SEARCH
Search Details
KUZUNO HirokiGraduate School of Engineering / Department of Electrical and Electronic EngineeringAssociate Professor
Profile
My main research area is cyber security, specifically on mobile, network, intrusion detection, digital forensics. Recent focusing topic regarding digital forensics methods for practical investigation.
Researcher basic information
■ Research Keyword■ Research Areas
■ Committee History
- Apr. 2024 - Present, IEEE Conference on Dependable and Secure Computing (DSC), Program committee
- 2023 - Present, コンピュータセキュリティシンポジウム, 実行委員(2023-),プログラム委員(2023-)
- 2023 - Present, 情報処理学会 論文誌 CSEC 特集号編集委員会, 編集委員
- Apr. 2022 - Present, 情報処理学会 コンピュータセキュリティ研究会(CSEC), 専門委員
- Apr. 2022 - Present, 情報処理学会 セキュリティ心理学とトラスト研究会(SPT), 運営委員(2022-2024.03),幹事(2024.04-)
- 2022 - Present, IEICE Transactions on Information and Systems Special Section on Information and Communication System Security, Guest Associate Editor-in-Cheif
- 2022 - Present, International Workshop on Security (IWSEC), Program committee (2022-), Poster Chair (2022) , Program co-Chair (2023)
- 2021 - Present, OSSセキュリティ技術ワークショップ(OWS) 実行委員会, 委員
- 2020 - Present, International Conference on Emerging Security Information, Systems and Technologies, Program committee member
- 2017 - Present, Asia Joint Conference on Information Security (AsiaJCIS), Program committee
- May 2013 - Present, 電子情報通信学会 情報通信システムセキュリティ専門委員会(ICSS), 専門委員, 2013.05-2015.03, 2018.04-
- Jun. 2020 - Jun. 2024, 情報処理学会 ジャーナル/JIP編集委員会 小委員会(ネットワークグループ), 編集委員
- 2021 - 2023, 情報処理学会 論文誌 CSEC 特集号編集委員会, 幹事
- Apr. 2018 - Mar. 2022, 情報処理学会 コンピュータセキュリティ研究会(CSEC), 運営委員
- 2020 - 2021, Annual FIRST Conference, Program committee
- 2018, IEEE Conference on Dependable and Secure Computing (DSC), Program committee
- Apr. 2013 - Oct. 2014, 情報処理学会 セキュリティ心理学とトラスト研究会(SPT), 専門委員
- 2014 - 2014, 電子情報通信学会 総合大会, プログラム編成委員
- 2013 - 2014, マルチメディア、分散、協調とモバイル(DICOMO)シンポジウム, プログラム委員
Research activity information
■ Award- Nov. 2024 第23回情報科学技術フォーラム(FIT2024), FIT Funai Best Paper Award
- Oct. 2024 コンピュータセキュリティシンポジウム2024, CSS2024優秀論文賞
- Sep. 2024 第106回 CSEC研究発表会 CSEC優秀研究賞
- Nov. 2023 情報セキュリティ(ISEC)研究専門委員会, 情報セキュリティ研究奨励賞
- Jun. 2023 ICSS 2022年度研究賞
- Dec. 2022 FIT論文賞 第21回情報科学技術フォーラム(FIT2022)
- Sep. 2022 第98回 CSEC研究発表会 CSEC優秀研究賞
- Dec. 2021 第20回情報科学技術フォーラム(FIT2021), FIT論文賞
- Sep. 2021 The 16th International Workshop on Security (IWSEC 2021) Best Paper Award
- Nov. 2020 第19回情報科学技術フォーラム(FIT2020), FIT論文賞
- Dec. 2019 第18回情報科学技術フォーラム(FIT2019), FIT論文賞
- Oct. 2018 コンピュータセキュリティシンポジウム2018, CSS2018優秀論文賞
- Apr. 2014 The 9th Asia Joint Conference on Information Security (AsiaJCIS 2014) Best Paper Award
- Feb. 2025, The 7th International Conference on Artificial Intelligence in Information and Communication, EnglishSeverity Prediction Based on Connectivity of Vulnerability Information via Related Product Information[Refereed]International conference proceedings
- Institute of Electronics, Information and Communications Engineers (IEICE), Feb. 2025, IEICE Transactions on Information and Systems, English[Refereed]Scientific journal
- Corresponding, Dec. 2024, (32) (32), 1066 - 1081, EnglishMan-in-the-Portal: Breaking SSL/TLS Silently Abusing Captive Portal[Refereed]Scientific journal
- Dec. 2024, The 2024 7th IEEE Conference on Dependable and Secure Computing (DSC 2024), EnglishkdMonitor: Kernel Data Monitor for Detecting Kernel Memory Corruption[Refereed]International conference proceedings
- Nov. 2024, Journal of Information Processing, (32) (32), 1090 - 1104, EnglishProposal of Open Source Software Security Risk Indicator based on Vulnerability Management Interview[Refereed]Scientific journal
- Nov. 2024, The 2024 7th Conference on Dependable;Secure Computing, EnglishCan We Determine Whether a Set of Ethereum Transaction Data Contains Fraudulent Transactions?[Refereed]International conference proceedings
- Nov. 2024, The 18th International Conference on Network and System Security (NSS 2024), EnglishRKPM: Restricted Kernel Page Mechanism to Mitigate Privilege Escalation Attacks,[Refereed]International conference proceedings
- Sep. 2024, Journal of Information Processing, 32, 767 - 778, EnglishVisualization Method for Open Source Software Risk Related to Vulnerability and Developmental Status Considering Dependencies[Refereed]Scientific journal
- Corresponding, Jul. 2024, International Journal of Information Security, 23, 3393 - 3413, EnglishEarly mitigation of CPU-optimized ransomware using monitoring encryption instructions[Refereed]Scientific journal
- Jul. 2024, International Journal of Information Security, 23, 3351 - 3367, English[Refereed]Scientific journal
- Dec. 2023, The 2023 Eleventh International Symposium on Computing and Networking (CANDAR 2023), EnglishSecurity Risk Visualization for Open-Source Software based on Vulnerabilities, Repositories, and Dependencies[Refereed]International conference proceedings
- Dec. 2023, Journal of Information Processing, 31, 788 - 801, English[Refereed]Scientific journal
- Nov. 2023, 10th International Workshop on Information and Communication Security (WICS 2023), The 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW 2023), EnglishPrevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE[Refereed]International conference proceedings
- Corresponding, Sep. 2023, IEICE Transactions on Information and Systems, E106-D(9) (9), 1339 - 1353, EnglishFile Tracking and Visualization Methods Using a Network Graph to Prevent Information Leakage,[Refereed]Scientific journal
- Sep. 2023, IEICE Transactions on Information and Systems, E106-D(9) (9), 1326 - 1338, EnglishProtection Mechanism of Kernel Data Using Memory Protection Key[Refereed]Scientific journal
- Aug. 2023, The 24th World Conference on Information Security Applications (WISA 2023), 14402, 143 - 156, EnglishSecurity Risk Indicator for Open Source Software to Measure Software Development Status[Refereed]International conference proceedings
- Aug. 2023, The 17th International Conference on Network and System Security, Short Paper, 13983, 61 - 76, English[Refereed]International conference proceedings
- Feb. 2023, The 23rd World Conference on Information Security Applications (WISA 2022), 13720, 222 - 234, English[Refereed]International conference proceedings
- Dec. 2022, 情報処理学会論文誌(テクニカルノート), 63(12) (12), 1770 - 1775, Japaneseグラフ埋め込みによるEthereumの不正取引アカウント検知[Refereed]Scientific journal
- Information Processing Society of Japan, Dec. 2022, Journal of Information Processing, 30, 796 - 806Scientific journal
- Corresponding, Nov. 2022, IEICE Transactions on Information and Systems, E105D(11) (11), 1890 - 1899, EnglishEfficient Protection Mechanism for CPU Cache Flush Instruction Based Attacks[Refereed]Scientific journal
- Sep. 2022, Journal of Information Processing, 30, 563 - 576, EnglishPrevention of Kernel Memory Corruption Using Kernel Page Restriction Mechanism[Refereed]Scientific journal
- Sep. 2022, The 17th International Workshop on Security (IWSEC 2022), 13504, 66 - 84, English[Refereed]International conference proceedings
- Corresponding, Aug. 2022, The 17th Asia Joint Conference on Information Security (AsiaJCIS 2022), EnglishConstructing a Network Graph of File Tracking Results Against Information Leakage[Refereed]
- Corresponding, Jun. 2022, Sensors, 22(12) (12), 1 - 19, EnglishDOC-IDS: A Deep Learning-based Method for Feature Extraction and Anomaly Detection in Network Traffic[Refereed]Scientific journal
- Sep. 2021, The 6th IEEE European Symposium on Security and Privacy Workshop (EuroSPW 2021), The 3rd edition of our workshop on the Security of Software / Hardware Interfaces (SILM 2021), 74 - 79, EnglishFlushBlocker: Lightweight mitigating mechanism for CPU cache flush instruction based attacks[Refereed]International conference proceedings
- Sep. 2021, The 16th International Workshop on Security (IWSEC 2021), (12231) (12231), 45 - 63, EnglishKPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruptio[Refereed]International conference proceedings
- Jul. 2021, IEEE Access, 9, 111651 - 111665, EnglishMitigation of Kernel Memory Corruption Using Multiple Kernel Memory Mechanism[Refereed]Scientific journal
- Sep. 2020, The 15th International Workshop on Security (IWSEC 2020), 12231, 97 - 116, EnglishMKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption[Refereed]International conference proceedings
- Jul. 2020, IEICE Transactions on Information and Systems, 103(7) (7), 1462 - 1475, EnglishIdentification of Kernel Memory Corruption Using Kernel Memory Secret Observation Mechanism[Refereed]Scientific journal
- Springer, Nov. 2019, The 15th International Conference on Information Security Practice and Experience (ISPEC 2019), 11879, 75 - 94, English[Refereed]International conference proceedings
- Nov. 2018, IEICE Transactions on Information and Systems, 101(11) (11), 2644 - 2657, EnglishAd-hoc Analytical Framework of Bitcoin Investigations for Law Enforcement[Refereed]Scientific journal
- Aug. 2018, The 13th Asia Joint Conference on Information Security (AsiaJCIS 2018), EnglishConstructing a Complete Timeline of a Security Incident by Aggregating Reports[Refereed]International conference proceedings
- May 2018, Workshop of The 32-nd IEEE International Conference on Advanced Information Networking and Applications (WAINA 2018), EnglishEarly Detection of Network Incident using Open Security Information[Refereed]International conference proceedings
- Aug. 2017, The fifteenth International Conference on Privacy, Security and Trust (PST 2017), EnglishA Nonoutsourceable Puzzle under GHOST Rule[Refereed]
- Bitcoin is the most famous cryptocurrency currently operating with a total marketcap of almost 7 billion USD. This innovation stands strong on the feature of pseudo anonymity and strives on its innovative de-centralized architecture based on the Blockchain. The Blockchain is a distributed ledger that keeps a public record of all the transactions processed on the bitcoin protocol network in full transparency without revealing the identity of the sender and the receiver. Over the course of 2016, cryptocurrencies have shown some instances of abuse by criminals in their activities due to its interesting nature. Darknet marketplaces are increasing the volume of their businesses in illicit and illegal trades but also cryptocurrencies have been used in cases of extortion, ransom and as part of sophisticated malware modus operandi. We tackle these challenges by developing an analytical capability that allows us to map relationships on the blockchain and filter crime instances in order to investigate the abuse in law enforcement local environment. We propose a practical bitcoin analytical process and an analyzing system that stands alone and manages all data on the blockchain in real-time with tracing and visualizing techniques rendering transactions decipherable and useful for law enforcement investigation and training. Our system adopts combination of analyzing methods that provides statistics of address, graphical transaction relation, discovery of paths and clustering of already known addresses. We evaluated our system in the three criminal cases includes marketplace, ransomware and DDoS extortion. These are practical training in law enforcement, then we determined whether our system could help investigation process and training.IEEE, 2017, PROCEEDINGS OF THE 2017 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), 9 - 16, English[Refereed]International conference proceedings
- 2016, International Journal of Space-Based and Situated Computing (IJSSC), 6(2) (2), 90 - 101, EnglishDetecting and Characterising of Mobile Advertisement Network Traffic using Graph Modeling[Refereed]Scientific journal
- Jan. 2015, International Journal of Space-Based and Situated Computing (IJSSC), 5(1) (1), 53 - 62, EnglishDetection of Sensitive Information Leakage in Android Applications using Signature Generation[Refereed]Scientific journal
- Android applications are widely used and many are "free" applications which include advertisement (ad) modules that provide ad services and track user behavior statistics. However, these ad modules often collect users' personal information and device identification numbers along with usage statistics, which is a violation of privacy. In our analysis of 1,188 Android applications' network traffic, we identified 797 applications that included 45 previously known ad modules. We analyzed these ad modules' network behavior, and found that they have characteristic network traffic patterns for acquiring ad content, specifically images. In order to accurately differentiate between ad modules' network traffic and valid application network traffic, we propose a novel method based on the distance between network traffic graphs mapping the relationships between HTTP session data (such as HTML or JavaScript). This distance describes the similarity between the sessions. Using this method, we can detect ad modules' traffic by comparing session graphs with the graphs of already known ad modules. In our evaluation, we generated 20,903 graphs of applications. We separated the application graphs into those generated by known ad modules (4,698 graphs), those we manually identified as ad modules (2,000 graphs), and standard application traffic. We then applied 1,000 graphs of known ad graphs to the other graph sets (the remaining 3,698 known ad graphs and the 2,000 manually classified ad graphs) to see how accurately they could be used to identify ad graphs. Our approach showed a 76% detection rate for known ad graphs, and a 96% detection rate for manually classified ad graphs.IEEE, 2014, 2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 1 - 10, English[Refereed]International conference proceedings
- In recent years, there has been rapid growth in mobile devices such as smartphones, and a number of applications are developed specifically for the smartphone market. In particular, there are many applications that are 'free' to the user, but depend on advertisement services for their revenue. Such applications include an advertisement module - a library provided by the advertisement service - that can collect a user's sensitive information and transmit it across the network. Such information is used for targeted advertisements, and user behavior statistics. Users accept this business model, but in most cases the applications do not require the user's acknowledgment in order to transmit sensitive information. Therefore, such applications' behavior becomes an invasion of privacy. In our analysis of 1,188 Android applications' network traffic and permissions, 93% of the applications we analyzed connected to multiple destinations when using the network. 61% required a permission combination that included both access to sensitive information and use of networking services. These applications have the potential to leak the user's sensitive information. Of the 107,859 HTTP packets from these applications, 23,309 (22%) contained sensitive information, such as device identification number and carrier name. In an effort to enable users to control the transmission of their private information, we propose a system which, using a novel clustering method based on the HTTP packet destination and content distances, generates signatures from the clustering result and uses them to detect sensitive information leakage from Android applications. Our system does not require an Android framework modification or any special privileges. Thus users can easily introduce our system to their devices, and manage suspicious applications' network behavior in a fine grained manner. Our system accurately detected 94% of the sensitive information leakage from the applications evaluated and produced only 5% false negative results, and less than 3% false positive results. © 2013 IEEE.2013, Proceedings - International Conference on Data Engineering, 112 - 119, English[Refereed]International conference proceedings
- Signature Generation for Sensitive Information Leakage in Android ApplicationsIn recent years, there has been rapid growth in mobile devices such as smartphones, and a number of applications are developed specifically for the smartphone market. In particular, there are many applications that are "free" to the user, but depend on advertisement services for their revenue. Such applications include an advertisement module - a library provided by the advertisement service - that can collect a user's sensitive information and transmit it across the network. Such information is used for targeted advertisements, and user behavior statistics. Users accept this business model, but in most cases the applications do not require the user's acknowledgment in order to transmit sensitive information. Therefore, such applications' behavior becomes an invasion of privacy. In our analysis of 1,188 Android applications' network traffic and permissions, 93% of the applications we analyzed connected to multiple destinations when using the network. 61% required a permission combination that included both access to sensitive information and use of networking services. These applications have the potential to leak the user's sensitive information. Of the 107,859 HTTP packets from these applications, 23,309 (22%) contained sensitive information, such as device identification number and carrier name. In an effort to enable users to control the transmission of their private information, we propose a system which, using a novel clustering method based on the HTTP packet destination and content distances, generates signatures from the clustering result and uses them to detect sensitive information leakage from Android applications. Our system does not require an Android framework modification or any special privileges. Thus users can easily introduce our system to their devices, and manage suspicious applications' network behavior in a fine grained manner. Our system accurately detected 94% of the sensitive information leakage from the applications evaluated and produced only 5% false negative results, and less than 3% false positive results.IEEE, 2013, 2013 IEEE 29TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS (ICDEW), 112 - 119, English[Refereed]International conference proceedings
- The Internet is being widely used these days and many users are required to manage their network environments, because damages caused by worms, which spread using security holes of software, are also increasing rapidly. One of the effective means of detecting the damages caused by the worms in early stage is to analyze the network communication logs stored in computers that are spread over a wide area. However, almost all network administrators are not able to install many observation points, though a large number of observation points over a wide area of a network are needed to grasp symptoms of attacks precisely. In this paper, we propose an agent based log analyzing system by integrating the concepts of P2P network and mobile agents to realize detection and protection from the damages which may be caused by the worms in early stage. We also show results of experiments using our prototype system. The results show that our system can collect useful information from a wide area of a network, and provide means of flexible and on-demand analysis of network traffic logs to detect hostile attacks on the network. © 2006 IEEE.2007, CIMCA 2006: International Conference on Computational Intelligence for Modelling, Control and Automation, Jointly with IAWTIC 2006: International Conference on Intelligent Agents Web Technologies ..., English[Refereed]International conference proceedings
