Find Research Outputs

Search concepts
Selected filters
2016

An efficient method for detecting obfuscated suspicious JavaScript based on text pattern analysis

Su, J., Yoshioka, K., Shikata, J. & Matsumoto, T. 2016 May 30 WTMC 2016 - Proceedings of the 2016 ACM International Workshop on Traffic Measurements for Cybersecurity, Co-located with Asia CCS 2016. Association for Computing Machinery, Inc, p. 3-11 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detecting obfuscated suspicious javascript based on information-theoretic measures and novelty detection

Su, J., Yoshioka, K., Shikata, J. & Matsumoto, T. 2016 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9558, p. 278-293 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9558)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Internet
Detectors
Experiments

Foreword

Korczyński, M., Mazurczyk, W., Yoshioka, K., Van Eeten, M. & Robertson, W. 2016 May 30 In : Unknown Journal. p. iii-iv

Research output: Contribution to journalEditorial

1 Citations

IoTPOT: A novel honeypot for revealing current IoT threats

Pa, Y. M. P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T. & Rossow, C. 2016 In : Journal of Information Processing. 24, 3, p. 522-533 12 p.

Research output: Contribution to journalArticle

Internet of things
Program processors
Malware

Sandprint: Fingerprinting malware sandboxes to provide intelligence for sandbox evasion

Yokoyama, A., Ishii, K., Tanabe, R., Papa, Y., Yoshioka, K., Matsumoto, T., Kasama, T., Inoue, D., Brengel, M., Backes, M. & Rossow, C. 2016 Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Springer Verlag, Vol. 9854 LNCS, p. 165-187 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware
Supervised learning
Classifiers

Who gets the boot? Analyzing victimization by DDoS-as-a-service

Noroozian, A., Korczyński, M., Gañan, C. H., Makita, D., Yoshioka, K. & Vaneeten, M. 2016 Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Springer Verlag, Vol. 9854 LNCS, p. 368-389 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Amplification
Industry
2015
1 Citations

AmpPot: Monitoring and defending against amplification DDos attacks

Krämer, L., Krupp, J., Makita, D., Nishizoe, T., Koide, T., Yoshioka, K. & Rossow, C. 2015 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9404, p. 615-636 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9404)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Amplification
Bandwidth
Linux

Detecting malicious domains and authoritative name servers based on their distinct mappings to IP addresses

Pa, Y. M. P., Yoshioka, K. & Matsumoto, T. 2015 Sep 15 In : Journal of Information Processing. 23, 5, p. 623-632 10 p.

Research output: Contribution to journalArticle

Servers
Internet
Communication

Message from the program co-chairs AsiaJCIS 2015

Fan, C. I., Zhang, Z., Nah, J. H. & Yoshioka, K. 2015 In : Unknown Journal. p. ix 7153843

Research output: Contribution to journalEditorial

2014

Message from program co-chairs

Zhang, M., Kim, J., Lin, C. H. & Yoshioka, K. 2014 Jan 26 In : Unknown Journal. p. ix 7023189

Research output: Contribution to journalArticle

1 Citations

Structural classification and similarity measurement of malware

Shi, H., Hamagami, T., Yoshioka, K., Xu, H., Tobe, K. & Goto, S. 2014 Jan 1 In : IEEJ Transactions on Electrical and Electronic Engineering. 9, 6, p. 621-632 12 p.

Research output: Contribution to journalArticle

Malware
Self organizing maps
Windows operating system
Data mining
Experiments
2013
Malware
Pattern matching
Modems
Viruses
Application programming interfaces (API)

Search engine based investigation on misconfiguration of zone transfer

Pa, Y. M. P., Yoshioka, K. & Matsumoto, T. 2013 Jan 1 Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013. IEEE Computer Society, p. 56-62 7 p. 6621652

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Search engines
2012

A method of preventing unauthorized data transmission in controller area network

Matsumoto, T., Hata, M., Tanabe, M., Yoshioka, K. & Oishi, K. 2012 Aug 20 IEEE Vehicular Technology Conference. 6240294

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data communication systems
Controllers
1 Citations

An efficient dynamic detection method for various x86 shellcodes

Fujii, T., Yoshioka, K., Shikata, J. & Matsumoto, T. 2012 Nov 1 Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012. p. 284-289 6 p. 6305299

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
Testing
Linux
6 Citations

Malware detection method by catching their random behavior in multiple executions

Kasama, T., Yoshioka, K., Inoue, D. & Matsumoto, T. 2012 Nov 1 Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012. p. 262-266 5 p. 6305295

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware
Application programming interfaces (API)
Dynamic analysis
Servers
Experiments

Malware sandbox analysis with efficient observation of Herder's behavior

Kasama, T., Yoshioka, K., Matsumoto, T., Yamagata, M., Eto, M., Inoue, D. & Nakao, K. 2012 Dec 21 In : Journal of Information Processing. 20, 4, p. 835-845 11 p.

Research output: Contribution to journalArticle

Malware
Servers
Internet
Observability
Hazardous materials spills
2011

3-3 Multimedia information hiding

Takizawa, O., Sonoda, K., Yoshioka, K. & Suzuki, J. 2011 Mar 1 In : Journal of the National Institute of Information and Communications Technology. 58, 1-2, p. 183-194 12 p.

