Bitvisor: a thin hypervisor for enforcing i/o device security T Shinagawa, H Eiraku, K Tanimoto, K Omote, S Hasegawa, T Horie, ... Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on …, 2009 | 344 | 2009 |
Improving agility and elasticity in bare-metal clouds Y Omote, T Shinagawa, K Kato Proceedings of the Twentieth International Conference on Architectural …, 2015 | 36 | 2015 |
Detecting malware signatures in a thin hypervisor Y Oyama, TTD Giang, Y Chubachi, T Shinagawa, K Kato Proceedings of the 27th Annual ACM Symposium on Applied Computing, 1807-1814, 2012 | 30 | 2012 |
Hypervisor-based prevention of persistent rootkits Y Chubachi, T Shinagawa, K Kato Proceedings of the 2010 ACM Symposium on Applied Computing, 214-220, 2010 | 29 | 2010 |
拡張コンポーネントのためのカーネルによる細粒度軽量保護ドメインの実現 品川高廣, 河野健二, 高橋雅彦, 益田隆司 情報処理学会論文誌 40 (6), 2596-2606, 1999 | 25 | 1999 |
Introducing role-based access control to a secure virtual machine monitor: security policy enforcement mechanism for distributed computers M Hirano, T Shinagawa, H Eiraku, S Hasegawa, K Omote, K Tanimoto, ... 2008 IEEE Asia-Pacific Services Computing Conference, 1225-1230, 2008 | 20 | 2008 |
High-accuracy malware classification with a malware-optimized deep learning model R Mitsuhashi, T Shinagawa arXiv preprint arXiv:2004.05258, 2020 | 19 | 2020 |
Identifying malicious dns tunnel tools from doh traffic using hierarchical machine learning classification R Mitsuhashi, A Satoh, Y Jin, K Iida, T Shinagawa, Y Takai Information Security: 24th International Conference, ISC 2021, Virtual Event …, 2021 | 18 | 2021 |
Live migration in bare-metal clouds T Fukai, T Shinagawa, K Kato IEEE Transactions on Cloud Computing 9 (1), 226-239, 2018 | 18 | 2018 |
Flexible and efficient sandboxing based on fine-grained protection domains T Shinagawa, K Kono, T Masuda International Symposium on Software Security, 172-184, 2002 | 17 | 2002 |
Malicious DNS tunnel tool recognition using persistent DoH traffic analysis R Mitsuhashi, Y Jin, K Iida, T Shinagawa, Y Takai IEEE Transactions on Network and Service Management 20 (2), 2086-2095, 2022 | 16 | 2022 |
OS-independent live migration scheme for bare-metal clouds T Fukai, Y Omote, T Shinagawa, K Kato 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing …, 2015 | 14 | 2015 |
{CAP-VMs}:{Capability-Based} Isolation and Sharing in the Cloud VA Sartakov, L Vilanova, D Eyers, T Shinagawa, P Pietzuch 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2022 | 13 | 2022 |
A two-step execution mechanism for thin secure hypervisors M Hirano, T Shinagawa, H Eiraku, S Hasegawa, K Omote, K Tanimoto, ... 2009 Third International Conference on Emerging Security Information …, 2009 | 12 | 2009 |
Exploiting segmentation mechanism for protecting against malicious mobile code T Shinagawa, K Kono, T Masuda University of Tokyo. Department of Information Science, 2000 | 12 | 2000 |
The quick migration of file servers K Matsuzawa, M Hayasaka, T Shinagawa Proceedings of the 11th ACM International Systems and Storage Conference, 65-75, 2018 | 10 | 2018 |
Reducing security policy size for internet servers in secure operating systems T Yokoyama, M Hanaoka, M Shimamura, K Kono, T Shinagawa IEICE transactions on information and systems 92 (11), 2196-2206, 2009 | 10 | 2009 |
Fine-grained protection domain based on segmentation mechanism T Shinagawa, K Kono, T Masuda Japan Society for Software Science and Technology, 2000 | 10 | 2000 |
Hypervisor-based background encryption Y Omote, Y Chubachi, T Shinagawa, T Kitamura, H Eiraku, K Matsubara Proceedings of the 27th Annual ACM Symposium on Applied Computing, 1829-1836, 2012 | 9 | 2012 |
Transparent VPN failure recovery with virtualization Y Matsuhashi, T Shinagawa, Y Ishii, N Hirooka, K Kato Future Generation Computer Systems 28 (1), 78-84, 2012 | 9 | 2012 |