trusted execution environment Stack overflow prevention method System security
Note © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Feb. 2026.|
Published Date 2023-11-27
Publication Title 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW)
Publisher IEEE
Start Page 274
End Page 278
ISSN 2832-1324
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2023 IEEE.
File Version author
DOI 10.1109/candarw60564.2023.00052
Related Url isVersionOf https://doi.org/10.1109/candarw60564.2023.00052
Author Miki, Masato| Yamauchi, Toshihiro| Kobayashi, Satoru|
Keywords Mandatory Access Control System IoT Security Linux Security Modules
Note © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Jan. 2026.|
Published Date 2023-11-28
Publication Title 2023 Eleventh International Symposium on Computing and Networking (CANDAR)
Publisher IEEE
Start Page 161
End Page 167
ISSN 2379-1896
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2023 IEEE.
File Version author
DOI 10.1109/candar60563.2023.00029
Related Url isVersionOf https://doi.org/10.1109/candar60563.2023.00029
FullText URL fulltext20250512-02.pdf
Author Norimatsu, Takashi| Yamauchi, Toshihiro|
Keywords Industrial Ethernet PROFINET Non Real Time Real-Time Isochronous Real Time
Note © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Arg. 2025.|
Published Date 2023-06-23
Publication Title 2023 5th International Conference on Computer Communication and the Internet (ICCCI)
Publisher IEEE
Start Page 236
End Page 244
ISSN 2833-2350
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2023 IEEE.
File Version author
DOI 10.1109/iccci59363.2023.10210171
Related Url isVersionOf https://doi.org/10.1109/iccci59363.2023.10210171
Author Sato, Masaya| Omori, Taku| Yamauchi, Toshihiro| Taniguchi, Hideo|
Keywords system call virtual machine monitor operating system
Note © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Feb. 2026.|
Published Date 2023-11-27
Publication Title 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW)
Publisher IEEE
Start Page 267
End Page 273
ISSN 2832-1324
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2023 IEEE.
File Version author
DOI 10.1109/candarw60564.2023.00051
Related Url isVersionOf https://doi.org/10.1109/candarw60564.2023.00051
FullText URL fulltext20230213-2.pdf
Author Tao, Xianji| Takemoto, Masatsugu| Tsunata, Ren| Ogasawara, Satoshi|
Keywords IPMSM IPMSG high-torque concentrated windings rectangular windings eddy current loss wind generator
Published Date 2023-01-11
Publication Title IEEE Access
Volume volume11
Publisher IEEE
Start Page 4740
End Page 4751
ISSN 2169-3536
Content Type Journal Article
language English
OAI-PMH Set 岡山大学
File Version publisher
DOI 10.1109/ACCESS.2023.3236105
Related Url isVersionOf https://doi.org/10.1109/ACCESS.2023.3236105
FullText URL fulltext.pdf
Author Zhu, Junjie| Hou, Pengcheng| Nagayama, Kenta| Hou, Yafei| Denno, Satoshi| Ferdian, Rian|
Keywords Leaky coaxial cable(LCX) localization RSSI neural network
Published Date 2022
Publication Title IEEE Access
Volume volume10
Publisher IEEE
Start Page 21109
End Page 21119
ISSN 2169-3536
Content Type Journal Article
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2022 authors.
File Version publisher
DOI 10.1109/ACCESS.2022.3153083
Web of Science KeyUT 000764062300001
Related Url isVersionOf https://doi.org/10.1109/ACCESS.2022.3153083
FullText URL fulltext20220201-2.pdf
Author Otani, Kohei| Okazaki, Toshiki| Yamauchi, Toshihiro| Moriyama, Hideaki| Sato, Masaya| Taniguchi, Hideo|
Abstract To handle information leaks caused by administrative errors or mishandling, a function for tracing the diffusion of classified information using a virtual machine monitor (VMM) was proposed. However, the proposed function has not been investigated in cases in which virtual machines (VMs) allocated by multiple virtual central processing units (vCPUs) are to be monitored. In addition, cases in which multiple VMs are monitored have not been examined. In this study, we describe the support of multiple VMs for the proposed VMM-based tracing function. We also show how to deal with VMs allocated by multiple vCPUs. Furthermore, we report the evaluation results from assessing the traceability of the improved proposed method and its overhead for classified information when a VM with multiple vCPUs is monitored.
Keywords Information leak prevention Virtualization VMM
Published Date 2021-11
Publication Title 2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)
Start Page 352
End Page 358
ISBN 978-1-6654-2835-4
language English
Copyright Holders © 2021 IEEE
File Version author
DOI 10.1109/candarw53999.2021.00066
FullText URL fulltext20210811-16.pdf
Author Ishihara, Takashi| Sato, Masaya| Yamauchi, Toshihiro|
Keywords Malicious Websites Blacklist Web-based Attack Android
Note © 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
This fulltext is available in Nov. 2022.|
7th International Workshop on Information and Communication Security (WICS 2020), Naha, Japan, 24-27 Nov. 2020|
Published Date 2020-11
Publication Title 2020 Eighth International Symposium on Computing and Networking Workshops (CANDARW)
Publisher IEEE
Start Page 20489448
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2020 IEEE
File Version author
DOI 10.1109/candarw51189.2020.00070
Related Url isVersionOf https://doi.org/10.1109/candarw51189.2020.00070
Author Ban, Yuya| Yamauchi, Toshihiro|
Published Date 2018-11
Publication Title 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)
Content Type Conference Paper
FullText URL fulltext20210811-11.pdf
Author Kudo, Naoki| Yamauchi, Toshihiro| Austin, Thomas H.|
Note © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| The 31st IEEE International Conference on Advanced Information Networking and Applications (AINA-2017) Tamkang University, Taipei, Taiwan, March 27 to March 29, 2017|
Published Date 2017-3
Publication Title 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA)
Publisher IEEE
Start Page 1063
End Page 1069
ISSN 1550-445X
Content Type Conference Paper
language Japanese
OAI-PMH Set 岡山大学
Copyright Holders © 2017 IEEE
File Version author
DOI 10.1109/aina.2017.61
Web of Science KeyUT 000403329000143
Related Url isVersionOf https://doi.org/10.1109/aina.2017.61
Author Akao, Yohei| Yamauchi, Toshihiro|
Published Date 2016-12
Publication Title 2016 International Conference on Information Science and Security (ICISS)
Content Type Conference Paper
Author Sato, Masaya| Yamauchi, Toshihiro| Taniguchi, Hideo|
Published Date 2016-11
Publication Title 2016 Fourth International Symposium on Computing and Networking (CANDAR)
Content Type Conference Paper
Author Yu, Jing| Yamauchi, Toshihiro|
Published Date 2013
Publication Title 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing
Content Type Conference Paper
FullText URL ISA2008.pdf
Author Uemura, Masahiro| Tabata, Toshihiro|
Keywords image spam bayesian filter image information token
Published Date 2008
Publication Title International Conference on Information Security and Assurance
Volume volume2008
Publisher IEEE
Start Page 46
End Page 51
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
File Version author
DOI 10.1109/ISA.2008.84
Related Url isVersionOf https://doi.org/10.1109/ISA.2008.84
Author Murakami, Hiroki|
Published Date 2019-11
Publication Title Proceedings of APSIPA Annual Summit and Conference
Volume volume2019
Content Type Conference Paper
Author Matsumoto, Kento| Hara, Sunao| Abe, Masanobu|
Published Date 2019-11
Publication Title Proceedings of APSIPA Annual Summit and Conference
Volume volume2019
Content Type Conference Paper