Blockchain explorer: An analytical process and investigation environment for bitcoin H Kuzuno, C Karam 2017 APWG symposium on electronic crime research (eCrime), 9-16, 2017 | 81 | 2017 |
Signature generation for sensitive information leakage in android applications H Kuzuno, S Tonami 2013 IEEE 29th international conference on data engineering workshops (ICDEW …, 2013 | 27 | 2013 |
DOC-IDS: a deep learning-based method for feature extraction and anomaly detection in network traffic N Yoshimura, H Kuzuno, Y Shiraishi, M Morii Sensors 22 (12), 4405, 2022 | 12 | 2022 |
Detection of sensitive information leakage in Android applications using signature generation H Kuzuno, S Tonami International Journal of Space-Based and Situated Computing 5 (1), 53-62, 2015 | 9 | 2015 |
Efficient Protection Mechanism for CPU Cache Flush Instruction Based Attacks S Enomoto, H Kuzuno, H Yamada IEICE TRANSACTIONS on Information and Systems 105 (11), 1890-1899, 2022 | 7 | 2022 |
Ad-hoc analytical framework of bitcoin investigations for law enforcement H Kuzuno, G Tziakouris IEICE TRANSACTIONS on Information and Systems 101 (11), 2644-2657, 2018 | 7 | 2018 |
A nonoutsourceable puzzle under ghost rule G Zeng, SM Yiu, J Zhang, H Kuzuno, MH Au 2017 15th Annual Conference on Privacy, Security and Trust (PST), 35-358, 2017 | 7 | 2017 |
Android アプリケーションに対する情報フロー制御機構の提案 葛野弘樹 コンピュータセキュリティシンポジウム 2011 論文集 2011 (3), 155-160, 2011 | 7 | 2011 |
Detecting advertisement module network behavior with graph modeling H Kuzuno, K Magata 2014 Ninth Asia Joint Conference on Information Security, 1-10, 2014 | 5 | 2014 |
Mitigation of kernel memory corruption using multiple kernel memory mechanism H Kuzuno, T Yamauchi IEEE Access 9, 111651-111665, 2021 | 4 | 2021 |
Detecting and characterising of mobile advertisement network traffic using graph modelling H Kuzuno, K Magata International Journal of Space-Based and Situated Computing 6 (2), 90-101, 2016 | 4 | 2016 |
AWide Area Log Analyzing System Based on Mobile Agents T Katoh, H Kuzuno, T Kawahara, A Watanabe, Y Nakai, BB Bista, ... 2006 International Conference on Computational Inteligence for Modelling …, 2006 | 4 | 2006 |
KMO: kernel memory observer to identify memory corruption by secret inspection mechanism H Kuzuno, T Yamauchi International Conference on Information Security Practice and Experience, 75-94, 2019 | 3 | 2019 |
モバイルエージェントを用いた分散型インターネット観測システムの提案 葛野弘樹, 中井優志, 渡邊集, 川原卓也, 加藤貴司, 高田豊雄 情報処理学会論文誌 47 (5), 1393-1405, 2006 | 3 | 2006 |
KDPM: Kernel Data Protection Mechanism Using a Memory Protection Key H Kuzuno, T Yamauchi International Workshop on Security, 66-84, 2022 | 2 | 2022 |
Mitigating Foreshadow Side-channel Attack Using Dedicated Kernel Memory Mechanism H Kuzuno, T Yamauchi Journal of Information Processing 30, 796-806, 2022 | 2 | 2022 |
FlushBlocker: Lightweight mitigating mechanism for CPU cache flush instruction based attacks S Enomoto, H Kuzuno 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 74-79, 2021 | 2 | 2021 |
Constructing a Complete Timeline of a Security Incident by Aggregating Reports H Kuzuno, S Inagaki, K Magata 2018 13th Asia Joint Conference on Information Security (AsiaJCIS), 109-115, 2018 | 2 | 2018 |
独自のカーネル用仮想記憶空間を用いたカーネルモジュール監視手法 葛野弘樹, 山内利宏 コンピュータセキュリティシンポジウム 2018 論文集 2018 (2), 971-978, 2018 | 2 | 2018 |
vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel Vulnerability H Kuzuno, T Yamauchi International Conference on Information Security Applications, 222-234, 2022 | 1 | 2022 |