Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks., , , and . ACSAC, page 309-318. ACM, (2012)API Chaser: Taint-Assisted Sandbox for Evasive Malware Analysis., , , and . J. Inf. Process., (2019)Analyzing the Use of Public and In-house Secure Development Guidelines in U.S. and Japanese Industries., , , and . CHI, page 187:1-187:17. ACM, (2023)Stealth Loader: Trace-Free Program Loading for API Obfuscation., , , , and . RAID, volume 10453 of Lecture Notes in Computer Science, page 217-237. Springer, (2017)1-day, 2 Countries - A Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States., , , , and . IEICE Trans. Inf. Syst., 103-D (7): 1524-1540 (2020)A Study on the Vulnerabilities of Mobiles Apps associated with Software Modules., , , , , , , , , and . CoRR, (2017)A Cross-role and Bi-national Analysis on Security Efforts and Constraints of Software Development Projects., , , and . ACSAC, page 349-364. ACM, (2021)Understanding the security management of global third-party Android marketplaces., , , , , , , , and . WAMA@ESEC/SIGSOFT FSE, page 12-18. ACM, (2017)I know what you did last login: inconsistent messages tell existence of a target's account to insiders., , , and . ACSAC, page 732-746. ACM, (2019)Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel., , , , , and . IEICE Trans. Inf. Syst., 103-D (2): 239-255 (2020)