Follow
Yuhei Kawakoya
Title
Cited by
Cited by
Year
Memory behavior-based automatic malware unpacking in stealth debugging environment
Y Kawakoya, M Iwamura, M Itoh
2010 5th International Conference on Malicious and Unwanted Software, 39-46, 2010
2602010
Design and implementation of high interaction client honeypot for drive-by-download attacks
M Akiyama, M Iwamura, Y Kawakoya, K Aoki, M Itoh
IEICE transactions on communications 93 (5), 1131-1139, 2010
982010
Api chaser: Anti-analysis resistant malware analyzer
Y Kawakoya, M Iwamura, E Shioji, T Hariu
Research in Attacks, Intrusions, and Defenses: 16th International Symposium …, 2013
452013
Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks
E Shioji, Y Kawakoya, M Iwamura, T Hariu
Proceedings of the 28th annual computer security applications conference …, 2012
352012
EIGER: automated IOC generation for accurate and interpretable endpoint malware detection
Y Kurogome, Y Otsuki, Y Kawakoya, M Iwamura, S Hayashi, T Mori, K Sen
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
252019
Scalable and performance-efficient client honeypot on high interaction system
M Akiyama, Y Kawakoya, T Hariu
2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet …, 2012
242012
Building stack traces from memory dump of Windows x64
Y Otsuki, Y Kawakoya, M Iwamura, J Miyoshi, K Ohkubo
Digital Investigation 24, S101-S110, 2018
222018
Stealth loader: Trace-free program loading for API obfuscation
Y Kawakoya, E Shioji, Y Otsuki, M Iwamura, T Yada
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
202017
Api chaser: Taint-assisted sandbox for evasive malware analysis
Y Kawakoya, E Shioji, M Iwamura, J Miyoshi
Journal of Information Processing 27, 297-314, 2019
162019
アナライジング・マルウェア: フリーツールを使った感染事案対処
新井
(No Title), 2010
92010
半透性仮想インターネットによるマルウェアの動的解析
青木一史, 川古谷裕平, 岩村誠, 伊藤光恭
コンピュータセキュリティシンポジウム 2009 (CSS2009) 論文集 2009, 1-6, 2011
82011
能動的攻撃と受動的攻撃に関する調査および考察
青木一史, 川古谷裕平, 秋山満昭, 岩村誠, 針生剛男, 伊藤光恭
情報処理学会論文誌 50 (9), 2147-2162, 2009
72009
Marionette: Client honeypot for investigating and understanding web-based malware infection on implicatedwebsites
A Mitsuaki
2009 Joint Workshop on Information Security, 2009
72009
アナライジング・マルウェア
新井悠, 岩村誠, 川古谷裕平, 青木一史, 星澤裕二
オライリー・ジャパン, 42-48, 2010
62010
Taint-assisted IAT Reconstruction against Position Obfuscation
Y Kawakoya, M Iwamura, J Miyoshi
Journal of Information Processing 26, 813-824, 2018
52018
テイント伝搬に基づく解析対象コードの追跡方法
川古谷裕平, 岩村誠, 針生剛男
情報処理学会論文誌 54 (8), 2079-2089, 2013
52013
クライアントハニーポットを用いた Web 感染型マルウェアの実態調査
秋山満昭
CSS2008, 10 月, 2008
52008
Ropminer: Learning-based static detection of rop chain considering linkability of rop gadgets
T Usui, T Ikuse, Y Otsuki, Y Kawakoya, M Iwamura, J Miyoshi, K Matsuura
IEICE TRANSACTIONS on Information and Systems 103 (7), 1476-1492, 2020
42020
My script engines know what you did in the dark: Converting engines into script API tracers
T Usui, Y Otsuki, Y Kawakoya, M Iwamura, J Miyoshi, K Matsuura
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
42019
Toward the Analysis of Distributed Code Injection in Post-mortem Forensics
Y Otsuki, Y Kawakoya, M Iwamura, J Miyoshi, J Faires, T Lillard
Advances in Information and Computer Security: 14th International Workshop …, 2019
42019
The system can't perform the operation now. Try again later.
Articles 1–20