著者 Kuzuno, Hiroki| Yamauchi, Toshihiro|
備考 This is an Accepted Manuscript of a conference paper published by Springer Nature Singapore.| NSS 2024| Lecture Notes in Computer Science, volume 15564| This fulltext file will be available in Mar. 2026.|
発行日 2025-03-14
出版物タイトル Network and System Security
出版者 Springer Nature Singapore
開始ページ 213
終了ページ 231
ISSN 0302-9743
資料タイプ 会議発表論文
言語 英語
OAI-PMH Set 岡山大学
著作権者 © 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
論文のバージョン author
DOI 10.1007/978-981-96-3531-3_11
関連URL isVersionOf https://doi.org/10.1007/978-981-96-3531-3_11
著者 Kuzuno, Hiroki| Yamauchi, Toshihiro|
抄録 Privilege escalation attacks through memory corruption via kernel vulnerabilities pose significant threats to operating systems. Although the extended Berkley Packet Filter has been employed to trace kernel code execution by inserting interrupts before and after kernel code invocations, it does not track operations before and after kernel data writes, thus hindering effective kernel data monitoring. In this study, we introduce a kernel data monitor (kdMonitor), which is a novel security mechanism designed to detect unauthorized alterations in the monitored kernel data of a dedicated kernel page. The kdMonitor incorporates two distinct methods. The first is periodic monitoring which regularly outputs the monitored kernel data of the dedicated kernel pages. The second is dynamic monitoring, which restricts write access to a dedicated kernel page, supplements any write operations with page faults, and outputs the monitored kernel data of dedicated kernel pages. kdMonitor enables real-time tracking of specified kernel data of the dedicated kernel page residing in the kernel's virtual memory space from the separated machine. Using kdMonitor, we demonstrated its capability to pinpoint tampering with user process privileged information stemming from privilege escalation attacks on the kernel. Through an empirical evaluation, we validated the effectiveness of kdMonitor in detecting privilege escalation attacks by user processes on Linux. Performance assessments revealed that kdMonitor achieved an attack detection time of 0.83 seconds with an overhead of 0.726 %.
キーワード Vulnerability countermeasure Operating system security System security
発行日 2024-11-06
出版物タイトル 2024 IEEE Conference on Dependable and Secure Computing (DSC)
開始ページ 66
終了ページ 73
ISBN 979-8-3315-4028-9
言語 英語
著作権者 © 2024 IEEE.
論文のバージョン author
DOI 10.1109/dsc63325.2024.00022
フルテキストURL fulltext20250725-01.pdf
著者 Kuzuno, Hiroki| Yamauchi, Toshihiro|
キーワード Kernel vulnerability Dynamic analysis System security
備考 This is an Accepted Manuscript of a conference paper published by Springer Nature Switzerland.| WISA 2022| Lecture Notes in Computer Science, volume 13720|
発行日 2023
出版物タイトル Information Security Applications
出版者 Springer Nature Switzerland
開始ページ 222
終了ページ 234
ISSN 0302-9743
資料タイプ 会議発表論文
言語 英語
OAI-PMH Set 岡山大学
著作権者 © 2023 Springer Nature Switzerland AG
論文のバージョン author
DOI 10.1007/978-3-031-25659-2_16
Web of Science KeyUT 001431522400016
関連URL isVersionOf https://doi.org/10.1007/978-3-031-25659-2_16
フルテキストURL fulltext20250523-04.pdf
著者 Shimamoto, Yuta| Uekawa, Hiroyuki| Akiyama, Mitsuaki| Yamauchi, Toshihiro|
抄録 Although a Software Bill of Materials (SBOM) plays a key role in software transparency, inconsistencies in SBOM descriptions can undermine its value. To address this, we propose a novel approach to program access control, SBOMAC, which leverages Mandatory Access Control (MAC) systems to ensure transparent and explicit program execution. In this study, we identify the challenges associated with implementing this approach and present preliminary investigation results to address these challenges.
発行日 2025-02-24
言語 英語
論文のバージョン publisher
フルテキストURL fulltext20250526-01.pdf
著者 Fujii, Shota| Kawaguchi, Nobutaka| Shigemoto, Tomohiro| Yamauchi, Toshihiro|
備考 This is an Accepted Manuscript of a conference paper published by Springer International Publishing.| IWSEC 2022| Lecture Notes in Computer Science, volume 13504|
発行日 2022-08-12
出版物タイトル Advances in Information and Computer Security
出版者 Springer International Publishing
開始ページ 85
終了ページ 104
ISSN 0302-9743
資料タイプ 会議発表論文
言語 英語
OAI-PMH Set 岡山大学
著作権者 © 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
論文のバージョン author
DOI 10.1007/978-3-031-15255-9_5
Web of Science KeyUT 000894177600005
関連URL isVersionOf https://doi.org/10.1007/978-3-031-15255-9_5
著者 Victor, Hervet| Kobayashi, Satoru| Yamauchi, Toshihiro|
キーワード Malware analysis IoT Honeypot Log analysis Attack patterns
備考 © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Feb. 2026.|
発行日 2023-11-27
出版物タイトル 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW)
出版者 IEEE
開始ページ 292
終了ページ 297
ISSN 2832-1324
資料タイプ 会議発表論文
言語 英語
OAI-PMH Set 岡山大学
著作権者 © 2023 IEEE.
論文のバージョン author
DOI 10.1109/candarw60564.2023.00055
関連URL isVersionOf https://doi.org/10.1109/candarw60564.2023.00055
著者 Shiba, Kaito| Kuzuno, Hiroki| Yamauchi, Toshihiro|
キーワード Trusted execution environment Stack overflow prevention method System security
備考 © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Feb. 2026.|
発行日 2023-11-27
出版物タイトル 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW)
出版者 IEEE
開始ページ 274
終了ページ 278
ISSN 2832-1324
資料タイプ 会議発表論文
言語 英語
OAI-PMH Set 岡山大学
著作権者 © 2023 IEEE.
論文のバージョン author
DOI 10.1109/candarw60564.2023.00052
関連URL isVersionOf https://doi.org/10.1109/candarw60564.2023.00052
著者 Miki, Masato| Yamauchi, Toshihiro| Kobayashi, Satoru|
キーワード Mandatory Access Control System IoT Security Linux Security Modules
備考 © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Jan. 2026.|
発行日 2023-11-28
出版物タイトル 2023 Eleventh International Symposium on Computing and Networking (CANDAR)
出版者 IEEE
開始ページ 161
終了ページ 167
ISSN 2379-1896
資料タイプ 会議発表論文
言語 英語
OAI-PMH Set 岡山大学
著作権者 © 2023 IEEE.
論文のバージョン author
DOI 10.1109/candar60563.2023.00029
関連URL isVersionOf https://doi.org/10.1109/candar60563.2023.00029
著者 Norimatsu, Takashi| Yamauchi, Toshihiro|
キーワード Industrial Ethernet PROFINET Non Real Time Real-Time Isochronous Real Time
備考 © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Arg. 2025.|
発行日 2023-06-23
出版物タイトル 2023 5th International Conference on Computer Communication and the Internet (ICCCI)
出版者 IEEE
開始ページ 236
終了ページ 244
ISSN 2833-2350
資料タイプ 会議発表論文
言語 英語
OAI-PMH Set 岡山大学
著作権者 © 2023 IEEE.
論文のバージョン author
DOI 10.1109/iccci59363.2023.10210171
関連URL isVersionOf https://doi.org/10.1109/iccci59363.2023.10210171
著者 Sato, Masaya| Omori, Taku| Yamauchi, Toshihiro| Taniguchi, Hideo|
キーワード system call virtual machine monitor operating system
備考 © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Feb. 2026.|
発行日 2023-11-27
出版物タイトル 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW)
出版者 IEEE
開始ページ 267
終了ページ 273
ISSN 2832-1324
資料タイプ 会議発表論文
言語 英語
OAI-PMH Set 岡山大学
著作権者 © 2023 IEEE.
論文のバージョン author
DOI 10.1109/candarw60564.2023.00051
関連URL isVersionOf https://doi.org/10.1109/candarw60564.2023.00051
著者 Michishita, Daigo| Kobayashi, Satoru| Yamauchi, Toshihiro|
備考 This is an Accepted Manuscript of a conference paper published by Springer Nature Switzerland.| EIDWT 2025| Lecture Notes on Data Engineering and Communications Technologies,volume 243| This fulltext file will be available in Apr. 2026.|
発行日 2025-04-01
出版物タイトル Advances in Internet, Data and Web Technologies
出版者 Springer Nature Switzerland
開始ページ 107
終了ページ 119
ISSN 2367-4512
資料タイプ 会議発表論文
言語 英語
OAI-PMH Set 岡山大学
著作権者 © 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG
論文のバージョン author
DOI 10.1007/978-3-031-86149-9_11
関連URL isVersionOf https://doi.org/10.1007/978-3-031-86149-9_11
フルテキストURL fulltext.pdf
著者 Yamauchi, Toshihiro| Orito, Rintaro| Ebisu, Koji| Sato, Masaya|
キーワード Android accessibility services malicious websites web-based attacks web security
発行日 2024
出版物タイトル IEEE Access
12巻
出版者 Institute of Electrical and Electronics Engineers
開始ページ 153285
終了ページ 153294
ISSN 2169-3536
資料タイプ 学術雑誌論文
言語 英語
OAI-PMH Set 岡山大学
著作権者 © 2024 The Authors.
論文のバージョン publisher
DOI 10.1109/ACCESS.2024.3478748
Web of Science KeyUT 001340709500001
関連URL isVersionOf https://doi.org/10.1109/ACCESS.2024.3478748
フルテキストURL fulltext20220204-1.pdf
著者 Nakamura, Toru| Ito, Hiroshi| Kiyomoto, Shinsaku| Yamauchi, Toshihiro|
キーワード Virtual machine introspection Forensics OS security
備考 This is the version of the book manuscript accepted for publication after peer review, but prior to copyediting and typesetting.
This fulltext is available in Aug. 2023.|
IWSEC 2021: Advances in Information and Computer Security pp 64-73|
発行日 2021-08-27
出版物タイトル Advances in Information and Computer Security|Lecture Notes in Computer Science
12835巻
出版者 Springer International Publishing
開始ページ 64
終了ページ 73
ISSN 0302-9743
NCID BC11247320
資料タイプ 図書
言語 英語
OAI-PMH Set 岡山大学
著作権者 © Springer Nature Switzerland AG 2021
論文のバージョン author
DOI 10.1007/978-3-030-85987-9_4
Web of Science KeyUT 000708084400004
関連URL isVersionOf https://doi.org/10.1007/978-3-030-85987-9_4
フルテキストURL fulltext20220201-3.pdf
著者 Kusunoki, Koki| Yamauchi, Toshihiro| Taniguchi, Hideo|
抄録 Physical memory capacity has increased owing to large-scale integration. In addition, memory footprints have increased in size, as multiple programs are executed on a single computer. Many operating systems manage physical memory by paging a 4 KB page. Therefore, the number of entries in the virtual address translation table for virtual to physical increases along with the size of the memory footprints. This cause a decrease in the translation lookaside buffer (TLB) hit ratio, resulting in the performance degradation of the application. To address this problem, we propose the implementation of physical memory management with two page sizes: 4 KB and 4 MB. This allows us to expand range of addresses to be translated by a single TLB entry, thereby improving the TLB hit rate. This paper describes the design and implementation of the physical memory management mechanism that manages physical memory using two page sizes on The ENduring operating system for Distributed EnviRonment (Tender OS). Our results showed that when the page size is 4 MB, the processing time of the memory allocation can be reduced by as much as approximately 99.7%, and the processing time for process creation can be reduced by as much as approximately 51%, and the processing time of the memory operation could be reduced by as much as 91.9%.
