Research Output 2002 2016

2016

An efficient method for detecting obfuscated suspicious JavaScript based on text pattern analysis

Su, J., Yoshioka, K., Shikata, J. & Matsumoto, T. 2016 May 30 WTMC 2016 - Proceedings of the 2016 ACM International Workshop on Traffic Measurements for Cybersecurity, Co-located with Asia CCS 2016. Association for Computing Machinery, Inc, p. 3-11 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citations

ASIC implementation of random number generators using SR latches and its evaluation

Torii, N., Kokubo, H., Yamamoto, D., Itoh, K., Takenaka, M. & Matsumoto, T. 2016 Dec 1 In : Eurasip Journal on Information Security. 2016, 1, 10

Research output: Contribution to journalArticle

Application specific integrated circuits
Entropy
Statistical tests
Field programmable gate arrays (FPGA)
Electric power utilization
1 Citations

Attribute based encryption with direct efficiency tradeoff

Attrapadung, N., Hanaoka, G., Matsumoto, T., Teruya, T. & Yamada, S. 2016 Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Proceedings. Springer Verlag, Vol. 9696, p. 249-266 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9696)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Computer hardware

Detecting obfuscated suspicious javascript based on information-theoretic measures and novelty detection

Su, J., Yoshioka, K., Shikata, J. & Matsumoto, T. 2016 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9558, p. 278-293 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9558)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Internet
Detectors
Experiments
1 Citations

Eigenanalysis of morphological diversity in silicon random nanostructures formed via resist collapse

Naruse, M., Hoga, M., Ohyagi, Y., Nishio, S., Tate, N., Yoshida, N. & Matsumoto, T. 2016 Nov 15 In : Physica A: Statistical Mechanics and its Applications. 462, p. 883-888 6 p.

Research output: Contribution to journalArticle

Nanostructures
Silicon
Security of data
Focused ion beams
Experiments
Application specific integrated circuits
Dynamic analysis

Foreword

Korczyński, M., Mazurczyk, W., Yoshioka, K., Van Eeten, M. & Robertson, W. 2016 May 30 In : Unknown Journal. p. iii-iv

Research output: Contribution to journalEditorial

Identity-based hierarchical key-insulated encryption without random oracles

Watanabe, Y. & Shikata, J. 2016 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9614, p. 255-279 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9614)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography

Information-theoretically secure timed-release secret sharing schemes

Watanabe, Y. & Shikata, J. 2016 In : Journal of Information Processing. 24, 4, p. 680-689 10 p.

Research output: Contribution to journalArticle

Security of data
Cryptography
Redundancy
1 Citations

IoTPOT: A novel honeypot for revealing current IoT threats

Pa, Y. M. P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T. & Rossow, C. 2016 In : Journal of Information Processing. 24, 3, p. 522-533 12 p.

Research output: Contribution to journalArticle

Internet of things
Program processors
Malware

Optical nano artifact metrics using silicon random nanostructures

Matsumoto, T., Yoshida, N., Nishio, S., Hoga, M., Ohyagi, Y., Tate, N. & Naruse, M. 2016 Aug 31 In : Scientific Reports. 6, 32438

Research output: Contribution to journalArticle

silicon
artifact
clone
experimental apparatus
biometry
9 Citations

Roadmap on optical security

Matsumoto, T. & 27 others Javidi, B., Carnicer, A., Yamaguchi, M., Nomura, T., Pérez-Cabré, E., Millán, M. S., Nishchal, N. K., Torroba, R., Barrera, J. F., He, W., Peng, X., Stern, A., Rivenson, Y., Alfalou, A., Brosseau, C., Guo, C., Sheridan, J. T., Situ, G., Naruse, M., Juvells, I., Tajahuerce, E., Lancis, J., Chen, W., Chen, X., Pinkse, P. W. H., Mosk, A. P. & Markman, A. 2016 Aug 1 In : Journal of Optics. 18, 8, 083001

Research output: Contribution to journalArticle

Cryptography
Security of data
Authentication
Photons
Imaging techniques

Sandprint: Fingerprinting malware sandboxes to provide intelligence for sandbox evasion

Yokoyama, A., Ishii, K., Tanabe, R., Papa, Y., Yoshioka, K., Matsumoto, T., Kasama, T., Inoue, D., Brengel, M., Backes, M. & Rossow, C. 2016 Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Springer Verlag, Vol. 9854 LNCS, p. 165-187 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware
Supervised learning
Classifiers

Sequential aggregate authentication codes with information theoretic security

Tomita, S., Watanabe, Y. & Shikata, J. 2016 Apr 26 2016 50th Annual Conference on Information Systems and Sciences, CISS 2016. Institute of Electrical and Electronics Engineers Inc., p. 192-197 6 p. 7460500

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Security of data
Gateways (computer networks)

Unconditionally secure revocable storage: Tight bounds, optimal construction, and robustness

Watanabe, Y., Hanaoka, G. & Shikata, J. 2016 Information Theoretic Security - 9th International Conference, ICITS 2016, Revised Selected Papers. Springer Verlag, Vol. 10015 LNCS, p. 213-237 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10015 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Access control
Concrete construction
Genes

