• 115 Citations
  • 4 h-Index
19942019
If you made any changes in Pure these will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 2 Similar Profiles
Computer operating systems Engineering & Materials Science
Access control Engineering & Materials Science
Data storage equipment Engineering & Materials Science
Processing Engineering & Materials Science
Computer monitors Engineering & Materials Science
Virtual Machine Mathematics
Application programs Engineering & Materials Science
Embedded systems Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1994 2019

  • 115 Citations
  • 4 h-Index
  • 98 Article
  • 29 Conference contribution
  • 4 Editorial
  • 2 Conference article

Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes

Yamauchi, T., Akao, Y., Yoshitani, R., Nakamura, Y. & Hashimoto, M., Jan 23 2019, DSC 2018 - 2018 IEEE Conference on Dependable and Secure Computing. Institute of Electrical and Electronics Engineers Inc., 8625137. (DSC 2018 - 2018 IEEE Conference on Dependable and Secure Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Processing
Linux

Acceleration of analysis processing on decentralized performance profiling system using virtual machines

Yamamoto, M., Nakashima, K., Yamauchi, T., Nagoya, A. & Taniguchi, H., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 152-158 7 p. 8590889. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Virtual Machine
Profiling
Decentralized
Sampling
Processing

Access control mechanism to mitigate cordova plugin attacks in hybrid applications

Kudo, N., Yamauchi, T. & Austin, T. H., Jan 1 2018, In : Journal of Information Processing. 26, p. 396-405 10 p.

Research output: Contribution to journalArticle

Access control
Application programming interfaces (API)

Mitigating use-after-free attack using library considering size and number of freed memory

Ban, Y. & Yamauchi, T., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 398-404 7 p. 8590934. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Attack
Data storage equipment
Vulnerability
Reuse
Libraries

Performance Improvement and Evaluation of Function for Tracing Diffusion of Classified Information on KVM

Moriyama, H., Yamauchi, T., Sato, M. & Taniguchi, H., Apr 23 2018, Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 463-468 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer monitors
Computer operating systems
Processing
Hooks
Personal computers