Memory behavior-based automatic malware unpacking in stealth debugging environment Y Kawakoya, M Iwamura, M Itoh 2010 5th International Conference on Malicious and Unwanted Software, 39-46, 2010 | 272 | 2010 |
Design and implementation of high interaction client honeypot for drive-by-download attacks M Akiyama, M Iwamura, Y Kawakoya, K Aoki, M Itoh IEICE transactions on communications 93 (5), 1131-1139, 2010 | 98 | 2010 |
Api chaser: Anti-analysis resistant malware analyzer Y Kawakoya, M Iwamura, E Shioji, T Hariu Research in Attacks, Intrusions, and Defenses: 16th International Symposium …, 2013 | 49 | 2013 |
Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks E Shioji, Y Kawakoya, M Iwamura, T Hariu Proceedings of the 28th annual computer security applications conference …, 2012 | 37 | 2012 |
EIGER: automated IOC generation for accurate and interpretable endpoint malware detection Y Kurogome, Y Otsuki, Y Kawakoya, M Iwamura, S Hayashi, T Mori, K Sen Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 31 | 2019 |
Scalable and performance-efficient client honeypot on high interaction system M Akiyama, Y Kawakoya, T Hariu 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet …, 2012 | 26 | 2012 |
Building stack traces from memory dump of Windows x64 Y Otsuki, Y Kawakoya, M Iwamura, J Miyoshi, K Ohkubo Digital Investigation 24, S101-S110, 2018 | 22 | 2018 |
Stealth loader: Trace-free program loading for API obfuscation Y Kawakoya, E Shioji, Y Otsuki, M Iwamura, T Yada Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017 | 21 | 2017 |
Api chaser: Taint-assisted sandbox for evasive malware analysis Y Kawakoya, E Shioji, M Iwamura, J Miyoshi Journal of Information Processing 27, 297-314, 2019 | 18 | 2019 |
アナライジング・マルウェア: フリーツールを使った感染事案対処 新井 (No Title), 2010 | 9 | 2010 |
半透性仮想インターネットによるマルウェアの動的解析 青木一史, 川古谷裕平, 岩村誠, 伊藤光恭 コンピュータセキュリティシンポジウム 2009 (CSS2009) 論文集 2009, 1-6, 2011 | 8 | 2011 |
能動的攻撃と受動的攻撃に関する調査および考察 青木一史, 川古谷裕平, 秋山満昭, 岩村誠, 針生剛男, 伊藤光恭 情報処理学会論文誌 50 (9), 2147-2162, 2009 | 7 | 2009 |
Ropminer: Learning-based static detection of rop chain considering linkability of rop gadgets T Usui, T Ikuse, Y Otsuki, Y Kawakoya, M Iwamura, J Miyoshi, K Matsuura IEICE TRANSACTIONS on Information and Systems 103 (7), 1476-1492, 2020 | 6 | 2020 |
アナライジング・マルウェア 新井悠, 岩村誠, 川古谷裕平, 青木一史, 星澤裕二 オライリー・ジャパン, 42-48, 2010 | 6 | 2010 |
Marionette: Client honeypot for investigating and understanding web-based malware infection on implicatedwebsites A Mitsuaki 2009 Joint Workshop on Information Security, 2009 | 6 | 2009 |
My script engines know what you did in the dark: Converting engines into script API tracers T Usui, Y Otsuki, Y Kawakoya, M Iwamura, J Miyoshi, K Matsuura Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 5 | 2019 |
Toward the analysis of distributed code injection in post-mortem forensics Y Otsuki, Y Kawakoya, M Iwamura, J Miyoshi, J Faires, T Lillard Advances in Information and Computer Security: 14th International Workshop …, 2019 | 5 | 2019 |
Taint-assisted IAT Reconstruction against Position Obfuscation Y Kawakoya, M Iwamura, J Miyoshi Journal of Information Processing 26, 813-824, 2018 | 5 | 2018 |
テイント伝搬に基づく解析対象コードの追跡方法 川古谷裕平, 岩村誠, 針生剛男 情報処理学会論文誌 54 (8), 2079-2089, 2013 | 5 | 2013 |
クライアントハニーポットを用いた Web 感染型マルウェアの実態調査 秋山満昭 CSS2008, 10 月, 2008 | 5 | 2008 |