Search For:

Displaying 1-5 out of 5 total
Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious URLs
Found in: IT Professional
By Mitsuaki Akiyama,Takeshi Yagi,Takeo Hariu
Issue Date:July 2013
pp. 50-56
Filtering based on blacklists is a major countermeasure against malicious websites. However, blacklists must be updated because malicious URLs tend to be short-lived, and they can be partially mutated to avoid blacklisting. Due to these characteristics, it...
Scalable and Performance-Efficient Client Honeypot on High Interaction System
Found in: 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet (SAINT)
By Mitsuaki Akiyama,Yuhei Kawakoya,Takeo Hariu
Issue Date:July 2012
pp. 40-50
We investigated client honeypots for detecting and circumstantially analyzing drive-by download attacks. A client honeypot requires both improved inspection performance and in-depth analysis for inspecting and discovering malicious websites. However, OS ov...
Enhanced attack collection scheme on high-interaction web honeypots
Found in: Computers and Communications, IEEE Symposium on
By Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh
Issue Date:June 2010
pp. 81-86
Vulnerabilities in web applications expose computer networks to security threats. In fact, a large number of websites are used by attackers as hopping sites for attacking other websites and user terminals. These incidents prevent service providers from con...
An Experimental Study of Logical Office service over International ATM Networks
Found in: Local Computer Networks, Annual IEEE Conference on
By Hiroyuki Fujii, Shigeaki Tanimoto, Takeo Hariu, Hirohisa Miyashiro, Linda Galasso
Issue Date:November 1997
pp. 530
Recently, demand for mobile computing environments has been increasing great ly, and easy access from remote sites has become desirable. To meet this requirement, NTT has proposed a J Logical Office( J service, which enables terminal plug & play, multi...
Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks
Found in: Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC '12)
By Eitaro Shioji, Makoto Iwamura, Takeo Hariu, Yuhei Kawakoya
Issue Date:December 2012
pp. 309-318
Code-reuse attacks by corrupting memory address pointers have been a major threat of software for many years. There have been numerous defenses proposed for countering this threat, but majority of them impose strict restrictions on software deployment such...