default search action
Hiroki Kuzuno
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Hiroki Kuzuno, Toshihiro Yamauchi:
Mitigation of privilege escalation attack using kernel data relocation mechanism. Int. J. Inf. Sec. 23(5): 3351-3367 (2024) - [j14]Shuhei Enomoto, Hiroki Kuzuno, Hiroshi Yamada, Yoshiaki Shiraishi, Masakatu Morii:
Early mitigation of CPU-optimized ransomware using monitoring encryption instructions. Int. J. Inf. Sec. 23(5): 3393-3413 (2024) - [j13]Tomohiko Yano, Hiroki Kuzuno:
Visualization Method for Open Source Software Risk Related to Vulnerability and Developmental Status Considering Dependencies. J. Inf. Process. 32: 767-778 (2024) - [c20]Hiroki Kuzuno, Toshihiro Yamauchi:
kdMonitor: Kernel Data Monitor for Detecting Kernel Memory Corruption. DSC 2024: 66-73 - [c19]Shunsuke Nakatani, Hiroki Kuzuno, Makoto Takita, Masami Mohri, Yoshiaki Shiraishi:
Can We Determine Whether a Set of Ethereum Transaction Data Contains Fraudulent Transactions? DSC 2024: 108-114 - [i2]Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii:
Breaktooth: Breaking Bluetooth Sessions Abusing Power-Saving Mode. IACR Cryptol. ePrint Arch. 2024: 900 (2024) - 2023
- [j12]Hiroki Kuzuno, Toshihiro Yamauchi:
Protection Mechanism of Kernel Data Using Memory Protection Key. IEICE Trans. Inf. Syst. 106(9): 1326-1338 (2023) - [j11]Tomohiko Yano, Hiroki Kuzuno, Kenichi Magata:
File Tracking and Visualization Methods Using a Network Graph to Prevent Information Leakage. IEICE Trans. Inf. Syst. 106(9): 1339-1353 (2023) - [j10]Hiroki Kuzuno, Toshihiro Yamauchi:
Identification of Vulnerable Kernel Code Using Kernel Tracing Mechanism. J. Inf. Process. 31: 788-801 (2023) - [c18]Tomohiko Yano, Hiroki Kuzuno:
Security Risk Visualization for Open-Source Software based on Vulnerabilities, Repositories, and Dependencies. candar 2023: 210-216 - [c17]Kaito Shiba, Hiroki Kuzuno, Toshihiro Yamauchi:
Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE. CANDARW 2023: 274-278 - [c16]Hiroki Kuzuno, Toshihiro Yamauchi:
KDRM: Kernel Data Relocation Mechanism to Mitigate Privilege Escalation Attack. NSS 2023: 61-76 - [c15]Hiroki Kuzuno, Tomohiko Yano, Kazuki Omo, Jeroen van der Ham, Toshihiro Yamauchi:
Security Risk Indicator for Open Source Software to Measure Software Development Status. WISA 2023: 143-156 - [e1]Junji Shikata, Hiroki Kuzuno:
Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023, Yokohama, Japan, August 29-31, 2023, Proceedings. Lecture Notes in Computer Science 14128, Springer 2023, ISBN 978-3-031-41325-4 [contents] - 2022
- [j9]Shuhei Enomoto, Hiroki Kuzuno, Hiroshi Yamada:
Efficient Protection Mechanism for CPU Cache Flush Instruction Based Attacks. IEICE Trans. Inf. Syst. 105-D(11): 1890-1899 (2022) - [j8]Hiroki Kuzuno, Toshihiro Yamauchi:
Prevention of Kernel Memory Corruption Using Kernel Page Restriction Mechanism. J. Inf. Process. 30: 563-576 (2022) - [j7]Hiroki Kuzuno, Toshihiro Yamauchi:
Mitigating Foreshadow Side-channel Attack Using Dedicated Kernel Memory Mechanism. J. Inf. Process. 30: 796-806 (2022) - [j6]Naoto Yoshimura, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii:
DOC-IDS: A Deep Learning-Based Method for Feature Extraction and Anomaly Detection in Network Traffic. Sensors 22(12): 4405 (2022) - [c14]Tomohiko Yano, Hiroki Kuzuno, Kenichi Magata:
Constructing a Network Graph of File Tracking Results Against Information Leakage. AsiaJCIS 2022: 8-15 - [c13]Hiroki Kuzuno, Toshihiro Yamauchi:
KDPM: Kernel Data Protection Mechanism Using a Memory Protection Key. IWSEC 2022: 66-84 - [c12]Hiroki Kuzuno, Toshihiro Yamauchi:
vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel Vulnerability. WISA 2022: 222-234 - 2021
- [j5]Hiroki Kuzuno, Toshihiro Yamauchi:
Mitigation of Kernel Memory Corruption Using Multiple Kernel Memory Mechanism. IEEE Access 9: 111651-111665 (2021) - [c11]Shuhei Enomoto, Hiroki Kuzuno:
FlushBlocker: Lightweight mitigating mechanism for CPU cache flush instruction based attacks. EuroS&P Workshops 2021: 74-79 - [c10]Hiroki Kuzuno, Toshihiro Yamauchi:
KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption. IWSEC 2021: 45-63 - 2020
- [j4]Hiroki Kuzuno, Toshihiro Yamauchi:
Identification of Kernel Memory Corruption Using Kernel Memory Secret Observation Mechanism. IEICE Trans. Inf. Syst. 103-D(7): 1462-1475 (2020) - [c9]Hiroki Kuzuno, Toshihiro Yamauchi:
MKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption. IWSEC 2020: 97-116
2010 – 2019
- 2019
- [c8]Hiroki Kuzuno, Toshihiro Yamauchi:
KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism. ISPEC 2019: 75-94 - 2018
- [j3]Hiroki Kuzuno, Giannis Tziakouris:
Ad-hoc Analytical Framework of Bitcoin Investigations for Law Enforcement. IEICE Trans. Inf. Syst. 101-D(11): 2644-2657 (2018) - [c7]Hiroki Kuzuno, Shintaro Otsuka:
Early Detection of Network Incident Using Open Security Information. AINA Workshops 2018: 18-23 - [c6]Hiroki Kuzuno, Shun Inagaki, Kenichi Magata:
Constructing a Complete Timeline of a Security Incident by Aggregating Reports. AsiaJCIS 2018: 109-115 - 2017
- [c5]Hiroki Kuzuno, Christian Karam:
Blockchain explorer: An analytical process and investigation environment for bitcoin. eCrime 2017: 9-16 - [c4]Gongxian Zeng, Siu-Ming Yiu, Jun Zhang, Hiroki Kuzuno, Man Ho Au:
A Nonoutsourceable Puzzle Under GHOST Rule. PST 2017: 35-43 - 2016
- [j2]Hiroki Kuzuno, Kenichi Magata:
Detecting and characterising of mobile advertisement network traffic using graph modelling. Int. J. Space Based Situated Comput. 6(2): 90-101 (2016) - 2015
- [j1]Hiroki Kuzuno, Satoshi Tonami:
Detection of sensitive information leakage in Android applications using signature generation. Int. J. Space Based Situated Comput. 5(1): 53-62 (2015) - 2014
- [c3]Hiroki Kuzuno, Kenichi Magata:
Detecting Advertisement Module Network Behavior with Graph Modeling. AsiaJCIS 2014: 1-10 - 2013
- [c2]Hiroki Kuzuno, Satoshi Tonami:
Signature generation for sensitive information leakage in android applications. ICDE Workshops 2013: 112-119 - [i1]Hiroki Kuzuno, Satoshi Tonami:
Signature Generation for Sensitive Information Leakage in Android Applications. CoRR abs/1305.4045 (2013)
2000 – 2009
- 2006
- [c1]Takashi Katoh, Hiroki Kuzuno, Takuya Kawahara, Atsumu Watanabe, Yushi Nakai, Bhed Bahadur Bista, Toyoo Takata:
AWide Area Log Analyzing System Based on Mobile Agents. CIMCA/IAWTIC 2006: 26
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-17 21:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint