If you made any changes in Pure these will be visible here soon.

Research Output 1994 2019

  • 470 Citations
  • 10 h-Index
  • 52 Conference contribution
  • 34 Article
  • 1 Chapter
2019

File systems are hard to test — Learning from XFStests

Aota, N. & Kono, K., 2019 Feb 1, In : IEICE Transactions on Information and Systems. 2, p. 269-279 11 p.

Research output: Contribution to journalArticle

Testing

Short-Liveness of Error Propagation in Kernel Can Improve Operating Systems Availability

Sugimoto, M., Kubota, T. & Kono, K., 2019 Jun 1, Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2019. Institute of Electrical and Electronics Engineers Inc., p. 23-24 2 p. 8805798. (Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Availability
Computer operating systems
Data structures
Computer systems
Data storage equipment

To unify or not to unify: A case study on unified builds (in WebKit)

Kubota, T., Suzuki, Y. & Kono, K., 2019 Feb 16, CC 2019 - Proceedings of the 28th International Conference on Compiler Construction. Amaral, J. N. & Kulkarni, M. (eds.). Association for Computing Machinery, p. 42-52 11 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

An application framework for migrating GPGPU Cloud applications

Yuhara, S., Suzuki, Y. & Kono, K., 2018 Dec 26, Proceedings - IEEE 10th International Conference on Cloud Computing Technology and Science, CloudCom 2018. IEEE Computer Society, Vol. 2018-December. p. 62-66 5 p. 8590995

Research output: Chapter in Book/Report/Conference proceedingConference contribution

GPGPU
Servers
Server
Hardware
Preemption

Cooperative GPGPU scheduling for consolidating server workloads

Suzuki, Y., Yamada, H., Kato, S. & Kono, K., 2018 Dec 1, In : IEICE Transactions on Information and Systems. E101D, 12, p. 3019-3037 19 p.

Research output: Contribution to journalArticle

Servers
Scheduling
Graphics processing unit
Multiplexing
Consolidation
1 Citation (Scopus)

Hardening hypervisors against vulnerabilities in instruction emulators

Ishiguro, K. & Kono, K., 2018 Apr 23, Proceedings of the 11th European Workshop on Systems Security, EuroSec 2018. Association for Computing Machinery, Inc, 3193118

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hardening
Program processors
Virtual machine
2017
5 Citations (Scopus)

Containers or hypervisors: Which is better for database consolidation?

Mardan, A. A. A. & Kono, K., 2017 Jan 23, Proceedings - 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016. IEEE Computer Society, p. 564-571 8 p. 7830739

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Consolidation
Container
Virtualization
Isolation
Containers
2 Citations (Scopus)

GLoop: An event-driven runtime for consolidating GPGPU applications

Suzuki, Y., Yamada, H., Kato, S. & Kono, K., 2017 Sep 24, SoCC 2017 - Proceedings of the 2017 Symposium on Cloud Computing. Association for Computing Machinery, Inc, p. 80-93 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

GPGPU
Event-driven
Graphics Processing Unit
Scheduling
Prototype
3 Citations (Scopus)

Nioh: Hardening the hypervisor by filtering illegal I/O requests to virtual devices

Ogasawara, J. & Kono, K., 2017 Dec 4, Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Association for Computing Machinery, Vol. Part F132521. p. 542-552 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hardening
Specifications
Virtual machine
2016

A case for static analysis of linux to find faults in interrupt request handlers

Yoshimura, T. & Kono, K., 2016, In : Journal of Information Processing. 24, 3, p. 573-582 10 p.

Research output: Contribution to journalArticle

Static analysis
Availability
Linux
8 Citations (Scopus)

GPUvm: GPU Virtualization at the Hypervisor

Suzuki, Y., Kato, S., Yamada, H. & Kono, K., 2016 Sep 1, In : IEEE Transactions on Computers. 65, 9, p. 2752-2766 15 p., 7349172.

Research output: Contribution to journalArticle

Virtualization
Graphics Processing Unit
Virtual Machine
Trade-offs
Graphics processing unit

Report on the Asia-Pacific systems workshop 2015 (APSys'15)

Heiser, G., Kono, K., Park, K. & Van Renesse, R., 2016 Mar 11, In : Operating Systems Review (ACM). 50, 1, p. 1-2 2 p.

Research output: Contribution to journalArticle

2015
5 Citations (Scopus)

A guideline for selecting live migration policies and implementations in clouds

Koto, A., Kono, K. & Yamada, H., 2015 Feb 9, Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom. February ed. IEEE Computer Society, Vol. 2015-February. p. 226-233 8 p. 7037671

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Migration
Cloud computing
Virtual Machine
Policy
Virtual machine

Detection of visual clickjacking vulnerabilities in incomplete defenses

Takamatsu, Y. & Kono, K., 2015 Jul 15, In : Journal of Information Processing. 23, 4, p. 513-524 12 p.

Research output: Contribution to journalArticle

2014

A VMM-level approach to shortening downtime of operating systems reboots in software updates

Yamada, H. & Kono, K., 2014 Oct 1, In : IEICE Transactions on Information and Systems. E97D, 10, p. 2663-2675 13 p.

Research output: Contribution to journalArticle

Computer operating systems
Virtual machine
4 Citations (Scopus)

Clickjuggler: Checking for incomplete defenses against clickjacking

Takamatsu, Y. & Kono, K., 2014, 2014 12th Annual Conference on Privacy, Security and Trust, PST 2014. Institute of Electrical and Electronics Engineers Inc., p. 224-231 8 p. 6890943

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Do injected faults cause real failures? A case study of linux

Kikuchi, N., Yoshimura, T., Sakuma, R. & Kono, K., 2014 Dec 12, Proceedings - IEEE 25th International Symposium on Software Reliability Engineering Workshops, ISSREW 2014. Institute of Electrical and Electronics Engineers Inc., p. 174-179 6 p. 6983834

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Theaters
Linux
1 Citation (Scopus)

Efficient update activation for virtual machines in iaas cloud computing environments

Yamada, H., Tonosaki, S. & Kono, K., 2014, In : IEICE Transactions on Information and Systems. E97-D, 3, p. 469-479 11 p.

Research output: Contribution to journalArticle

Cloud computing
Chemical activation
Servers
Virtual machine
Internet

FoxyFeed: Forging device-level asynchronous events for kernel development

Kono, K., Miyahara, S., Yamada, H. & Yoshimura, T., 2014 Dec 3, Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC. IEEE Computer Society, p. 145-154 10 p. 6974781

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Forging
Linux
Virtual machine

Minimizing WAN communications in inter-datacenter key-value stores

Horie, H., Asahara, M., Yamada, H. & Kono, K., 2014 Dec 3, IEEE International Conference on Cloud Computing, CLOUD. IEEE Computer Society, p. 490-497 8 p. 6973778

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wide area networks
Data transfer
Communication
Routing protocols
Scalability

Screening legitimate and fake/crude antivirus software

Kasuya, M. & Kono, K., 2014, In : IPSJ Online Transactions. 7, 2014, p. 43-51 9 p.

Research output: Contribution to journalArticle

Screening
Data storage equipment
Program processors
Malware
Experiments
2013

Automatically checking for session management vulnerabilities in web applications

Takamatsu, Y., Kosuga, Y. & Kono, K., 2013, In : IPSJ Online Transactions. 6, 1, p. 17-27 11 p.

Research output: Contribution to journalArticle

Experiments

Distinguishing legitimate and fake/crude antivirus software

Kasuya, M. & Kono, K., 2013, SECURWARE 2013 - 7th International Conference on Emerging Security Information, Systems and Technologies. p. 109-116 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Program processors
Malware
Experiments
10 Citations (Scopus)

Honeyguide: A VM migration-aware network topology for saving energy consumption in data center networks

Shirayanagi, H., Yamada, H. & Kono, K., 2013 Sep, In : IEICE Transactions on Information and Systems. E96-D, 9, p. 2055-2064 10 p.

Research output: Contribution to journalArticle

Consolidation
Energy utilization
Switches
Topology
Fault tolerance
1 Citation (Scopus)

Pangaea: A single key space, inter-datacenter key-value store

Horie, H., Asahara, M., Yamada, H. & Kono, K., 2013, Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS. IEEE Computer Society, p. 434-435 2 p. 6808209

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data transfer
1 Citation (Scopus)

Request dispatching for cheap energy prices in cloud data centers

Yamada, H., Sakamoto, T., Horie, H. & Kono, K., 2013, Proceedings of the 2013 IEEE 2nd International Conference on Cloud Networking, CloudNet 2013. p. 210-213 4 p. 6710580

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
Servers
Energy utilization
Processing
Industry

Traveling forward in time to newer operating systems using shadowreboot

Yamada, H. & Kono, K., 2013 Aug, In : ACM SIGPLAN Notices. 48, 7, p. 121-130 10 p.

Research output: Contribution to journalArticle

Linux
Virtual machine
3 Citations (Scopus)

Traveling forward in time to newer operating systems using ShadowReboot

Yamada, H. & Kono, K., 2013, VEE 2013 - Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments. p. 121-130 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Linux
Virtual machine

Using fault injection to analyze the scope of error propagation in linux

Yoshimura, T., Yamada, H. & Kono, K., 2013, In : IPSJ Online Transactions. 6, 1, p. 55-64 10 p.

Research output: Contribution to journalArticle

Linux
Computer operating systems
Data structures
Computer systems
Availability
2012
4 Citations (Scopus)

Automated detection of session management vulnerabilities in web applications

Takamatsu, Y., Kosuga, Y. & Kono, K., 2012, 2012 10th Annual International Conference on Privacy, Security and Trust, PST 2012. p. 112-119 8 p. 6297927

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments

Clustering performance anomalies based on similarity in processing time changes

Iwata, S. & Kono, K., 2012, In : IPSJ Online Transactions. 5, 1, p. 1-12 12 p.

Research output: Contribution to journalArticle

Processing
Industry
Servers
3 Citations (Scopus)

Energy-price-driven request dispatching for cloud data centers

Sakamoto, T., Yamada, H., Horie, H. & Kono, K., 2012, Proceedings - 2012 IEEE 5th International Conference on Cloud Computing, CLOUD 2012. p. 974-976 3 p. 6253610

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
Servers
Energy utilization
Industry
26 Citations (Scopus)

Honeyguide: A VM migration-aware network topology for saving energy consumption in data center networks

Shirayanagi, H., Yamada, H. & Kono, K., 2012, Proceedings - IEEE Symposium on Computers and Communications. p. 460-467 8 p. 6249339

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data Center
Virtual Machine
Network Topology
Consolidation
Energy Consumption

Inter-datacenter elastic key-value storage

Horie, H., Asahara, M., Yamada, H. & Kono, K., 2012, 10th International Conference on Optical Internet, COIN 2012. p. 71-72 2 p. 6245947

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Overlay networks
Joining
Resource allocation
Servers

Lightweight recovery from kernel failures using phase-based reboot

Yamakita, K., Yamada, H. & Kono, K., 2012, In : IPSJ Online Transactions. 5, 1, p. 59-70 12 p.

Research output: Contribution to journalArticle

Recovery
Computer systems
Availability
Experiments
Linux

MashCache: Taming flash crowds by using their good features

Horie, H., Asahara, M., Yamada, H. & Kono, K., 2012, In : IPSJ Online Transactions. 5, 1, p. 21-33 13 p.

Research output: Contribution to journalArticle

Metadata
Explosions
Websites
Servers
Chemical analysis
33 Citations (Scopus)

Towards unobtrusive VM live migration for cloud computing platforms

Koto, A., Yamada, H., Ohmura, K. & Kono, K., 2012, Proceedings of the Asia-Pacific Workshop on Systems, APSYS'12.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Resource allocation
Throughput
Data storage equipment
Virtual machine
2011
2 Citations (Scopus)

Amberate: A framework for automated vulnerability scanners for web applications

Kosuga, Y. & Kono, K., 2011, In : Computer Software. 28, 4, p. 175-195 21 p.

Research output: Contribution to journalArticle

A state-aware protocol fuzzer based on application-layer protocols

Kitagawa, T., Hanaoka, M. & Kono, K., 2011 May, In : IEICE Transactions on Information and Systems. E94-D, 5, p. 1008-1017 10 p.

Research output: Contribution to journalArticle

Network protocols
HTTP
Servers
Specifications
Experiments
5 Citations (Scopus)

Can linux be rejuvenated without reboots?

Yoshimura, T., Yamada, H. & Kono, K., 2011, Proceedings - 2011 3rd International Workshop on Software Aging and Rejuvenation, WoSAR 2011. p. 50-55 6 p. 6141725

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Faulting
Computer operating systems
Linux
Data structures
Computer systems
2 Citations (Scopus)

Clustering performance anomalies in web applications based on root causes

Iwata, S. & Kono, K., 2011, Proceedings of the 8th ACM International Conference on Autonomic Computing, ICAC 2011 and Co-located Workshops. p. 221-224 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web Application
Anomaly
Bean
Roots
Clustering

Efficiently synchronizing virtual machines in cloud computing environments

Tonosaki, S., Yamada, H. & Kono, K., 2011, Proceedings - 2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011. p. 154-162 9 p. 6133139

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Servers
Virtual machine
Cloning
Computer operating systems
22 Citations (Scopus)

Phase-based reboot: Reusing operating system execution phases for cheap reboot-based recovery

Yamakita, K., Yamada, H. & Kono, K., 2011, Proceedings of the International Conference on Dependable Systems and Networks. p. 169-180 12 p. 5958216

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recovery
Computer systems
Availability
Experiments
Linux

Traveling forward in time to newer operating systems using ShadowReboot

Yamada, H. & Kono, K., 2011, Proceedings of the 2nd Asia-Pacific Workshop on Systems, APSys'11.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Switches
Linux
Virtual machine
2010
12 Citations (Scopus)

AspFuzz: A state-aware protocol fuzzer based on application-layer protocols

Kitagawa, T., Hanaoka, M. & Kono, K., 2010, Proceedings - IEEE Symposium on Computers and Communications. p. 202-208 7 p. 5546704

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Vulnerability
Network protocols
Anomalous
HTTP
Servers
5 Citations (Scopus)

Automated detection of session fixation vulnerabilities

Takamatsu, Y., Kosuga, Y. & Kono, K., 2010, Proceedings of the 19th International Conference on World Wide Web, WWW '10. p. 1191-1192 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Simulators
Experiments

Introduction to the special issue on software papers

Izumi, J., Ichiji, H., Kono, K., Gondow, K., Toyoda, M. & Banbara, M., 2010, In : Computer Software. 27, 4, p. 1 1 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Narrowing down possible causes of performance anomaly in web applications

Iwata, S. & Kono, K., 2010, EDCC-8 - Proceedings of the 8th European Dependable Computing Conference. p. 185-190 6 p. 5474181

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web Application
Anomaly
Monitoring
Control Charts
Monitoring System

P2P-Based approach to finding replica server locations for alleviating flash crowds

Asaharata, M., Kono, K., Kojima, T. & Hayakawaf, A., 2010 Nov, In : IEICE Transactions on Information and Systems. E93-D, 11, p. 3027-3037 11 p.

Research output: Contribution to journalArticle

Servers
Internet
2009
114 Citations (Scopus)

Bit visor: A thin hypervisor for enforcing i/o device security

Shinagawa, T., Eiraku, H., Tanimoto, K., Omote, K., Hasegawa, S., Horie, T., Hirano, M., Kourai, K., Oyama, Y., Kawai, E., Kono, K., Chiba, S., Shinjo, Y. & Kato, K., 2009, Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE'09. p. 121-130 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer hardware
Cryptography
Virtual machine
Computer systems