Publications

Academic Papers

  1. S. Ippa, T. Okubo and M. Hashimoto, "The Relationship Between Emotional and Other Factors in Information Diffusion," in IEEE Access, vol. 13, pp. 21249-21264, 2025, doi: 10.1109/ACCESS.2025.3535547.
  2. K. Yonemura, M. Hashimoto et al., "The Effects of Prior Learning and Motivation on Learning Outcomes in Gamified Cybersecurity Education: A Case Study Approach," Computer Software, Vol. 42 (2), pp. 30-44, JSSST, 2025.
  3. A. Kanda, M. Hashimoto, T. Okubo, "Can We Create a TLS Lie Detector?," Journal of Information Processing, 2024, Volume 32, Pages 1114-1124, Released on J-STAGE December 15, 2024, Online ISSN 1882-6652, https://doi.org/10.2197/ipsjjip.32.1114, https://www.jstage.jst.go.jp/article/ipsjjip/32/0/32_1114/_article/-char/en.
  4. S. Ippa, T. Okubo and M. Hashimoto, "An Analysis of Social Bot Activity on X in Modern Japan," in IEEE Access, vol. 12, pp. 125800-125808, 2024, doi: 10.1109/ACCESS.2024.3454536.
  5. K. Sakai, K. Takeshige, K. Kato, N. Kurihara, K. Ono and M. Hashimoto, "An Automatic Detection System for Fake Japanese Shopping Sites Using fastText and LightGBM," in IEEE Access, vol. 11, pp. 111389-111401, 2023, doi: 10.1109/ACCESS.2023.3323218.
  6. N. Ito, M. Hashimoto and A. Otsuka, "Feature Extraction Methods for Binary Code Similarity Detection Using Neural Machine Translation Models," in IEEE Access, vol. 11, pp. 102796-102805, 2023, doi: 10.1109/ACCESS.2023.3316215.
  7. Y. Masubuchi, M. Hashimoto, A. Otsuka, "SIBYL: A Method for Detecting Similar Binary Functions Using Machine Learning," IEICE Transactions on Information and Systems, Vol. E105-D, No.4, pp.755-765, Apr. 2022.
  8. Yamauchi T, Akao Y, Yoshitani R, Nakamura Y, Hashimoto M. Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes. International Journal of Information Security. 2020. https://doi.org/10.1007/s10207-020-00514-7
  9. Masaki Hashimoto: Access Control Technology and Its Latest Trends, Journal of Japan Society for Security Management, Vol.29, No.3, pp.21-27, 2016.
  10. Ruo Ando, Masaki Hashimoto, Toshihiro Yamauchi: Secure File Access Log External Storage Mechanism by Virtualization Technology, IPSJ Journal, Vol.54, No.2, pp.585-595, Feb. 2013.
  11. Toshiharu Harada, Tetsuo Handa, Masaki Hashimoto, Hidehiko Tanaka: Mandatory Access Control Method Based on Application Execution Status, IPSJ Journal, Vol.53, No.9, pp.2130-2147, Sep. 2012.
  12. Masaki Hashimoto, Ruo Ando, Toshiyuki Maeda, Hidehiko Tanaka: Trends in OS research for improving information security, IPSJ Journal: Computing Systems (ACS), Vol.5, No.2, pp.51-62, Mar. 2012.
  13. Masaki Hashimoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka: Authorization Policy Description Language Based on Logic Programming, IPSJ Journal, Vol.51, No.9, pp.1682-1691, Sep. 2010.

International Conference / Peer-Reviewed Oral Presentations

  1. Taishin Saito, M. Hashimoto, Kuniyasu Suzaki, "Benign Activity Extraction for Dependency Reduction in Data Provenance-based Attack Analysis," In Proceedings of the 20th International Workshop on Security (IWSEC 2025), Fukuoka, Japan, 2025. (accepted)
  2. K. Yamamoto, M. Oya, M. Hashimoto, Haruhiko Kaiya and T. Okubo, "COTTAGE: Supporting Threat Analysis for Security Novices with Auto-Generated Attack Defense Trees," in 20th International Conference on Software Technologies (ICSOFT 2025), Bilbao, Spain, 2025, pp. 132-142.
  3. K. Sakai, K. Takeshige, S. Matsugaya, M. Shimamura and M. Hashimoto, "Phishing Prevention Focusing on Certificates and Input Forms: PoC as Browser Extensions," 2025 1st International Conference on Consumer Technology (ICCT-Pacific), Matsue, Shimane, Japan, 2025, pp. 1-4, doi: 10.1109/ICCT-Pacific63901.2025.11012853.
  4. M. Oya, K. Yamamoto, M. Hashimoto and T. Okubo, "A Novel Framework for Reusable Attack Tree Patterns: Leveraging CAPEC for Semi-Automated Threat Modeling," in 2025 9th International Conference on Cryptography, Security and Privacy (CSP), Okinawa, Japan, 2025. (accepted)
  5. Shingo Matsugaya, Makoto Shimamura, Kosuke Takeshige, Keisuke Sakai, Masaki Hashimoto, "Characteristic Analysis and Attack Group Identification of Phishing Sites Targeting Japan," In: Barolli, L. (eds) Advances in Internet, Data and Web Technologies. EIDWT 2025. Lecture Notes on Data Engineering and Communications Technologies, vol 243. Springer, Cham. https://doi.org/10.1007/978-3-031-86149-9_7.
  6. Shuhei Ippa, Takao Okubo, Masaki Hashimoto, "An Analysis of Relationship Between Social Bots and Echo Chambers on X in Modern Japan," 2024 Twelfth International Symposium on Computing and Networking (CANDAR), Naha, Japan, 2024, pp. 49-58, doi: 10.1109/CANDAR64496.2024.00014.
  7. M. Shimamura, S. Matsugaya, K. Sakai, K. Takeshige and M. Hashimoto, "An Analysis of the Relationship Between Black-Hat SEO Malware Families Leveraging Information from Redirected Fake E-Commerce Scam Sites," 2024 IEEE Conference on Dependable and Secure Computing (DSC), Tokyo, Japan, 2024, pp. 123-130, doi: 10.1109/DSC63325.2024.00025.
  8. S. Ippa, T. Okubo and M. Hashimoto, "The Reality and Feature Analysis of Information Diffusion in Japanese Disinformation Examples," 2024 19th Asia Joint Conference on Information Security (AsiaJCIS), Tainan, Taiwan, 2024, pp. 137-142, doi: 10.1109/AsiaJCIS64263.2024.00030.
  9. K. Yonemura, M. Hashimoto et al., "Motivation and Educational Effectiveness in Teaching Expert Development Project by an Educational Community," 2024 IEEE Global Engineering Education Conference (EDUCON), Kos Island, Greece, 2024, pp. 01-08, doi: 10.1109/EDUCON60312.2024.10578741.
  10. K. Yonemura, M. Hashimoto et al., "Motivation in Teaching Expert Development Project by KOSEN Security Educational Community," 2023 IEEE Global Engineering Education Conference (EDUCON), Kuwait, Kuwait, 2023, pp. 1-9, doi: 10.1109/EDUCON54358.2023.10125167.
  11. A. Kanda, M. Hashimoto, "Identification of TLS Communications Using Randomness Testing," 2021 IEEE 45th Annual Computer Software and Applications Conference (COMPSAC), 2021, pp. 1099-1106, doi: 10.1109/COMPSAC51774.2021.00150.
  12. M. Kadoguchi, H. Kobayashi, S. Hayashi, A. Otsuka and M. Hashimoto, "Deep Self-Supervised Clustering of the Dark Web for Cyber Threat Intelligence," 2020 IEEE International Conference on Intelligence and Security Informatics (ISI), Arlington, VA, USA, 2020, pp. 1-6, doi: 10.1109/ISI49825.2020.9280485.
  13. H. Kobayashi, M. Kadoguchi, S. Hayashi, A. Otsuka and M. Hashimoto, "An Expert System for Classifying Harmful Content on the Dark Web," 2020 IEEE International Conference on Intelligence and Security Informatics (ISI), Arlington, VA, USA, 2020, pp. 1-6, doi: 10.1109/ISI49825.2020.9280536.
  14. M. Kadoguchi, S. Hayashi, M. Hashimoto and A. Otsuka, "Exploring the Dark Web for Cyber Threat Intelligence using Machine Leaning," 2019 IEEE International Conference on Intelligence and Security Informatics (ISI), Shenzhen, China, 2019, pp. 200-202, doi: 10.1109/ISI.2019.8823360.
  15. T. Yamauchi, Y. Akao, R. Yoshitani, Y. Nakamura and M. Hashimoto, "Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes," 2018 IEEE Conference on Dependable and Secure Computing (DSC), 2018, pp. 1-8, doi: 10.1109/DESEC.2018.8625137.
  16. M. Hashimoto, M. Kim, H. Tsuji and H. Tanaka, "Policy Description Language for Dynamic Access Control Models," 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009, pp. 37-42, doi: 10.1109/DASC.2009.129.
  17. Masaki Hashimoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka: Research on Multiple Policy Integrated Management Method for Distributed Systems, Proceedings of Computer Systems Symposium, IPSJ Symposium Series, vol.2008, no.12, IPSJ, pp.49-56, 2008.
  18. Kazuki Fujisawa, Masaki Hashimoto, Kunio Miyamoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka: Security Enhancement Proposals for Device Drivers in Virtual Machine Monitors, Proceedings of Computer Systems Symposium, IPSJ Symposium Series, vol.2007, no.14, IPSJ, pp.31-38, 2007.
  19. Masaki Hashimoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka: Initial Study of Policy-Based Access Control Model for Distributed Processing, Proceedings of Computer Systems Symposium, IPSJ Symposium Series, vol.2007, no.14, IPSJ, pp.217-224, 2007.

Workshop and Conference Presentations (Non-Refereed, Machine-Translated)

  1. Taishin Saito, Masaki Hashimoto, Kuniyasu Suzaki: Study on Benign Activity Extraction Methods in Information Systems Using DARPA Dataset, Proceedings of Computer Security Symposium 2024, IPSJ, 1641-1648 (2024-10-15).
  2. Shingo Matsugaya, Makoto Shimamura, Kosuke Takeshige, Keisuke Sakai, Masaki Hashimoto: Characteristic Analysis and Attack Group Identification of Phishing Sites Targeting Japan, Proceedings of Computer Security Symposium 2024, IPSJ, 1072-1079 (2024-10-15).
  3. Makoto Shimamura, Kosuke Takeshige, Shingo Matsugaya, Keisuke Sakai, Masaki Hashimoto: Analysis of Relationships Between Malware Using Information from Fake Shopping Sites Redirected by Malware Performing Malicious SEO, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2024-CSEC-106(29), 1-8 (2024-07-15), 2188-8655.
  4. Makoto Shimamura, Kosuke Takeshige, Shingo Matsugaya, Keisuke Sakai, Masaki Hashimoto: Group Extraction and Analysis Using Site Characteristics in Fake Shopping Site Fraud Targeting Japanese People, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2024-CSEC-104(34), 1-8 (2024-03-11), 2188-8655.
  5. Kosuke Takeshige, Keisuke Sakai, Makoto Shimamura, Shingo Matsugaya, Masaki Hashimoto: Multi-Class Classification of Malicious Sites Using Machine Learning, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2024-CSEC-104(7), 1-8 (2024-03-11), 2188-8655.
  6. Atsushi Kanda, Masaki Hashimoto: Can We Create a TLS Lie Detector?, Proceedings of Computer Security Symposium 2023, IPSJ, 1365-1372 (2023-10-23).
  7. Keisuke Sakai, Kosuke Takeshige, Masanori Hiramatsu, Masaki Hashimoto: Research on Trend Analysis of Fake Sites Targeting Japan, Proceedings of Computer Security Symposium 2023, IPSJ, 596-603 (2023-10-23).
  8. Shuhei Ippa, Masaki Hashimoto: Analysis of Social Bot Activity and Influence on Social Media in Modern Japan, Proceedings of Computer Security Symposium 2023, IPSJ, 253-260 (2023-10-23).
  9. Shuhei Ippa, Masaki Hashimoto: Research Toward Understanding the Impact of Social Bots in Japan, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2023-CSEC-102(11), 1-8 (2023-07-17), 2188-8655, 2023.
  10. Keisuke Shiraishi, Masaki Hashimoto: Building Resilient Systems and Recommendations for Security Chaos Engineering (SCE), Advanced Technology and Information Crime and Security Research Group, Japan Society for Security Management, Chuo University, 2023.
  11. Shuhei Ippa, Masaki Hashimoto: Research Toward Understanding Social Bot Activity in Japan, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2023-CSEC-100(29), 1-8 (2023-02-27), 2188-8655, 2023.
  12. Norimitsu Ito, Masaki Hashimoto, Akira Otsuka: Feature Extraction Methods for Binary Code Similarity Detection Using Neural Machine Translation Models, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2023-CSEC-100(20), 1-8 (2023-02-27), 2188-8655, 2023.
  13. Kunihito Adachi, Masaki Hashimoto: Development of Security Checklist for Legacy Control Systems, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2023-CSEC-100(7), 1-8 (2023-02-27), 2188-8655, 2023.
  14. Keisuke Sakai, Kosuke Takeshige, Kazuki Kato, Naoki Kurihara, Katsumi Ono, Masaki Hashimoto: Development of Automatic Detection System for Fake Shopping Sites Using fastText and LightGBM, Proceedings of Computer Security Symposium 2022, IPSJ, 887-894 (2022-10-17).
  15. Keisuke Shiraishi, Masaki Hashimoto, Toshihiro Matsui: Research on Resilient Architecture for Autonomous IoT Systems, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2022-CSEC-96(13), 1-8 (2022-03-03), 2188-8655.
  16. Tsuyoshi Miyasaka, Misuke Okubo, Nobuki Suetsugu, Midori Inaba, Masaki Hashimoto: Development of System for Linking and Visualizing Malicious Activities in Systems for Intrusion Detection, Proceedings of Computer Security Symposium 2021, IPSJ, 381-388 (2021-10-19).
  17. Kosuke Takahashi, Masaki Hashimoto: Client Delegation Method for Anti-Cheat Measures on Servers Using Intel SGX, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2021-CSEC-92(28), 1-8 (2021-03-08), 2188-8655.
  18. Takayuki Chiwaki, Masaki Hashimoto: Countermeasure Methods Using Rust Against Attacks Exploiting Memory Corruption Vulnerabilities, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2021-CSEC-92(9), 1-8 (2021-03-08), 2188-8655.
  19. Nobuki Suetsugu, Miyu Okubo, Masaki Hashimoto: Study on Linking and Visualization Methods for Malicious Activities in Systems for Intrusion Detection, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2020-CSEC-90(24), 1-6 (2020-07-13), 2188-8655.
  20. Hanae Kobayashi, Masaki Hashimoto: Development of Automatic Classification Expert System for Illegal and Harmful Information Prevalent on the Dark Web, IPSJ Security Psychology and Trust Research Reports (SPT), IPSJ, 2020-SPT-36(20), 1-6 (2020-02-24), 2188-8671.
  21. Hitoshi Inoue, Masaki Hashimoto: Investigation of HTTP Requests and Proposal for Identifying Fake User-Agent Values, IPSJ Security Psychology and Trust Research Reports (SPT), IPSJ, 2020-SPT-36(16), 1-6 (2020-02-24), 2188-8671.
  22. Moritoshi Aoyagi, Hidenori Tsuji, Masaki Hashimoto: Search for Similar Binary Code Between Different Architectures Using Neural Machine Translation Models, IPSJ Security Psychology and Trust Research Reports (SPT), IPSJ, 2020-SPT-36(8), 1-6 (2020-02-24), 2188-8671.
  23. Atsushi Kanda, Masaki Hashimoto: Identification of TLS Communication Using Randomness, Proceedings of Computer Security Symposium 2019, IPSJ, 2019, 683-690 (2019-10-14).
  24. Yuka Ogura, Hidenori Tsuji, Masaki Hashimoto: Visualization Method for Secure OS/Intrusion Prevention Effects Using Processing Language, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2019-CSEC-84(9), 1-8 (2019-02-25), 2188-8655.
  25. Yasuhiro Mitsuishi, Masaki Hashimoto, Hidenori Tsuji, Harumichi Yuasa: Current Status and Issues of Maritime Cybersecurity, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2019-CSEC-84(2), 1-9 (2019-02-25), 2188-8655.
  26. Shuhei Segawa, Hidenori Tsuji, Masaki Hashimoto: Initial Study of Vulnerability Testing Tools for Short-Range Wireless Communication, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2018-CSEC-83(5), 1-7 (2018-12-06), 2188-8655.
  27. Masaki Sugiu, Hidenori Tsuji, Masaki Hashimoto: Evaluation of Efficient Deployment of Deception Networks, IPSJ Computer Security Research Reports (CSEC), IPSJ, 2018-CSEC-83(2), 1-6 (2018-12-06), 2188-8655.
  28. Naoki Kurihara, Hidenori Tsuji, Masaki Hashimoto: Fake Site Detection Using Machine Learning, IEICE Technical Report, vol.118, no.315, ICSS2018-56, pp.19-24, November 2018.
  29. Hiroki Inoue, Hidenori Tsuji, Masaki Hashimoto: Access Control Policy Protection Method Using TrustZone Technology, Proceedings of Computer Security Symposium 2018, IPSJ, 2018(2), 941-948.
  30. Yuka Ogura, Hidenori Tsuji, Masaki Hashimoto: Visualization of Mandatory Access Control Effects by TOMOYO Linux, Proceedings of Computer Security Symposium 2018, IPSJ, 2018(2), 949-955.
  31. Yasuhiro Mitsuishi, Masaki Hashimoto, Hidenori Tsuji, Harumichi Yuasa: Current Status and Issues of Maritime Cybersecurity, Proceedings of Computer Security Symposium 2018, IPSJ, 2018(2), 1213-1220.
  32. Tadashi Shimomura, Nobuki Suetsugu, Hidenori Tsuji, Masaki Hashimoto: Malware Detection Method by Machine Learning Focusing on Functional Types of Malicious Activities, IEICE Technical Report, Vol.117, No.481, ICSS2017-51, pp.121-126, February 2018.
  33. Makoto Ashizu, Ikuo Tanaka, Hidenori Tsuji, Masaki Hashimoto: Research on Evaluation Methods for Memory Forensics Tools, IEICE Technical Report, Vol.117, No.481, ICSS2017-51, pp.115-120, February 2018.
  34. Takuya Koike, Misuke Okubo, Hidenori Tsuji, Masaki Hashimoto: Research on Definition Methods of Malicious Activities by Linking System Activities, IEICE Technical Report, Vol.117, No.481, ICSS2017-51, pp.55-60, February 2018.
  35. Shota Hayashi, Hidenori Tsuji, Masaki Hashimoto: Threat Intelligence Extraction Method Using Machine Learning, IPSJ Research Report, Vol.2018, No.5(CSEC80), IPSJ, pp.1-8, February 2018.
  36. Moriyo Tamura, Masaki Hashimoto: Malware Detection Method by Function Similarity in PE Using CNN, IPSJ Research Report, Vol.2017, No.8(CSEC79), IPSJ, pp.1-6, November 2017.
  37. Nobuki Suetsugu, Masaki Hashimoto: Behavioral Consideration by Malware Function Classification as Seen from API Calls, IEICE Technical Report, Vol.116, No.328, ICSS2016-40, pp. 9-14, November 2016.
  38. Ikuo Tanaka, Masaki Hashimoto: Verification of Effectiveness of Memory Forensic Tools Against Anti-Forensic Functions, Proceedings of Computer Security Symposium 2016, 2016(2), 100-105. (2016-10-04)
  39. Takeyasu Yoshimura, Masaki Hashimoto, Hidenori Tsuji, Hidehiko Tanaka: Initial Study for Building Dynamic Analysis Environment for Linux Malware Using TOMOYO Linux, Proceedings of Computer Security Symposium 2016, 2016(2), 518-525. (2016-10-04)
  40. Yudai Tomaru, Masaki Hashimoto, Hidehiko Tanaka: Initial Study for Process Activity Linking Method for Intrusion Prevention, IEICE Technical Report, vol. 115, no. 488, ICSS2015-61, pp. 83-88, March 2016.
  41. Masaki Hashimoto, Minetoshi Takizawa, Fumihiko Takayama, Hidenori Tsuji, Hidehiko Tanaka: Toward Practical Implementation of Mandatory Access Control by Logical Languages, IEICE Technical Report, vol. 115, no. 334, ICSS2015-44, pp. 55-60, November 2015.
  42. Masaki Hashimoto, Minetoshi Takizawa, Fumihiko Takayama, Hidenori Tsuji, Hidehiko Tanaka: User Space Implementation of SELinux Policy Processing System, Proceedings of Computer Systems Symposium, 2014, pp.27-35, 2014-11-12.
  43. Masaki Hashimoto, Minetoshi Takizawa, Fumihiko Takayama, Hidenori Tsuji, Hidehiko Tanaka: Implementation and Evaluation of Authorization Decision Mechanism for SELinux by Logical Language, Proceedings of Computer Security Symposium 2014, 2014-2, pp.743-750, 2014-10-15.
  44. Akira Urano, Masaki Hashimoto, Hidenori Tsuji, Hidehiko Tanaka: Initial Study on Trace Detection Method of Anti-Forensic Tools, Proceedings of Computer Security Symposium 2013, 2013-4, pp.163-168, 2013-10-14.
  45. Tomohiro Hotta, Masaki Hashimoto, Hidenori Tsuji, Hidehiko Tanaka: Email Misdirection Countermeasures Considering Practical Operation, IPSJ Research Report, Vol.2013, No.50(CSEC60), IPSJ, pp.1-8, 2013.
  46. Yusuke Karasawa, Masaki Hashimoto, Hidenori Tsuji, Hidehiko Tanaka: Consideration on Methods to Prevent One-Click Fraud, IEICE Information Security Research Group, 2013 Symposium on Cryptography and Information Security (SCIS2013), 2F4-2, 2013.
  47. Masanobu Nakama, Masaki Hashimoto, Hidenori Tsuji, Hidehiko Tanaka: Proposal of C&C Server Behavior Information Extraction System, IEICE Information Security Research Group, 2013 Symposium on Cryptography and Information Security (SCIS2013), 1D1-5, 2013.
  48. Tatsuhiko Matsufuji, Masaki Hashimoto, Keiichi Horiai, Hidehiko Tanaka: Improvement of Automatic Malware Classification System by Strengthening Static Analysis, IPSJ Research Report: CSEC [Computer Security], Vol.2012, No.10, pp.1-7, 2012.
  49. Hideki Hatagami, Masaki Hashimoto, Keiichi Horiai, Hidehiko Tanaka: Research on Automatic Classification Method in Malware Dynamic Analysis, IPSJ Research Report: CSEC [Computer Security], Vol.2011, No.51, pp.1-7, 2011.
  50. Masayuki Nakao, Masaki Hashimoto, Kunio Miyamoto, Hidehiko Tanaka: Initial Study on System Integrity Verification Using Software-Based TCB, IEICE Information Security Research Group, 2010 Symposium on Cryptography and Information Security (SCIS2010), 4E2-3, 2010.
  51. Masaki Hashimoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka: Research on Policy Description Language Using Logical Language, Japan Society for Software Science and Technology, 7th Dependable Systems Workshop (DSW09), Hakodate Onuma Prince Hotel, 2009.
  52. Mira Kim, Masaki Hashimoto, Hidenori Tsuji, Hidehiko Tanaka: Study of Information Leakage Prevention Technology by File Self-Destruction Function, Proceedings of Computer Security Symposium, IPSJ Symposium Series, Vol.2008, No.8, Volume 1, IPSJ, pp.115-119, 2008.
  53. Kunio Miyamoto, Kazuki Fujisawa, Masaki Hashimoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka: A Method for Determining Execution in Virtual Machine Environment at Program Runtime, Proceedings of Computer Security Symposium, IPSJ Symposium Series, vol.2007, no.10, IPSJ, pp.549-552, 2007.
  54. Kazuki Fujisawa, Masaki Hashimoto, Kunio Miyamoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka: Proposals for Improving Device Driver Safety in Virtual Machine Monitors, Information Science and Technology Forum, FIT2007, General Lecture Papers, Volume 4, IPSJ, pp.53-54, 2007.
  55. Masaki Hashimoto, Kazuki Fujisawa, Kunio Miyamoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka: Resource Access Control Using Capability in Distributed Systems, IPSJ Research Report, Vol.2007, No.71(CSEC38), IPSJ, pp.393-400, 2007.
  56. Hidenori Tsuji, Masaki Hashimoto, Mira Kim, Hidehiko Tanaka: Initial Study on Secure OS as Application Platform, IPSJ Research Report, Vol.2007, No.71(CSEC38), IPSJ, pp.381-386, 2007.
  57. Masaki Hashimoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka: A Study for Building Secure Distributed Systems, Proceedings of Computer Security Symposium, IPSJ Symposium Series, vol.2006, no.11, IPSJ, pp.435-440, 2006.
  58. Masaki Hashimoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka: Research on Secure Resource Management Methods in Distributed Environments, Information Science and Technology Forum, FIT2006, General Lecture Papers, Volume 4, IPSJ, pp.311-312, 2006.