• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1994 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2020

    Detecting Struct Member-Related Memory Leaks Using Error Code Analysis in Linux Kernel

    Suzuki, K., Kubota, T. & Kono, K., 2020 Oct, Proceedings - 2020 IEEE 31st International Symposium on Software Reliability Engineering Workshops, ISSREW 2020. Vieira, M., Madeira, H., Antunes, N. & Zheng, Z. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 329-335 7 p. 9307663. (Proceedings - 2020 IEEE 31st International Symposium on Software Reliability Engineering Workshops, ISSREW 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Poster: No More Slow Messages: Programmable Packet Handling in Hard IRQ

    Natori, K., Kikuchi, T. & Kono, K., 2020 Sep, Proceedings - 2020 International Symposium on Reliable Distributed Systems, SRDS 2020. IEEE Computer Society, p. 329-331 3 p. 9252018. (Proceedings of the IEEE Symposium on Reliable Distributed Systems; vol. 2020-September).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2019

    A framework for building linux-based single-purpose appliances optimized for the cloud

    Osuka, A. & Kono, K., 2019 Dec, Proceedings - 11th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2019, 19th IEEE International Conference on Computer and Information Technology, CIT 2019, 2019 International Workshop on Resource Brokering with Blockchain, RBchain 2019 and 2019 Asia-Pacific Services Computing Conference, APSCC 2019. Chen, J. & Yang, L. T. (eds.). IEEE Computer Society, p. 305-308 4 p. 8968938. (Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom; vol. 2019-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Detecting and analyzing year 2038 problem bugs in user-level applications

    Suzuki, K., Kubota, T. & Kono, K., 2019 Dec, Proceedings - 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing, PRDC 2019. IEEE Computer Society, p. 65-74 10 p. 8952166. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC; vol. 2019-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • GPUVM: Why not virtualizing GPUs at the hypervisor?

    Suzuki, Y., Kato, S., Yamada, H. & Kono, K., 2019 Jan 1, Proceedings of the 2014 USENIX Annual Technical Conference, USENIX ATC 2014. USENIX Association, p. 109-120 12 p. (Proceedings of the 2014 USENIX Annual Technical Conference, USENIX ATC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    54 Citations (Scopus)
  • Short-Liveness of Error Propagation in Kernel Can Improve Operating Systems Availability

    Sugimoto, M., Kubota, T. & Kono, K., 2019 Jun, Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2019. Institute of Electrical and Electronics Engineers Inc., p. 23-24 2 p. 8805798. (Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • To unify or not to unify: A case study on unified builds (in WebKit)

    Kubota, T., Suzuki, Y. & Kono, K., 2019 Feb 16, CC 2019 - Proceedings of the 28th International Conference on Compiler Construction. Kulkarni, M. & Amaral, J. N. (eds.). Association for Computing Machinery, p. 42-52 11 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2018

    An application framework for migrating GPGPU Cloud applications

    Yuhara, S., Suzuki, Y. & Kono, K., 2018 Dec 26, Proceedings - IEEE 10th International Conference on Cloud Computing Technology and Science, CloudCom 2018. IEEE Computer Society, p. 62-66 5 p. 8590995. (Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom; vol. 2018-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Hardening hypervisors against vulnerabilities in instruction emulators

    Ishiguro, K. & Kono, K., 2018 Apr 23, Proceedings of the 11th European Workshop on Systems Security, EuroSec 2018. Association for Computing Machinery, Inc, 3193118. (Proceedings of the 11th European Workshop on Systems Security, EuroSec 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2017

    GLoop: An event-driven runtime for consolidating GPGPU applications

    Suzuki, Y., Yamada, H., Kato, S. & Kono, K., 2017 Sep 24, SoCC 2017 - Proceedings of the 2017 Symposium on Cloud Computing. Association for Computing Machinery, Inc, p. 80-93 14 p. (SoCC 2017 - Proceedings of the 2017 Symposium on Cloud Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Nioh: Hardening the hypervisor by filtering illegal I/O requests to virtual devices

    Ogasawara, J. & Kono, K., 2017 Dec 4, Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Association for Computing Machinery, p. 542-552 11 p. (ACM International Conference Proceeding Series; vol. Part F132521).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • 2016

    Containers or hypervisors: Which is better for database consolidation?

    Mardan, A. A. A. & Kono, K., 2016 Jul 2, Proceedings - 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016. IEEE Computer Society, p. 564-571 8 p. 7830739. (Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom; vol. 0).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • 2015

    A guideline for selecting live migration policies and implementations in clouds

    Koto, A., Kono, K. & Yamada, H., 2015 Feb 9, Proceedings - 2014 IEEE 6th International Conference on Cloud Computing Technology and Science, CloudCom 2014. February ed. IEEE Computer Society, p. 226-233 8 p. 7037671. (Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom; vol. 2015-February, no. February).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • 2014

    Clickjuggler: Checking for incomplete defenses against clickjacking

    Takamatsu, Y. & Kono, K., 2014 Jan 1, 2014 12th Annual Conference on Privacy, Security and Trust, PST 2014. Miri, A., Josang, A., Garcia-Alfaro, J., Hengartner, U. & Huang, N-F. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 224-231 8 p. 6890943. (2014 12th Annual Conference on Privacy, Security and Trust, PST 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Do injected faults cause real failures? A case study of linux

    Kikuchi, N., Yoshimura, T., Sakuma, R. & Kono, K., 2014 Dec 12, Proceedings - IEEE 25th International Symposium on Software Reliability Engineering Workshops, ISSREW 2014. Institute of Electrical and Electronics Engineers Inc., p. 174-179 6 p. 6983834. (Proceedings - IEEE 25th International Symposium on Software Reliability Engineering Workshops, ISSREW 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • FoxyFeed: Forging device-level asynchronous events for kernel development

    Kono, K., Miyahara, S., Yamada, H. & Yoshimura, T., 2014 Dec 3, Proceedings - 20th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2014. IEEE Computer Society, p. 145-154 10 p. 6974781. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Minimizing WAN communications in inter-datacenter key-value stores

    Horie, H., Asahara, M., Yamada, H. & Kono, K., 2014 Dec 3, Proceedings - 2014 IEEE 7th International Conference on Cloud Computing, CLOUD 2014. Kesselman, C. (ed.). IEEE Computer Society, p. 490-497 8 p. 6973778. (IEEE International Conference on Cloud Computing, CLOUD).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2013

    Distinguishing legitimate and fake/crude antivirus software

    Kasuya, M. & Kono, K., 2013 Dec 1, SECURWARE 2013 - 7th International Conference on Emerging Security Information, Systems and Technologies. p. 109-116 8 p. (SECURWARE 2013 - 7th International Conference on Emerging Security Information, Systems and Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Pangaea: A single key space, inter-datacenter key-value store

    Horie, H., Asahara, M., Yamada, H. & Kono, K., 2013, Proceedings - 2013 19th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2013. IEEE Computer Society, p. 434-435 2 p. 6808209. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Request dispatching for cheap energy prices in cloud data centers

    Yamada, H., Sakamoto, T., Horie, H. & Kono, K., 2013 Dec 1, Proceedings of the 2013 IEEE 2nd International Conference on Cloud Networking, CloudNet 2013. p. 210-213 4 p. 6710580. (Proceedings of the 2013 IEEE 2nd International Conference on Cloud Networking, CloudNet 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Traveling forward in time to newer operating systems using ShadowReboot

    Yamada, H. & Kono, K., 2013, VEE 2013 - Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments. p. 121-130 10 p. (VEE 2013 - Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • 2012

    Automated detection of session management vulnerabilities in web applications

    Takamatsu, Y., Kosuga, Y. & Kono, K., 2012 Nov 6, 2012 10th Annual International Conference on Privacy, Security and Trust, PST 2012. p. 112-119 8 p. 6297927. (2012 10th Annual International Conference on Privacy, Security and Trust, PST 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Energy-price-driven request dispatching for cloud data centers

    Sakamoto, T., Yamada, H., Horie, H. & Kono, K., 2012 Oct 2, Proceedings - 2012 IEEE 5th International Conference on Cloud Computing, CLOUD 2012. p. 974-976 3 p. 6253610. (Proceedings - 2012 IEEE 5th International Conference on Cloud Computing, CLOUD 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Honeyguide: A VM migration-aware network topology for saving energy consumption in data center networks

    Shirayanagi, H., Yamada, H. & Kono, K., 2012, 2012 IEEE Symposium on Computers and Communications, ISCC 2012. p. 460-467 8 p. 6249339. (Proceedings - IEEE Symposium on Computers and Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Citations (Scopus)
  • Inter-datacenter elastic key-value storage

    Horie, H., Asahara, M., Yamada, H. & Kono, K., 2012 Sep 28, 10th International Conference on Optical Internet, COIN 2012. p. 71-72 2 p. 6245947. (10th International Conference on Optical Internet, COIN 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Towards unobtrusive VM live migration for cloud computing platforms

    Koto, A., Yamada, H., Ohmura, K. & Kono, K., 2012, Proceedings of the Asia-Pacific Workshop on Systems, APSYS'12. (Proceedings of the Asia-Pacific Workshop on Systems, APSYS'12).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    35 Citations (Scopus)
  • 2011

    Can linux be rejuvenated without reboots?

    Yoshimura, T., Yamada, H. & Kono, K., 2011, Proceedings - 2011 3rd International Workshop on Software Aging and Rejuvenation, WoSAR 2011. p. 50-55 6 p. 6141725. (Proceedings - 2011 3rd International Workshop on Software Aging and Rejuvenation, WoSAR 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Clustering performance anomalies in web applications based on root causes

    Iwata, S. & Kono, K., 2011 Jul 15, Proceedings of the 8th ACM International Conference on Autonomic Computing, ICAC 2011 and Co-located Workshops. p. 221-224 4 p. (Proceedings of the 8th ACM International Conference on Autonomic Computing, ICAC 2011 and Co-located Workshops).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Efficiently synchronizing virtual machines in cloud computing environments

    Tonosaki, S., Yamada, H. & Kono, K., 2011, Proceedings - 2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011. p. 154-162 9 p. 6133139. (Proceedings - 2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Phase-based reboot: Reusing operating system execution phases for cheap reboot-based recovery

    Yamakita, K., Yamada, H. & Kono, K., 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks, DSN 2011. p. 169-180 12 p. 5958216. (Proceedings of the International Conference on Dependable Systems and Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Citations (Scopus)
  • Traveling forward in time to newer operating systems using ShadowReboot

    Yamada, H. & Kono, K., 2011 Dec 1, Proceedings of the 2nd Asia-Pacific Workshop on Systems, APSys'11. (Proceedings of the 2nd Asia-Pacific Workshop on Systems, APSys'11).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2010

    AspFuzz: A state-aware protocol fuzzer based on application-layer protocols

    Kitagawa, T., Hanaoka, M. & Kono, K., 2010 Sep 17, IEEE Symposium on Computers and Communications, ISCC 2010. p. 202-208 7 p. 5546704. (Proceedings - IEEE Symposium on Computers and Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • Automated detection of session fixation vulnerabilities

    Takamatsu, Y., Kosuga, Y. & Kono, K., 2010, Proceedings of the 19th International Conference on World Wide Web, WWW '10. p. 1191-1192 2 p. (Proceedings of the 19th International Conference on World Wide Web, WWW '10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Narrowing down possible causes of performance anomaly in web applications

    Iwata, S. & Kono, K., 2010, EDCC-8 - Proceedings of the 8th European Dependable Computing Conference. p. 185-190 6 p. 5474181. (EDCC-8 - Proceedings of the 8th European Dependable Computing Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2009

    Bit visor: A thin hypervisor for enforcing i/o device security

    Shinagawa, T., Eiraku, H., Tanimoto, K., Omote, K., Hasegawa, S., Horie, T., Hirano, M., Kourai, K., Oyama, Y., Kawai, E., Kono, K., Chiba, S., Shinjo, Y. & Kato, K., 2009 Jul 14, Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE'09. p. 121-130 10 p. (Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE'09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    129 Citations (Scopus)
  • Efficient update propagation by speculating replica locations on peer-to-peer networks

    Hayakawa, A., Asahara, M., Kono, K. & Kojima, T., 2009, ICPADS '09 - 15th International Conference on Parallel and Distributed Systems. p. 422-431 10 p. 5395309. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Embedding network coordinates into the heart of distributed hash tables

