Follow
Yoshihiro Oyama
Title
Cited by
Cited by
Year
Bitvisor: a thin hypervisor for enforcing i/o device security
T Shinagawa, H Eiraku, K Tanimoto, K Omote, S Hasegawa, T Horie, ...
Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on …, 2009
3432009
Load-based covert channels between xen virtual machines
K Okamura, Y Oyama
Proceedings of the 2010 ACM Symposium on Applied Computing, 173-180, 2010
1222010
Malware analysis of imaged binary samples by convolutional neural network with attention mechanism
H Yakura, S Shinozaki, R Nishimura, Y Oyama, J Sakuma
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
1102018
Anomaly detection using layered networks based on eigen co-occurrence matrix
M Oka, Y Oyama, H Abe, K Kato
Recent Advances in Intrusion Detection: 7th International Symposium, RAID …, 2004
1062004
Software safety execution system
K Kato, Y Oyama
US Patent 7,690,023, 2010
1052010
Executing Parallel Programs with Synchronization Bottlenecks Efficiently
Y Oyama, K Taura, A Yonezawa
Proceedings of International Workshop on Parallel and Distributed Computing …, 1999
1051999
A virtual machine migration system based on a CPU emulator
K Onoue, Y Oyama, A Yonezawa
First International Workshop on Virtualization Technology in Distributed …, 2006
722006
Softwarepot: An encapsulated transferable file system for secure software circulation
K Kato, Y Oyama
International Symposium on Software Security, 112-132, 2002
642002
Neural malware analysis with attention mechanism
H Yakura, S Shinozaki, R Nishimura, Y Oyama, J Sakuma
Computers & Security 87, 101592, 2019
532019
Trends of anti-analysis operations of malwares observed in API call logs
Y Oyama
Journal of Computer Virology and Hacking Techniques 14 (1), 69-85, 2018
472018
Eigen co-occurrence matrix method for masquerade detection
M Oka, Y Oyama, K Kato
Publications of the Japan Society for Software Science and Technology, 2004
382004
Control of system calls from outside of virtual machines
K Onoue, Y Oyama, A Yonezawa
Proceedings of the 2008 ACM symposium on Applied computing, 2116-1221, 2008
362008
Identifying useful features for malware detection in the ember dataset
Y Oyama, T Miyashita, H Kokubo
2019 seventh international symposium on computing and networking workshops …, 2019
332019
Detecting malware signatures in a thin hypervisor
Y Oyama, TTD Giang, Y Chubachi, T Shinagawa, K Kato
Proceedings of the 27th Annual ACM Symposium on Applied Computing, 1807-1814, 2012
292012
A virtual machine monitor for providing a single system image
K Kaneda, Y Oyama, A Yonezawa
URL http://web. yl. is. su-tokyo. ac. jp/∼ kaneda/dvm, 2005
282005
An efficient compilation framework for languages based on a concurrent process calculus
Y Oyama, K Taura, A Yonezawa
Euro-Par'97 Parallel Processing: Third International Euro-Par Conference …, 1997
271997
Optimizing local file accesses for FUSE-based distributed storage
S Ishiguro, J Murakami, Y Oyama, O Tatebe
2012 SC Companion: High Performance Computing, Networking Storage and …, 2012
262012
Malware analysis system using process-level virtualization
Y Adachi, Y Oyama
2009 IEEE Symposium on Computers and Communications, 550-556, 2009
262009
Online Computation of Critical Paths for Multithreaded Languages
Y Oyama, K Taura, A Yonezawa
Lecture Notes in Computer Science 1800, 301-313, 2000
202000
Gfarm/bb—gfarm file system for node-local burst buffer
O Tatebe, S Moriwake, Y Oyama
Journal of Computer Science and Technology 35, 61-71, 2020
162020
The system can't perform the operation now. Try again later.
Articles 1–20