{IoTPOT}: analysing the rise of {IoT} compromises YMP Pa, S Suzuki, K Yoshioka, T Matsumoto, T Kasama, C Rossow 9th USENIX Workshop on Offensive Technologies (WOOT 15), 2015 | 504 | 2015 |
IoTPOT: A novel honeypot for revealing current IoT threats YMP Pa, S Suzuki, K Yoshioka, T Matsumoto, T Kasama, C Rossow Journal of Information Processing 24 (3), 522-533, 2016 | 312 | 2016 |
Amppot: Monitoring and defending against amplification ddos attacks L Krämer, J Krupp, D Makita, T Nishizoe, T Koide, K Yoshioka, C Rossow Research in Attacks, Intrusions, and Defenses: 18th International Symposium …, 2015 | 170 | 2015 |
A method of preventing unauthorized data transmission in controller area network T Matsumoto, M Hata, M Tanabe, K Yoshioka, K Oishi 2012 IEEE 75th Vehicular Technology Conference (VTC Spring), 1-5, 2012 | 130 | 2012 |
Sandprint: Fingerprinting malware sandboxes to provide intelligence for sandbox evasion A Yokoyama, K Ishii, R Tanabe, Y Papa, K Yoshioka, T Matsumoto, ... Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016 | 122 | 2016 |
nicter: An incident analysis system toward binding network monitoring with malware analysis D Inoue, M Eto, K Yoshioka, S Baba, K Suzuki, J Nakazato, K Ohtaka, ... 2008 WOMBAT Workshop on Information Security Threats Data Collection and …, 2008 | 99 | 2008 |
Message authentication method in communication system and communication system H Oguma, T Matsumoto, M Hata, M Tanabe, K Yoshioka, K Oishi US Patent 9,331,854, 2016 | 82 | 2016 |
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai. O Çetin, C Ganán, L Altena, T Kasama, D Inoue, K Tamiya, Y Tie, ... NDSS, 2019 | 78 | 2019 |
Malware behavior analysis in isolated miniature network for revealing malware's network activity D Inoue, K Yoshioka, M Eto, Y Hoshizawa, K Nakao 2008 IEEE International Conference on Communications, 1715-1721, 2008 | 67 | 2008 |
Automated malware analysis system and its sandbox for revealing malware's internal and external activities D Inoue, K Yoshioka, M Eto, Y Hoshizawa, K Nakao IEICE transactions on information and systems 92 (5), 945-954, 2009 | 65 | 2009 |
On the origin of scanning: The impact of location on internet-wide scans G Wan, L Izhikevich, D Adrian, K Yoshioka, R Holz, C Rossow, ... Proceedings of the ACM Internet Measurement Conference, 662-679, 2020 | 62 | 2020 |
Who gets the boot? analyzing victimization by ddos-as-a-service A Noroozian, M Korczyński, CH Gañan, D Makita, K Yoshioka, ... Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016 | 60 | 2016 |
An attacker’s dream? exploring the capabilities of chatgpt for developing malware YM Pa Pa, S Tanizaki, T Kou, M Van Eeten, K Yoshioka, T Matsumoto Proceedings of the 16th Cyber Security Experimentation and Test Workshop, 10-18, 2023 | 58 | 2023 |
Practical correlation analysis between scan and malware profiles against zero-day attacks based on darknet monitoring K Nakao, D Inoue, M Eto, K Yoshioka IEICE TRANSACTIONS on Information and Systems 92 (5), 787-798, 2009 | 56 | 2009 |
Detect me if you… oh wait. An internet-wide view of self-revealing honeypots S Morishita, T Hoizumi, W Ueno, R Tanabe, C Gañán, MJG Van Eeten, ... 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2019 | 44 | 2019 |
Exposed infrastructures: Discovery, attacks and remediation of insecure ics remote management devices T Sasaki, A Fujita, CH Gañán, M van Eeten, K Yoshioka, T Matsumoto 2022 IEEE Symposium on Security and Privacy (SP), 2379-2396, 2022 | 40 | 2022 |
A novel concept of network incident analysis based on multi-layer observations of malware activities K Nakao, K Yoshioka, D Inoue, M Eto The 2nd Joint Workshop on Information Security (JWIS07), 267-279, 2007 | 40 | 2007 |
An incident analysis system NICTER and its analysis engines based on data mining techniques D Inoue, K Yoshioka, M Eto, M Yamagata, E Nishino, J Takeuchi, ... Advances in Neuro-Information Processing: 15th International Conference …, 2009 | 36 | 2009 |
Your sandbox is blinded: Impact of decoy injection to public malware analysis systems K Yoshioka, Y Hosobuchi, T Orii, T Matsumoto Information and Media Technologies 6 (2), 633-648, 2011 | 32 | 2011 |
Disposable botnets: examining the anatomy of IoT botnet infrastructure R Tanabe, T Tamai, A Fujita, R Isawa, K Yoshioka, T Matsumoto, C Gañán, ... Proceedings of the 15th International Conference on Availability …, 2020 | 27 | 2020 |