Publications
Academic Papers
- S. Ippa, T. Okubo and M. Hashimoto, "The Relationship Between Emotional and Other Factors in Information Diffusion," in IEEE Access, vol. 13, pp. 21249-21264, 2025, doi: 10.1109/ACCESS.2025.3535547.
- K. Yonemura, M. Hashimoto et al., "The Effects of Prior Learning and Motivation on Learning Outcomes in Gamified Cybersecurity Education: A Case Study Approach," Computer Software, Vol. 42 (2), pp. 30-44, JSSST, 2025.
- A. Kanda, M. Hashimoto, T. Okubo, "Can We Create a TLS Lie Detector?," Journal of Information Processing, 2024, Volume 32, Pages 1114-1124, Released on J-STAGE December 15, 2024, Online ISSN 1882-6652, https://doi.org/10.2197/ipsjjip.32.1114, https://www.jstage.jst.go.jp/article/ipsjjip/32/0/32_1114/_article/-char/en.
- S. Ippa, T. Okubo and M. Hashimoto, "An Analysis of Social Bot Activity on X in Modern Japan," in IEEE Access, vol. 12, pp. 125800-125808, 2024, doi: 10.1109/ACCESS.2024.3454536.
- K. Sakai, K. Takeshige, K. Kato, N. Kurihara, K. Ono and M. Hashimoto, "An Automatic Detection System for Fake Japanese Shopping Sites Using fastText and LightGBM," in IEEE Access, vol. 11, pp. 111389-111401, 2023, doi: 10.1109/ACCESS.2023.3323218.
- N. Ito, M. Hashimoto and A. Otsuka, "Feature Extraction Methods for Binary Code Similarity Detection Using Neural Machine Translation Models," in IEEE Access, vol. 11, pp. 102796-102805, 2023, doi: 10.1109/ACCESS.2023.3316215.
- Y. Masubuchi, M. Hashimoto, A. Otsuka, "SIBYL: A Method for Detecting Similar Binary Functions Using Machine Learning," IEICE Transactions on Information and Systems, Vol. E105-D, No.4, pp.755-765, Apr. 2022.
- Yamauchi T, Akao Y, Yoshitani R, Nakamura Y, Hashimoto M. Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes. International Journal of Information Security. 2020. https://doi.org/10.1007/s10207-020-00514-7
- Masaki Hashimoto: Access Control Technology and Its Latest Trends, Journal of Japan Society for Security Management, Vol.29, No.3, pp.21-27, 2016.
- Ruo Ando, Masaki Hashimoto, Toshihiro Yamauchi: Secure File Access Log External Storage Mechanism by Virtualization Technology, IPSJ Journal, Vol.54, No.2, pp.585-595, Feb. 2013.
- Toshiharu Harada, Tetsuo Handa, Masaki Hashimoto, Hidehiko Tanaka: Mandatory Access Control Method Based on Application Execution Status, IPSJ Journal, Vol.53, No.9, pp.2130-2147, Sep. 2012.
- Masaki Hashimoto, Ruo Ando, Toshiyuki Maeda, Hidehiko Tanaka: Trends in OS research for improving information security, IPSJ Journal: Computing Systems (ACS), Vol.5, No.2, pp.51-62, Mar. 2012.
- Masaki Hashimoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka: Authorization Policy Description Language Based on Logic Programming, IPSJ Journal, Vol.51, No.9, pp.1682-1691, Sep. 2010.
International Conference / Peer-Reviewed Oral Presentations
- Taishin Saito, M. Hashimoto, Kuniyasu Suzaki, "Benign Activity Extraction for Dependency Reduction in Data Provenance-based Attack Analysis," In Proceedings of the 20th International Workshop on Security (IWSEC 2025), Fukuoka, Japan, 2025. (accepted)
- K. Yamamoto, M. Oya, M. Hashimoto, Haruhiko Kaiya and T. Okubo, "COTTAGE: Supporting Threat Analysis for Security Novices with Auto-Generated Attack Defense Trees," in 20th International Conference on Software Technologies (ICSOFT 2025), Bilbao, Spain, 2025, pp. 132-142.
- K. Sakai, K. Takeshige, S. Matsugaya, M. Shimamura and M. Hashimoto, "Phishing Prevention Focusing on Certificates and Input Forms: PoC as Browser Extensions," 2025 1st International Conference on Consumer Technology (ICCT-Pacific), Matsue, Shimane, Japan, 2025, pp. 1-4, doi: 10.1109/ICCT-Pacific63901.2025.11012853.
- M. Oya, K. Yamamoto, M. Hashimoto and T. Okubo, "A Novel Framework for Reusable Attack Tree Patterns: Leveraging CAPEC for Semi-Automated Threat Modeling," in 2025 9th International Conference on Cryptography, Security and Privacy (CSP), Okinawa, Japan, 2025. (accepted)
- Shingo Matsugaya, Makoto Shimamura, Kosuke Takeshige, Keisuke Sakai, Masaki Hashimoto, "Characteristic Analysis and Attack Group Identification of Phishing Sites Targeting Japan," In: Barolli, L. (eds) Advances in Internet, Data and Web Technologies. EIDWT 2025. Lecture Notes on Data Engineering and Communications Technologies, vol 243. Springer, Cham. https://doi.org/10.1007/978-3-031-86149-9_7.
- Shuhei Ippa, Takao Okubo, Masaki Hashimoto, "An Analysis of Relationship Between Social Bots and Echo Chambers on X in Modern Japan," 2024 Twelfth International Symposium on Computing and Networking (CANDAR), Naha, Japan, 2024, pp. 49-58, doi: 10.1109/CANDAR64496.2024.00014.
- M. Shimamura, S. Matsugaya, K. Sakai, K. Takeshige and M. Hashimoto, "An Analysis of the Relationship Between Black-Hat SEO Malware Families Leveraging Information from Redirected Fake E-Commerce Scam Sites," 2024 IEEE Conference on Dependable and Secure Computing (DSC), Tokyo, Japan, 2024, pp. 123-130, doi: 10.1109/DSC63325.2024.00025.
- S. Ippa, T. Okubo and M. Hashimoto, "The Reality and Feature Analysis of Information Diffusion in Japanese Disinformation Examples," 2024 19th Asia Joint Conference on Information Security (AsiaJCIS), Tainan, Taiwan, 2024, pp. 137-142, doi: 10.1109/AsiaJCIS64263.2024.00030.
- K. Yonemura, M. Hashimoto et al., "Motivation and Educational Effectiveness in Teaching Expert Development Project by an Educational Community," 2024 IEEE Global Engineering Education Conference (EDUCON), Kos Island, Greece, 2024, pp. 01-08, doi: 10.1109/EDUCON60312.2024.10578741.
- K. Yonemura, M. Hashimoto et al., "Motivation in Teaching Expert Development Project by KOSEN Security Educational Community," 2023 IEEE Global Engineering Education Conference (EDUCON), Kuwait, Kuwait, 2023, pp. 1-9, doi: 10.1109/EDUCON54358.2023.10125167.
- A. Kanda, M. Hashimoto, "Identification of TLS Communications Using Randomness Testing," 2021 IEEE 45th Annual Computer Software and Applications Conference (COMPSAC), 2021, pp. 1099-1106, doi: 10.1109/COMPSAC51774.2021.00150.
- M. Kadoguchi, H. Kobayashi, S. Hayashi, A. Otsuka and M. Hashimoto, "Deep Self-Supervised Clustering of the Dark Web for Cyber Threat Intelligence," 2020 IEEE International Conference on Intelligence and Security Informatics (ISI), Arlington, VA, USA, 2020, pp. 1-6, doi: 10.1109/ISI49825.2020.9280485.
- H. Kobayashi, M. Kadoguchi, S. Hayashi, A. Otsuka and M. Hashimoto, "An Expert System for Classifying Harmful Content on the Dark Web," 2020 IEEE International Conference on Intelligence and Security Informatics (ISI), Arlington, VA, USA, 2020, pp. 1-6, doi: 10.1109/ISI49825.2020.9280536.
- M. Kadoguchi, S. Hayashi, M. Hashimoto and A. Otsuka, "Exploring the Dark Web for Cyber Threat Intelligence using Machine Leaning," 2019 IEEE International Conference on Intelligence and Security Informatics (ISI), Shenzhen, China, 2019, pp. 200-202, doi: 10.1109/ISI.2019.8823360.
- T. Yamauchi, Y. Akao, R. Yoshitani, Y. Nakamura and M. Hashimoto, "Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes," 2018 IEEE Conference on Dependable and Secure Computing (DSC), 2018, pp. 1-8, doi: 10.1109/DESEC.2018.8625137.
- M. Hashimoto, M. Kim, H. Tsuji and H. Tanaka, "Policy Description Language for Dynamic Access Control Models," 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009, pp. 37-42, doi: 10.1109/DASC.2009.129.
- Masaki Hashimoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka: Research on Multiple Policy Integrated Management Method for Distributed Systems, Proceedings of Computer Systems Symposium, IPSJ Symposium Series, vol.2008, no.12, IPSJ, pp.49-56, 2008.
- Kazuki Fujisawa, Masaki Hashimoto, Kunio Miyamoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka: Security Enhancement Proposals for Device Drivers in Virtual Machine Monitors, Proceedings of Computer Systems Symposium, IPSJ Symposium Series, vol.2007, no.14, IPSJ, pp.31-38, 2007.
- Masaki Hashimoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka: Initial Study of Policy-Based Access Control Model for Distributed Processing, Proceedings of Computer Systems Symposium, IPSJ Symposium Series, vol.2007, no.14, IPSJ, pp.217-224, 2007.
Workshop and Conference Presentations (Non-Refereed, Machine-Translated)
- Taishin Saito, Masaki Hashimoto, Kuniyasu Suzaki: Study on Benign Activity Extraction Methods in Information Systems Using DARPA Dataset, Proceedings of Computer Security Symposium 2024, IPSJ, 1641-1648 (2024-10-15).
- Shingo Matsugaya, Makoto Shimamura, Kosuke Takeshige, Keisuke Sakai, Masaki Hashimoto: Characteristic Analysis and Attack Group Identification of Phishing Sites Targeting Japan, Proceedings of Computer Security Symposium 2024, IPSJ, 1072-1079 (2024-10-15).
- Makoto Shimamura, Kosuke Takeshige, Shingo Matsugaya, Keisuke Sakai, Masaki Hashimoto: Analysis of Relationships Between Malware Using Information from Fake Shopping Sites Redirected by Malware Performing Malicious SEO, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2024-CSEC-106(29), 1-8 (2024-07-15), 2188-8655.
- Makoto Shimamura, Kosuke Takeshige, Shingo Matsugaya, Keisuke Sakai, Masaki Hashimoto: Group Extraction and Analysis Using Site Characteristics in Fake Shopping Site Fraud Targeting Japanese People, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2024-CSEC-104(34), 1-8 (2024-03-11), 2188-8655.
- Kosuke Takeshige, Keisuke Sakai, Makoto Shimamura, Shingo Matsugaya, Masaki Hashimoto: Multi-Class Classification of Malicious Sites Using Machine Learning, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2024-CSEC-104(7), 1-8 (2024-03-11), 2188-8655.
- Atsushi Kanda, Masaki Hashimoto: Can We Create a TLS Lie Detector?, Proceedings of Computer Security Symposium 2023, IPSJ, 1365-1372 (2023-10-23).
- Keisuke Sakai, Kosuke Takeshige, Masanori Hiramatsu, Masaki Hashimoto: Research on Trend Analysis of Fake Sites Targeting Japan, Proceedings of Computer Security Symposium 2023, IPSJ, 596-603 (2023-10-23).
- Shuhei Ippa, Masaki Hashimoto: Analysis of Social Bot Activity and Influence on Social Media in Modern Japan, Proceedings of Computer Security Symposium 2023, IPSJ, 253-260 (2023-10-23).
- Shuhei Ippa, Masaki Hashimoto: Research Toward Understanding the Impact of Social Bots in Japan, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2023-CSEC-102(11), 1-8 (2023-07-17), 2188-8655, 2023.
- Keisuke Shiraishi, Masaki Hashimoto: Building Resilient Systems and Recommendations for Security Chaos Engineering (SCE), Advanced Technology and Information Crime and Security Research Group, Japan Society for Security Management, Chuo University, 2023.
- Shuhei Ippa, Masaki Hashimoto: Research Toward Understanding Social Bot Activity in Japan, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2023-CSEC-100(29), 1-8 (2023-02-27), 2188-8655, 2023.
- Norimitsu Ito, Masaki Hashimoto, Akira Otsuka: Feature Extraction Methods for Binary Code Similarity Detection Using Neural Machine Translation Models, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2023-CSEC-100(20), 1-8 (2023-02-27), 2188-8655, 2023.
- Kunihito Adachi, Masaki Hashimoto: Development of Security Checklist for Legacy Control Systems, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2023-CSEC-100(7), 1-8 (2023-02-27), 2188-8655, 2023.
- Keisuke Sakai, Kosuke Takeshige, Kazuki Kato, Naoki Kurihara, Katsumi Ono, Masaki Hashimoto: Development of Automatic Detection System for Fake Shopping Sites Using fastText and LightGBM, Proceedings of Computer Security Symposium 2022, IPSJ, 887-894 (2022-10-17).
- Keisuke Shiraishi, Masaki Hashimoto, Toshihiro Matsui: Research on Resilient Architecture for Autonomous IoT Systems, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2022-CSEC-96(13), 1-8 (2022-03-03), 2188-8655.
- Tsuyoshi Miyasaka, Misuke Okubo, Nobuki Suetsugu, Midori Inaba, Masaki Hashimoto: Development of System for Linking and Visualizing Malicious Activities in Systems for Intrusion Detection, Proceedings of Computer Security Symposium 2021, IPSJ, 381-388 (2021-10-19).
- Kosuke Takahashi, Masaki Hashimoto: Client Delegation Method for Anti-Cheat Measures on Servers Using Intel SGX, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2021-CSEC-92(28), 1-8 (2021-03-08), 2188-8655.
- Takayuki Chiwaki, Masaki Hashimoto: Countermeasure Methods Using Rust Against Attacks Exploiting Memory Corruption Vulnerabilities, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2021-CSEC-92(9), 1-8 (2021-03-08), 2188-8655.
- Nobuki Suetsugu, Miyu Okubo, Masaki Hashimoto: Study on Linking and Visualization Methods for Malicious Activities in Systems for Intrusion Detection, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2020-CSEC-90(24), 1-6 (2020-07-13), 2188-8655.
- Hanae Kobayashi, Masaki Hashimoto: Development of Automatic Classification Expert System for Illegal and Harmful Information Prevalent on the Dark Web, IPSJ Security Psychology and Trust Research Reports (SPT), IPSJ, 2020-SPT-36(20), 1-6 (2020-02-24), 2188-8671.
- Hitoshi Inoue, Masaki Hashimoto: Investigation of HTTP Requests and Proposal for Identifying Fake User-Agent Values, IPSJ Security Psychology and Trust Research Reports (SPT), IPSJ, 2020-SPT-36(16), 1-6 (2020-02-24), 2188-8671.
- Moritoshi Aoyagi, Hidenori Tsuji, Masaki Hashimoto: Search for Similar Binary Code Between Different Architectures Using Neural Machine Translation Models, IPSJ Security Psychology and Trust Research Reports (SPT), IPSJ, 2020-SPT-36(8), 1-6 (2020-02-24), 2188-8671.
- Atsushi Kanda, Masaki Hashimoto: Identification of TLS Communication Using Randomness, Proceedings of Computer Security Symposium 2019, IPSJ, 2019, 683-690 (2019-10-14).
- Yuka Ogura, Hidenori Tsuji, Masaki Hashimoto: Visualization Method for Secure OS/Intrusion Prevention Effects Using Processing Language, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2019-CSEC-84(9), 1-8 (2019-02-25), 2188-8655.
- Yasuhiro Mitsuishi, Masaki Hashimoto, Hidenori Tsuji, Harumichi Yuasa: Current Status and Issues of Maritime Cybersecurity, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2019-CSEC-84(2), 1-9 (2019-02-25), 2188-8655.
- Shuhei Segawa, Hidenori Tsuji, Masaki Hashimoto: Initial Study of Vulnerability Testing Tools for Short-Range Wireless Communication, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2018-CSEC-83(5), 1-7 (2018-12-06), 2188-8655.
- Masaki Sugiu, Hidenori Tsuji, Masaki Hashimoto: Evaluation of Efficient Deployment of Deception Networks, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2018-CSEC-83(2), 1-6 (2018-12-06), 2188-8655.
- Naoki Kurihara, Hidenori Tsuji, Masaki Hashimoto: Fake Site Detection Using Machine Learning, IEICE Technical Report, vol.118, no.315, ICSS2018-56, pp.19-24, November 2018.
- Hiroki Inoue, Hidenori Tsuji, Masaki Hashimoto: Access Control Policy Protection Method Using TrustZone Technology, Proceedings of Computer Security Symposium 2018, IPSJ, 2018(2), 941-948.
- Yuka Ogura, Hidenori Tsuji, Masaki Hashimoto: Visualization of Mandatory Access Control Effects by TOMOYO Linux, Proceedings of Computer Security Symposium 2018, IPSJ, 2018(2), 949-955.
- Yasuhiro Mitsuishi, Masaki Hashimoto, Hidenori Tsuji, Harumichi Yuasa: Current Status and Issues of Maritime Cybersecurity, Proceedings of Computer Security Symposium 2018, IPSJ, 2018(2), 1213-1220.
- Tadashi Shimomura, Nobuki Suetsugu, Hidenori Tsuji, Masaki Hashimoto: Malware Detection Method by Machine Learning Focusing on Functional Types of Malicious Activities, IEICE Technical Report, Vol.117, No.481, ICSS2017-51, pp.121-126, February 2018.
- Makoto Ashizu, Ikuo Tanaka, Hidenori Tsuji, Masaki Hashimoto: Research on Evaluation Methods for Memory Forensics Tools, IEICE Technical Report, Vol.117, No.481, ICSS2017-51, pp.115-120, February 2018.
- Takuya Koike, Misuke Okubo, Hidenori Tsuji, Masaki Hashimoto: Research on Definition Methods of Malicious Activities by Linking System Activities, IEICE Technical Report, Vol.117, No.481, ICSS2017-51, pp.55-60, February 2018.
- Shota Hayashi, Hidenori Tsuji, Masaki Hashimoto: Threat Intelligence Extraction Method Using Machine Learning, IPSJ Research Report, Vol.2018, No.5(CSEC80), IPSJ, pp.1-8, February 2018.
- Moriyo Tamura, Masaki Hashimoto: Malware Detection Method by Function Similarity in PE Using CNN, IPSJ Research Report, Vol.2017, No.8(CSEC79), IPSJ, pp.1-6, November 2017.
- Nobuki Suetsugu, Masaki Hashimoto: Behavioral Consideration by Malware Function Classification as Seen from API Calls, IEICE Technical Report, Vol.116, No.328, ICSS2016-40, pp. 9-14, November 2016.
- Ikuo Tanaka, Masaki Hashimoto: Verification of Effectiveness of Memory Forensic Tools Against Anti-Forensic Functions, Proceedings of Computer Security Symposium 2016, 2016(2), 100-105. (2016-10-04)
- Takeyasu Yoshimura, Masaki Hashimoto, Hidenori Tsuji, Hidehiko Tanaka: Initial Study for Building Dynamic Analysis Environment for Linux Malware Using TOMOYO Linux, Proceedings of Computer Security Symposium 2016, 2016(2), 518-525. (2016-10-04)
- Yudai Tomaru, Masaki Hashimoto, Hidehiko Tanaka: Initial Study for Process Activity Linking Method for Intrusion Prevention, IEICE Technical Report, vol. 115, no. 488, ICSS2015-61, pp. 83-88, March 2016.
- Masaki Hashimoto, Minetoshi Takizawa, Fumihiko Takayama, Hidenori Tsuji, Hidehiko Tanaka: Toward Practical Implementation of Mandatory Access Control by Logical Languages, IEICE Technical Report, vol. 115, no. 334, ICSS2015-44, pp. 55-60, November 2015.
- Masaki Hashimoto, Minetoshi Takizawa, Fumihiko Takayama, Hidenori Tsuji, Hidehiko Tanaka: User Space Implementation of SELinux Policy Processing System, Proceedings of Computer Systems Symposium, 2014, pp.27-35, 2014-11-12.
- Masaki Hashimoto, Minetoshi Takizawa, Fumihiko Takayama, Hidenori Tsuji, Hidehiko Tanaka: Implementation and Evaluation of Authorization Decision Mechanism for SELinux by Logical Language, Proceedings of Computer Security Symposium 2014, 2014-2, pp.743-750, 2014-10-15.
- Akira Urano, Masaki Hashimoto, Hidenori Tsuji, Hidehiko Tanaka: Initial Study on Trace Detection Method of Anti-Forensic Tools, Proceedings of Computer Security Symposium 2013, 2013-4, pp.163-168, 2013-10-14.
- Tomohiro Hotta, Masaki Hashimoto, Hidenori Tsuji, Hidehiko Tanaka: Email Misdirection Countermeasures Considering Practical Operation, IPSJ Research Report, Vol.2013, No.50(CSEC60), IPSJ, pp.1-8, 2013.
- Yusuke Karasawa, Masaki Hashimoto, Hidenori Tsuji, Hidehiko Tanaka: Consideration on Methods to Prevent One-Click Fraud, IEICE Information Security Research Group, 2013 Symposium on Cryptography and Information Security (SCIS2013), 2F4-2, 2013.
- Masanobu Nakama, Masaki Hashimoto, Hidenori Tsuji, Hidehiko Tanaka: Proposal of C&C Server Behavior Information Extraction System, IEICE Information Security Research Group, 2013 Symposium on Cryptography and Information Security (SCIS2013), 1D1-5, 2013.
- Tatsuhiko Matsufuji, Masaki Hashimoto, Keiichi Horiai, Hidehiko Tanaka: Improvement of Automatic Malware Classification System by Strengthening Static Analysis, IPSJ Research Report: CSEC [Computer Security], Vol.2012, No.10, pp.1-7, 2012.
- Hideki Hatagami, Masaki Hashimoto, Keiichi Horiai, Hidehiko Tanaka: Research on Automatic Classification Method in Malware Dynamic Analysis, IPSJ Research Report: CSEC [Computer Security], Vol.2011, No.51, pp.1-7, 2011.
- Masayuki Nakao, Masaki Hashimoto, Kunio Miyamoto, Hidehiko Tanaka: Initial Study on System Integrity Verification Using Software-Based TCB, IEICE Information Security Research Group, 2010 Symposium on Cryptography and Information Security (SCIS2010), 4E2-3, 2010.
- Masaki Hashimoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka: Research on Policy Description Language Using Logical Language, Japan Society for Software Science and Technology, 7th Dependable Systems Workshop (DSW09), Hakodate Onuma Prince Hotel, 2009.
- Mira Kim, Masaki Hashimoto, Hidenori Tsuji, Hidehiko Tanaka: Study of Information Leakage Prevention Technology by File Self-Destruction Function, Proceedings of Computer Security Symposium, IPSJ Symposium Series, Vol.2008, No.8, Volume 1, IPSJ, pp.115-119, 2008.
- Kunio Miyamoto, Kazuki Fujisawa, Masaki Hashimoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka: A Method for Determining Execution in Virtual Machine Environment at Program Runtime, Proceedings of Computer Security Symposium, IPSJ Symposium Series, vol.2007, no.10, IPSJ, pp.549-552, 2007.
- Kazuki Fujisawa, Masaki Hashimoto, Kunio Miyamoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka: Proposals for Improving Device Driver Safety in Virtual Machine Monitors, Information Science and Technology Forum, FIT2007, General Lecture Papers, Volume 4, IPSJ, pp.53-54, 2007.
- Masaki Hashimoto, Kazuki Fujisawa, Kunio Miyamoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka: Resource Access Control Using Capability in Distributed Systems, IPSJ Research Report, Vol.2007, No.71(CSEC38), IPSJ, pp.393-400, 2007.
- Hidenori Tsuji, Masaki Hashimoto, Mira Kim, Hidehiko Tanaka: Initial Study on Secure OS as Application Platform, IPSJ Research Report, Vol.2007, No.71(CSEC38), IPSJ, pp.381-386, 2007.
- Masaki Hashimoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka: A Study for Building Secure Distributed Systems, Proceedings of Computer Security Symposium, IPSJ Symposium Series, vol.2006, no.11, IPSJ, pp.435-440, 2006.
- Masaki Hashimoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka: Research on Secure Resource Management Methods in Distributed Environments, Information Science and Technology Forum, FIT2006, General Lecture Papers, Volume 4, IPSJ, pp.311-312, 2006.