• 20 Citations
  • 2 h-Index
20112019
If you made any changes in Pure these will be visible here soon.

Research Output 2011 2019

  • 20 Citations
  • 2 h-Index
  • 9 Article
  • 7 Conference contribution
2019

(Short Paper) method for preventing suspicious web access in android WebView

Sato, M., Imamura, Y., Orito, R. & Yamauchi, T., Jan 1 2019, Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Proceedings. Attrapadung, N. & Yagi, T. (eds.). Springer Verlag, p. 241-250 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11689 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

HTTP
World Wide Web
Web browsers
Miners
Communication
Acoustic impedance
Stamping
Thermoplastics
Carbon fibers
Heating
Open Access
Computer systems
Data storage equipment
Processing
2018

Hiding Communication of Essential Services by System Call Proxy

Okuda, Y., Sato, M. & Taniguchi, H., Dec 27 2018, Proceedings - 2018 6th International Symposium on Computing and Networking, CANDAR 2018. Institute of Electrical and Electronics Engineers Inc., p. 47-56 10 p. 8594743. (Proceedings - 2018 6th International Symposium on Computing and Networking, CANDAR 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Monitoring
Virtual machine

Performance Improvement and Evaluation of Function for Tracing Diffusion of Classified Information on KVM

Moriyama, H., Yamauchi, T., Sato, M. & Taniguchi, H., Apr 23 2018, Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 463-468 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer monitors
Computer operating systems
Processing
Hooks
Personal computers
1 Citation (Scopus)

Web access monitoring mechanism for Android WebView

Imamura, Y., Uekawa, H., Ishihara, Y., Sato, M. & Yamauchi, T., Jan 29 2018, Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2018. Association for Computing Machinery, 3167942

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web browsers
World Wide Web
Monitoring
Application programs
Chromium
2017

Memory access monitoring and disguising of process information to Avoid Attacks to essential services

Sato, M., Yamauchi, T. & Taniguchi, H., Jan 13 2017, Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016. Institute of Electrical and Electronics Engineers Inc., p. 635-641 7 p. 7818684

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer monitors
Data storage equipment
Monitoring
Virtual machine
2016
1 Citation (Scopus)

Design of function for tracing diffusion of classified information for IPC on KVM

Fujii, S., Sato, M., Yamauchi, T. & Taniguchi, H., 2016, In : Journal of Information Processing. 24, 5, p. 781-792 12 p.

Research output: Contribution to journalArticle

Communication
Virtual machine
1 Citation (Scopus)

Evaluation and design of function for tracing diffusion of classified information for file operations with KVM

Fujii, S., Sato, M., Yamauchi, T. & Taniguchi, H., Feb 23 2016, (Accepted/In press) In : Journal of Supercomputing. p. 1-21 21 p.

Research output: Contribution to journalArticle

Tracing
Operating Systems
Evaluation
Virtual Machine
Computer operating systems
2015
2 Citations (Scopus)

Process hiding by virtual machine monitor for attack avoidance

Sato, M., Yamauchi, T. & Taniguchi, H., Sep 15 2015, In : Journal of Information Processing. 23, 5, p. 673-682 10 p.

Research output: Contribution to journalArticle

Computer monitors
Computer operating systems
Virtual machine
2014
Attack
Computer monitors
Computer operating systems
Application programs
Virtual Machine
1 Citation (Scopus)

Secure and fast log transfer mechanism for virtual machine

Sato, M. & Yamauchi, T., Oct 1 2014, In : Journal of Information Processing. 22, 4, p. 597-608 12 p.

Research output: Contribution to journalArticle

Virtual machine
Computer monitors
Communication
Malware
2013
2 Citations (Scopus)

Secure log transfer by replacing a library in a virtual machine

Sato, M. & Yamauchi, T., 2013, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 8231 LNCS. p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8231 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Virtual Machine
Trigger
kernel
Libraries
Virtual machine
2012
10 Citations (Scopus)

VMM-based log-tampering and loss detection scheme

Sato, M. & Yamauchi, T., 2012, In : Journal of Internet Technology. 13, 4, p. 655-666 12 p.

Research output: Contribution to journalArticle

National security
Data storage equipment
Virtual machine

ログの改ざんと喪失を防止するシステムの仮想計算機モニタによる実現

Sato, M., 2012, In : 情報処理学会論文誌. 53, 2, p. 847-856 10 p.

Research output: Contribution to journalArticle

2011
2 Citations (Scopus)

VMBLS: Virtual machine based logging scheme for prevention of tampering and loss

Sato, M. & Yamauchi, T., 2011, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6908 LNCS. p. 176-190 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6908 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Virtual Machine
Computer monitors
Computer operating systems
Operating Systems
Isolation