What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Katsunari Yoshioka
Google Scholar
15
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/asiaccs
Bits and Pieces: Piecing Together Factors of IoT Vulnerability Exploitation.
Arwa Abdulkarim Al Alsadi
Mathew Vermeer
Takayuki Sasaki
Katsunari Yoshioka
Michel van Eeten
Carlos Gañán
2025
conf/uss
Am I Infected? Lessons from Operating a Large-Scale IoT Security Diagnostic Service.
Takayuki Sasaki
Tomoya Inazawa
Youhei Yamaguchi
Simon Parkin
Michel van Eeten
Katsunari Yoshioka
Tsutomu Matsumoto
2024
conf/sp
Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network.
Takayuki Sasaki
Takaya Noma
Yudai Morii
Toshiya Shimura
Michel van Eeten
Katsunari Yoshioka
Tsutomu Matsumoto
2023
conf/uss
An Attacker's Dream? Exploring the Capabilities of ChatGPT for Developing Malware.
Yin Minn Pa Pa
Shunsuke Tanizaki
Tetsui Kou
Michel van Eeten
Katsunari Yoshioka
Tsutomu Matsumoto
2023
conf/esorics
Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks.
Radu Anghel
Swaathi Vetrivel
Elsa Turcios Rodriguez
Kaichi Sameshima
Daisuke Makita
Katsunari Yoshioka
Carlos Gañán
Yury Zhauniarovich
2022
conf/asiajcis
SPOT: Analyzing IoT Ransomware Attacks using Bare Metal NAS Devices.
Hiroki Yasui
Takahiro Inoue
Takayuki Sasaki
Rui Tanabe
Katsunari Yoshioka
Tsutomu Matsumoto
2022
conf/sp
Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.
Takayuki Sasaki
Akira Fujita
Carlos Hernandez Gañán
Michel van Eeten
Katsunari Yoshioka
Tsutomu Matsumoto
2022
conf/asiaccs
No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis.
Arwa Abdulkarim Al Alsadi
Kaichi Sameshima
Jakob Bleier
Katsunari Yoshioka
Martina Lindorfer
Michel van Eeten
Carlos Hernandez Gañán
2020
conf/uss
APTGen: An Approach towards Generating Practical Dataset Labelled with Targeted Attack Sequences.
Yusuke Takahashi
Shigeyoshi Shima
Rui Tanabe
Katsunari Yoshioka
2019
conf/ndss
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.
Orçun Çetin
Carlos Gañán
Lisette Altena
Takahiro Kasama
Daisuke Inoue
Kazuki Tamiya
Ying Tie
Katsunari Yoshioka
Michel van Eeten
2018
conf/asiajcis
Evaluating Disassembly-Code Based Similarity between IoT Malware Samples.
Ryoichi Isawa
Tao Ban
Ying Tie
Katsunari Yoshioka
Daisuke Inoue
2016
conf/uss
Evaluating Malware Mitigation by Android Market Operators.
Yosuke Kikuchi
Hiroshi Mori
Hiroki Nakano
Katsunari Yoshioka
Tsutomu Matsumoto
Michel van Eeten
2016
conf/asiajcis
Wamber: Defending Web Sites on Hosting Services with Self-Learning Honeypots.
Satomi Saito
Satoru Torii
Katsunari Yoshioka
Tsutomu Matsumoto
2015
conf/icisc
Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection.
Jiawei Su
Katsunari Yoshioka
Junji Shikata
Tsutomu Matsumoto
2013
conf/asiajcis
Search Engine Based Investigation on Misconfiguration of Zone Transfer.
Yin Minn Pa Pa
Katsunari Yoshioka
Tsutomu Matsumoto
Coauthors
Akira Fujita
(1)
Arwa Abdulkarim Al Alsadi
(2)
Carlos Gañán
(3)
Carlos Hernandez Gañán
(2)
Daisuke Inoue
(2)
Daisuke Makita
(1)
Elsa Turcios Rodriguez
(1)
Hiroki Nakano
(1)
Hiroki Yasui
(1)
Hiroshi Mori
(1)
Jakob Bleier
(1)
Jiawei Su
(1)
Junji Shikata
(1)
Kaichi Sameshima
(2)
Katsunari Yoshioka
(15)
Kazuki Tamiya
(1)
Lisette Altena
(1)
Martina Lindorfer
(1)
Mathew Vermeer
(1)
Michel van Eeten
(8)
Orçun Çetin
(1)
Radu Anghel
(1)
Rui Tanabe
(2)
Ryoichi Isawa
(1)
Satomi Saito
(1)
Satoru Torii
(1)
Shigeyoshi Shima
(1)
Shunsuke Tanizaki
(1)
Simon Parkin
(1)
Swaathi Vetrivel
(1)
Takahiro Inoue
(1)
Takahiro Kasama
(1)
Takaya Noma
(1)
Takayuki Sasaki
(5)
Tao Ban
(1)
Tetsui Kou
(1)
Tomoya Inazawa
(1)
Toshiya Shimura
(1)
Tsutomu Matsumoto
(9)
Yin Minn Pa Pa
(2)
Ying Tie
(2)
Yosuke Kikuchi
(1)
Youhei Yamaguchi
(1)
Yudai Morii
(1)
Yury Zhauniarovich
(1)
Yusuke Takahashi
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to