• 547 Citations
  • 11 h-Index
19942019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2019

A framework for building linux-based single-purpose appliances optimized for the cloud

Osuka, A. & Kono, K., 2019 Dec, Proceedings - 11th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2019, 19th IEEE International Conference on Computer and Information Technology, CIT 2019, 2019 International Workshop on Resource Brokering with Blockchain, RBchain 2019 and 2019 Asia-Pacific Services Computing Conference, APSCC 2019. Chen, J. & Yang, L. T. (eds.). IEEE Computer Society, p. 305-308 4 p. 8968938. (Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom; vol. 2019-December).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detecting and analyzing year 2038 problem bugs in user-level applications

Suzuki, K., Kubota, T. & Kono, K., 2019 Dec, Proceedings - 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing, PRDC 2019. IEEE Computer Society, p. 65-74 10 p. 8952166. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC; vol. 2019-December).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

GPUVM: Why not virtualizing GPUs at the hypervisor?

Suzuki, Y., Kato, S., Yamada, H. & Kono, K., 2019 Jan 1, Proceedings of the 2014 USENIX Annual Technical Conference, USENIX ATC 2014. USENIX Association, p. 109-120 12 p. (Proceedings of the 2014 USENIX Annual Technical Conference, USENIX ATC 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

48 Citations (Scopus)

Short-Liveness of Error Propagation in Kernel Can Improve Operating Systems Availability

Sugimoto, M., Kubota, T. & Kono, K., 2019 Jun, Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2019. Institute of Electrical and Electronics Engineers Inc., p. 23-24 2 p. 8805798. (Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

To unify or not to unify: A case study on unified builds (in WebKit)

Kubota, T., Suzuki, Y. & Kono, K., 2019 Feb 16, CC 2019 - Proceedings of the 28th International Conference on Compiler Construction. Amaral, J. N. & Kulkarni, M. (eds.). Association for Computing Machinery, p. 42-52 11 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

An application framework for migrating GPGPU Cloud applications

Yuhara, S., Suzuki, Y. & Kono, K., 2018 Dec 26, Proceedings - IEEE 10th International Conference on Cloud Computing Technology and Science, CloudCom 2018. IEEE Computer Society, Vol. 2018-December. p. 62-66 5 p. 8590995

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hardening hypervisors against vulnerabilities in instruction emulators

Ishiguro, K. & Kono, K., 2018 Apr 23, Proceedings of the 11th European Workshop on Systems Security, EuroSec 2018. Association for Computing Machinery, Inc, 3193118

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2017

GLoop: An event-driven runtime for consolidating GPGPU applications

Suzuki, Y., Yamada, H., Kato, S. & Kono, K., 2017 Sep 24, SoCC 2017 - Proceedings of the 2017 Symposium on Cloud Computing. Association for Computing Machinery, Inc, p. 80-93 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Nioh: Hardening the hypervisor by filtering illegal I/O requests to virtual devices

Ogasawara, J. & Kono, K., 2017 Dec 4, Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Association for Computing Machinery, Vol. Part F132521. p. 542-552 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)
2016

Containers or hypervisors: Which is better for database consolidation?

Mardan, A. A. A. & Kono, K., 2016 Jul 2, Proceedings - 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016. IEEE Computer Society, p. 564-571 8 p. 7830739. (Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom; vol. 0).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)
2015

A guideline for selecting live migration policies and implementations in clouds

Koto, A., Kono, K. & Yamada, H., 2015 Feb 9, Proceedings - 2014 IEEE 6th International Conference on Cloud Computing Technology and Science, CloudCom 2014. February ed. IEEE Computer Society, p. 226-233 8 p. 7037671. (Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom; vol. 2015-February, no. February).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)
2014

Clickjuggler: Checking for incomplete defenses against clickjacking

Takamatsu, Y. & Kono, K., 2014 Jan 1, 2014 12th Annual Conference on Privacy, Security and Trust, PST 2014. Miri, A., Josang, A., Garcia-Alfaro, J., Hengartner, U. & Huang, N-F. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 224-231 8 p. 6890943. (2014 12th Annual Conference on Privacy, Security and Trust, PST 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Do injected faults cause real failures? A case study of linux

Kikuchi, N., Yoshimura, T., Sakuma, R. & Kono, K., 2014 Dec 12, Proceedings - IEEE 25th International Symposium on Software Reliability Engineering Workshops, ISSREW 2014. Institute of Electrical and Electronics Engineers Inc., p. 174-179 6 p. 6983834. (Proceedings - IEEE 25th International Symposium on Software Reliability Engineering Workshops, ISSREW 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

FoxyFeed: Forging device-level asynchronous events for kernel development

Kono, K., Miyahara, S., Yamada, H. & Yoshimura, T., 2014 Dec 3, Proceedings - 20th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2014. IEEE Computer Society, p. 145-154 10 p. 6974781. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Minimizing WAN communications in inter-datacenter key-value stores

Horie, H., Asahara, M., Yamada, H. & Kono, K., 2014 Dec 3, Proceedings - 2014 IEEE 7th International Conference on Cloud Computing, CLOUD 2014. Kesselman, C. (ed.). IEEE Computer Society, p. 490-497 8 p. 6973778. (IEEE International Conference on Cloud Computing, CLOUD).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2013

Distinguishing legitimate and fake/crude antivirus software

Kasuya, M. & Kono, K., 2013 Dec 1, SECURWARE 2013 - 7th International Conference on Emerging Security Information, Systems and Technologies. p. 109-116 8 p. (SECURWARE 2013 - 7th International Conference on Emerging Security Information, Systems and Technologies).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pangaea: A single key space, inter-datacenter key-value store

Horie, H., Asahara, M., Yamada, H. & Kono, K., 2013, Proceedings - 2013 19th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2013. IEEE Computer Society, p. 434-435 2 p. 6808209. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Request dispatching for cheap energy prices in cloud data centers

Yamada, H., Sakamoto, T., Horie, H. & Kono, K., 2013 Dec 1, Proceedings of the 2013 IEEE 2nd International Conference on Cloud Networking, CloudNet 2013. p. 210-213 4 p. 6710580. (Proceedings of the 2013 IEEE 2nd International Conference on Cloud Networking, CloudNet 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Traveling forward in time to newer operating systems using ShadowReboot

Yamada, H. & Kono, K., 2013 Apr 10, VEE 2013 - Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments. p. 121-130 10 p. (VEE 2013 - Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)
2012

Automated detection of session management vulnerabilities in web applications

Takamatsu, Y., Kosuga, Y. & Kono, K., 2012 Nov 6, 2012 10th Annual International Conference on Privacy, Security and Trust, PST 2012. p. 112-119 8 p. 6297927. (2012 10th Annual International Conference on Privacy, Security and Trust, PST 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Energy-price-driven request dispatching for cloud data centers

Sakamoto, T., Yamada, H., Horie, H. & Kono, K., 2012 Oct 2, Proceedings - 2012 IEEE 5th International Conference on Cloud Computing, CLOUD 2012. p. 974-976 3 p. 6253610. (Proceedings - 2012 IEEE 5th International Conference on Cloud Computing, CLOUD 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Honeyguide: A VM migration-aware network topology for saving energy consumption in data center networks

Shirayanagi, H., Yamada, H. & Kono, K., 2012 Sep 28, 2012 IEEE Symposium on Computers and Communications, ISCC 2012. p. 460-467 8 p. 6249339. (Proceedings - IEEE Symposium on Computers and Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

27 Citations (Scopus)

Inter-datacenter elastic key-value storage

Horie, H., Asahara, M., Yamada, H. & Kono, K., 2012 Sep 28, 10th International Conference on Optical Internet, COIN 2012. p. 71-72 2 p. 6245947. (10th International Conference on Optical Internet, COIN 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Towards unobtrusive VM live migration for cloud computing platforms

Koto, A., Yamada, H., Ohmura, K. & Kono, K., 2012 Oct 8, Proceedings of the Asia-Pacific Workshop on Systems, APSYS'12. (Proceedings of the Asia-Pacific Workshop on Systems, APSYS'12).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

35 Citations (Scopus)
2011

Can linux be rejuvenated without reboots?

Yoshimura, T., Yamada, H. & Kono, K., 2011 Dec 1, Proceedings - 2011 3rd International Workshop on Software Aging and Rejuvenation, WoSAR 2011. p. 50-55 6 p. 6141725. (Proceedings - 2011 3rd International Workshop on Software Aging and Rejuvenation, WoSAR 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Clustering performance anomalies in web applications based on root causes

Iwata, S. & Kono, K., 2011 Jul 15, Proceedings of the 8th ACM International Conference on Autonomic Computing, ICAC 2011 and Co-located Workshops. p. 221-224 4 p. (Proceedings of the 8th ACM International Conference on Autonomic Computing, ICAC 2011 and Co-located Workshops).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Efficiently synchronizing virtual machines in cloud computing environments

Tonosaki, S., Yamada, H. & Kono, K., 2011 Dec 1, Proceedings - 2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011. p. 154-162 9 p. 6133139. (Proceedings - 2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Phase-based reboot: Reusing operating system execution phases for cheap reboot-based recovery

Yamakita, K., Yamada, H. & Kono, K., 2011 Aug 26, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks, DSN 2011. p. 169-180 12 p. 5958216. (Proceedings of the International Conference on Dependable Systems and Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

23 Citations (Scopus)

Traveling forward in time to newer operating systems using ShadowReboot

Yamada, H. & Kono, K., 2011 Dec 1, Proceedings of the 2nd Asia-Pacific Workshop on Systems, APSys'11. (Proceedings of the 2nd Asia-Pacific Workshop on Systems, APSys'11).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2010

AspFuzz: A state-aware protocol fuzzer based on application-layer protocols

Kitagawa, T., Hanaoka, M. & Kono, K., 2010 Sep 17, IEEE Symposium on Computers and Communications, ISCC 2010. p. 202-208 7 p. 5546704. (Proceedings - IEEE Symposium on Computers and Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

Automated detection of session fixation vulnerabilities

Takamatsu, Y., Kosuga, Y. & Kono, K., 2010 Jul 20, Proceedings of the 19th International Conference on World Wide Web, WWW '10. p. 1191-1192 2 p. (Proceedings of the 19th International Conference on World Wide Web, WWW '10).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Narrowing down possible causes of performance anomaly in web applications

Iwata, S. & Kono, K., 2010 Jul 12, EDCC-8 - Proceedings of the 8th European Dependable Computing Conference. p. 185-190 6 p. 5474181. (EDCC-8 - Proceedings of the 8th European Dependable Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)
2009

Bit visor: A thin hypervisor for enforcing i/o device security

Shinagawa, T., Eiraku, H., Tanimoto, K., Omote, K., Hasegawa, S., Horie, T., Hirano, M., Kourai, K., Oyama, Y., Kawai, E., Kono, K., Chiba, S., Shinjo, Y. & Kato, K., 2009 Jul 14, Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE'09. p. 121-130 10 p. (Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE'09).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

121 Citations (Scopus)

Efficient update propagation by speculating replica locations on peer-to-peer networks

Hayakawa, A., Asahara, M., Kono, K. & Kojima, T., 2009 Dec 1, ICPADS '09 - 15th International Conference on Parallel and Distributed Systems. p. 422-431 10 p. 5395309. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Embedding network coordinates into the heart of distributed hash tables

Kojima, T., Asahara, M., Kono, K. & Hayakawa, A., 2009 Dec 1, IEEE P2P'09 - 9th International Conference on Peer-to-Peer Computing. p. 155-158 4 p. 5284517. (IEEE P2P'09 - 9th International Conference on Peer-to-Peer Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Performance improvement by means of collaboration between network intrusion detection systems

Hanaoka, M., Kono, K. & Hirotsu, T., 2009 Jul 17, Proceedings of the 7th Annual Communication Networks and Services Research Conference, CNSR 2009. p. 262-269 8 p. 4939136. (Proceedings of the 7th Annual Communication Networks and Services Research Conference, CNSR 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Simplifying security policy descriptions for internet servers in secure operating systems

Yokoyama, T., Hanaoka, M., Shimamura, M. & Kono, K., 2009 Dec 1, 24th Annual ACM Symposium on Applied Computing, SAC 2009. p. 326-333 8 p. (Proceedings of the ACM Symposium on Applied Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Yataglass: Network-level code emulation for analyzing memory-scanning attacks

Shimamura, M. & Kono, K., 2009 Nov 9, Detection of Intrusions and Malware, and Vulnerability Assessment - 6th International Conference, DIMVA 2009, Proceedings. p. 68-87 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5587 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)
2008

Enforcing appropriate process execution for exploiting idle resources from outside operating systems

Abe, Y., Yamada, H. & Kono, K., 2008 Dec 1, EuroSys'08 - Proceedings of the EuroSys 2008 Conference. p. 27-40 14 p. (EuroSys'08 - Proceedings of the EuroSys 2008 Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

FlexBox: Sandboxing Internet servers based on layer-7 contexts

Tanoue, A., Shimamura, M., Hanaoka, M. & Kono, K., 2008 Nov 17, IEEE Symposium on Computers and Communications 2008, ISCC 2008. p. 386-391 6 p. 4625645. (Proceedings - IEEE Symposium on Computers and Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2007

An efficient TCP reassembler mechanism for layer7-aware network intrusion detection/prevention systems

Hanaoka, M., Kono, K., Shimamura, M. & Yamaguchi, S., 2007 Dec 1, 12th IEEE International Symposium on Computers and Communications, ISCC '07. p. 79-86 8 p. 4381605. (Proceedings - IEEE Symposium on Computers and Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Finding candidate spots for replica servers based on demand fluctuation

Asahara, M., Shimada, A., Yamada, H. & Kono, K., 2007 Dec 1, The 13th International Conference on Parallel and Distributed Systems, ICPADS. 4447737. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

FoxyTechnique: Tricking operating system policies with a virtual machine monitor

Yamada, H. & Kono, K., 2007 Oct 29, VEE'07: Proceedings of the 3rd International Conference on Virtual Execution Environments. p. 55-64 10 p. (VEE'07: Proceedings of the 3rd International Conference on Virtual Execution Environments).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Sania: Syntactic and semantic analysis for automated testing against SQL injection

Kosuga, Y., Kono, K., Hanaoka, M., Hishiyama, M. & Takahama, Y., 2007 Dec 1, Proceedings - 23rd Annual Computer Security Applications Conference, ACSAC 2007. p. 107-116 10 p. 4412981. (Proceedings - Annual Computer Security Applications Conference, ACSAC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

64 Citations (Scopus)
2006

User-level disk-bandwidth control for resource-borrowing network applications

Yamada, H. & Kono, K., 2006 Jan 1, 10th IEEE/IFIP Network Operations and Management Symposium, NOMS 2006. Institute of Electrical and Electronics Engineers Inc., 1687667. (IEEE Symposium Record on Network Operations and Management Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Using attack information to reduce false positives in network IDS

Shimamura, M. & Kono, K., 2006 Dec 1, Proceedings - 11th IEEE Symposium on Computers and Communications, ISCC 2006. p. 386-393 8 p. 1691059. (Proceedings - International Symposium on Computers and Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)
2005

A practical approach to automatic parameter-tuning of web servers

Sugiki, A., Kono, K. & Iwasaki, H., 2005 Dec 1, Advances in Computer Science - ASIAN 2005: 10th Asian Computing Science Conference, Proceedings. p. 146-159 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3818 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2003

A hierarchical protection model for protecting against executable content

Shinagawa, T., Kono, K. & Masuda, T., 2003 Dec 1, Proceedings of the IASTED International Conference on Computer Science and Technology. Sahni, S. (ed.). p. 194-202 9 p. (Proceedings of the IASTED International Conference on Computer Science and Technology).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Preemptive Resource Management: Defending Against Resource Monopolizing DoS

Kaneko, W., Kono, K. & Shimizu, K., 2003 Dec 1, 21st IASTED International Multi-Conference on Applied Informatics. p. 662-669 8 p. (IASTED International Multi-Conference on Applied Informatics; vol. 21).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2002

An integrated laboratory for computer architecture and networking

Tateoka, T., Suzuki, M., Kono, K., Maeda, Y. & Abe, K., 2002 May 26, Proceedings of the 2002 Workshop on Computer Architecture Education, WCAE 2002 - Held in conjunction with the 29th International Symposium on Computer Architecture. Association for Computing Machinery, Inc, a20

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)