Research output: Contribution to journalArticle

Sirens
Doppler effect
Disasters
2 Citations

An empirical evaluation of an unpacking method implemented with dynamic binary instrumentation

Kim, H. C., Orii, T., Yoshioka, K., Inoue, D., Song, J., Eto, M., Shikata, J., Matsumoto, T. & Nakao, K. 2011 Sep 1 In : IEICE Transactions on Information and Systems. E94-D, 9, p. 1778-1791 14 p.

Research output: Contribution to journalArticle

Malware
Purging
Experiments
3 Citations

Your sandbox is blinded: Impact of decoy injection to public malware analysis systems

Yoshioka, K., Hosobuchi, Y., Orii, T. & Matsumoto, T. 2011 In : Journal of Information Processing. 19, p. 153-168 16 p.

Research output: Contribution to journalArticle

Malware
Internet
Websites
Screening
Testing
2010

Fine-grain feature extraction from malware's scan behavior based on spectrum analysis

Eto, M., Sonoda, K., Inoue, D., Yoshioka, K. & Nakao, K. 2010 May 10 In : IEICE Transactions on Information and Systems. E93-D, 5, p. 1106-1116 11 p.

Research output: Contribution to journalArticle

Malware
Spectrum analysis
Feature extraction
Monitoring
Computer worms
4 Citations
Malware
Internet
HTTP
Servers
Testing
2 Citations

Vulnerability in public malware sandbox analysis systems

Yoshioka, K., Hosobuchi, Y., Orii, T. & Matsumoto, T. 2010 Nov 29 Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 265-268 4 p. 5598065

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware
Internet
Computer systems
Testing
2009
5 Citations

An incident analysis system NICTER and its analysis engines based on data mining techniques

Inoue, D., Yoshioka, K., Eto, M., Yamagata, M., Nishino, E., Takeuchi, J. I., Ohkouchi, K. & Nakao, K. 2009 Sep 21 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 1 ed. Vol. 5506 LNCS, p. 579-586 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5506 LNCS, no. PART 1)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Engines
Data mining
Malware
Self organizing maps
Detectors
3 Citations

A proposal of malware distinction method based on scan patterns using spectrum analysis

Eto, M., Sonoda, K., Inoue, D., Yoshioka, K. & Nakao, K. 2009 Dec 1 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 2 ed. Vol. 5864 LNCS, p. 565-572 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5864 LNCS, no. PART 2)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware
Spectrum analysis
Monitoring
Computer worms
Computer viruses
10 Citations

Automated malware analysis system and its sandbox for revealing malware's internal and external activities

Inoue, D., Yoshioka, K., Eto, M., Hoshizawa, Y. & Nakao, K. 2009 Dec 1 In : IEICE Transactions on Information and Systems. E92-D, 5, p. 945-954 10 p.

Research output: Contribution to journalArticle

Malware
Internet
Computer systems
1 Citations

DAEDALUS: Novel application of large-scale darknet monitoring for practical protection of live networks

Inoue, D., Suzuki, M., Eto, M., Yoshioka, K. & Nakao, K. 2009 Dec 1 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5758 LNCS, p. 381-382 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5758 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Monitoring
Internet
Malware
2 Citations

Malware sandbox analysis for secure observation of vulnerability exploitation

Yoshioka, K., Inoue, D., Eto, M., Hoshizawa, Y., Nogawa, H. & Nakao, K. 2009 Dec 1 In : IEICE Transactions on Information and Systems. E92-D, 5, p. 955-966 12 p.

Research output: Contribution to journalArticle

Malware
Hazards
Experiments
24 Citations

Practical correlation analysis between scan and malware profiles against zero-day attacks based on darknet monitoring

Nakao, K., Inoue, D., Eto, M. & Yoshioka, K. 2009 Dec 1 In : IEICE Transactions on Information and Systems. E92-D, 5, p. 787-798 12 p.

Research output: Contribution to journalArticle

Malware
Electronic crime countermeasures
Sensor networks
Statistics
Monitoring
2008

Fingerprinting traffic log

Yoshioka, K. & Matsumoto, T. 2008 Oct 22 Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 143-146 4 p. 4604026

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Monitoring
Sensors
Computer worms
Computer viruses
Internet
1 Citations

Information hiding on lossless data compression

Yoshioka, K., Sonoda, K., Takizawa, O. & Matsumoto, T. 2008 Dec 1 In : Journal of Digital Information Management. 6, 2, p. 151-156 6 p.

Research output: Contribution to journalArticle

Data compression
18 Citations

Malware behavior analysis in isolated miniature network for revealing Malware's network activity

Inoue, D., Yoshioka, K., Eto, M., Hoshizawa, Y. & Nakao, K. 2008 Sep 12 IEEE International Conference on Communications. p. 1715-1721 7 p. 4533366

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware
Internet
Computer networks
Monitoring
Computer worms
21 Citations

Nicter: An incident analysis system toward binding network monitoring with malware analysis

Inoue, D., Eto, M., Yoshioka, K., Baba, S., Suzuki, K., Nakazato, J., Ohtaka, K. & Nakao, K. 2008 Nov 6 Proceedings - WOMBAT Workshop on Information Security Threats Data Collection and Sharing, WISTDCS 2008. p. 58-66 9 p. 4627315

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware
Computer worms
Computer viruses
Observatories