Keyword : malware


Malware Function Estimation Using API in Initial Behavior
Naoto KAWAGUCHI Kazumasa OMOTE 
Publication:   
Publication Date: 2017/01/01
Vol. E100-A  No. 1 ; pp. 167-175
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
malwarefunction estimationrisk evaluationsupervised machine learningdynamic analysis
 Summary | Full Text:PDF(231.7KB)

Inishing: A UI Phishing Attack to Exploit the Vulnerability of Inotify in Android Smartphones
Woo Hyun AHN Sanghyeon PARK Jaewon OH Seung-Ho LIM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/09/01
Vol. E99-D  No. 9 ; pp. 2404-2409
Type of Manuscript:  LETTER
Category: Dependable Computing
Keyword: 
securityAndroid OSmalwareinotifyphishing attack
 Summary | Full Text:PDF(2.1MB)

BotProfiler: Detecting Malware-Infected Hosts by Profiling Variability of Malicious Infrastructure
Daiki CHIBA Takeshi YAGI Mitsuaki AKIYAMA Kazufumi AOKI Takeo HARIU Shigeki GOTO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2016/05/01
Vol. E99-B  No. 5 ; pp. 1012-1023
Type of Manuscript:  Special Section PAPER (Special Section on Internet Architectures and Management Methods that Enable Flexible and Secure Deployment of Network Services)
Category: 
Keyword: 
malwarebotnetdynamic analysistemplate
 Summary | Full Text:PDF(2.1MB)

An Original Entry Point Detection Method with Candidate-Sorting for More Effective Generic Unpacking
Ryoichi ISAWA Daisuke INOUE Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/04/01
Vol. E98-D  No. 4 ; pp. 883-893
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
software packermalwarecode analysisData Execution Prevention (DEP)security
 Summary | Full Text:PDF(637.9KB)

Analysis of Blacklist Update Frequency for Countering Malware Attacks on Websites
Takeshi YAGI Junichi MURAYAMA Takeo HARIU Sho TSUGAWA Hiroyuki OHSAKI Masayuki MURATA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2014/01/01
Vol. E97-B  No. 1 ; pp. 76-86
Type of Manuscript:  PAPER
Category: Internet
Keyword: 
malwarewebsiteblacklistmonitoringstate transitionanalysis
 Summary | Full Text:PDF(3.1MB)

Evaluations and Analysis of Malware Prevention Methods on Websites
Takeshi YAGI Junichi MURAYAMA Takeo HARIU Hiroyuki OHSAKI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2013/12/01
Vol. E96-B  No. 12 ; pp. 3091-3100
Type of Manuscript:  PAPER
Category: Internet
Keyword: 
securitywebhoneypotmalwareanti-virusblacklistaccess filtering
 Summary | Full Text:PDF(1.7MB)

Time Zone Correlation Analysis of Malware/Bot Downloads
Khamphao SISAAT Hiroaki KIKUCHI Shunji MATSUO Masato TERADA Masashi FUJIWARA Surin KITTITORNKUN 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2013/07/01
Vol. E96-B  No. 7 ; pp. 1753-1763
Type of Manuscript:  Special Section PAPER (Special Section on Internet Architectures, Protocols, and Management Methods that Enable Sustainable Development)
Category: 
Keyword: 
malwarebotnetbot downloadtime zone correlationhoneypot
 Summary | Full Text:PDF(2MB)

Analysis on the Sequential Behavior of Malware Attacks
Nur Rohman ROSYID Masayuki OHRUI Hiroaki KIKUCHI Pitikhate SOORAKSA Masato TERADA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/11/01
Vol. E94-D  No. 11 ; pp. 2139-2149
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
PrefixSpanmalwarebotnetscoordinated attacksequential pattern
 Summary | Full Text:PDF(1.5MB)

An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation
Hyung Chan KIM Tatsunori ORII Katsunari YOSHIOKA Daisuke INOUE Jungsuk SONG Masashi ETO Junji SHIKATA Tsutomu MATSUMOTO Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/09/01
Vol. E94-D  No. 9 ; pp. 1778-1791
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
software securitydynamic binary instrumentationunpackingmalwarebinary analysis
 Summary | Full Text:PDF(951.3KB)

Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks
Mitsuaki AKIYAMA Makoto IWAMURA Yuhei KAWAKOYA Kazufumi AOKI Mitsutaka ITOH 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2010/05/01
Vol. E93-B  No. 5 ; pp. 1131-1139
Type of Manuscript:  Special Section PAPER (Special Section on Technology and Architecture for Sustainable Growth of the Internet)
Category: 
Keyword: 
malwareclient honeypotintrusion detection
 Summary | Full Text:PDF(2.3MB)

Design of Provider-Provisioned Website Protection Scheme against Malware Distribution
Takeshi YAGI Naoto TANIMOTO Takeo HARIU Mitsutaka ITOH 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2010/05/01
Vol. E93-B  No. 5 ; pp. 1122-1130
Type of Manuscript:  Special Section PAPER (Special Section on Technology and Architecture for Sustainable Growth of the Internet)
Category: 
Keyword: 
securitywebvulnerabilityapplicationmalware
 Summary | Full Text:PDF(877.3KB)

Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities
Daisuke INOUE Katsunari YOSHIOKA Masashi ETO Yuji HOSHIZAWA Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5 ; pp. 945-954
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Malware Detection
Keyword: 
malwaredynamic analysissandboxsecurity incident
 Summary | Full Text:PDF(1.6MB)