• 547 Citations
  • 11 h-Index
19942019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Article
2019

File systems are hard to test — Learning from XFStests

Aota, N. & Kono, K., 2019 Feb, In : IEICE Transactions on Information and Systems. 2, p. 269-279 11 p.

Research output: Contribution to journalArticle

2018

Cooperative GPGPU scheduling for consolidating server workloads

Suzuki, Y., Yamada, H., Kato, S. & Kono, K., 2018 Dec 1, In : IEICE Transactions on Information and Systems. E101D, 12, p. 3019-3037 19 p.

Research output: Contribution to journalArticle

2016

A case for static analysis of linux to find faults in interrupt request handlers

Yoshimura, T. & Kono, K., 2016, In : Journal of Information Processing. 24, 3, p. 573-582 10 p.

Research output: Contribution to journalArticle

GPUvm: GPU Virtualization at the Hypervisor

Suzuki, Y., Kato, S., Yamada, H. & Kono, K., 2016 Sep 1, In : IEEE Transactions on Computers. 65, 9, p. 2752-2766 15 p., 7349172.

Research output: Contribution to journalArticle

16 Citations (Scopus)

Report on the Asia-Pacific systems workshop 2015 (APSys'15)

Heiser, G., Kono, K., Park, K. & Van Renesse, R., 2016 Mar 11, In : Operating Systems Review (ACM). 50, 1, p. 1-2 2 p.

Research output: Contribution to journalArticle

2015

Detection of visual clickjacking vulnerabilities in incomplete defenses

Takamatsu, Y. & Kono, K., 2015 Jul 15, In : Journal of information processing. 23, 4, p. 513-524 12 p.

Research output: Contribution to journalArticle

2014

A VMM-level approach to shortening downtime of operating systems reboots in software updates

Yamada, H. & Kono, K., 2014 Oct 1, In : IEICE Transactions on Information and Systems. E97D, 10, p. 2663-2675 13 p.

Research output: Contribution to journalArticle

Efficient update activation for virtual machines in iaas cloud computing environments

Yamada, H., Tonosaki, S. & Kono, K., 2014 Jan 1, In : IEICE Transactions on Information and Systems. E97-D, 3, p. 469-479 11 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Screening legitimate and fake/crude antivirus software

Kasuya, M. & Kono, K., 2014 Jan 1, In : IPSJ Online Transactions. 7, 2014, p. 43-51 9 p.

Research output: Contribution to journalArticle

2013

Automatically checking for session management vulnerabilities in web applications

Takamatsu, Y., Kosuga, Y. & Kono, K., 2013 Jul 30, In : IPSJ Online Transactions. 6, 1, p. 17-27 11 p.

Research output: Contribution to journalArticle

Honeyguide: A VM migration-aware network topology for saving energy consumption in data center networks

Shirayanagi, H., Yamada, H. & Kono, K., 2013 Sep, In : IEICE Transactions on Information and Systems. E96-D, 9, p. 2055-2064 10 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)

Traveling forward in time to newer operating systems using shadowreboot

Yamada, H. & Kono, K., 2013 Aug 1, In : ACM SIGPLAN Notices. 48, 7, p. 121-130 10 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Using fault injection to analyze the scope of error propagation in linux

Yoshimura, T., Yamada, H. & Kono, K., 2013 Jul 30, In : IPSJ Online Transactions. 6, 1, p. 55-64 10 p.

Research output: Contribution to journalArticle

2012

Clustering performance anomalies based on similarity in processing time changes

Iwata, S. & Kono, K., 2012 Jun 15, In : IPSJ Online Transactions. 5, 1, p. 1-12 12 p.

Research output: Contribution to journalArticle

Lightweight recovery from kernel failures using phase-based reboot

Yamakita, K., Yamada, H. & Kono, K., 2012 Jun 15, In : IPSJ Online Transactions. 5, 1, p. 59-70 12 p.

Research output: Contribution to journalArticle

MashCache: Taming flash crowds by using their good features

Horie, H., Asahara, M., Yamada, H. & Kono, K., 2012, In : IPSJ Online Transactions. 5, 1, p. 21-33 13 p.

Research output: Contribution to journalArticle

2011

Amberate: A framework for automated vulnerability scanners for web applications

Kosuga, Y. & Kono, K., 2011 Dec 8, In : Computer Software. 28, 4, p. 175-195 21 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

A state-aware protocol fuzzer based on application-layer protocols

Kitagawa, T., Hanaoka, M. & Kono, K., 2011 May, In : IEICE Transactions on Information and Systems. E94-D, 5, p. 1008-1017 10 p.

Research output: Contribution to journalArticle

2010

P2P-Based approach to finding replica server locations for alleviating flash crowds

Asaharata, M., Kono, K., Kojima, T. & Hayakawaf, A., 2010 Nov, In : IEICE Transactions on Information and Systems. E93-D, 11, p. 3027-3037 11 p.

Research output: Contribution to journalArticle

2009

Reducing security policy size for internet servers in secure operating systems

Yokoyama, T., Hanaoka, M., Shimamura, M., Kono, K. & Shinagawa, T., 2009, In : IEICE Transactions on Information and Systems. E92-D, 11, p. 2196-2206 11 p.

Research output: Contribution to journalArticle

Why is it (thought) so difficult to write Software Papers?

Gondow, K., Akashi, O., Ichiji, H., Iwasaki, H., Kono, K., Toyoda, M. & Ueda, K., 2009, In : Computer Software. 26, 4, p. 17-29 13 p.

Research output: Contribution to journalArticle

2008

Filtering false positives based on server-side behaviors

Shimamura, M., Hanaoka, M. & Kono, K., 2008 Feb, In : IEICE Transactions on Information and Systems. E91-D, 2, p. 264-276 13 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Tuning mechanisms for two major parameters of Apache web servers

Sugiki, A., Kono, K. & Iwasaki, H., 2008 Oct 1, In : Software - Practice and Experience. 38, 12, p. 1215-1240 26 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2007

An extensible protocol-processing code generator from definitions of application-layer protocols

Abe, K., Iwasaki, H. & Kono, K., 2007 Jun 11, In : Computer Software. 24, 2, p. 150-163 14 p.

Research output: Contribution to journalArticle

Automatic Tuning of the Keep-alive Parameter of Web Servers based on Request-waiting Intervals.

Sugiki, A., Kono, K. & Iwasaki, H., 2007 Jan, In : Computer Software. 24, 2, p. 68-78 11 p.

Research output: Contribution to journalArticle

TCP reassembler for layer7-aware network intrusion detection/prevention systems

Hanaoka, M., Shemamura, M. & Kono, K., 2007 Dec, In : IEICE Transactions on Information and Systems. E90-D, 12, p. 2019-2032 14 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
2006

Basic mechanism of elastic server groups - Dynamic adaptation to load fluctuation

Agetsuma, M., Kono, K., Iwasaki, H. & Masuda, T., 2006 Jul 1, In : Systems and Computers in Japan. 37, 8, p. 24-37 14 p.

Research output: Contribution to journalArticle

2005

Exploiting mobile code for user-transparent distribution of application-level protocols

Agetsuma, M., Kono, K., Iwasaki, H. & Masuda, T., 2005 Jan 1, In : Systems and Computers in Japan. 36, 1, p. 44-57 14 p.

Research output: Contribution to journalArticle

2004

An integrated laboratory for processor organization, compiler design, and computer networking

Abe, K., Tateoka, T., Suzuki, M., Maeda, Y., Kono, K. & Watanabe, T., 2004 Aug 1, In : IEEE Transactions on Education. 47, 3, p. 311-320 10 p.

Research output: Contribution to journalArticle

20 Citations (Scopus)

Minimizing Privileged Code in Setuid Programs using Fine-grained Protection Domains.

Shinagawa, T., Kono, K. & Masuda, T., 2004 Jan, In : Computer Software. 21, 2, p. 107-113 7 p.

Research output: Contribution to journalArticle

2003