default search action
Kenichi Kourai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Tokito Murata, Kenichi Kourai:
Parallel and consistent live checkpointing and restoration of split-memory VMs. Future Gener. Comput. Syst. 159: 432-443 (2024) - 2023
- [c63]Yuichi Ozaki, Sousuke Kanamoto, Hiroaki Yamamoto, Kenichi Kourai:
Reliable and Accurate Fault Detection with GPGPUs and LLVM. CLOUD 2023: 540-546 - [c62]Yuji Muraoka, Kenichi Kourai:
Memory-virtualizing and -devirtualizing VM Migration with Private Virtual Memory. COMPSAC 2023: 91-96 - [c61]Tomoya Unoki, Kenichi Kourai:
VM Migration Support for Secure Out-of-Band VNC with Shadow Devices. DASC/PiCom/CBDCom/CyberSciTech 2023: 298-305 - [c60]Kazumi Igarashi, Akira Nagata, Yohei Okamoto, Masahiro Shibata, Kenichi Kourai, Masato Tsuru:
Efficient VM Migration for Multiple Destination Sites Across a Japan-US OpenFlow Testbed. INFOCOM Workshops 2023: 1-5 - [c59]Shuhei Horio, Kouta Takahashi, Kenichi Kourai:
SEmigrate: Optimizing Data Protection with VM Introspection. PRDC 2023: 88-98 - [c58]Yoshimichi Koga, Kenichi Kourai:
SSdetector: Secure and Manageable Host-based IDS with SGX and SMM. TrustCom 2023: 539-548 - [c57]Kento Kimura, Kenichi Kourai:
Xfas: Fault Recovery by Externally Controlling OS Behavior. UCC 2023: 9 - 2022
- [c56]Takumi Kawamura, Kenichi Kourai:
Secure Offloading of User-level IDS with VM-compatible OS Emulation Layers for Intel SGX. CLOUD 2022: 157-166 - [c55]Kento Kimura, Kenichi Kourai:
GPU-based first aid for system faults. APSys 2022: 38-45 - 2021
- [j10]Huseyn Huseynov, Tarek N. Saadawi, Kenichi Kourai:
Hardening the Security of Multi-Access Edge Computing through Bio-Inspired VM Introspection. Big Data Cogn. Comput. 5(4): 52 (2021) - [c54]Oluwaseyi Ajayi, Huseyn Huseynov, Tarek N. Saadawi, Masato Tsuru, Kenichi Kourai:
Transpacific Testbed for Real-Time Experimentation. 5GWF 2021: 505-510 - [c53]Tomoharu Nakano, Kenichi Kourai:
Secure Offloading of Intrusion Detection Systems from VMs with Intel SGX. CLOUD 2021: 297-303 - [c52]Soichiro Tauchi, Kenichi Kourai, Lukman Ab. Rahim:
Optimizing VMs across Multiple Hosts with Transparent and Consistent Tracking of Unused Memory. CLOUD 2021: 467-477 - [c51]Naomichi Fukuda, Kenichi Kourai, Saneyasu Yamaguchi:
Improvement of ARC Considering Negative Locality of Reference in Virtualized Environment. IEEE BigData 2021: 5897-5899 - [c50]Hirofumi Satou, Kenichi Kourai:
Prevention of a DoS Attack with Copy-on-write in the Overlay Filesystem. DASC/PiCom/CBDCom/CyberSciTech 2021: 76-83 - [c49]Huseyn Huseynov, Tarek N. Saadawi, Kenichi Kourai:
Bio-inspired VM Introspection for Securing Collaboration Platforms. INCoS 2021: 32-41 - [c48]Shuhei Horio, Kouta Takahashi, Kenichi Kourai, Lukman Ab. Rahim:
Optimized Memory Encryption for VMs Across Multiple Hosts. INCoS 2021: 307-315 - [c47]Kenji Nakashima, Kenichi Kourai:
MigSGX: a migration mechanism for containers including SGX applications. UCC 2021: 6:1-6:10 - 2020
- [j9]Keisuke Inokuchi, Kenichi Kourai:
Secure VM management with strong user binding in semi-trusted clouds. J. Cloud Comput. 9: 3 (2020) - [j8]Kenichi Kourai, Kouta Sannomiya:
Flexible service consolidation with nested virtualization and library operating systems. Softw. Pract. Exp. 50(1): 3-21 (2020) - [c46]Takahiro Kashiwagi, Kenichi Kourai:
Flexible and Efficient Partial Migration of Split-memory VMs. CLOUD 2020: 248-257 - [c45]Tomoya Unoki, Kenichi Kourai:
VM Migration for Secure Out-of-band Remote Management with Nested Virtualization. CLOUD 2020: 517-521 - [c44]Tokiko Takayama, Kenichi Kourai:
Optimization of Parallel Applications Under CPU Overcommitment. COMPSAC 2020: 51-60 - [c43]Kouki Yamato, Kenichi Kourai, Tarek N. Saadawi:
Transparent IDS Offloading for Split-Memory Virtual Machines. COMPSAC 2020: 833-838 - [c42]Naomichi Fukuda, Taisei Miura, Kenichi Kourai, Saneyasu Yamaguchi:
Cache Management with Fadvise Based on LFU. COMPSAC 2020: 1145-1150 - [c41]Huseyn Huseynov, Kenichi Kourai, Tarek N. Saadawi, Obinna Igbe:
Virtual Machine Introspection for Anomaly-Based Keylogger Detection. HPSR 2020: 1-6 - [c40]Taisei Miura, Kenichi Kourai, Saneyasu Yamaguchi:
Cache Replacement Based on LSTM in the Second Cache in Virtualized Environment. CANDAR (Workshops) 2020: 421-424 - [c39]Kohei Ueki, Kenichi Kourai:
Fine-grained Autoscaling with In-VM Containers and VM Introspection. UCC 2020: 155-164 - [p1]Kenji Kono, Kenichi Kourai, Hiroshi Yamada:
Application to Operating Systems. Handbook of Software Aging and Rejuvenation 2020: 229-259
2010 – 2019
- 2019
- [c38]Yuichi Ozaki, Sousuke Kanamoto, Hiroaki Yamamoto, Kenichi Kourai:
Detecting System Failures with GPUs and LLVM. APSys 2019: 47-53 - [c37]Kenichi Kourai, Yuji Shiota:
Consistent Offline Update of Suspended Virtual Machines in Clouds. DASC/PiCom/DataCom/CyberSciTech 2019: 58-65 - [c36]Tomonori Morikawa, Kenichi Kourai:
Low-Cost and Fast Failure Recovery Using In-VM Containers in Clouds. DASC/PiCom/DataCom/CyberSciTech 2019: 572-579 - [c35]Yuji Muraoka, Kenichi Kourai:
Efficient Migration of Large-Memory VMs Using Private Virtual Memory. INCoS 2019: 380-389 - [c34]Kenichi Kourai, Evangelos Pournaras:
UCC/BDCAT'19 Poster Chairs Welcome Message. UCC Companion 2019: 129 - 2018
- [c33]Masato Suetake, Takahiro Kashiwagi, Hazuki Kizu, Kenichi Kourai:
S-memV: Split Migration of Large-Memory Virtual Machines in IaaS Clouds. IEEE CLOUD 2018: 285-293 - [c32]Shota Futagami, Tomoya Unoki, Kenichi Kourai:
Secure Out-of-band Remote Management of Virtual Machines with Transparent Passthrough. ACSAC 2018: 430-440 - [c31]Kenichi Kourai, Naoto Fukuda, Tomohiro Kodama:
Efficient page-cache encryption for smart devices with non-volatile main memory. SAC 2018: 1109-1115 - [c30]Keisuke Inokuchi, Kenichi Kourai:
UVBond: Strong User Binding to VMs for Secure Remote Management in Semi-Trusted Clouds. UCC 2018: 213-222 - 2017
- [c29]Kenichi Kourai, Sungho Arai, Kousuke Nakamura, Seigo Okazaki, Shigeru Chiba:
Resource Cages: A New Abstraction of the Hypervisor for Performance Isolation Considering IDS Offloading. CloudCom 2017: 170-177 - [c28]Shohei Miyama, Kenichi Kourai:
Secure IDS Offloading with Nested Virtualization and Deep VM Introspection. ESORICS (2) 2017: 305-323 - 2016
- [j7]Sho Kawahara, Kenichi Kourai:
Virtual Machine Co-migration for Out-of-band Remote Management. J. Inf. Process. 24(4): 669-679 (2016) - [c27]Kenichi Kourai, Kazuki Juda:
Secure Offloading of Legacy IDSes Using Remote VM Introspection in Semi-trusted Clouds. CLOUD 2016: 43-50 - [c26]Masato Suetake, Hazuki Kizu, Kenichi Kourai:
Split Migration of Large Memory Virtual Machines. APSys 2016: 4:1-4:8 - [c25]Kenichi Kourai, Kouta Sannomiya:
Seamless and Secure Application Consolidation for Optimizing Instance Deployment in Clouds. CloudCom 2016: 318-325 - [c24]Kenichi Kourai, Hiroki Ooba:
VMBeam: Zero-Copy Migration of Virtual Machines for Virtual IaaS Clouds. SRDS 2016: 121-126 - 2015
- [j6]Kenichi Kourai, Hisato Utsunomiya:
Co-migration of Virtual Machines with Synchronization for IDS Offloading. Inf. Media Technol. 10(1): 26-36 (2015) - [c23]Kenichi Kourai, Hiroki Ooba:
Zero-copy Migration for Lightweight Software Rejuvenation of Virtualized Systems. APSys 2015: 7:1-7:8 - [c22]Kenichi Kourai, Kouki Oozono:
Virtual AMT for Unified Management of Physical and Virtual Desktops. COMPSAC 2015: 928-937 - [c21]Hiroki Sugimoto, Kenichi Kourai, Saneyasu Yamaguchi:
Host OS page cache hit ratio improvement based on guest OS page drop. iiWAS 2015: 77:1-77:4 - [c20]Kenichi Kourai, Riku Nakata:
Analysis of the Impact of CPU Virtualization on Parallel Applications in Xen. TrustCom/BigDataSE/ISPA (3) 2015: 132-139 - [c19]Kenichi Kourai, Tatuya Kajiwara:
Secure Out-of-Band Remote Management Using Encrypted Virtual Serial Consoles in IaaS Clouds. TrustCom/BigDataSE/ISPA (1) 2015: 443-450 - 2014
- [j5]Kenichi Kourai, Takeshi Azumi, Shigeru Chiba:
Efficient and Fine-Grained VMM-Level Packet Filtering for Self-Protection. Int. J. Adapt. Resilient Auton. Syst. 5(2): 83-100 (2014) - [c18]Kenichi Kourai, Kousuke Nakamura:
Efficient VM Introspection in KVM and Performance Comparison with Xen. PRDC 2014: 192-202 - [c17]Sho Kawahara, Kenichi Kourai:
The Continuity of Out-of-Band Remote Management across Virtual Machine Migration in Clouds. UCC 2014: 176-185 - 2013
- [j4]Tomohisa Egawa, Naoki Nishimura, Kenichi Kourai:
Security Enhancement of Out-of-band Remote Management in IaaS Clouds. Inf. Media Technol. 8(4): 961-970 (2013) - [c16]Kenichi Kourai, Hisato Utsunomiya:
Synchronized Co-migration of Virtual Machines for IDS Offloading in Clouds. CloudCom (1) 2013: 120-129 - 2012
- [j3]Hidekazu Tadokoro, Kenichi Kourai, Shigeru Chiba:
Preventing Information Leakage from Virtual Machines' Memory in IaaS Clouds. Inf. Media Technol. 7(4): 1421-1431 (2012) - [c15]Tomohisa Egawa, Naoki Nishimura, Kenichi Kourai:
Dependable and secure remote management in IaaS clouds. CloudCom 2012: 411-418 - [c14]Kenichi Kourai, Takuya Nagata:
A Secure Framework for Monitoring Operating Systems Using SPEs in Cell/B.E. PRDC 2012: 41-50 - [c13]Kenichi Kourai, Takeshi Azumi, Shigeru Chiba:
A Self-Protection Mechanism against Stepping-Stone Attacks for IaaS Clouds. UIC/ATC 2012: 539-546 - 2011
- [j2]Kenichi Kourai, Shigeru Chiba:
Fast Software Rejuvenation of Virtual Machine Monitors. IEEE Trans. Dependable Secur. Comput. 8(6): 839-851 (2011) - [c12]Kenichi Kourai:
Fast and correct performance recovery of operating systems using a virtual machine monitor. VEE 2011: 99-110 - 2010
- [c11]Kenichi Kourai:
CacheMind: Fast performance recovery using a virtual machine monitor. DSN Workshops 2010: 86-92 - [c10]Hidekazu Tadokoro, Kenichi Kourai, Shigeru Chiba:
A Secure System-Wide Process Scheduler across Virtual Machines. PRDC 2010: 27-36
2000 – 2009
- 2009
- [j1]Kenichi Kourai, Hideaki Hibino, Shigeru Chiba:
Application-Level Scheduling Using AOP. LNCS Trans. Aspect Oriented Softw. Dev. 5: 1-44 (2009) - [c9]Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimoto, Kazumasa Omote, Shoichi Hasegawa, Takashi Horie, Manabu Hirano, Kenichi Kourai, Yoshihiro Oyama, Eiji Kawai, Kenji Kono, Shigeru Chiba, Yasushi Shinjo, Kazuhiko Kato:
BitVisor: a thin hypervisor for enforcing i/o device security. VEE 2009: 121-130 - 2007
- [c8]Kenichi Kourai, Hideaki Hibino, Shigeru Chiba:
Aspect-oriented application-level scheduling for J2EE servers. AOSD 2007: 1-13 - [c7]Kenichi Kourai, Shigeru Chiba:
A Fast Rejuvenation Technique for Server Consolidation with Virtual Machines. DSN 2007: 245-255 - 2006
- [c6]Yoshisato Yanagisawa, Kenichi Kourai, Shigeru Chiba:
A dynamic aspect-oriented system for OS kernels. GPCE 2006: 69-78 - 2005
- [c5]Kenichi Kourai, Shigeru Chiba:
HyperSpector: virtual distributed monitoring environments for secure intrusion detection. VEE 2005: 197-207 - 2003
- [c4]Kenichi Kourai, Toshio Hirotsu, Koji Sato, Osamu Akashi, Kensuke Fukuda, Toshiharu Sugawara, Shigeru Chiba:
Secure and Manageable Virtual Private Networks for End-users. LCN 2003: 385-394 - [c3]Osamu Akashi, Toshio Hirotsu, Koji Sato, Kenichi Kourai, Mitsuro Maruyama, Toshiharu Sugawara:
Agents Support for Flexible Inter-AS Policy Control. SAINT Workshops 2003: 294-298 - 2001
- [c2]Kenichi Kourai, Shigeru Chiba:
A Secure Access Control Mechanism against Internet Crackers. ICDCS 2001: 743-746
1990 – 1999
- 1997
- [c1]Shigeru Chiba, Takeshi Nishimura, Kenichi Kourai, Atsushi Ohnoki, Takashi Masuda:
Weak Protection for Reflective Operating Systems. ECOOP Workshops 1997: 62-67
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint