Find Research Outputs

Search concepts
Selected filters
2016

An efficient method for detecting obfuscated suspicious JavaScript based on text pattern analysis

Su, J., Yoshioka, K., Shikata, J. & Matsumoto, T. 2016 May 30 WTMC 2016 - Proceedings of the 2016 ACM International Workshop on Traffic Measurements for Cybersecurity, Co-located with Asia CCS 2016. Association for Computing Machinery, Inc, p. 3-11 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detecting obfuscated suspicious javascript based on information-theoretic measures and novelty detection

Su, J., Yoshioka, K., Shikata, J. & Matsumoto, T. 2016 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9558, p. 278-293 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9558)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Internet
Detectors
Experiments

Foreword

Korczyński, M., Mazurczyk, W., Yoshioka, K., Van Eeten, M. & Robertson, W. 2016 May 30 In : Unknown Journal. p. iii-iv

Research output: Contribution to journalEditorial

1 Citations

IoTPOT: A novel honeypot for revealing current IoT threats

Pa, Y. M. P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T. & Rossow, C. 2016 In : Journal of Information Processing. 24, 3, p. 522-533 12 p.

Research output: Contribution to journalArticle

Internet of things
Program processors
Malware

Sandprint: Fingerprinting malware sandboxes to provide intelligence for sandbox evasion

Yokoyama, A., Ishii, K., Tanabe, R., Papa, Y., Yoshioka, K., Matsumoto, T., Kasama, T., Inoue, D., Brengel, M., Backes, M. & Rossow, C. 2016 Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Springer Verlag, Vol. 9854 LNCS, p. 165-187 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware
Supervised learning
Classifiers

Who gets the boot? Analyzing victimization by DDoS-as-a-service

Noroozian, A., Korczyński, M., Gañan, C. H., Makita, D., Yoshioka, K. & Vaneeten, M. 2016 Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Springer Verlag, Vol. 9854 LNCS, p. 368-389 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Amplification
Industry
2015
1 Citations

AmpPot: Monitoring and defending against amplification DDos attacks

Krämer, L., Krupp, J., Makita, D., Nishizoe, T., Koide, T., Yoshioka, K. & Rossow, C. 2015 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9404, p. 615-636 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9404)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Amplification
Bandwidth
Linux

Detecting malicious domains and authoritative name servers based on their distinct mappings to IP addresses

Pa, Y. M. P., Yoshioka, K. & Matsumoto, T. 2015 Sep 15 In : Journal of Information Processing. 23, 5, p. 623-632 10 p.

Research output: Contribution to journalArticle

Servers
Internet
Communication

Message from the program co-chairs AsiaJCIS 2015

Fan, C. I., Zhang, Z., Nah, J. H. & Yoshioka, K. 2015 In : Unknown Journal. p. ix 7153843

Research output: Contribution to journalEditorial

2014

Message from program co-chairs

Zhang, M., Kim, J., Lin, C. H. & Yoshioka, K. 2014 Jan 26 In : Unknown Journal. p. ix 7023189

Research output: Contribution to journalArticle

1 Citations

Structural classification and similarity measurement of malware

Shi, H., Hamagami, T., Yoshioka, K., Xu, H., Tobe, K. & Goto, S. 2014 Jan 1 In : IEEJ Transactions on Electrical and Electronic Engineering. 9, 6, p. 621-632 12 p.

Research output: Contribution to journalArticle

Malware
Self organizing maps
Windows operating system
Data mining
Experiments
2013
Malware
Pattern matching
Modems
Viruses
Application programming interfaces (API)

Search engine based investigation on misconfiguration of zone transfer

Pa, Y. M. P., Yoshioka, K. & Matsumoto, T. 2013 Jan 1 Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013. IEEE Computer Society, p. 56-62 7 p. 6621652

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Search engines