Find Research Outputs

Search concepts
Selected filters
2016

An efficient method for detecting obfuscated suspicious JavaScript based on text pattern analysis

Su, J., Yoshioka, K., Shikata, J. & Matsumoto, T. 2016 May 30 WTMC 2016 - Proceedings of the 2016 ACM International Workshop on Traffic Measurements for Cybersecurity, Co-located with Asia CCS 2016. Association for Computing Machinery, Inc, p. 3-11 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citations

ASIC implementation of random number generators using SR latches and its evaluation

Torii, N., Kokubo, H., Yamamoto, D., Itoh, K., Takenaka, M. & Matsumoto, T. 2016 Dec 1 In : Eurasip Journal on Information Security. 2016, 1, 10

Research output: Contribution to journalArticle

Application specific integrated circuits
Entropy
Statistical tests
Field programmable gate arrays (FPGA)
Electric power utilization
1 Citations

Attribute based encryption with direct efficiency tradeoff

Attrapadung, N., Hanaoka, G., Matsumoto, T., Teruya, T. & Yamada, S. 2016 Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Proceedings. Springer Verlag, Vol. 9696, p. 249-266 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9696)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Computer hardware

Detecting obfuscated suspicious javascript based on information-theoretic measures and novelty detection

Su, J., Yoshioka, K., Shikata, J. & Matsumoto, T. 2016 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9558, p. 278-293 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9558)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Internet
Detectors
Experiments
1 Citations

Eigenanalysis of morphological diversity in silicon random nanostructures formed via resist collapse

Naruse, M., Hoga, M., Ohyagi, Y., Nishio, S., Tate, N., Yoshida, N. & Matsumoto, T. 2016 Nov 15 In : Physica A: Statistical Mechanics and its Applications. 462, p. 883-888 6 p.

Research output: Contribution to journalArticle

Nanostructures
Silicon
Security of data
Focused ion beams
Experiments
Application specific integrated circuits
Dynamic analysis
1 Citations

IoTPOT: A novel honeypot for revealing current IoT threats

Pa, Y. M. P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T. & Rossow, C. 2016 In : Journal of Information Processing. 24, 3, p. 522-533 12 p.

Research output: Contribution to journalArticle

Internet of things
Program processors
Malware

Optical nano artifact metrics using silicon random nanostructures

Matsumoto, T., Yoshida, N., Nishio, S., Hoga, M., Ohyagi, Y., Tate, N. & Naruse, M. 2016 Aug 31 In : Scientific Reports. 6, 32438

Research output: Contribution to journalArticle

silicon
artifact
clone
experimental apparatus
biometry
9 Citations

Roadmap on optical security

Matsumoto, T. & 27 others Javidi, B., Carnicer, A., Yamaguchi, M., Nomura, T., Pérez-Cabré, E., Millán, M. S., Nishchal, N. K., Torroba, R., Barrera, J. F., He, W., Peng, X., Stern, A., Rivenson, Y., Alfalou, A., Brosseau, C., Guo, C., Sheridan, J. T., Situ, G., Naruse, M., Juvells, I., Tajahuerce, E., Lancis, J., Chen, W., Chen, X., Pinkse, P. W. H., Mosk, A. P. & Markman, A. 2016 Aug 1 In : Journal of Optics. 18, 8, 083001

Research output: Contribution to journalArticle

Cryptography
Security of data
Authentication
Photons
Imaging techniques

Sandprint: Fingerprinting malware sandboxes to provide intelligence for sandbox evasion

Yokoyama, A., Ishii, K., Tanabe, R., Papa, Y., Yoshioka, K., Matsumoto, T., Kasama, T., Inoue, D., Brengel, M., Backes, M. & Rossow, C. 2016 Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Springer Verlag, Vol. 9854 LNCS, p. 165-187 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware
Supervised learning
Classifiers
2015

Detecting malicious domains and authoritative name servers based on their distinct mappings to IP addresses

Pa, Y. M. P., Yoshioka, K. & Matsumoto, T. 2015 Sep 15 In : Journal of Information Processing. 23, 5, p. 623-632 10 p.

Research output: Contribution to journalArticle

Servers
Internet
Communication

Non-scanning optical near-field microscopy for nanophotonic security

Tate, N., Naruse, M., Matsumoto, T., Hoga, M., Ohyagi, Y., Nishio, S., Nomura, W. & Ohtsu, M. 2015 In : International Journal of Metalcasting. 9, 1, p. 1383-1387 5 p.

Research output: Contribution to journalArticle

Nanophotonics
Optical microscopy
Nanorods
Microscopic examination
Demonstrations
2014

Discriminative and distributed measurement of temperature and strain with time-division pump-probe-read light generation by single laser diode in simplified BOCDA system

Matsumoto, T., Kishi, M. & Hotate, K. 2014 Jan 1 Proceedings of SPIE - The International Society for Optical Engineering. SPIE, Vol. 9157, 91573W

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pumps
Temperature
Semiconductor lasers
Polarization-maintaining fiber
Polarization
6 Citations

Nano-artifact metrics based on random collapse of resist

Matsumoto, T., Hoga, M., Ohyagi, Y., Ishikawa, M., Naruse, M., Hanaki, K., Suzuki, R., Sekiguchi, D., Tate, N. & Ohtsu, M. 2014 Aug 21 In : Scientific Reports. 4, 6142

Research output: Contribution to journalArticle

artifact
clone
pillar
silicon
electron
5 Citations

Unidirectional light propagation through two-layer nanostructures based on optical near-field interactions

Naruse, M., Hori, H., Ishii, S., Drezet, A., Huant, S., Hoga, M., Ohyagi, Y., Matsumoto, T., Tate, N. & Ohtsu, M. 2014 Jan 1 In : Journal of the Optical Society of America B: Optical Physics. 31, 10, p. 2404-2413 10 p.

Research output: Contribution to journalArticle

Nanostructures
Light propagation
Light transmission
Conversion efficiency
Optical properties
2013
Malware
Pattern matching
Modems
Viruses
Application programming interfaces (API)
2 Citations

Optical near-field-mediated polarization asymmetry induced by two-layer nanostructures

Naruse, M., Tate, N., Ohyagi, Y., Hoga, M., Matsumoto, T., Hori, H., Drezet, A., Huant, S. & Ohtsu, M. 2013 Sep 23 In : Optics Express. 21, 19, p. 21857-21870 14 p.

Research output: Contribution to journalArticle

Nanostructures
Polarization
Nanophotonics
Conversion efficiency
Optical fibers

Search engine based investigation on misconfiguration of zone transfer

Pa, Y. M. P., Yoshioka, K. & Matsumoto, T. 2013 Jan 1 Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013. IEEE Computer Society, p. 56-62 7 p. 6621652

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Search engines
Security of data
Cryptography
2012

A method of preventing unauthorized data transmission in controller area network

Matsumoto, T., Hata, M., Tanabe, M., Yoshioka, K. & Oishi, K. 2012 Aug 20 IEEE Vehicular Technology Conference. 6240294

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data communication systems
Controllers
1 Citations

An efficient dynamic detection method for various x86 shellcodes

Fujii, T., Yoshioka, K., Shikata, J. & Matsumoto, T. 2012 Nov 1 Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012. p. 284-289 6 p. 6305299

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
Testing
Linux
1 Citations

A proper security analysis method for CMOS cryptographic circuits

Takahashi, Y. & Matsumoto, T. 2012 Mar 25 In : IEICE Electronics Express. 9, 6, p. 458-463 6 p.

Research output: Contribution to journalArticle

Electric power utilization
Experiments
6 Citations

Malware detection method by catching their random behavior in multiple executions

Kasama, T., Yoshioka, K., Inoue, D. & Matsumoto, T. 2012 Nov 1 Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012. p. 262-266 5 p. 6305295

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware
Application programming interfaces (API)
Dynamic analysis
Servers
Experiments

Malware sandbox analysis with efficient observation of Herder's behavior

Kasama, T., Yoshioka, K., Matsumoto, T., Yamagata, M., Eto, M., Inoue, D. & Nakao, K. 2012 Dec 21 In : Journal of Information Processing. 20, 4, p. 835-845 11 p.

Research output: Contribution to journalArticle

Malware
Servers
Internet
Observability
Hazardous materials spills
2011

An efficient verifiable implicit asking protocol for Diffie-Hellman key exchange

Oishi, K. & Matsumoto, T. 2011 May 17 Proceedings - 2011 Workshop on Lightweight Security and Privacy: Devices, Protocols, and Applications, LightSec 2011. p. 10-19 10 p. 5749573

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
2 Citations

An empirical evaluation of an unpacking method implemented with dynamic binary instrumentation

Kim, H. C., Orii, T., Yoshioka, K., Inoue, D., Song, J., Eto, M., Shikata, J., Matsumoto, T. & Nakao, K. 2011 Sep 1 In : IEICE Transactions on Information and Systems. E94-D, 9, p. 1778-1791 14 p.

Research output: Contribution to journalArticle

Malware
Purging
Experiments
1 Citations

Empirical study on privacy concerns and the acceptance of e-money in Japan

Komatsu, A. & Matsumoto, T. 2011 In : Journal of Information Processing. 19, p. 307-316 10 p.

Research output: Contribution to journalArticle

Economics
Regression analysis
Application specific integrated circuits
Side channel attack
7 Citations
Field programmable gate arrays (FPGA)
Scalability
Delay circuits

Integrity enhancement of real-time systems by information-theoretic cryptography

Katayama, S., Sekiguchi, K., Fukushima, K. & Matsumoto, T. 2011 Nov 21 Proceedings of the SICE Annual Conference. p. 1541-1546 6 p. 6060209

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Real time systems
Cryptography
Security of data
Communication
2 Citations

Self destructive tamper response for software protection

Oishi, K. & Matsumoto, T. 2011 May 20 Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011. p. 490-496 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dynamic analysis
Static analysis
Costs
3 Citations

Your sandbox is blinded: Impact of decoy injection to public malware analysis systems

Yoshioka, K., Hosobuchi, Y., Orii, T. & Matsumoto, T. 2011 In : Journal of Information Processing. 19, p. 153-168 16 p.

Research output: Contribution to journalArticle

Malware
Internet
Websites
Screening
Testing
2010
2 Citations

A design methodology for a DPA-resistant circuit with RSL techniques

Suzuki, D., Saeki, M., Shimizu, K., Satoh, A. & Matsumoto, T. 2010 Dec 1 In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E93-A, 12, p. 2497-2508 12 p.

Research output: Contribution to journalArticle

Logic gates
Hardware
Side channel attack
Switching circuits
Logic circuits
3 Citations

An artifact-metrics which utilizes laser speckle patterns for plastic ID card surface

Yamakoshi, M., Rong, X. & Matsumoto, T. 2010 May 7 Proceedings of SPIE - The International Society for Optical Engineering. Vol. 7618, 76180B

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Speckle
Cameras
Lasers
Metric system
Laser beams
3 Citations

Information-theoretically secure key-insulated multireceiver authentication codes

Seito, T., Aikawa, T., Shikata, J. & Matsumoto, T. 2010 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6055 LNCS, p. 148-165 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6055 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Security of data

Information-theoretic approach to authentication codes for power system communications

Matsumoto, T., Kobayashi, T., Katayama, S., Fukushima, K. & Sekiguchi, K. 2010 Jul 26 2010 IEEE PES Transmission and Distribution Conference and Exposition: Smart Solutions for a Changing World. 5484416

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Authentication
Smart power grids
Advanced metering infrastructures
Electric load management
4 Citations
Malware
Internet
HTTP
Servers
Testing
2 Citations

Vulnerability in public malware sandbox analysis systems

Yoshioka, K., Hosobuchi, Y., Orii, T. & Matsumoto, T. 2010 Nov 29 Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 265-268 4 p. 5598065

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware
Internet
Computer systems
Testing
2009
1 Citations

Complementary logics vs masked logics: Which countermeasure is a better selection?

Matsumoto, T., Mimura, H. & Suzuki, D. 2009 Dec 10 ECCTD 2009 - European Conference on Circuit Theory and Design Conference Program. p. 399-402 4 p. 5274989

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application specific integrated circuits
Field programmable gate arrays (FPGA)
Side channel attack

Evaluation of equal error rate in document authentication system using magnetic fiber

Ikeda, T., Hiroe, S., Yamada, T., Matsumoto, T. & Takemura, Y. 2009 Dec 29 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, ASID 2009. 5276959

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Metric system
Fibers
Biometrics
Security systems
3 Citations

Information-flow-based access control for web browsers

Yoshihama, S., Tateishi, T., Tabuchi, N. & Matsumoto, T. 2009 Dec 1 In : IEICE Transactions on Information and Systems. E92-D, 5, p. 836-850 15 p.

Research output: Contribution to journalArticle

Access control
Web browsers
World Wide Web

Power system communications and information-theoretic cryptography

Matsumoto, T., Kobayashi, T., Katayama, S., Fukushima, K. & Sekiguchi, K. 2009 Dec 16 Transmission and Distribution Conference and Exposition: Asia and Pacific, T and D Asia 2009. 5357018

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Authentication
Cryptography
Control systems
Data acquisition

Protection relay systems employing unconditionally secure authentication codes

Matsumoto, T., Kobayashi, T., Katayama, S., Fukushima, K. & Sekiguchi, K. 2009 Dec 1 2009 IEEE Bucharest PowerTech: Innovative Ideas Toward the Electrical Grid of the Future. 5281906

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Relay protection
Communication
1 Citations

Unconditionally secure blind authentication codes: The model, constructions, and links to commitment

Hara, Y., Ishiwata, T., Shikata, J. & Matsumoto, T. 2009 Jul 16 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5458 LNCS, p. 116-137 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5458 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Security of data
Cryptography
Polynomials
2 Citations

Unconditionally secure blind signatures

Hara, Y., Seito, T., Shikata, J. & Matsumoto, T. 2009 Dec 1 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4883 LNCS, p. 23-43 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4883 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citations

Unconditionally secure group signatures

Seito, T., Hara, Y., Shikata, J. & Matsumoto, T. 2009 Aug 1 In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E92-A, 8, p. 2067-2085 19 p.

Research output: Contribution to journalArticle

Cryptography
Managers
2008

Fingerprinting traffic log

Yoshioka, K. & Matsumoto, T. 2008 Oct 22 Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 143-146 4 p. 4604026

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Monitoring
Sensors
Computer worms
Computer viruses
Internet
5 Citations

Individuality evaluation for paper based artifact-metrics using transmitted light image

Yamakoshi, M., Tanaka, J., Furuie, M., Hirabayashi, M. & Matsumoto, T. 2008 May 7 Proceedings of SPIE - The International Society for Optical Engineering. Vol. 6819, 68190H

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Metric system
Ferromagnetic resonance
Image resolution
Fibers
1 Citations

Information hiding on lossless data compression

Yoshioka, K., Sonoda, K., Takizawa, O. & Matsumoto, T. 2008 Dec 1 In : Journal of Digital Information Management. 6, 2, p. 151-156 6 p.

Research output: Contribution to journalArticle

Data compression

Prototyping security test objects for use with advanced biometric authentication systems

Matsumoto, T. 2008 Dec 1 Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biometrics
Authentication