CS Store Search
Displaying 1-5 out of 5 total
Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious URLs
By Mitsuaki Akiyama,Takeshi Yagi,Takeo Hariu
Issue Date:July 2013
Filtering based on blacklists is a major countermeasure against malicious websites. However, blacklists must be updated because malicious URLs tend to be short-lived, and they can be partially mutated to avoid blacklisting. Due to these characteristics, it...
Scalable and Performance-Efficient Client Honeypot on High Interaction System
2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet (SAINT)
By Mitsuaki Akiyama,Yuhei Kawakoya,Takeo Hariu
Issue Date:July 2012
We investigated client honeypots for detecting and circumstantially analyzing drive-by download attacks. A client honeypot requires both improved inspection performance and in-depth analysis for inspecting and discovering malicious websites. However, OS ov...
Enhanced attack collection scheme on high-interaction web honeypots
Computers and Communications, IEEE Symposium on
By Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh
Issue Date:June 2010
Vulnerabilities in web applications expose computer networks to security threats. In fact, a large number of websites are used by attackers as hopping sites for attacking other websites and user terminals. These incidents prevent service providers from con...
An Experimental Study of Logical Office service over International ATM Networks
Local Computer Networks, Annual IEEE Conference on
By Hiroyuki Fujii, Shigeaki Tanimoto, Takeo Hariu, Hirohisa Miyashiro, Linda Galasso
Issue Date:November 1997
Recently, demand for mobile computing environments has been increasing great ly, and easy access from remote sites has become desirable. To meet this requirement, NTT has proposed a J Logical Office( J service, which enables terminal plug & play, multi...
Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks
Found in: Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC '12)
By Eitaro Shioji, Makoto Iwamura, Takeo Hariu, Yuhei Kawakoya
Issue Date:December 2012
Code-reuse attacks by corrupting memory address pointers have been a major threat of software for many years. There have been numerous defenses proposed for countering this threat, but majority of them impose strict restrictions on software deployment such...
Original Search Engine
Need a Web Account?
Become a Member
This site and all contents (unless otherwise noted) are Copyright ©2008, IEEE, Inc. All rights reserved.