default search action
Masaya Sato
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Toshihiro Yamauchi, Rintaro Orito, Koji Ebisu, Masaya Sato:
Detecting Unintended Redirects to Malicious Websites on Android Devices Based on URL-Switching Interval. IEEE Access 12: 153285-153294 (2024) - [j10]Tomohito Takubo, Masaya Sato, Atsushi Ueno:
Wrong Fix Detection for RTK Positioning Based on Relative Position Between Multiple Antennas. J. Robotics Mechatronics 36(2): 472-482 (2024) - [c22]Masaya Sato, Ryuki Mandai:
Control Displaying of Web Push Notifications Inducing Users to Phishing Websites. DSC 2024: 102-103 - [c21]Masaya Sato, Keisuke Maeda, Ren Togo, Takahiro Ogawa, Miki Haseyama:
Caption Unification for Multi-View Lifelogging Images Based on In-Context Learning with Heterogeneous Semantic Contents. ICASSP 2024: 8085-8089 - 2023
- [j9]Masaya Sato, Taku Omori, Toshihiro Yamauchi, Hideo Taniguchi:
Memory Analysis Based Estimation of Hook Point by Virtual Machine Monitor. Int. J. Netw. Comput. 13(2): 273-286 (2023) - [c20]Masaya Sato, Taku Omori, Toshihiro Yamauchi, Hideo Taniguchi:
Supporting Multiple OS Types on Estimation of System Call Hook Point by Virtual Machine Monitor. CANDARW 2023: 267-273 - [c19]Masaya Sato, Keisuke Maeda, Ren Togo, Takahiro Ogawa, Miki Haseyama:
Caption Unification for Multiple Viewpoint Lifelogging Images and Its Verification. GCCE 2023: 415-416 - 2022
- [j8]Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi:
Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM. J. Internet Serv. Inf. Secur. 12(1): 26-43 (2022) - [c18]Masaya Sato, Taku Omori, Toshihiro Yamauchi, Hideo Taniguchi:
Hook Point Estimation for System Call Detection by Virtual Machine Monitor. CANDARW 2022: 358-362 - [c17]Masaya Sato, Ryosuke Nakamura, Toshihiro Yamauchi, Hideo Taniguchi:
Improving Transparency of Hardware Breakpoints with Virtual Machine Introspection. IIAI-AAI 2022: 113-117 - 2021
- [j7]Yuta Imamura, Rintaro Orito, Hiroyuki Uekawa, Kritsana Chaikaew, Pattara Leelaprute, Masaya Sato, Toshihiro Yamauchi:
Web access monitoring mechanism via Android WebView for threat analysis. Int. J. Inf. Sec. 20(6): 833-847 (2021) - [c16]Kohei Otani, Toshiki Okazaki, Toshihiro Yamauchi, Hideaki Moriyama, Masaya Sato, Hideo Taniguchi:
Function for Tracing Diffusion of Classified Information to Support Multiple VMs with KVM. CANDAR (Workshops) 2021: 352-358 - 2020
- [c15]Masaya Sato, Hideo Taniguchi, Ryosuke Nakamura:
Virtual Machine Monitor-based Hiding Method for Access to Debug Registers. CANDAR 2020: 209-214 - [c14]Takashi Ishihara, Masaya Sato, Toshihiro Yamauchi:
Method of Generating a Blacklist for Mobile Devices by Searching Malicious Websites. CANDAR (Workshops) 2020: 328-333 - [c13]Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi:
Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM. NBiS 2020: 338-349
2010 – 2019
- 2019
- [j6]Yuuki Okuda, Masaya Sato, Hideo Taniguchi:
Implementation and Evaluation of Communication-Hiding Method by System Call Proxy. Int. J. Netw. Comput. 9(2): 217-238 (2019) - [j5]Masaya Sato, Hideo Taniguchi, Toshihiro Yamauchi:
Design and implementation of hiding method for file manipulation of essential services by system call proxy using virtual machine monitor. Int. J. Space Based Situated Comput. 9(1): 1-10 (2019) - [c12]Yuta Imamura, Rintaro Orito, Kritsana Chaikaew, Célia Manardo, Pattara Leelaprute, Masaya Sato, Toshihiro Yamauchi:
Threat Analysis of Fake Virus Alerts Using WebView Monitor. CANDAR 2019: 28-36 - [c11]Yuya Kobayashi, Masaya Sato, Hideo Taniguchi:
Evaluation of Processing Distribution for Application Program and OS in Microkernel OS. CANDAR Workshops 2019: 440-444 - [c10]Masaya Sato, Yuta Imamura, Rintaro Orito, Toshihiro Yamauchi:
(Short Paper) Method for Preventing Suspicious Web Access in Android WebView. IWSEC 2019: 241-250 - 2018
- [c9]Yuta Imamura, Hiroyuki Uekawa, Yasuhiro Ishihara, Masaya Sato, Toshihiro Yamauchi:
Web access monitoring mechanism for Android webview. ACSW 2018: 1:1-1:8 - [c8]Masaya Sato, Kazuhiro Hotta, Ayako Imanishi, Michiyuki Matsuda, Kenta Terai:
Segmentation of Cell Membrane and Nucleus by Improving Pix2pix. BIOSIGNALS 2018: 216-220 - [c7]Yuuki Okuda, Masaya Sato, Hideo Taniguchi:
Hiding Communication of Essential Services by System Call Proxy. CANDAR 2018: 47-56 - [c6]Masaya Sato, Hideo Taniguchi, Toshihiro Yamauchi:
Hiding File Manipulation of Essential Services by System Call Proxy. NBiS 2018: 853-863 - 2017
- [c5]Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi:
Performance Improvement and Evaluation of Function for Tracing Diffusion of Classified Information on KVM. CANDAR 2017: 463-468 - 2016
- [j4]Shota Fujii, Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi:
Design of Function for Tracing Diffusion of Classified Information for IPC on KVM. J. Inf. Process. 24(5): 781-792 (2016) - [j3]Shota Fujii, Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi:
Evaluation and design of function for tracing diffusion of classified information for file operations with KVM. J. Supercomput. 72(5): 1841-1861 (2016) - [c4]Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi:
Memory Access Monitoring and Disguising of Process Information to Avoid Attacks to Essential Services. CANDAR 2016: 635-641 - 2015
- [j2]Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi:
Process Hiding by Virtual Machine Monitor for Attack Avoidance. J. Inf. Process. 23(5): 673-682 (2015) - 2014
- [j1]Masaya Sato, Toshihiro Yamauchi:
Secure and Fast Log Transfer Mechanism for Virtual Machine. J. Inf. Process. 22(4): 597-608 (2014) - [c3]Masaya Sato, Toshihiro Yamauchi:
Complicating Process Identification by Replacing Process Information for Attack Avoidance. IWSEC 2014: 33-47 - 2013
- [c2]Masaya Sato, Toshihiro Yamauchi:
Secure Log Transfer by Replacing a Library in a Virtual Machine. IWSEC 2013: 1-18 - 2011
- [c1]Masaya Sato, Toshihiro Yamauchi:
VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss. ARES 2011: 176-190
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-17 21:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint