Yuichiro Kanzaki
Yuichiro Kanzaki
National Institute of Technology, Kumamoto College
Verified email at kumamoto-nct.ac.jp
TitleCited byYear
Exploiting self-modification mechanism for program protection
Y Kanzaki, A Monden, M Nakamura, K Matsumoto
Proceedings 27th Annual International Computer Software and Applications …, 2003
902003
Queue-based cost evaluation of mental simulation process in program comprehension
M Nakamura, A Monden, T Itoh, K Matsumoto, Y Kanzaki, H Satoh
Proceedings. 5th International Workshop on Enterprise Networking and …, 2004
202004
Software obfuscation from crackers' viewpoint.
H Yamauchi, Y Kanzaki, A Monden, M Nakamura, K Matsumoto
ACST, 286-291, 2006
192006
A software protection method based on instruction camouflage
Y Kanzaki, A Monden, M Nakamura, KI Matsumoto
Electronics and Communications in Japan (Part III: Fundamental Electronic …, 2006
192006
A goal-oriented approach to software obfuscation
A Monden, M Nakamura, H Tamada
IJCSNS 8 (9), 59, 2008
142008
Code Artificiality: A Metric for the Code Stealth Based on an N-gram Model
Y Kanzaki, A Monden, C Collberg
1st International Workshop on Software Protection (SPRO 2015), 31-37, 2015
92015
Protecting secret information in software processes and products
Y Kanzaki
Ph. D. dissertation, Nara Institute of Science and Technology, 2006
62006
A software protection method based on time-sensitive code and self-modification mechanism
Y Kanzaki, A Monden
Proceedings of the IASTED International Conference, 2010
52010
Characterizing dynamics of information leakage in security-sensitive software process
Y Kanzaki, H Igaki, M Nakamura, A Monden, K Matsumoto
Proceedings of the 2005 Australasian workshop on Grid computing and e …, 2005
32005
Pinpointing and hiding surprising fragments in an obfuscated program
Y Kanzaki, C Thomborson, A Monden, C Collberg
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 8, 2015
12015
Evaluation of Software Obfuscation Based on the Randomness of Instructions.
A Futamura, A Monden, H Tamada, Y Kanzaki, M Nakamura, ...
Computer Software 30 (3), 18-24, 2013
12013
Quantitative analysis of information leakage in security-sensitive software processes
Y Kanzaki, H Igaki, M Nakamura, A Monden, K Matsumoto
Information and Media Technologies 1 (1), 121-133, 2006
12006
Quantitative Analysis of Information Leakage in Security-Sensitive Software Processes
Y Kanzaki, H Igaki, M Nakamura, A Monden, K Matsumoto
IPSJ Digital Courier 1, 322-334, 2005
12005
Java クラスファイルからプログラム指紋を抽出する方法の提案
玉田春昭, 神崎雄一郎, 中村匡秀, 門田暁人, 松本健一
情報処理学会研究報告コンピュータセキュリティ (CSEC) 2003 (74 (2003-CSEC-022)), 127-133, 2003
12003
An Instruction Folding Method to Prevent Reverse Engineering in Java Platform
T Ohdo, H Tamada, Y Kanzaki, A Monden
2013 14th ACIS International Conference on Software Engineering, Artificial …, 2013
2013
危険管理とリスク管理
K Yuichiro, I Hiroshi, N Masahide, M Akito
情報処理学会論文誌 46 (8), 2129-2141, 2005
2005
The system can't perform the operation now. Try again later.
Articles 1–16