FullText URL fulltext.pdf
Author Saji, Kazuma| Yamauchi, Toshihiro| Kobayashi, Satoru| Taniguchi, Hideo|
Keywords Code reuse attack IoT firmware software diversity function reordering LLVM
Published Date 2025
Publication Title IEEE Access
Volume volume13
Publisher Institute of Electrical and Electronics Engineers (IEEE)
Start Page 185111
End Page 185124
ISSN 2169-3536
Content Type Journal Article
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2025 The Authors.
File Version publisher
DOI 10.1109/access.2025.3626065
Related Url isVersionOf https://doi.org/10.1109/access.2025.3626065
Author Shimamoto, Yuta| Phinyodom, Jiratchaya| Yoshimoto, Ryota| Uekawa, Hiroyuki| Akiyama, Mitsuaki| Yamauchi, Toshihiro|
Keywords Internet of Things Firmware Startup script SysVinit
Note This is an Conference paper of an article published by Springer Nature Singapore.| MobiSec 2024| Communications in Computer and Information Science, volume 2597| This fulltext file will be available in Oct. 2026.|
Published Date 2025-10-15
Publication Title Mobile Internet Security
Publisher Springer Nature Singapore
Start Page 417
End Page 431
ISSN 1865-0929
Content Type Journal Article
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2026 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
File Version author
DOI 10.1007/978-981-95-0172-4_28
Related Url isVersionOf https://doi.org/10.1007/978-981-95-0172-4_28
Author Kuzuno, Hiroki| Yamauchi, Toshihiro|
Note This is an Accepted Manuscript of a conference paper published by Springer Nature Singapore.| NSS 2024| Lecture Notes in Computer Science, volume 15564| This fulltext file will be available in Mar. 2026.|
Published Date 2025-03-14
Publication Title Network and System Security
Publisher Springer Nature Singapore
Start Page 213
End Page 231
ISSN 0302-9743
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
File Version author
DOI 10.1007/978-981-96-3531-3_11
Related Url isVersionOf https://doi.org/10.1007/978-981-96-3531-3_11
Author Kuzuno, Hiroki| Yamauchi, Toshihiro|
Abstract Privilege escalation attacks through memory corruption via kernel vulnerabilities pose significant threats to operating systems. Although the extended Berkley Packet Filter has been employed to trace kernel code execution by inserting interrupts before and after kernel code invocations, it does not track operations before and after kernel data writes, thus hindering effective kernel data monitoring. In this study, we introduce a kernel data monitor (kdMonitor), which is a novel security mechanism designed to detect unauthorized alterations in the monitored kernel data of a dedicated kernel page. The kdMonitor incorporates two distinct methods. The first is periodic monitoring which regularly outputs the monitored kernel data of the dedicated kernel pages. The second is dynamic monitoring, which restricts write access to a dedicated kernel page, supplements any write operations with page faults, and outputs the monitored kernel data of dedicated kernel pages. kdMonitor enables real-time tracking of specified kernel data of the dedicated kernel page residing in the kernel's virtual memory space from the separated machine. Using kdMonitor, we demonstrated its capability to pinpoint tampering with user process privileged information stemming from privilege escalation attacks on the kernel. Through an empirical evaluation, we validated the effectiveness of kdMonitor in detecting privilege escalation attacks by user processes on Linux. Performance assessments revealed that kdMonitor achieved an attack detection time of 0.83 seconds with an overhead of 0.726 %.
Keywords Vulnerability countermeasure Operating system security System security
Published Date 2024-11-06
Publication Title 2024 IEEE Conference on Dependable and Secure Computing (DSC)
Start Page 66
End Page 73
ISBN 979-8-3315-4028-9
language English
Copyright Holders © 2024 IEEE.
File Version author
DOI 10.1109/dsc63325.2024.00022
FullText URL fulltext20250725-01.pdf
Author Kuzuno, Hiroki| Yamauchi, Toshihiro|
Keywords Kernel vulnerability Dynamic analysis System security
Note This is an Accepted Manuscript of a conference paper published by Springer Nature Switzerland.| WISA 2022| Lecture Notes in Computer Science, volume 13720|
Published Date 2023
Publication Title Information Security Applications
Publisher Springer Nature Switzerland
Start Page 222
End Page 234
ISSN 0302-9743
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2023 Springer Nature Switzerland AG
File Version author
DOI 10.1007/978-3-031-25659-2_16
Web of Science KeyUT 001431522400016
Related Url isVersionOf https://doi.org/10.1007/978-3-031-25659-2_16
FullText URL fulltext20250523-04.pdf
Author Shimamoto, Yuta| Uekawa, Hiroyuki| Akiyama, Mitsuaki| Yamauchi, Toshihiro|
Abstract Although a Software Bill of Materials (SBOM) plays a key role in software transparency, inconsistencies in SBOM descriptions can undermine its value. To address this, we propose a novel approach to program access control, SBOMAC, which leverages Mandatory Access Control (MAC) systems to ensure transparent and explicit program execution. In this study, we identify the challenges associated with implementing this approach and present preliminary investigation results to address these challenges.
Published Date 2025-02-24
language English
File Version publisher
FullText URL fulltext20250526-01.pdf
Author Fujii, Shota| Kawaguchi, Nobutaka| Shigemoto, Tomohiro| Yamauchi, Toshihiro|
Note This is an Accepted Manuscript of a conference paper published by Springer International Publishing.| IWSEC 2022| Lecture Notes in Computer Science, volume 13504|
Published Date 2022-08-12
Publication Title Advances in Information and Computer Security
Publisher Springer International Publishing
Start Page 85
End Page 104
ISSN 0302-9743
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
File Version author
DOI 10.1007/978-3-031-15255-9_5
Web of Science KeyUT 000894177600005
Related Url isVersionOf https://doi.org/10.1007/978-3-031-15255-9_5
Author Victor, Hervet| Kobayashi, Satoru| Yamauchi, Toshihiro|
Keywords Malware analysis IoT Honeypot Log analysis Attack patterns
Note © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Feb. 2026.|
Published Date 2023-11-27
Publication Title 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW)
Publisher IEEE
Start Page 292
End Page 297
ISSN 2832-1324
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2023 IEEE.
File Version author
DOI 10.1109/candarw60564.2023.00055
Related Url isVersionOf https://doi.org/10.1109/candarw60564.2023.00055
Author Shiba, Kaito| Kuzuno, Hiroki| Yamauchi, Toshihiro|
Keywords Trusted execution environment Stack overflow prevention method System security
Note © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Feb. 2026.|
Published Date 2023-11-27
Publication Title 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW)
Publisher IEEE
Start Page 274
End Page 278
ISSN 2832-1324
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2023 IEEE.
File Version author
DOI 10.1109/candarw60564.2023.00052
Related Url isVersionOf https://doi.org/10.1109/candarw60564.2023.00052
FullText URL fulltext20250523-01.pdf
Author Miki, Masato| Yamauchi, Toshihiro| Kobayashi, Satoru|
Keywords Mandatory Access Control System IoT Security Linux Security Modules
Note © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Jan. 2026.|
Published Date 2023-11-28
Publication Title 2023 Eleventh International Symposium on Computing and Networking (CANDAR)
Publisher IEEE
Start Page 161
End Page 167
ISSN 2379-1896
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2023 IEEE.
File Version author
DOI 10.1109/candar60563.2023.00029
Related Url isVersionOf https://doi.org/10.1109/candar60563.2023.00029
FullText URL fulltext20250512-02.pdf
Author Norimatsu, Takashi| Yamauchi, Toshihiro|
Keywords Industrial Ethernet PROFINET Non Real Time Real-Time Isochronous Real Time
Note © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Arg. 2025.|
Published Date 2023-06-23
Publication Title 2023 5th International Conference on Computer Communication and the Internet (ICCCI)
Publisher IEEE
Start Page 236
End Page 244
ISSN 2833-2350
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2023 IEEE.
File Version author
DOI 10.1109/iccci59363.2023.10210171
Related Url isVersionOf https://doi.org/10.1109/iccci59363.2023.10210171
Author Sato, Masaya| Omori, Taku| Yamauchi, Toshihiro| Taniguchi, Hideo|
Keywords system call virtual machine monitor operating system
Note © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.| This fulltext file will be available in Feb. 2026.|
Published Date 2023-11-27
Publication Title 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW)
Publisher IEEE
Start Page 267
End Page 273
ISSN 2832-1324
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2023 IEEE.
File Version author
DOI 10.1109/candarw60564.2023.00051
Related Url isVersionOf https://doi.org/10.1109/candarw60564.2023.00051
Author Michishita, Daigo| Kobayashi, Satoru| Yamauchi, Toshihiro|
Note This is an Accepted Manuscript of a conference paper published by Springer Nature Switzerland.| EIDWT 2025| Lecture Notes on Data Engineering and Communications Technologies,volume 243| This fulltext file will be available in Apr. 2026.|
Published Date 2025-04-01
Publication Title Advances in Internet, Data and Web Technologies
Publisher Springer Nature Switzerland
Start Page 107
End Page 119
ISSN 2367-4512
Content Type Conference Paper
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG
File Version author
DOI 10.1007/978-3-031-86149-9_11
Related Url isVersionOf https://doi.org/10.1007/978-3-031-86149-9_11
FullText URL fulltext.pdf
Author Yamauchi, Toshihiro| Orito, Rintaro| Ebisu, Koji| Sato, Masaya|
Keywords Android accessibility services malicious websites web-based attacks web security
Published Date 2024
Publication Title IEEE Access
Volume volume12
Publisher Institute of Electrical and Electronics Engineers
Start Page 153285
End Page 153294
ISSN 2169-3536
Content Type Journal Article
language English
OAI-PMH Set 岡山大学
Copyright Holders © 2024 The Authors.
File Version publisher
DOI 10.1109/ACCESS.2024.3478748
Web of Science KeyUT 001340709500001
Related Url isVersionOf https://doi.org/10.1109/ACCESS.2024.3478748
FullText URL fulltext20220204-1.pdf
Author Nakamura, Toru| Ito, Hiroshi| Kiyomoto, Shinsaku| Yamauchi, Toshihiro|
Keywords Virtual machine introspection Forensics OS security
Note This is the version of the book manuscript accepted for publication after peer review, but prior to copyediting and typesetting.
This fulltext is available in Aug. 2023.|
IWSEC 2021: Advances in Information and Computer Security pp 64-73|
Published Date 2021-08-27
Publication Title Advances in Information and Computer Security|Lecture Notes in Computer Science
Volume volume12835
Publisher Springer International Publishing
Start Page 64
End Page 73
ISSN 0302-9743
NCID BC11247320
Content Type Book
language English
OAI-PMH Set 岡山大学
Copyright Holders © Springer Nature Switzerland AG 2021
File Version author
DOI 10.1007/978-3-030-85987-9_4
Web of Science KeyUT 000708084400004
Related Url isVersionOf https://doi.org/10.1007/978-3-030-85987-9_4
FullText URL fulltext20220201-3.pdf
Author Kusunoki, Koki| Yamauchi, Toshihiro| Taniguchi, Hideo|
Abstract Physical memory capacity has increased owing to large-scale integration. In addition, memory footprints have increased in size, as multiple programs are executed on a single computer. Many operating systems manage physical memory by paging a 4 KB page. Therefore, the number of entries in the virtual address translation table for virtual to physical increases along with the size of the memory footprints. This cause a decrease in the translation lookaside buffer (TLB) hit ratio, resulting in the performance degradation of the application. To address this problem, we propose the implementation of physical memory management with two page sizes: 4 KB and 4 MB. This allows us to expand range of addresses to be translated by a single TLB entry, thereby improving the TLB hit rate. This paper describes the design and implementation of the physical memory management mechanism that manages physical memory using two page sizes on The ENduring operating system for Distributed EnviRonment (Tender OS). Our results showed that when the page size is 4 MB, the processing time of the memory allocation can be reduced by as much as approximately 99.7%, and the processing time for process creation can be reduced by as much as approximately 51%, and the processing time of the memory operation could be reduced by as much as 91.9%.
Published Date 2021-08-08
Publication Title Advances in Networked-Based Information Systems|Lecture Notes in Networks and Systems
Volume volume313
Start Page 238
End Page 248
ISBN 978-3-030-84912-2
language English
Copyright Holders © The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
File Version author
DOI 10.1007/978-3-030-84913-9_22
FullText URL fulltext20220201-2.pdf
Author Otani, Kohei| Okazaki, Toshiki| Yamauchi, Toshihiro| Moriyama, Hideaki| Sato, Masaya| Taniguchi, Hideo|
Abstract To handle information leaks caused by administrative errors or mishandling, a function for tracing the diffusion of classified information using a virtual machine monitor (VMM) was proposed. However, the proposed function has not been investigated in cases in which virtual machines (VMs) allocated by multiple virtual central processing units (vCPUs) are to be monitored. In addition, cases in which multiple VMs are monitored have not been examined. In this study, we describe the support of multiple VMs for the proposed VMM-based tracing function. We also show how to deal with VMs allocated by multiple vCPUs. Furthermore, we report the evaluation results from assessing the traceability of the improved proposed method and its overhead for classified information when a VM with multiple vCPUs is monitored.
Keywords Information leak prevention Virtualization VMM
Published Date 2021-11
Publication Title 2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)
Start Page 352
End Page 358
ISBN 978-1-6654-2835-4
language English
Copyright Holders © 2021 IEEE
File Version author
DOI 10.1109/candarw53999.2021.00066
FullText URL Mitigation_of_Kernel_Memory_Corruption_Using_Multiple_Kernel_Memory_Mechanism.pdf
Author Kuzuno, Hiroki| Yamauchi, Toshihiro|
Keywords Memory corruption kernel vulnerability system security operating system
Published Date 2021
Publication Title IEEE Access
Volume volume9
Publisher Institute of Electrical and Electronics Engineers (IEEE)
Start Page 111651
End Page 111665
ISSN 2169-3536
Content Type Journal Article
language English
OAI-PMH Set 岡山大学
File Version publisher
DOI 10.1109/access.2021.3101452
Related Url isVersionOf https://doi.org/10.1109/access.2021.3101452
Author Ichioka, Shuichi| Pouget, Estelle| Mimura, Takao| Nakajima, Jun| Yamauchi, Toshihiro|
Published Date 2020-12-09
Publication Title Information Security Applications|Lecture Notes in Computer Science
Volume volume12583
Content Type Journal Article
Author Ban, Yuya| Yamauchi, Toshihiro|
Published Date 2018-11
Publication Title 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)
Content Type Conference Paper