If you made any changes in Pure these will be visible here soon.

Research Output 1994 2019

  • 472 Citations
  • 10 h-Index
  • 52 Conference contribution
  • 34 Article
  • 1 Chapter
Filter
Conference contribution
2019

Short-Liveness of Error Propagation in Kernel Can Improve Operating Systems Availability

Sugimoto, M., Kubota, T. & Kono, K., 2019 Jun 1, Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2019. Institute of Electrical and Electronics Engineers Inc., p. 23-24 2 p. 8805798. (Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Availability
Computer operating systems
Data structures
Computer systems
Data storage equipment

To unify or not to unify: A case study on unified builds (in WebKit)

Kubota, T., Suzuki, Y. & Kono, K., 2019 Feb 16, CC 2019 - Proceedings of the 28th International Conference on Compiler Construction. Amaral, J. N. & Kulkarni, M. (eds.). Association for Computing Machinery, p. 42-52 11 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

An application framework for migrating GPGPU Cloud applications

Yuhara, S., Suzuki, Y. & Kono, K., 2018 Dec 26, Proceedings - IEEE 10th International Conference on Cloud Computing Technology and Science, CloudCom 2018. IEEE Computer Society, Vol. 2018-December. p. 62-66 5 p. 8590995

Research output: Chapter in Book/Report/Conference proceedingConference contribution

GPGPU
Servers
Server
Hardware
Preemption
1 Citation (Scopus)

Hardening hypervisors against vulnerabilities in instruction emulators

Ishiguro, K. & Kono, K., 2018 Apr 23, Proceedings of the 11th European Workshop on Systems Security, EuroSec 2018. Association for Computing Machinery, Inc, 3193118

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hardening
Program processors
Virtual machine
2017
5 Citations (Scopus)

Containers or hypervisors: Which is better for database consolidation?

Mardan, A. A. A. & Kono, K., 2017 Jan 23, Proceedings - 8th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016. IEEE Computer Society, p. 564-571 8 p. 7830739

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Consolidation
Container
Virtualization
Isolation
Containers
2 Citations (Scopus)

GLoop: An event-driven runtime for consolidating GPGPU applications

Suzuki, Y., Yamada, H., Kato, S. & Kono, K., 2017 Sep 24, SoCC 2017 - Proceedings of the 2017 Symposium on Cloud Computing. Association for Computing Machinery, Inc, p. 80-93 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

GPGPU
Event-driven
Graphics Processing Unit
Scheduling
Prototype
3 Citations (Scopus)

Nioh: Hardening the hypervisor by filtering illegal I/O requests to virtual devices

Ogasawara, J. & Kono, K., 2017 Dec 4, Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Association for Computing Machinery, Vol. Part F132521. p. 542-552 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hardening
Specifications
Virtual machine
2015
5 Citations (Scopus)

A guideline for selecting live migration policies and implementations in clouds

Koto, A., Kono, K. & Yamada, H., 2015 Feb 9, Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom. February ed. IEEE Computer Society, Vol. 2015-February. p. 226-233 8 p. 7037671

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Migration
Cloud computing
Virtual Machine
Policy
Virtual machine
2014
4 Citations (Scopus)

Clickjuggler: Checking for incomplete defenses against clickjacking

Takamatsu, Y. & Kono, K., 2014, 2014 12th Annual Conference on Privacy, Security and Trust, PST 2014. Institute of Electrical and Electronics Engineers Inc., p. 224-231 8 p. 6890943

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Do injected faults cause real failures? A case study of linux

Kikuchi, N., Yoshimura, T., Sakuma, R. & Kono, K., 2014 Dec 12, Proceedings - IEEE 25th International Symposium on Software Reliability Engineering Workshops, ISSREW 2014. Institute of Electrical and Electronics Engineers Inc., p. 174-179 6 p. 6983834

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Theaters
Linux

FoxyFeed: Forging device-level asynchronous events for kernel development

Kono, K., Miyahara, S., Yamada, H. & Yoshimura, T., 2014 Dec 3, Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC. IEEE Computer Society, p. 145-154 10 p. 6974781