- May 2006, IPSJ journal, 47(5) (5), JapaneseA Proposal of Distributed Internet Monitoring System Using Mobile Agent[Refereed]Scientific journal
- Nov. 2005, 合同エージェントワークショップ&シンポジウム2005 (JAWS 2005), Japaneseモバイルエージェントを用いた分散型インターネット観測システムの提案
- Lead, Mar. 2025, 第70回 情報通信システムセキュリティ研究会, Japaneseシステムコールと関係するカーネル関数の特定手法の提案Summary national conference
- Mar. 2025, 第70回 情報通信システムセキュリティ研究会, Japaneseテイント解析のためのLLMコンパイラの性能についてSummary national conference
- Mar. 2025, 第70回 情報通信システムセキュリティ研究会, JapaneseLLMコンパイラを用いたバイナリコードからのテイント解析の検討Summary national conference
- Corresponding, Mar. 2025, 第70回 情報通信システムセキュリティ研究会, Japaneseオープンソースソフトウェアの依存関係を考慮した脆弱性修正状況の検出および可視化手法の提案,Summary national conference
- Corresponding, Mar. 2025, 第70回 情報通信システムセキュリティ研究会, JapaneseBluetooth省電力モードと認証の脆弱性を用いた中間者攻撃の検討Summary national conference
- Mar. 2025, 情報処理学会 第60回SPT研究発表会, Japanese侵入トリガとなるユーザ行動を実操作可能な標的型攻撃体験システムの構築Summary national conference
- Jan. 2025, 2025年 暗号と情報セキュリティシンポジウム(SCIS2025), EnglishFormal Verification of IND-CPA Security of HQC in EasyCryptIntroduction international proceedings
- Corresponding, Jan. 2025, 2025年 暗号と情報セキュリティシンポジウム(SCIS2025), JapaneseBluetooth省電力モードを用いた音声盗聴攻撃と防御Summary national conference
- Jan. 2025, 電子情報通信学会 ライフインテリジェンスとオフィス情報システム研究会(LOIS), Japanese認証・認可機能アドオンサービスA+Blockのクラウド環境へのデプロイ手法の設計Summary national conference
- Jan. 2025, 電子情報通信学会 ライフインテリジェンスとオフィス情報システム研究会(LOIS), Japaneseサイバーセキュリティ文書のための固有表現抽出モデルについてSummary national conference
- Lead, Oct. 2024, コンピュータセキュリティシンポジウム2024 (CSS 2024), Japaneseオープンソースソフトウェアを対象とした脆弱性修正状況の収集と調査Summary national conference
- Corresponding, Oct. 2024, コンピュータセキュリティシンポジウム2024 (CSS 2024), Japaneseランサムウェアに対する破壊的書き込みの監視による仮想ディスク保護機構Summary national conference
- Oct. 2024, コンピュータセキュリティシンポジウム2024 (CSS 2024), Japanese標的型攻撃演習システムのクラウド基盤での構築Summary national conference
- Lead, Sep. 2024, 第23回情報科学技術フォーラム (FIT 2024), Japaneseカーネルデータ監視による特権昇格攻撃検出手法の提案と評価Summary national conference
- Jul. 2024, 情報処理学会 第56回SPT研究発表会, Japanese脆弱性情報の関連製品情報を介した接続関係に基づく深刻度予測Summary national conference
- Jul. 2024, 情報処理学会 第106回コンピュータセキュリティ研究発表会, JapaneseBluetooth省電力モードを用いるデバイスハイジャック攻撃Summary national conference
- Last, Apr. 2024, 情報処理学会 第54回SPT研究発表会, Japanese手首の振る舞いを用いた情報流出検知手法の提案Summary national conference
- Lead, Mar. 2024, 第66回 情報通信システムセキュリティ研究会 (ICSS), Japanese読書き制限カーネルページを用いたカーネルデータ保護機構の提案Summary national conference
- Mar. 2024, 情報処理学会 第54回SPT研究発表会, Japanese各種の分類器を組み合わせたEthereumの不正アカウント検知Summary national conference
- Mar. 2024, 情報処理学会 第54回SPT研究発表会, JapaneseWebサービスに対する認証・認可機能アドオンサービスA+Blockの設計Summary national conference
- Mar. 2024, 情報処理学会 第54回SPT研究発表会, Japaneseサイバーセキュリティ分野の質問応答システムのためのデータセットSummary national conference
- Mar. 2024, 電子情報通信学会 ライフインテリジェンスとオフィス情報システム研究会(LOIS), Japanese複数の専有VMで構成した標的型攻撃演習システムSummary national conference
- Corresponding, Dec. 2023, 情報処理学会 第103回コンピュータセキュリティ研究発表会, Japaneseクラウドを標的としたクリプトジャッキングに対する実行抑制機構Summary national conference
- Nov. 2023, 電子情報通信学会 情報セキュリティ研究会 (ISEC), JapaneseBluetooth BR/EDRに対する省エネモードを利用した暗号鍵ハイジャック攻撃の提案Summary national conference
- Oct. 2023, コンピュータセキュリティシンポジウム2023 (CSS 2023), JapaneseBluetooth BR/EDRへの新たな攻撃手法とその実証 ~省エネモードの脆弱性とその脅威~Summary national conference
- Lead, Oct. 2023, コンピュータセキュリティシンポジウム2023 (CSS 2023), JapaneseLinuxカーネルにおける脆弱性修正状況の調査Summary national conference
- Oct. 2023, コンピュータセキュリティシンポジウム2023 (CSS 2023), Japanese専有VM上のコンテナによるコンテナセキュリティ演習システムSummary national conference
- Lead, Sep. 2023, 第22回情報科学技術フォーラム (FIT 2023), Japaneseカーネルメモリ解析を用いた特権昇格攻撃検出手法の提案と評価Summary national conference
- Jul. 2023, マルチメディア,分散,協調とモバイル(DICOMO2023)シンポジウム, JapaneseEthereumの不正取引検知に対するトポロジカルデータ解析の適用Summary national conference
- Last, Mar. 2023, 第62回 情報通信システムセキュリティ研究会 (ICSS), Japaneseソフトウェアの依存関係に基づいた可視化によるセキュリティリスク把握手法の提案と評価Summary national conference
- Mar. 2023, 情報処理学会 第50回SPT研究発表会, Japanese脆弱性情報とMITRE ATT&CKを関連付けるオントロジーSummary national conference
- Mar. 2023, 情報処理学会 第50回SPT研究発表会, JapaneseWeb APIのアドオンアクセス制御Summary national conference
- Lead, Mar. 2023, 情報処理学会 第50回SPT研究発表会, Japanese脆弱性管理の調査を通じたソフトウェアサプライチェーンセキュリティの検討と考察Summary national conference
- Lead, Mar. 2023, 情報処理学会 第85回全国大会, Japanese新規仮想化ソフトウェアのセキュア実装に向けた既存実装の脆弱性分類の検討,Summary national conference
- Jan. 2023, 暗号と情報セキュリティシンポジウム2023(SCIS2023), JapaneseIoT向け連合学習フレームワークによるネットワーク異常検知への特徴量選択の適用Summary national conference
- Jan. 2023, 暗号と情報セキュリティシンポジウム2023(SCIS2023), JapaneseOP-TEEにおけるTA内のバッファオーバフローを利用した攻撃に対する防御手法の設計と実装Summary national conference
- Corresponding, Nov. 2022, 第61回 情報通信システムセキュリティ研究会 (ICSS), Japaneseランサムウェアに対する実行遅延タスクスケジューラの提案と評価Summary national conference
- Lead, Oct. 2022, コンピュータセキュリティシンポジウム2022, Japaneseオープンソースソフトウェアに対するセキュリティリスク指標の提案と評価Summary national conference
- Oct. 2022, コンピュータセキュリティシンポジウム2022, JapaneseOP-TEEにおけるTA内のバッファオーバフローを利用した攻撃に対する防御手法の設計Summary national conference
- Oct. 2022, コンピュータセキュリティシンポジウム2022, Japanese脆弱性情報とMITRE ATT&CKを関連付ける知識グラフの構築Summary national conference
- Oct. 2022, コンピュータセキュリティシンポジウム2022, Japanese脆弱性自動評価システムの継続運用のためのモデル選択手法Summary national conference
- Oct. 2022, コンピュータセキュリティシンポジウム2022, Japanese脆弱性情報から攻撃アクターを答えるオントロジーSummary national conference
- Lead, Sep. 2022, 第21回情報科学技術フォーラム (FIT 2022), Japanese権限情報の動的な再配置による特権昇格攻撃防止手法の提案と評価Summary national conference
- Corresponding, Jul. 2022, 情報処理学会 第98回 CSEC研究発表会, Japaneseランサムウェアに対する CPU 命令実行抑止機構の提案と評価Summary national conference
- Jul. 2022, マルチメディア,分散,協調とモバイル(DICOMO2022)シンポジウム, Japaneseグラフ埋め込みによるEthereumの不正取引アカウント検知Report research institution
- Jul. 2022, マルチメディア,分散,協調とモバイル(DICOMO2022)シンポジウム, Japanese脆弱性自動評価システムの継続運用のための再学習手法Report research institution
- Jul. 2022, マルチメディア,分散,協調とモバイル(DICOMO2022)シンポジウム, Japaneseコンテナの脆弱性に関するセキュリティ演習環境の構築Summary national conference
- Lead, Mar. 2022, 情報処理学会 第190回DPS・第96回CSEC合同研究発表会, JapaneseカーネルにおけるMemory Protection Key を用いたカーネルデータ保護機構の拡張性検討と性能評価Summary national conference
- Oct. 2021, コンピュータセキュリティシンポジウム2021 (CSS 2021)OP-TEEのセキュアワールドにおける脅威の調査Summary national conference
- Lead, Oct. 2021, コンピュータセキュリティシンポジウム2021 (CSS 2021)カーネルにおけるMemory Protection Keyを用いた権限情報保護機構の提案Summary national conference
- Lead, Sep. 2021, 第20回情報科学技術フォーラム (FIT 2021)攻撃ユーザプロセスの利用するカーネルコードの追跡と特定手法の提案と評価Summary national conference
- Lead, Mar. 2021, 第54回 情報通信システムセキュリティ研究会(ICSS)カーネル仮想記憶空間における排他的ページ参照機構の実現方式と性能評価Summary national conference
- Last, Nov. 2020, 情報処理学会 第91回CSEC・第40回SPT・第90回EIP合同研究発表会プロセス実行監視による CPU キャッシュを対象としたサイドチャネル攻撃に対する緩和機構Summary national conference
- Lead, Oct. 2020, コンピュータセキュリティシンポジウム2020 (CSS 2020), Japaneseコンテナ向けカーネル仮想記憶空間の分離制御機構Summary national conference
- Lead, Sep. 2020, 第19回情報科学技術フォーラム (FIT 2020), Japaneseカーネル仮想記憶空間における排他的ページ参照機構によるデータ保護能力と性能評価Summary national conference
- Last, Oct. 2019, コンピュータセキュリティシンポジウム2019 (CSS 2019), Japaneseハードウェアベース暗号鍵管理に関する日本向けAndroidプラットフォームの調査Summary national conference
- Oct. 2019, コンピュータセキュリティシンポジウム2019 (CSS 2019)カーネル仮想記憶空間における排他的ページ参照によるカーネルの攻撃耐性の実現と評価Summary national conference
- Sep. 2019, 第18回情報科学技術フォーラム (FIT 2019), Japaneseカーネル脆弱性を利用した攻撃に対する仮想記憶空間の切替え処理の保護と改ざん検出Summary national conference
- Mar. 2019, 情報処理学会 第178回DPS・第84回CSEC合同研究発表会, Japaneseカーネルに対する攻撃における独自の仮想記憶空間の切替え手法の検出能力と防御手法
- Oct. 2018, コンピュータセキュリティシンポジウム2018 (CSS 2018)独自のカーネル用仮想記憶空間を用いたカーネルモジュール監視手法Summary national conference
- Oct. 2017, コンピュータセキュリティシンポジウム2017 (CSS 2017), JapaneseWannaCryを事例としたセキュリティレポートの分析
- 2013, マルチメディア, 分散, 協調とモバイルシンポジウム (DICOMO2013), JapaneseAndroidアプリケーションにおける情報収集モジュール通信判別手法
- Feb. 2012, 情報処理学会 第150回DPS・第56回CSEC合同研究発表会, JapaneseHTTPトラフィックを利用したクラスタリングによるAndroidアプリケーションの分類
- Oct. 2011, コンピュータセキュリティシンポジウム2011 (CSS 2011), JapaneseAndroidアプリケーションに対する情報フロー制御機構の提案
- Oct. 2010, コンピュータセキュリティシンポジウム2010 (CSS 2010), Japaneseアクセス権限の紐付けによるストレージにおけるアクセス制御方式の提案
- Feb. 2007, 電子情報通信学会 ソフトウェアサイエンス研究会 (SS) 電子情報通信学会技術研究報告報データフロー解析を用いた侵入検知法の提案
- 2005, 暗号と情報セキュリティシンポジウム2005 (SCIS 2005), Japaneseモバイルエージェントに基づく非共有型広域ログ解析
- Sep. 2004, コンピュータセキュリティシンポジウム2004 (CSS 2004), JapanesePeer-to-Peerネットワークにおけるエージェントを用いたログ解析ソフトウェア
- Sep. 2004, コンピュータセキュリティシンポジウム2004 (CSS 2004), Japanese確率オートマトンを用いた異常検知手法
■ Lectures, oral presentations, etc.
- 15th ACM SIGOPS Asia-Pacific Workshop on Systems (APSys 2024), Sep. 2024, EnglishEffective Mitigation for XMRig-based Cryptojacking on Web ServersPoster presentation
- 第34回コンピュータシステム・シンポジウム(ComSys2022), Dec. 2022, Japanese仮想化ソフトウェアのセキュア化に向けた脆弱性の調査分析Poster presentation
- The International Symposium on Information Theory and Its Applications (ISITA 2022), Oct. 2022, EnglishRe-learning Techniques for Continuous Operation of Automated Vulnerability Assessment SystemPoster presentation
- The 14th International Workshop on Security (IWSEC 2019), Aug. 2019, English, International conferenceKernel Memory Inspection Capability for Malicious Kernel Module Detection (from CSS 2018)[Invited]Invited oral presentation
- International Workshop on Security (IWSEC) 2017, Aug. 2017, English, International conferenceA Practical Finding Method of Network Incident with Open Security InformationPoster presentation
- the 16th Annual DFRWS USA 2016, Aug. 2016, English, International conferencePractical Analyzing the Relation of Wallet Addresses in BitcoinOral presentation
- THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS
- INFORMATION PROCESSING SOCIETY OF JAPAN
- 科学技術振興機構(JST), 戦略的創造研究推進事業(ACT-X) AI共生社会を拓くサイバーインフラストラクチャ, Oct. 2024 - Mar. 2027, Principal investigator攻撃耐性を備えたセキュアな基盤ソフトウ ェアの研究
- 日本学術振興会, 科学研究費助成事業 若手研究, 若手研究, 神戸大学, Apr. 2023 - Mar. 2026, Principal investigator攻撃実行防止と攻撃対象保護による高セキュア基盤ソフトウェアの研究
- Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (B), Grant-in-Aid for Scientific Research (B), Okayama University, Apr. 2022 - Mar. 2026, Coinvestigator機器毎のソフトウェア構成変更による攻撃難化と攻撃耐性を持つ基盤ソフトウェアの研究
- 国立情報学研究所, 2024年度 国立情報学研究所公募型共同研究, Jul. 2024 - Mar. 2025, Principal investigatorOSSに対する脆弱性修正状況の検出と可視化に関する研究
- 電気通信普及財団, 2022年度研究調査助成 技術分野, Apr. 2023 - Mar. 2025, Principal investigatorオペレーティングシステムにおける特権昇格攻撃防止を目指すセキュリティ機構の研究
- 国立情報学研究所, 2023年度 国立情報学研究所公募型共同研究, Apr. 2023 - Mar. 2024, Principal investigatorセキュリティリスク推定によるソフトウェアサプライチェーンの保護に関する研究
- 科学技術振興機構(JST), さきがけICT基盤強化, Oct. 2022 - Mar. 2023, Principal investigator特定課題研究
- National Institute of Informatics, NII Open Collaborative Research 2022, Kobe University, Jul. 2022 - Mar. 2023, Principal investigatorResearch on Secure Monitoring Mechanism for Software Supply Chain
- 総務省, 電波資源拡大のための研究開発, 神戸大学, 2022, Coinvestigator電波の有効利用のためのIoTマルウェア無害化/無機能化技術等に関する研究開発
- 経済産業省, 未踏ソフトウェア創造事業(未踏ユース), 2005 - 2005, Principal investigatorABLA:エージェント・P2Pネットワークを利用した個人ユーザ参加型インターネット観測システムの開発Competitive research funding