Papers - YAMAUCHI Toshihiro
-
Detecting Unintended Redirects to Malicious Websites on Android Devices Based on URL-Switching Interval Reviewed
Toshihiro Yamauchi, Rintaro Orito, Koji Ebisu, Masaya Sato
IEEE Access 12 153285 - 153294 2024.10
-
Mitsuaki Akiyama, Shugo Shiraishi, Akifumi Fukumoto, Ryota Yoshimoto, Eitaro Shioji, Toshihiro Yamauchi
Computers & Security 133 103389 - 103389 2023.10
-
Web access monitoring mechanism via Android WebView for threat analysis Reviewed International coauthorship
Yuta Imamura, Rintaro Orito, Hiroyuki Uekawa, Kritsana Chaikaew, Pattara Leelaprute, Masaya Sato, Toshihiro Yamauchi
International Journal of Information Security 20 ( 6 ) 833 - 847 2021.12
-
スマートフォン端末におけるセキュリティ上の脅威と対策:権限昇格攻撃と悪性Webサイトへの誘導に焦点を当てて Invited Reviewed
山内 利宏
金融研究 40 ( 4 ) 25 - 54 2021.10
-
Toshihiro Yamauchi, Yohei Akao, Ryota Yoshitani, Yuichi Nakamura, Masaki Hashimoto
International Journal of Information Security 20 ( 4 ) 461 - 473 2021.8
-
Mitigating use-after-free attacks using memory-reuse-prohibited library Reviewed
Toshihiro Yamauchi, Yuta Ikegami, Yuya Ban
IEICE Transactions on Information and Systems E100D ( 10 ) 2295 - 2306 2017.10
-
Investigation Towards Detecting Landing Websites for Fake Japanese Shopping Websites
Daigo Michishita, Satoru Kobayashi, Toshihiro Yamauchi
Lecture Notes on Data Engineering and Communications Technologies 107 - 119 2025.4
-
Startup Program Identification for Efficient and Accurate IoT Security Investigations Reviewed
Yuta Shimamoto, Ryota Yoshimoto, Mitsuaki Akiyama, Toshihiro Yamauchi
Journal of Information Processing 33 55 - 65 2025.2
-
Poster: Towards SBOM-based Access Control for Transparent and Explicit Program Execution Reviewed
Yuta Shimamoto, Hiroyuki Uekawa, Mitsuaki Akiyama, Toshihiro Yamauchi
Network and Distributed System Security Symposium 2025 Posters (NDSS 2025 Posters) 2025.2
-
Investigation Towards Detecting Landing Websites for Fake Japanese Shopping Websites Reviewed
Investigation Towards Detecting Landing Websites for Fake Japanese Shopping Websites
2025.2
-
Developing the Flexible Conformance Test Execution Platform for OAuth 2.0-based Security Profiles Reviewed
Takashi Norimatsu, Yuichi Nakamura, Toshihiro Yamauchi
Journal of Information Processing 33 168 - 183 2025.1
-
Ensuring Log Authenticity in System Audits with VMM-Based Evidence Collection Reviewed
Toru Nakamura, Hiroshi Ito, Jeuk Kang, Takamasa Isohara, Toshihiro Yamauchi
Journal of Internet Services and Information Security (JISIS) 2025
-
Evaluation of a Startup Program Identification for Efficient and Accurate IoT Security Investigations Reviewed
Yuta Shimamoto, Jiratchaya Phinyodom, Ryota Yoshimoto, Hiroyuki Uekawa, Mitsuaki Akiyama, Toshihiro Yamauchi
8th International Conference on Mobile Internet Security (MobiSec 2024) 1 - 12 2024.12
-
Proposal of Open Source Software Security Risk Indicator based on Vulnerability Management Interview Reviewed
Hiroki Kuzuno, Tomohiko Yano, Kazuki Omo, Jeroen van, der Ham, Toshihiro Yamauchi
Journal of Information Processing 32 1090 - 1104 2024.12
-
CPUアーキテクチャに依存しないIoTマルウェア分類木生成手法 Reviewed
大迫勇太郎, 山内利宏, 吉岡克成, 藤橋卓也, 渡辺 尚, 猿渡俊介
情報処理学会論文誌 65 ( 11 ) 1604 - 1617 2024.11
-
RKPM: Restricted Kernel Page Mechanism to Mitigate Privilege Escalation Attacks Reviewed
Hiroki Kuzuno, Toshihiro Yamauchi
18th International Conference on Network and System Security (NSS 2024) 15564 213 - 231 2024.11
-
kdMonitor: Kernel Data Monitor for Detecting Kernel Memory Corruption Reviewed
Hiroki Kuzuno, Toshihiro Yamauchi
2024 7th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2024) 66 - 73 2024.11
-
仮想計算機モニタによる複数OSに対応したシステムコール検知箇所推定手法 Reviewed
大森 卓, 佐藤将也, 山内利宏, 谷口秀夫
情報処理学会論文誌 65 ( 9 ) 1374 - 1385 2024.9
-
Effectiveness of MAC Systems Based on LSM and Their Security Policy Configuration for Protecting IoT Devices Reviewed
Masato Miki, Toshihiro Yamauchi, Satoru Kobayashi
Journal of Internet Services and Information Security 14 ( 3 ) 293 - 315 2024.8
-
Mitigation of privilege escalation attack using kernel data relocation mechanism Reviewed
Hiroki Kuzuno, Toshihiro Yamauchi
International Journal of Information Security 23 3351 - 3367 2024.7