Katsunari YOSHIOKA


Catching the Behavioral Differences between Multiple Executions for Malware Detection
Takahiro KASAMA Katsunari YOSHIOKA Daisuke INOUE Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1  pp. 225-232
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: System Security
Keyword: 
malware detectiondynamic analysisBehavioral Differences
 Summary | Full Text:PDF(1.6MB)

An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation
Hyung Chan KIM Tatsunori ORII Katsunari YOSHIOKA Daisuke INOUE Jungsuk SONG Masashi ETO Junji SHIKATA Tsutomu MATSUMOTO Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/09/01
Vol. E94-D  No. 9  pp. 1778-1791
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
software securitydynamic binary instrumentationunpackingmalwarebinary analysis
 Summary | Full Text:PDF(951.3KB)

Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis
Masashi ETO Kotaro SONODA Daisuke INOUE Katsunari YOSHIOKA Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/05/01
Vol. E93-D  No. 5  pp. 1106-1116
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
malware correlation analysisspectrum analysisFourier transform
 Summary | Full Text:PDF(561.2KB)

Multi-Pass Malware Sandbox Analysis with Controlled Internet Connection
Katsunari YOSHIOKA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1  pp. 210-218
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
malware sandbox analysismulti-pass analysis
 Summary | Full Text:PDF(1.1MB)

Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring
Koji NAKAO Daisuke INOUE Masashi ETO Katsunari YOSHIOKA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 787-798
Type of Manuscript:  INVITED PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
network monitoringdarknet malware analysissandboxcorrelation analysis
 Summary | Full Text:PDF(2MB)

Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities
Daisuke INOUE Katsunari YOSHIOKA Masashi ETO Yuji HOSHIZAWA Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 945-954
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Malware Detection
Keyword: 
malwaredynamic analysissandboxsecurity incident
 Summary | Full Text:PDF(1.6MB)

Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation
Katsunari YOSHIOKA Daisuke INOUE Masashi ETO Yuji HOSHIZAWA Hiroki NOGAWA Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 955-966
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Malware Detection
Keyword: 
malware sandbox analysisexploit code detectionlow-interaction honeypot
 Summary | Full Text:PDF(3.2MB)

On Collusion Security of Random Codes
Katsunari YOSHIOKA Junji SHIKATA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 296-304
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Biometrics
Keyword: 
fingerprintingwatermarkingtraitor tracingcollusion secure code
 Summary | Full Text:PDF(427KB)

Collusion Secure Codes: Systematic Security Definitions and Their Relations
Katsunari YOSHIOKA Junji SHIKATA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5  pp. 1162-1171
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
fingerprintingtraitor tracingcollusion secure code
 Summary | Full Text:PDF(408KB)

Random-Error Resilience of a Short Collusion-Secure Code
Katsunari YOSHIOKA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/05/01
Vol. E86-A  No. 5  pp. 1147-1155
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
fingerprintingcollusion attackcollusion-secure code
 Summary | Full Text:PDF(346.9KB)