    Kojima, T., Asahara, M., Kono, K. & Hayakawa, A., 2009, IEEE P2P'09 - 9th International Conference on Peer-to-Peer Computing. p. 155-158 4 p. 5284517. (IEEE P2P'09 - 9th International Conference on Peer-to-Peer Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Performance improvement by means of collaboration between network intrusion detection systems

    Hanaoka, M., Kono, K. & Hirotsu, T., 2009, Proceedings of the 7th Annual Communication Networks and Services Research Conference, CNSR 2009. p. 262-269 8 p. 4939136. (Proceedings of the 7th Annual Communication Networks and Services Research Conference, CNSR 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Simplifying security policy descriptions for internet servers in secure operating systems

    Yokoyama, T., Hanaoka, M., Shimamura, M. & Kono, K., 2009 Dec 1, 24th Annual ACM Symposium on Applied Computing, SAC 2009. p. 326-333 8 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Yataglass: Network-level code emulation for analyzing memory-scanning attacks

    Shimamura, M. & Kono, K., 2009, Detection of Intrusions and Malware, and Vulnerability Assessment - 6th International Conference, DIMVA 2009, Proceedings. p. 68-87 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5587 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2008

    Enforcing appropriate process execution for exploiting idle resources from outside operating systems

    Abe, Y., Yamada, H. & Kono, K., 2008, EuroSys'08 - Proceedings of the EuroSys 2008 Conference. p. 27-40 14 p. (EuroSys'08 - Proceedings of the EuroSys 2008 Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • FlexBox: Sandboxing Internet servers based on layer-7 contexts

    Tanoue, A., Shimamura, M., Hanaoka, M. & Kono, K., 2008, IEEE Symposium on Computers and Communications 2008, ISCC 2008. p. 386-391 6 p. 4625645. (Proceedings - IEEE Symposium on Computers and Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2007

    An efficient TCP reassembler mechanism for layer7-aware network intrusion detection/prevention systems

    Hanaoka, M., Kono, K., Shimamura, M. & Yamaguchi, S., 2007 Dec 1, 12th IEEE International Symposium on Computers and Communications, ISCC '07. p. 79-86 8 p. 4381605. (Proceedings - IEEE Symposium on Computers and Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Finding candidate spots for replica servers based on demand fluctuation

    Asahara, M., Shimada, A., Yamada, H. & Kono, K., 2007, The 13th International Conference on Parallel and Distributed Systems, ICPADS. 4447737. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • FoxyTechnique: Tricking operating system policies with a virtual machine monitor

    Yamada, H. & Kono, K., 2007, VEE'07: Proceedings of the 3rd International Conference on Virtual Execution Environments. p. 55-64 10 p. (VEE'07: Proceedings of the 3rd International Conference on Virtual Execution Environments).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Sania: Syntactic and semantic analysis for automated testing against SQL injection

    Kosuga, Y., Kono, K., Hanaoka, M., Hishiyama, M. & Takahama, Y., 2007, Proceedings - 23rd Annual Computer Security Applications Conference, ACSAC 2007. p. 107-116 10 p. 4412981. (Proceedings - Annual Computer Security Applications Conference, ACSAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    68 Citations (Scopus)
  • 2006

    User-level disk-bandwidth control for resource-borrowing network applications

    Yamada, H. & Kono, K., 2006 Jan 1, 10th IEEE/IFIP Network Operations and Management Symposium, NOMS 2006. Institute of Electrical and Electronics Engineers Inc., 1687667. (IEEE Symposium Record on Network Operations and Management Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Using attack information to reduce false positives in network IDS

    Shimamura, M. & Kono, K., 2006, Proceedings - 11th IEEE Symposium on Computers and Communications, ISCC 2006. Institute of Electrical and Electronics Engineers Inc., p. 386-393 8 p. 1691059. (Proceedings - International Symposium on Computers and Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • 2005

    A practical approach to automatic parameter-tuning of web servers

    Sugiki, A., Kono, K. & Iwasaki, H., 2005, Advances in Computer Science - ASIAN 2005: 10th Asian Computing Science Conference, Proceedings. p. 146-159 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3818 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2003

    A hierarchical protection model for protecting against executable content

    Shinagawa, T., Kono, K. & Masuda, T., 2003, Proceedings of the IASTED International Conference on Computer Science and Technology. Sahni, S. (ed.). p. 194-202 9 p. (Proceedings of the IASTED International Conference on Computer Science and Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution