Bitvisor: a thin hypervisor for enforcing i/o device security T Shinagawa, H Eiraku, K Tanimoto, K Omote, S Hasegawa, T Horie, ... Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on …, 2009 | 344 | 2009 |
RanSAP: An open dataset of ransomware storage access patterns for training machine learning models M Hirano, R Hodota, R Kobayashi Forensic Science International: Digital Investigation 40, 301314, 2022 | 41 | 2022 |
Machine learning based ransomware detection using storage access patterns obtained from live-forensic hypervisor M Hirano, R Kobayashi 2019 sixth international conference on internet of things: Systems …, 2019 | 35 | 2019 |
Introducing role-based access control to a secure virtual machine monitor: security policy enforcement mechanism for distributed computers M Hirano, T Shinagawa, H Eiraku, S Hasegawa, K Omote, K Tanimoto, ... 2008 IEEE Asia-Pacific Services Computing Conference, 1225-1230, 2008 | 20 | 2008 |
LogDrive: a proactive data collection and analysis framework for time-traveling forensic investigation in IaaS cloud environments M Hirano, N Tsuzuki, S Ikeda, R Kobayashi Journal of Cloud Computing 7 (1), 18, 2018 | 15 | 2018 |
Design and implementation of a portable ID management framework for a secure virtual machine monitor M Hirano, T Okuda, E Kawai, S Yamaguchi Journal of Information Assurance and Security (JIAS), Dynamic Publishers 2 …, 2007 | 13 | 2007 |
WaybackVisor: Hypervisor-based scalable live forensic architecture for timeline analysis M Hirano, T Tsuzuki, S Ikeda, N Taka, K Fujiwara, R Kobayashi Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2017 | 12 | 2017 |
A two-step execution mechanism for thin secure hypervisors M Hirano, T Shinagawa, H Eiraku, S Hasegawa, K Omote, K Tanimoto, ... 2009 Third International Conference on Emerging Security Information …, 2009 | 12 | 2009 |
T-pim: Trusted password input method against data stealing malware M Hirano, T Umeda, T Okuda, E Kawai, S Yamaguchi 2009 Sixth International Conference on Information Technology: New …, 2009 | 9 | 2009 |
Application for a simple device authentication framework: device authentication middleware using novel smart card software M Hirano, T Okuda, S Yamaguchi 2007 International Symposium on Applications and the Internet Workshops, 31-31, 2007 | 9 | 2007 |
Evaluation of a sector-hash based rapid file detection method for monitoring infrastructure-as-a-service cloud platforms M Hirano, H Takase, K Yoshida 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 8 | 2015 |
A log-structured block preservation and restoration system for proactive forensic data collection in the cloud M Hirano, H Ogawa 2016 11th International Conference on Availability, Reliability and Security …, 2016 | 7 | 2016 |
Machine Learning-based Ransomware Detection Using Low-level Memory Access Patterns Obtained From Live-forensic Hypervisor M Hirano, R Kobayashi 2022 IEEE International Conference on Cyber Security and Resilience (CSR …, 2022 | 5 | 2022 |
Design and implementation of an inter-device authentication framework guaranteeing explicit ownership M Hirano, T Okuda, S Yamaguchi IPSJ Digital Courier 4, 114-127, 2008 | 5 | 2008 |
Teaching Expert Development Project by KOSEN Security Educational Community K Yonemura, S Oyama, H Kobayashi, S Yamada, K Shiraishi, S Izumi, ... 2022 IEEE Global Engineering Education Conference (EDUCON), 1643-1651, 2022 | 3 | 2022 |
準パススルー型ハイパーバイザによるストレージアクセスパターンの収集システムの提案 高直我, 池田征士朗, 平野学, 小林良太郎 コンピュータセキュリティシンポジウム 2018 論文集 2018 (2), 678-685, 2018 | 3 | 2018 |
仮想計算機モニタを利用したコンピュータフォレンジックスのための補助記憶装置のデータの保全と回復のシステム 小川拡, 平野学 研究報告マルチメディア通信と分散処理 (DPS) 2013 (16), 1-8, 2013 | 3 | 2013 |
Portable id management framework for security enhancement of virtual machine monitors M Hirano, T Okuda, E Kawai, T Shinagawa, H Eiraku, K Tanimoto, ... Engineering the Computer Science and IT, 477-488, 2009 | 3 | 2009 |
準パススルー型仮想マシンモニタ BitVisor の設計と実装 品川高廣, 榮樂英樹, 谷本幸一, 面和成, 長谷川晶一, 保理江高志, ... 情報処理学会研究報告システムソフトウェアとオペレーティング・システム (OS) 2008 (77 …, 2008 | 3 | 2008 |
ストレージアクセスパターンを用いた機械学習によるランサムウェア判別システムの精度向上に関する考察 程田凌羽, 平野学, 小林良太郎 研究報告コンピュータセキュリティ (CSEC) 2021 (52), 1-7, 2021 | 2 | 2021 |