発行日 2021-08-08
出版物タイトル Advances in Networked-Based Information Systems|Lecture Notes in Networks and Systems
313巻
開始ページ 238
終了ページ 248
ISBN 978-3-030-84912-2
言語 英語
著作権者 © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
論文のバージョン author
DOI 10.1007/978-3-030-84913-9_22
フルテキストURL fulltext20220201-2.pdf
著者 Otani, Kohei| Okazaki, Toshiki| Yamauchi, Toshihiro| Moriyama, Hideaki| Sato, Masaya| Taniguchi, Hideo|
抄録 To handle information leaks caused by administrative errors or mishandling, a function for tracing the diffusion of classified information using a virtual machine monitor (VMM) was proposed. However, the proposed function has not been investigated in cases in which virtual machines (VMs) allocated by multiple virtual central processing units (vCPUs) are to be monitored. In addition, cases in which multiple VMs are monitored have not been examined. In this study, we describe the support of multiple VMs for the proposed VMM-based tracing function. We also show how to deal with VMs allocated by multiple vCPUs. Furthermore, we report the evaluation results from assessing the traceability of the improved proposed method and its overhead for classified information when a VM with multiple vCPUs is monitored.
キーワード Information leak prevention Virtualization VMM
発行日 2021-11
出版物タイトル 2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)
開始ページ 352
終了ページ 358
ISBN 978-1-6654-2835-4
言語 英語
著作権者 © 2021 IEEE
論文のバージョン author
DOI 10.1109/candarw53999.2021.00066
フルテキストURL Mitigation_of_Kernel_Memory_Corruption_Using_Multiple_Kernel_Memory_Mechanism.pdf
著者 Kuzuno, Hiroki| Yamauchi, Toshihiro|
キーワード Memory corruption kernel vulnerability system security operating system
発行日 2021
出版物タイトル IEEE Access
9巻
出版者 Institute of Electrical and Electronics Engineers (IEEE)
開始ページ 111651
終了ページ 111665
ISSN 2169-3536
資料タイプ 学術雑誌論文
言語 英語
OAI-PMH Set 岡山大学
論文のバージョン publisher
DOI 10.1109/access.2021.3101452
関連URL isVersionOf https://doi.org/10.1109/access.2021.3101452
著者 Ichioka, Shuichi| Pouget, Estelle| Mimura, Takao| Nakajima, Jun| Yamauchi, Toshihiro|
発行日 2020-12-09
出版物タイトル Information Security Applications|Lecture Notes in Computer Science
12583巻
資料タイプ 学術雑誌論文
著者 Ban, Yuya| Yamauchi, Toshihiro|
発行日 2018-11
出版物タイトル 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)
資料タイプ 会議発表論文
著者 Imamura, Yuta| Uekawa, Hiroyuki| Ishihara, Yasuhiro| Sato, Masaya| Yamauchi, Toshihiro|
発行日 2018-1-29
出版物タイトル Proceedings of the Australasian Computer Science Week Multiconference
資料タイプ 会議発表論文
フルテキストURL fulltext20210811-12.pdf
著者 Kudo, Naoki| Yamauchi, Toshihiro| Austin, Thomas H.|
キーワード hybrid Application Android Access Control
備考 ここに掲載した著作物の利用に関する注意
本著作物の著作権は情報処理学会に帰属します。本著作物は著作権者である情報処理学会の許可のもとに掲載するものです。ご利用に当たっては「著作権法」ならびに「情報処理学会倫理綱領」に従うことをお願いいたします。

Notice for the use of this material
The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the author (s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of the IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof. |
発行日 2018
出版物タイトル Journal of Information Processing
26巻
出版者 Information Processing Society of Japan
開始ページ 396
終了ページ 405
ISSN 1882-6652
資料タイプ 学術雑誌論文
言語 英語
著作権者 Copyright (C) Information Processing Society of Japan.
論文のバージョン publisher
DOI 10.2197/ipsjjip.26.396
関連URL isVersionOf https://doi.org/10.2197/ipsjjip.26.396