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Forging
Linux
Virtual machine

Minimizing WAN communications in inter-datacenter key-value stores

Horie, H., Asahara, M., Yamada, H. & Kono, K., 2014 Dec 3, IEEE International Conference on Cloud Computing, CLOUD. IEEE Computer Society, p. 490-497 8 p. 6973778

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wide area networks
Data transfer
Communication
Routing protocols
Scalability
2013

Distinguishing legitimate and fake/crude antivirus software

Kasuya, M. & Kono, K., 2013, SECURWARE 2013 - 7th International Conference on Emerging Security Information, Systems and Technologies. p. 109-116 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Program processors
Malware
Experiments
1 Citation (Scopus)

Pangaea: A single key space, inter-datacenter key-value store

Horie, H., Asahara, M., Yamada, H. & Kono, K., 2013, Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS. IEEE Computer Society, p. 434-435 2 p. 6808209

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data transfer
1 Citation (Scopus)

Request dispatching for cheap energy prices in cloud data centers

Yamada, H., Sakamoto, T., Horie, H. & Kono, K., 2013, Proceedings of the 2013 IEEE 2nd International Conference on Cloud Networking, CloudNet 2013. p. 210-213 4 p. 6710580

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
Servers
Energy utilization
Processing
Industry
3 Citations (Scopus)

Traveling forward in time to newer operating systems using ShadowReboot

Yamada, H. & Kono, K., 2013, VEE 2013 - Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments. p. 121-130 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Linux
Virtual machine
2012
4 Citations (Scopus)

Automated detection of session management vulnerabilities in web applications

Takamatsu, Y., Kosuga, Y. & Kono, K., 2012, 2012 10th Annual International Conference on Privacy, Security and Trust, PST 2012. p. 112-119 8 p. 6297927

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments
3 Citations (Scopus)

Energy-price-driven request dispatching for cloud data centers

Sakamoto, T., Yamada, H., Horie, H. & Kono, K., 2012, Proceedings - 2012 IEEE 5th International Conference on Cloud Computing, CLOUD 2012. p. 974-976 3 p. 6253610

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
Servers
Energy utilization
Industry
27 Citations (Scopus)

Honeyguide: A VM migration-aware network topology for saving energy consumption in data center networks

Shirayanagi, H., Yamada, H. & Kono, K., 2012, Proceedings - IEEE Symposium on Computers and Communications. p. 460-467 8 p. 6249339

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data Center
Virtual Machine
Network Topology
Consolidation
Energy Consumption

Inter-datacenter elastic key-value storage

Horie, H., Asahara, M., Yamada, H. & Kono, K., 2012, 10th International Conference on Optical Internet, COIN 2012. p. 71-72 2 p. 6245947

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Overlay networks
Joining
Resource allocation
Servers
33 Citations (Scopus)

Towards unobtrusive VM live migration for cloud computing platforms

Koto, A., Yamada, H., Ohmura, K. & Kono, K., 2012, Proceedings of the Asia-Pacific Workshop on Systems, APSYS'12.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Resource allocation
Throughput
Data storage equipment
Virtual machine
2011
5 Citations (Scopus)

Can linux be rejuvenated without reboots?

Yoshimura, T., Yamada, H. & Kono, K., 2011, Proceedings - 2011 3rd International Workshop on Software Aging and Rejuvenation, WoSAR 2011. p. 50-55 6 p. 6141725

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Faulting
Computer operating systems
Linux
Data structures
Computer systems
2 Citations (Scopus)

Clustering performance anomalies in web applications based on root causes

Iwata, S. & Kono, K., 2011, Proceedings of the 8th ACM International Conference on Autonomic Computing, ICAC 2011 and Co-located Workshops. p. 221-224 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web Application
Anomaly
Bean
Roots
Clustering

Efficiently synchronizing virtual machines in cloud computing environments

Tonosaki, S., Yamada, H. & Kono, K., 2011, Proceedings - 2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011. p. 154-162 9 p. 6133139

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Servers
Virtual machine
Cloning
Computer operating systems
22 Citations (Scopus)

Phase-based reboot: Reusing operating system execution phases for cheap reboot-based recovery

Yamakita, K., Yamada, H. & Kono, K., 2011, Proceedings of the International Conference on Dependable Systems and Networks. p. 169-180 12 p. 5958216

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recovery
Computer systems
Availability
Experiments
Linux

Traveling forward in time to newer operating systems using ShadowReboot

Yamada, H. & Kono, K., 2011, Proceedings of the 2nd Asia-Pacific Workshop on Systems, APSys'11.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Switches
Linux
Virtual machine
2010
12 Citations (Scopus)

AspFuzz: A state-aware protocol fuzzer based on application-layer protocols

Kitagawa, T., Hanaoka, M. & Kono, K., 2010, Proceedings - IEEE Symposium on Computers and Communications. p. 202-208 7 p. 5546704

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Vulnerability
Network protocols
Anomalous
HTTP
Servers
5 Citations (Scopus)

Automated detection of session fixation vulnerabilities

Takamatsu, Y., Kosuga, Y. & Kono, K., 2010, Proceedings of the 19th International Conference on World Wide Web, WWW '10. p. 1191-1192 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Simulators
Experiments
3 Citations (Scopus)

Narrowing down possible causes of performance anomaly in web applications

Iwata, S. & Kono, K., 2010, EDCC-8 - Proceedings of the 8th European Dependable Computing Conference. p. 185-190 6 p. 5474181

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web Application
Anomaly
Monitoring
Control Charts
Monitoring System
2009
115 Citations (Scopus)

Bit visor: A thin hypervisor for enforcing i/o device security

Shinagawa, T., Eiraku, H., Tanimoto, K., Omote, K., Hasegawa, S., Horie, T., Hirano, M., Kourai, K., Oyama, Y., Kawai, E., Kono, K., Chiba, S., Shinjo, Y. & Kato, K., 2009, Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE'09. p. 121-130 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer hardware
Cryptography
Virtual machine
Computer systems

Efficient update propagation by speculating replica locations on peer-to-peer networks

Hayakawa, A., Asahara, M., Kono, K. & Kojima, T., 2009, Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS. p. 422-431 10 p. 5395309

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Peer to peer networks
Electric power distribution
Servers
Cost effectiveness
Scalability
8 Citations (Scopus)

Embedding network coordinates into the heart of distributed hash tables

Kojima, T., Asahara, M., Kono, K. & Hayakawa, A., 2009, IEEE P2P'09 - 9th International Conference on Peer-to-Peer Computing. p. 155-158 4 p. 5284517

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Topology

Performance improvement by means of collaboration between network intrusion detection systems

Hanaoka, M., Kono, K. & Hirotsu, T., 2009, Proceedings of the 7th Annual Communication Networks and Services Research Conference, CNSR 2009. p. 262-269 8 p. 4939136

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Hardware
2 Citations (Scopus)

Simplifying security policy descriptions for internet servers in secure operating systems

Yokoyama, T., Hanaoka, M., Shimamura, M. & Kono, K., 2009, Proceedings of the ACM Symposium on Applied Computing. p. 326-333 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer operating systems
Servers
Internet
Network protocols
Access control
3 Citations (Scopus)

Yataglass: Network-level code emulation for analyzing memory-scanning attacks

Shimamura, M. & Kono, K., 2009, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5587 LNCS. p. 68-87 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5587 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Emulation
Scanning
Attack
Data storage equipment
Security of data
2008
2 Citations (Scopus)

Enforcing appropriate process execution for exploiting idle resources from outside operating systems

Abe, Y., Yamada, H. & Kono, K., 2008 Apr 25, Operating Systems Review (ACM). 4 ed. Vol. 42. p. 27-40 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Degradation
Viruses
Resource allocation
Program processors
Experiments
3 Citations (Scopus)

Enforcing appropriate process execution for exploiting idle resources from outside operating systems

Abe, Y., Yamada, H. & Kono, K., 2008, EuroSys'08 - Proceedings of the EuroSys 2008 Conference. p. 27-40 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Degradation
Viruses
Resource allocation
Program processors
Experiments

FlexBox: Sandboxing Internet servers based on layer-7 contexts

Tanoue, A., Shimamura, M., Hanaoka, M. & Kono, K., 2008, Proceedings - IEEE Symposium on Computers and Communications. p. 386-391 6 p. 4625645

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Server
Internet
Context
Attack
2007
2 Citations (Scopus)

An efficient TCP reassembler mechanism for layer7-aware network intrusion detection/prevention systems

Hanaoka, M., Kono, K., Shimamura, M. & Yamaguchi, S., 2007, Proceedings - IEEE Symposium on Computers and Communications. p. 79-86 8 p. 4381605

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Transparency
Copying
Testing
Linux
2 Citations (Scopus)

Finding candidate spots for replica servers based on demand fluctuation

Asahara, M., Shimada, A., Yamada, H. & Kono, K., 2007, Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS. Vol. 1. 4447737

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Internet
7 Citations (Scopus)

FoxyTechnique: Tricking operating system policies with a virtual machine monitor

Yamada, H. & Kono, K., 2007, VEE'07: Proceedings of the 3rd International Conference on Virtual Execution Environments. p. 55-64 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer monitors
Computer operating systems
Scheduling
Hardware
Virtual machine
62 Citations (Scopus)

Sania: Syntactic and semantic analysis for automated testing against SQL injection

Kosuga, Y., Kono, K., Hanaoka, M., Hishiyama, M. & Takahama, Y., 2007, Proceedings - Annual Computer Security Applications Conference, ACSAC. p. 107-116 10 p. 4412981

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Syntactics
Semantics
Testing
HTML
Websites
2006

User-level disk-bandwidth control for resource-borrowing network applications

Yamada, H. & Kono, K., 2006, IEEE Symposium Record on Network Operations and Management Symposium. 1687667

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bandwidth
9 Citations (Scopus)

Using attack information to reduce false positives in network IDS

Shimamura, M. & Kono, K., 2006, Proceedings - International Symposium on Computers and Communications. p. 386-393 8 p. 1691059

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Servers
Computer monitors
2005
1 Citation (Scopus)

A practical approach to automatic parameter-tuning of web servers

Sugiki, A., Kono, K. & Iwasaki, H., 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3818 LNCS. p. 146-159 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3818 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web Server
Parameter Tuning
Workload
Servers
Tuning
2003

A hierarchical protection model for protecting against executable content

Shinagawa, T., Kono, K. & Masuda, T., 2003, Proceedings of the IASTED International Conference on Computer Science and Technology. Sahni, S. (ed.). p. 194-202 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Defects
Access control
threat
programme
code
1 Citation (Scopus)

Preemptive Resource Management: Defending Against Resource Monopolizing DoS

Kaneko, W., Kono, K. & Shimizu, K., 2003, IASTED International Multi-Conference on Applied Informatics. Vol. 21. p. 662-669 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Resource allocation
Availability
2002
3 Citations (Scopus)

An integrated laboratory for computer architecture and networking

Tateoka, T., Suzuki, M., Kono, K., Maeda, Y. & Abe, K., 2002 May 26, Proceedings of the 2002 Workshop on Computer Architecture Education, WCAE 2002 - Held in conjunction with the 29th International Symposium on Computer Architecture. Association for Computing Machinery, Inc, a20

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer architecture
networking
Students
student
computer science
2 Citations (Scopus)

YabAI: The first rescue simulation league champion

Morimoto, T., Kono, K. & Takeuchi, I., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 2377 LNAI. p. 49-59 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2377 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Disaster
Disasters
Simulation
Simulation System
Damage
2000
18 Citations (Scopus)

Efficient RMI: dynamic specialization of object serialization

Kono, K. & Masuda, T., 2000, Proceedings - International Conference on Distributed Computing Systems. IEEE, p. 308-315 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Sun