Katsunari Yoshioka
Katsunari Yoshioka
Verified email at ynu.ac.jp
TitleCited byYear
IoTPOT: analysing the rise of IoT compromises
YMP Pa, S Suzuki, K Yoshioka, T Matsumoto, T Kasama, C Rossow
9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15), 2015
1762015
Iotpot: A novel honeypot for revealing current iot threats
YMP Pa, S Suzuki, K Yoshioka, T Matsumoto, T Kasama, C Rossow
Journal of Information Processing 24 (3), 522-533, 2016
842016
nicter: An incident analysis system toward binding network monitoring with malware analysis
D Inoue, M Eto, K Yoshioka, S Baba, K Suzuki, J Nakazato, K Ohtaka, ...
2008 WOMBAT Workshop on Information Security Threats Data Collection andá…, 2008
712008
Amppot: Monitoring and defending against amplification ddos attacks
L Krńmer, J Krupp, D Makita, T Nishizoe, T Koide, K Yoshioka, C Rossow
International Symposium on Recent Advances in Intrusion Detection, 615-636, 2015
692015
A method of preventing unauthorized data transmission in controller area network
T Matsumoto, M Hata, M Tanabe, K Yoshioka, K Oishi
2012 IEEE 75th Vehicular Technology Conference (VTC Spring), 1-5, 2012
652012
Malware behavior analysis in isolated miniature network for revealing malware's network activity
D Inoue, K Yoshioka, M Eto, Y Hoshizawa, K Nakao
2008 IEEE International Conference on Communications, 1715-1721, 2008
552008
Automated malware analysis system and its sandbox for revealing malware's internal and external activities
D Inoue, K Yoshioka, M Eto, Y Hoshizawa, K Nakao
IEICE transactions on information and systems 92 (5), 945-954, 2009
492009
Practical correlation analysis between scan and malware profiles against zero-day attacks based on darknet monitoring
K Nakao, D Inoue, M Eto, K Yoshioka
IEICE TRANSACTIONS on Information and Systems 92 (5), 787-798, 2009
452009
SandPrint: fingerprinting malware sandboxes to provide intelligence for sandbox evasion
A Yokoyama, K Ishii, R Tanabe, Y Papa, K Yoshioka, T Matsumoto, ...
International Symposium on Research in Attacks, Intrusions, and Defensesá…, 2016
382016
A novel concept of network incident analysis based on multi-layer observations of malware activities
K Nakao, K Yoshioka, D Inoue, M Eto
The 2nd Joint Workshop on Information Security (JWIS07), 267-279, 2007
322007
Message authentication method in communication system and communication system
H Oguma, T Matsumoto, M Hata, M Tanabe, K Yoshioka, K Oishi
US Patent 9,331,854, 2016
312016
An incident analysis system NICTER and its analysis engines based on data mining techniques
D Inoue, K Yoshioka, M Eto, M Yamagata, E Nishino, J Takeuchi, ...
International Conference on Neural Information Processing, 579-586, 2008
272008
Who gets the boot? analyzing victimization by ddos-as-a-service
A Noroozian, M Korczyński, CH Ga˝an, D Makita, K Yoshioka, ...
International Symposium on Research in Attacks, Intrusions, and Defensesá…, 2016
262016
Your sandbox is blinded: Impact of decoy injection to public malware analysis systems
K Yoshioka, Y Hosobuchi, T Orii, T Matsumoto
Information and Media Technologies 6 (2), 633-648, 2011
242011
Multi-pass malware sandbox analysis with controlled internet connection
K Yoshioka, T Matsumoto
IEICE transactions on fundamentals of electronics, communications andá…, 2010
212010
Malware sandbox analysis for secure observation of vulnerability exploitation
K Yoshioka, D Inoue, M Eto, Y Hoshizawa, H Nogawa, K Nakao
IEICE transactions on information and systems 92 (5), 955-966, 2009
202009
Sandbox analysis with controlled internet connection for observing temporal changes of malware behavior
K Yoshioka, T Kasama, T Matsumoto
2009 Joint Workshop on Information Security (JWIS 2009), 2009
172009
Vulnerability in public malware sandbox analysis systems
K Yoshioka, Y Hosobuchi, T Orii, T Matsumoto
2010 10th IEEE/IPSJ International Symposium on Applications and the Internetá…, 2010
132010
Malware detection method by catching their random behavior in multiple executions
T Kasama, K Yoshioka, D Inoue, T Matsumoto
2012 IEEE/IPSJ 12th International Symposium on Applications and the Internetá…, 2012
122012
A proposal of malware distinction method based on scan patterns using spectrum analysis
M Eto, K Sonoda, D Inoue, K Yoshioka, K Nakao
International Conference on Neural Information Processing, 565-572, 2009
112009
The system can't perform the operation now. Try again later.
Articles 1–20