Who gets the boot? Analyzing victimization by DDoS-as-a-service

Noroozian, A., Korczyński, M., Gañan, C. H., Makita, D., Yoshioka, K. & Vaneeten, M. 2016 Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Springer Verlag, Vol. 9854 LNCS, p. 368-389 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Amplification
Industry
2015

A compiler of two-party protocols for composable and game-theoretic security, and its application to oblivious transfer

Goto, S. & Shikata, J. 2015 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9496, p. 133-151 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9496)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Game theory
1 Citations

AmpPot: Monitoring and defending against amplification DDos attacks

Krämer, L., Krupp, J., Makita, D., Nishizoe, T., Koide, T., Yoshioka, K. & Rossow, C. 2015 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9404, p. 615-636 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9404)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Amplification
Bandwidth
Linux
1 Citations

Constructions of CCA-secure revocable identity-based encryption

Ishida, Y., Watanabe, Y. & Shikata, J. 2015 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9144, p. 174-191 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Data encapsulation
Scalability

Constructions of symmetric-key encryption with guessing secrecy

Iwamoto, M. & Shikata, J. 2015 Sep 28 IEEE International Symposium on Information Theory - Proceedings. Institute of Electrical and Electronics Engineers Inc., Vol. 2015-June, p. 725-729 5 p. 7282550

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Probability distributions
1 Citations

Constructions of unconditionally secure broadcast encryption from key predistribution systems with trade-offs between communication and storage

Watanabe, Y. & Shikata, J. 2015 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9451, p. 489-502 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9451)

Research output: Chapter in Book/Report/Conference proceedingChapter

Cryptography
Communication

Detecting malicious domains and authoritative name servers based on their distinct mappings to IP addresses

Pa, Y. M. P., Yoshioka, K. & Matsumoto, T. 2015 Sep 15 In : Journal of Information Processing. 23, 5, p. 623-632 10 p.

Research output: Contribution to journalArticle

Servers
Internet
Communication

Message from the program co-chairs AsiaJCIS 2015

Fan, C. I., Zhang, Z., Nah, J. H. & Yoshioka, K. 2015 In : Unknown Journal. p. ix 7153843

Research output: Contribution to journalEditorial

Non-scanning optical near-field microscopy for nanophotonic security

Tate, N., Naruse, M., Matsumoto, T., Hoga, M., Ohyagi, Y., Nishio, S., Nomura, W. & Ohtsu, M. 2015 In : International Journal of Metalcasting. 9, 1, p. 1383-1387 5 p.

Research output: Contribution to journalArticle

Nanophotonics
Optical microscopy
Nanorods
Microscopic examination
Demonstrations

Timed-release secret sharing schemes with information theoretic security

Watanabe, Y. & Shikata, J. 2015 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9024, p. 219-236 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9024)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security of data
Cryptography
Redundancy
Cryptography
Authentication
2014
1 Citations

Structural classification and similarity measurement of malware

Shi, H., Hamagami, T., Yoshioka, K., Xu, H., Tobe, K. & Goto, S. 2014 Jan 1 In : IEEJ Transactions on Electrical and Electronic Engineering. 9, 6, p. 621-632 12 p.

Research output: Contribution to journalArticle

Malware
Self organizing maps
Windows operating system
Data mining
Experiments
5 Citations

Unidirectional light propagation through two-layer nanostructures based on optical near-field interactions

Naruse, M., Hori, H., Ishii, S., Drezet, A., Huant, S., Hoga, M., Ohyagi, Y., Matsumoto, T., Tate, N. & Ohtsu, M. 2014 Jan 1 In : Journal of the Optical Society of America B: Optical Physics. 31, 10, p. 2404-2413 10 p.

Research output: Contribution to journalArticle

Nanostructures
Light propagation
Light transmission
Conversion efficiency
Optical properties
2005
3 Citations
Experiments
2004
4 Citations
2003
4 Citations
Random errors
Cathode ray tubes
Computer simulation
4 Citations
2002
1 Citations

Cryptography with information theoretic security

Imai, H., Hanaoka, G., Shikata, J., Otsuka, A. & Nascimento, A. C. 2002 Proceedings of the 2002 IEEE Information Theory Workshop, ITW 2002. Institute of Electrical and Electronics Engineers Inc., p. 73 1 p. 1115419

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security of data
Cryptography
1 Citations

Traceability schemes for signed documents

Yonezawa, S., Hanaoka, G., Shikata, J. & Imai, H. 2002 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2433, p. 257-271 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2433)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic document identification systems
Communication
Costs
10 Citations

Unconditionally secure anonymous encryption and group authentication

Hanaoka, G., Shikata, J., Hanaoka, Y. & Imai, H. 2002 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2501, p. 81-99 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2501)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Cryptography
Polynomials
7 Citations

Unconditionally secure key insulated cryptosystems: Models, bounds and constructions

Hanaoka, Y., Hanaoka, G., Shikata, J. & Imai, H. 2002 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2513, p. 85-96 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2513)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Concrete construction
Computer systems