• 20 Citations
  • 2 h-Index
20112019
If you made any changes in Pure these will be visible here soon.

Research Output 2011 2019

  • 20 Citations
  • 2 h-Index
  • 9 Article
  • 7 Conference contribution
Filter
Conference contribution
2019

(Short Paper) method for preventing suspicious web access in android WebView

Sato, M., Imamura, Y., Orito, R. & Yamauchi, T., Jan 1 2019, Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Proceedings. Attrapadung, N. & Yagi, T. (eds.). Springer Verlag, p. 241-250 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11689 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

HTTP
World Wide Web
Web browsers
Miners
Communication
2018

Hiding Communication of Essential Services by System Call Proxy

Okuda, Y., Sato, M. & Taniguchi, H., Dec 27 2018, Proceedings - 2018 6th International Symposium on Computing and Networking, CANDAR 2018. Institute of Electrical and Electronics Engineers Inc., p. 47-56 10 p. 8594743. (Proceedings - 2018 6th International Symposium on Computing and Networking, CANDAR 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Monitoring
Virtual machine

Performance Improvement and Evaluation of Function for Tracing Diffusion of Classified Information on KVM

Moriyama, H., Yamauchi, T., Sato, M. & Taniguchi, H., Apr 23 2018, Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 463-468 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer monitors
Computer operating systems
Processing
Hooks
Personal computers
1 Citation (Scopus)

Web access monitoring mechanism for Android WebView

Imamura, Y., Uekawa, H., Ishihara, Y., Sato, M. & Yamauchi, T., Jan 29 2018, Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2018. Association for Computing Machinery, 3167942

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web browsers
World Wide Web
Monitoring
Application programs
Chromium
2017

Memory access monitoring and disguising of process information to Avoid Attacks to essential services

Sato, M., Yamauchi, T. & Taniguchi, H., Jan 13 2017, Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016. Institute of Electrical and Electronics Engineers Inc., p. 635-641 7 p. 7818684

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer monitors
Data storage equipment
Monitoring
Virtual machine
2013
2 Citations (Scopus)

Secure log transfer by replacing a library in a virtual machine

Sato, M. & Yamauchi, T., 2013, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 8231 LNCS. p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8231 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Virtual Machine
Trigger
kernel
Libraries
Virtual machine
2011
2 Citations (Scopus)

VMBLS: Virtual machine based logging scheme for prevention of tampering and loss

Sato, M. & Yamauchi, T., 2011, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6908 LNCS. p. 176-190 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6908 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Virtual Machine
Computer monitors
Computer operating systems
Operating Systems
Isolation