Name
Affiliation
Papers
TOSHIHIRO YAMAUCHI
Okayama Univ, Okayama, Japan
26
Collaborators
Citations 
PageRank 
38
17
9.39
Referers 
Referees 
References 
45
371
146
Search Limit
100371
Title
Citations
PageRank
Year
Additional Kernel Observer: Privilege Escalation Attack Prevention Mechanism Focusing On System Call Privilege Changes00.342021
Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM00.342020
Access Control Mechanism to Mitigate Cordova Plugin Attacks in Hybrid Applications.00.342018
Mitigating Use-after-Free Attack Using Library Considering Size and Number of Freed Memory00.342018
Hiding File Manipulation of Essential Services by System Call Proxy.00.342018
Acceleration of Analysis Processing on Decentralized Performance Profiling System Using Virtual Machines00.342018
Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes00.342018
Editor's Message to Special Issue of Computer Security Technologies against Sophisticated Cyber Attacks.00.342017
Performance Improvement and Evaluation of Function for Tracing Diffusion of Classified Information on KVM00.342017
Kernel Rootkits Detection Method By Monitoring Branches Using Hardware Features10.372017
Mitigating Use-After-Free Attacks Using Memory-Reuse-Prohibited Library10.402017
Plate: persistent memory management for nonvolatile main memory.00.342016
HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks.30.442016
Rule-Based Sensor Data Aggregation System For M2m Gateways10.392016
Design of Function for Tracing Diffusion of Classified Information for IPC on KVM.00.342016
Evaluation and design of function for tracing diffusion of classified information for file operations with KVM.10.352016
Memory Access Monitoring And Disguising Of Process Information To Avoid Attacks To Essential Services00.342016
Attacker Investigation System Triggered by Information Leakage00.342015
Proposal Of Kernel Rootkits Detection Method By Monitoring Branches Using Hardware Features10.382015
Reducing Resource Consumption of SELinux for Embedded Systems with Contributions to Open-Source Ecosystems.00.342015
Process Hiding by Virtual Machine Monitor for Attack Avoidance.20.412015
Fast Control Method Of Software-Managed Tlb For Reducing Zero-Copy Communication Overhead00.342015
Access Control To Prevent Malicious Javascript Code Exploiting Vulnerabilities Of Webview In Android Os30.472015
CSDA: Rule-based complex sensor data aggregation system for M2M gateway20.382015
Complicating Process Identification by Replacing Process Information for Attack Avoidance.00.342014
Access Control to Prevent Attacks Exploiting Vulnerabilities of WebView in Android OS20.382013