Follow
Katsunari Yoshioka
Katsunari Yoshioka
Verified email at ynu.ac.jp
Title
Cited by
Cited by
Year
{IoTPOT}: analysing the rise of {IoT} compromises
YMP Pa, S Suzuki, K Yoshioka, T Matsumoto, T Kasama, C Rossow
9th USENIX Workshop on Offensive Technologies (WOOT 15), 2015
4712015
IoTPOT: A novel honeypot for revealing current IoT threats
YMP Pa, S Suzuki, K Yoshioka, T Matsumoto, T Kasama, C Rossow
Journal of Information Processing 24 (3), 522-533, 2016
2822016
Amppot: Monitoring and defending against amplification ddos attacks
L Krämer, J Krupp, D Makita, T Nishizoe, T Koide, K Yoshioka, C Rossow
Research in Attacks, Intrusions, and Defenses: 18th International Symposium …, 2015
1542015
A method of preventing unauthorized data transmission in controller area network
T Matsumoto, M Hata, M Tanabe, K Yoshioka, K Oishi
2012 IEEE 75th Vehicular Technology Conference (VTC Spring), 1-5, 2012
1262012
Sandprint: Fingerprinting malware sandboxes to provide intelligence for sandbox evasion
A Yokoyama, K Ishii, R Tanabe, Y Papa, K Yoshioka, T Matsumoto, ...
Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016
1122016
nicter: An incident analysis system toward binding network monitoring with malware analysis
D Inoue, M Eto, K Yoshioka, S Baba, K Suzuki, J Nakazato, K Ohtaka, ...
2008 WOMBAT Workshop on Information Security Threats Data Collection and …, 2008
1002008
Message authentication method in communication system and communication system
H Oguma, T Matsumoto, M Hata, M Tanabe, K Yoshioka, K Oishi
US Patent 9,331,854, 2016
802016
Malware behavior analysis in isolated miniature network for revealing malware's network activity
D Inoue, K Yoshioka, M Eto, Y Hoshizawa, K Nakao
2008 IEEE International Conference on Communications, 1715-1721, 2008
662008
Automated malware analysis system and its sandbox for revealing malware's internal and external activities
D Inoue, K Yoshioka, M Eto, Y Hoshizawa, K Nakao
IEICE transactions on information and systems 92 (5), 945-954, 2009
642009
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.
O Çetin, C Ganán, L Altena, T Kasama, D Inoue, K Tamiya, Y Tie, ...
NDSS, 2019
632019
Practical correlation analysis between scan and malware profiles against zero-day attacks based on darknet monitoring
K Nakao, D Inoue, M Eto, K Yoshioka
IEICE TRANSACTIONS on Information and Systems 92 (5), 787-798, 2009
562009
Who gets the boot? analyzing victimization by ddos-as-a-service
A Noroozian, M Korczyński, CH Gañan, D Makita, K Yoshioka, ...
Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016
542016
On the origin of scanning: The impact of location on internet-wide scans
G Wan, L Izhikevich, D Adrian, K Yoshioka, R Holz, C Rossow, ...
Proceedings of the ACM Internet Measurement Conference, 662-679, 2020
472020
A novel concept of network incident analysis based on multi-layer observations of malware activities
K Nakao, K Yoshioka, D Inoue, M Eto
The 2nd Joint Workshop on Information Security (JWIS07), 267-279, 2007
412007
Detect me if you… oh wait. An internet-wide view of self-revealing honeypots
S Morishita, T Hoizumi, W Ueno, R Tanabe, C Gañán, MJG Van Eeten, ...
2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2019
392019
An incident analysis system NICTER and its analysis engines based on data mining techniques
D Inoue, K Yoshioka, M Eto, M Yamagata, E Nishino, J Takeuchi, ...
Advances in Neuro-Information Processing: 15th International Conference …, 2009
352009
Your sandbox is blinded: Impact of decoy injection to public malware analysis systems
K Yoshioka, Y Hosobuchi, T Orii, T Matsumoto
Information and Media Technologies 6 (2), 633-648, 2011
322011
Multi-pass malware sandbox analysis with controlled internet connection
K Yoshioka, T Matsumoto
IEICE transactions on fundamentals of electronics, communications and …, 2010
282010
Disposable botnets: examining the anatomy of iot botnet infrastructure
R Tanabe, T Tamai, A Fujita, R Isawa, K Yoshioka, T Matsumoto, C Gañán, ...
Proceedings of the 15th International Conference on Availability …, 2020
242020
Designing comprehensive cyber threat analysis platform: Can we orchestrate analysis engines?
T Takahashi, Y Umemura, C Han, T Ban, K Furumoto, O Nakamura, ...
2021 IEEE International Conference on Pervasive Computing and Communications …, 2021
232021
The system can't perform the operation now. Try again later.
Articles 1–20