FullText URL fulltext.pdf
Author Tsunata, Ren| Kimura, Masaki| Takemoto, Masatsugu| Imai, Jun|
Keywords IPMSM winding traction motor 50 krpm eddy current loss
Note EVTeC 2025, the 7th International Electric Vehicle Technology Conference| Publication code: 20259018|
Published Date 2025-05
Publisher JSAE
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2025 Society of Automotive Engineers of Japan, Inc.
File Version publisher
Author Damoiseau-Malraux, Gaspard| Kobayashi, Satoru| Fukuda, Kensuke|
Keywords log analysis regular expression source code analysis parsing static code analysis
Note © 2025 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Aug. 2027.|
Published Date 2025-07-08
Publication Title 2025 IEEE 49th Annual Computers, Software, and Applications Conference (COMPSAC)
Publisher IEEE
ISSN 2836-3795
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2025 IEEE.
File Version author
DOI 10.1109/compsac65507.2025.00104
Related Url isVersionOf https://doi.org/10.1109/compsac65507.2025.00104
FullText URL fulltext.pdf
Author Tada, Naoya| Ohashi, Hiroaki| Uemori, Takeshi| Sakamoto, Junji|
Note The 7th International Conference on Mechanical Engineering and Applied Composite Materials (MEACM 2024) 23/09/2024 - 25/09/2024 Singapore, Singapore|
Published Date 2024-11-01
Publication Title Journal of Physics: Conference Series
Volume volume2892
Publisher IOP Publishing
Start Page 012002
ISSN 1742-6588
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
File Version publisher
DOI 10.1088/1742-6596/2892/1/012002
Related Url isVersionOf https://doi.org/10.1088/1742-6596/2892/1/012002
FullText URL fulltext.pdf
Author Okazaki, Risa| Kamikawa, Kunihisa| Uno, Hideki| Okuda, Hiroto| Namba, Shihoko| Kano, Mitsunobu| Morita, Mizuki|
Note Proceedings of the 20th World Congress on Medical and Health Informatics| Studies in Health Technology and Informatics, Volume 329|
Published Date 2025-08-07
Publication Title MEDINFO 2025 — Healthcare Smart × Medicine Deep
Publisher IOS Press
Start Page 1892
End Page 1893
ISSN 0926-9630
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2025 The Authors.
File Version publisher
PubMed ID 40776284
DOI 10.3233/shti251267
Related Url isVersionOf https://doi.org/10.3233/shti251267
FullText URL fulltext.pdf
Author Sakamoto, Junji| Tada, Naoya| Uemori, Takeshi|
Keywords Vibration Fatigue crack propagation Non-destructive inspection Titanium alloy
Note European Conference on Fracture 2024|
Published Date 2025
Publication Title Procedia Structural Integrity
Volume volume68
Publisher Elsevier BV
Start Page 1319
End Page 1323
ISSN 2452-3216
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2025 The Author(s).
File Version publisher
DOI 10.1016/j.prostr.2025.06.205
Related Url isVersionOf https://doi.org/10.1016/j.prostr.2025.06.205
FullText URL fulltext.pdf
Author Morita, Mizuki| Honjoh, Mina| Yamane, Takahiro|
Keywords Clinical endpoint, clinical outcomes wearable devices
Note Proceedings of the 20th World Congress on Medical and Health Informatics| Studies in Health Technology and Informatics, Volume 329|
Published Date 2025-08-07
Publication Title MEDINFO 2025 — Healthcare Smart × Medicine Deep
Publisher IOS Press
Start Page 391
End Page 395
ISSN 0926-9630
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2025 The Authors.
File Version publisher
DOI 10.3233/shti250868
Related Url isVersionOf https://doi.org/10.3233/shti250868
Author Kuzuno, Hiroki| Yamauchi, Toshihiro|
Note This is an Accepted Manuscript of a conference paper published by Springer Nature Singapore.| NSS 2024| Lecture Notes in Computer Science, volume 15564| This fulltext file will be available in Mar. 2026.|
Published Date 2025-03-14
Publication Title Network and System Security
Publisher Springer Nature Singapore
Start Page 213
End Page 231
ISSN 0302-9743
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
File Version author
DOI 10.1007/978-981-96-3531-3_11
Related Url isVersionOf https://doi.org/10.1007/978-981-96-3531-3_11
Author Kuzuno, Hiroki| Yamauchi, Toshihiro|
Abstract Privilege escalation attacks through memory corruption via kernel vulnerabilities pose significant threats to operating systems. Although the extended Berkley Packet Filter has been employed to trace kernel code execution by inserting interrupts before and after kernel code invocations, it does not track operations before and after kernel data writes, thus hindering effective kernel data monitoring. In this study, we introduce a kernel data monitor (kdMonitor), which is a novel security mechanism designed to detect unauthorized alterations in the monitored kernel data of a dedicated kernel page. The kdMonitor incorporates two distinct methods. The first is periodic monitoring which regularly outputs the monitored kernel data of the dedicated kernel pages. The second is dynamic monitoring, which restricts write access to a dedicated kernel page, supplements any write operations with page faults, and outputs the monitored kernel data of dedicated kernel pages. kdMonitor enables real-time tracking of specified kernel data of the dedicated kernel page residing in the kernel's virtual memory space from the separated machine. Using kdMonitor, we demonstrated its capability to pinpoint tampering with user process privileged information stemming from privilege escalation attacks on the kernel. Through an empirical evaluation, we validated the effectiveness of kdMonitor in detecting privilege escalation attacks by user processes on Linux. Performance assessments revealed that kdMonitor achieved an attack detection time of 0.83 seconds with an overhead of 0.726 %.
Keywords Vulnerability countermeasure Operating system security System security
Published Date 2024-11-06
Publication Title 2024 IEEE Conference on Dependable and Secure Computing (DSC)
Start Page 66
End Page 73
ISBN 979-8-3315-4028-9
language English
Copyright Holders © 2024 IEEE.
File Version author
DOI 10.1109/dsc63325.2024.00022
FullText URL fulltext20250725-01.pdf
Author Kuzuno, Hiroki| Yamauchi, Toshihiro|
Keywords Kernel vulnerability Dynamic analysis System security
Note This is an Accepted Manuscript of a conference paper published by Springer Nature Switzerland.| WISA 2022| Lecture Notes in Computer Science, volume 13720|
Published Date 2023
Publication Title Information Security Applications
Publisher Springer Nature Switzerland
Start Page 222
End Page 234
ISSN 0302-9743
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2023 Springer Nature Switzerland AG
File Version author
DOI 10.1007/978-3-031-25659-2_16
Web of Science KeyUT 001431522400016
Related Url isVersionOf https://doi.org/10.1007/978-3-031-25659-2_16
FullText URL fulltext20250526-01.pdf
Author Fujii, Shota| Kawaguchi, Nobutaka| Shigemoto, Tomohiro| Yamauchi, Toshihiro|
Note This is an Accepted Manuscript of a conference paper published by Springer International Publishing.| IWSEC 2022| Lecture Notes in Computer Science, volume 13504|
Published Date 2022-08-12
Publication Title Advances in Information and Computer Security
Publisher Springer International Publishing
Start Page 85
End Page 104
ISSN 0302-9743
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
File Version author
DOI 10.1007/978-3-031-15255-9_5
Web of Science KeyUT 000894177600005
Related Url isVersionOf https://doi.org/10.1007/978-3-031-15255-9_5
Author Victor, Hervet| Kobayashi, Satoru| Yamauchi, Toshihiro|
Keywords Malware analysis IoT Honeypot Log analysis Attack patterns
Note © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Feb. 2026.|
Published Date 2023-11-27
Publication Title 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW)
Publisher IEEE
Start Page 292
End Page 297
ISSN 2832-1324
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2023 IEEE.
File Version author
DOI 10.1109/candarw60564.2023.00055
Related Url isVersionOf https://doi.org/10.1109/candarw60564.2023.00055
Author Shiba, Kaito| Kuzuno, Hiroki| Yamauchi, Toshihiro|
Keywords Trusted execution environment Stack overflow prevention method System security
Note © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Feb. 2026.|
Published Date 2023-11-27
Publication Title 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW)
Publisher IEEE
Start Page 274
End Page 278
ISSN 2832-1324
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2023 IEEE.
File Version author
DOI 10.1109/candarw60564.2023.00052
Related Url isVersionOf https://doi.org/10.1109/candarw60564.2023.00052
Author Miki, Masato| Yamauchi, Toshihiro| Kobayashi, Satoru|
Keywords Mandatory Access Control System IoT Security Linux Security Modules
Note © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Jan. 2026.|
Published Date 2023-11-28
Publication Title 2023 Eleventh International Symposium on Computing and Networking (CANDAR)
Publisher IEEE
Start Page 161
End Page 167
ISSN 2379-1896
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2023 IEEE.
File Version author
DOI 10.1109/candar60563.2023.00029
Related Url isVersionOf https://doi.org/10.1109/candar60563.2023.00029
FullText URL fulltext20250512-02.pdf
Author Norimatsu, Takashi| Yamauchi, Toshihiro|
Keywords Industrial Ethernet PROFINET Non Real Time Real-Time Isochronous Real Time
Note © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Arg. 2025.|
Published Date 2023-06-23
Publication Title 2023 5th International Conference on Computer Communication and the Internet (ICCCI)
Publisher IEEE
Start Page 236
End Page 244
ISSN 2833-2350
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2023 IEEE.
File Version author
DOI 10.1109/iccci59363.2023.10210171
Related Url isVersionOf https://doi.org/10.1109/iccci59363.2023.10210171
Author Sato, Masaya| Omori, Taku| Yamauchi, Toshihiro| Taniguchi, Hideo|
Keywords system call virtual machine monitor operating system
Note © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Feb. 2026.|
Published Date 2023-11-27
Publication Title 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW)
Publisher IEEE
Start Page 267
End Page 273
ISSN 2832-1324
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2023 IEEE.
File Version author
DOI 10.1109/candarw60564.2023.00051
Related Url isVersionOf https://doi.org/10.1109/candarw60564.2023.00051
Author Michishita, Daigo| Kobayashi, Satoru| Yamauchi, Toshihiro|
Note This is an Accepted Manuscript of a conference paper published by Springer Nature Switzerland.| EIDWT 2025| Lecture Notes on Data Engineering and Communications Technologies,volume 243| This fulltext file will be available in Apr. 2026.|
Published Date 2025-04-01
Publication Title Advances in Internet, Data and Web Technologies
Publisher Springer Nature Switzerland
Start Page 107
End Page 119
ISSN 2367-4512
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG
File Version author
DOI 10.1007/978-3-031-86149-9_11
Related Url isVersionOf https://doi.org/10.1007/978-3-031-86149-9_11
FullText URL fulltext20240530-01.pdf
Author Fukushima, Yukinobu| Koujitani, Yuki| Nakane, Kazutoshi| Tarutani, Yuta| Wu, Celimuge| Ji, Yusheng| Yokohira, Tokumi| Murase, Tutomu|
Keywords Multi-stage information processing system VM migration control Deep reinforcement learning Deep Deterministic Policy Gradient (DDPG)
Note https://www.thinkmind.org/library/ICN/ICN_2024/icn_2024_1_30_30019.html|
Published Date 2024-05-26
Publication Title ICN 2024 : The Twenty-Third International Conference on Networks
Publisher IARIA
Start Page 13
End Page 18
ISSN 2308-4413
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders Copyright (c) IARIA, 2024
File Version publisher
FullText URL fulltext20210811-16.pdf
Author Ishihara, Takashi| Sato, Masaya| Yamauchi, Toshihiro|
Keywords Malicious Websites Blacklist Web-based Attack Android
Note © 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
This fulltext is available in Nov. 2022.|
7th International Workshop on Information and Communication Security (WICS 2020), Naha, Japan, 24-27 Nov. 2020|
Published Date 2020-11
Publication Title 2020 Eighth International Symposium on Computing and Networking Workshops (CANDARW)
Publisher IEEE
Start Page 20489448
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2020 IEEE
File Version author
DOI 10.1109/candarw51189.2020.00070
Related Url isVersionOf https://doi.org/10.1109/candarw51189.2020.00070
Author Ban, Yuya| Yamauchi, Toshihiro|
Published Date 2018-11
Publication Title 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)
Content Type Conference Paper
Author Imamura, Yuta| Uekawa, Hiroyuki| Ishihara, Yasuhiro| Sato, Masaya| Yamauchi, Toshihiro|
Published Date 2018-1-29
Publication Title Proceedings of the Australasian Computer Science Week Multiconference
Content Type Conference Paper