Katsunari YOSHIOKA


Detecting and Understanding Online Advertising Fraud in the Wild
Fumihiro KANEI Daiki CHIBA Kunio HATO Katsunari YOSHIOKA Tsutomu MATSUMOTO Mitsuaki AKIYAMA 
Publication:   
Publication Date: 2020/07/01
Vol. E103-D  No. 7  pp. 1512-1523
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Network and System Security
Keyword: 
online advertisingadvertising fraudadware
 Summary | Full Text:PDF

Pay the Piper: DDoS Mitigation Technique to Deter Financially-Motivated Attackers
Takayuki SASAKI Carlos HERNANDEZ GAÑÁN Katsunari YOSHIOKA Michel VAN EETEN Tsutomu MATSUMOTO 
Publication:   
Publication Date: 2020/04/01
Vol. E103-B  No. 4  pp. 389-404
Type of Manuscript:  Special Section PAPER (Special Section on Network Resource Control and Management Technologies for Sustainable Social Information Infrastructure)
Category: 
Keyword: 
DDoSproof of workfinancially-motivated attackers
 Summary | Full Text:PDF

IoT Malware Analysis and New Pattern Discovery Through Sequence Analysis Using Meta-Feature Information
Chun-Jung WU Shin-Ying HUANG Katsunari YOSHIOKA Tsutomu MATSUMOTO 
Publication:   
Publication Date: 2020/01/01
Vol. E103-B  No. 1  pp. 32-42
Type of Manuscript:  Special Section PAPER (Special Section on Internet Architecture, Applications and Operation Technologies for a Cyber-Physical System)
Category: Fundamental Theories for Communications
Keyword: 
IoT malwarebotnetdenial of servicetext miningN-gramclassificationclustering
 Summary | Full Text:PDF

A Cross-Platform Study on Emerging Malicious Programs Targeting IoT Devices
Tao BAN Ryoichi ISAWA Shin-Ying HUANG Katsunari YOSHIOKA Daisuke INOUE 
Publication:   
Publication Date: 2019/09/01
Vol. E102-D  No. 9  pp. 1683-1685
Type of Manuscript:  Special Section LETTER (Special Section on Log Data Usage Technology and Office Information Systems)
Category: Cybersecurity
Keyword: 
IoT securityIoT malwaremalware analysismalware classification
 Summary | Full Text:PDF

Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities
Hiroki NAKANO Fumihiro KANEI Yuta TAKATA Mitsuaki AKIYAMA Katsunari YOSHIOKA 
Publication:   
Publication Date: 2018/11/01
Vol. E101-D  No. 11  pp. 2576-2583
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Mobile Application and Web Security
Keyword: 
Mobile AppVulnerabilitiesQuestion and Answer WebsiteCode Snippets
 Summary | Full Text:PDF

Catching the Behavioral Differences between Multiple Executions for Malware Detection
Takahiro KASAMA Katsunari YOSHIOKA Daisuke INOUE Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1  pp. 225-232
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: System Security
Keyword: 
malware detectiondynamic analysisBehavioral Differences
 Summary | Full Text:PDF

An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation
Hyung Chan KIM Tatsunori ORII Katsunari YOSHIOKA Daisuke INOUE Jungsuk SONG Masashi ETO Junji SHIKATA Tsutomu MATSUMOTO Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/09/01
Vol. E94-D  No. 9  pp. 1778-1791
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
software securitydynamic binary instrumentationunpackingmalwarebinary analysis
 Summary | Full Text:PDF

Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis
Masashi ETO Kotaro SONODA Daisuke INOUE Katsunari YOSHIOKA Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/05/01
Vol. E93-D  No. 5  pp. 1106-1116
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
malware correlation analysisspectrum analysisFourier transform
 Summary | Full Text:PDF

Multi-Pass Malware Sandbox Analysis with Controlled Internet Connection
Katsunari YOSHIOKA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1  pp. 210-218
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
malware sandbox analysismulti-pass analysis
 Summary | Full Text:PDF

Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities
Daisuke INOUE Katsunari YOSHIOKA Masashi ETO Yuji HOSHIZAWA Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 945-954
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Malware Detection
Keyword: 
malwaredynamic analysissandboxsecurity incident
 Summary | Full Text:PDF

Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring
Koji NAKAO Daisuke INOUE Masashi ETO Katsunari YOSHIOKA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 787-798
Type of Manuscript:  INVITED PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
network monitoringdarknet malware analysissandboxcorrelation analysis
 Summary | Full Text:PDF

Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation
Katsunari YOSHIOKA Daisuke INOUE Masashi ETO Yuji HOSHIZAWA Hiroki NOGAWA Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 955-966
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Malware Detection
Keyword: 
malware sandbox analysisexploit code detectionlow-interaction honeypot
 Summary | Full Text:PDF

On Collusion Security of Random Codes
Katsunari YOSHIOKA Junji SHIKATA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 296-304
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Biometrics
Keyword: 
fingerprintingwatermarkingtraitor tracingcollusion secure code
 Summary | Full Text:PDF

Collusion Secure Codes: Systematic Security Definitions and Their Relations
Katsunari YOSHIOKA Junji SHIKATA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5  pp. 1162-1171
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
fingerprintingtraitor tracingcollusion secure code
 Summary | Full Text:PDF

Random-Error Resilience of a Short Collusion-Secure Code
Katsunari YOSHIOKA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/05/01
Vol. E86-A  No. 5  pp. 1147-1155
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
fingerprintingcollusion attackcollusion-secure code
 Summary | Full Text:PDF