• 565 Citations
  • 12 h-Index
1994 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Article
2003
2004

An integrated laboratory for processor organization, compiler design, and computer networking

Abe, K., Tateoka, T., Suzuki, M., Maeda, Y., Kono, K. & Watanabe, T., 2004 Aug 1, In : IEEE Transactions on Education. 47, 3, p. 311-320 10 p.

Research output: Contribution to journalArticle

20 Citations (Scopus)

Minimizing Privileged Code in Setuid Programs using Fine-grained Protection Domains.

Shinagawa, T., Kono, K. & Masuda, T., 2004 Jan, In : Computer Software. 21, 2, p. 107-113 7 p.

Research output: Contribution to journalArticle

2005

Exploiting mobile code for user-transparent distribution of application-level protocols

Agetsuma, M., Kono, K., Iwasaki, H. & Masuda, T., 2005 Jan 1, In : Systems and Computers in Japan. 36, 1, p. 44-57 14 p.

Research output: Contribution to journalArticle

2006

Basic mechanism of elastic server groups - Dynamic adaptation to load fluctuation

Agetsuma, M., Kono, K., Iwasaki, H. & Masuda, T., 2006 Jul 1, In : Systems and Computers in Japan. 37, 8, p. 24-37 14 p.

Research output: Contribution to journalArticle

2007

An extensible protocol-processing code generator from definitions of application-layer protocols

Abe, K., Iwasaki, H. & Kono, K., 2007 Jun 11, In : Computer Software. 24, 2, p. 150-163 14 p.

Research output: Contribution to journalArticle

Automatic Tuning of the Keep-alive Parameter of Web Servers based on Request-waiting Intervals.

Sugiki, A., Kono, K. & Iwasaki, H., 2007 Jan, In : Computer Software. 24, 2, p. 68-78 11 p.

Research output: Contribution to journalArticle

TCP reassembler for layer7-aware network intrusion detection/prevention systems

Hanaoka, M., Shemamura, M. & Kono, K., 2007 Dec, In : IEICE Transactions on Information and Systems. E90-D, 12, p. 2019-2032 14 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
2008

Filtering false positives based on server-side behaviors

Shimamura, M., Hanaoka, M. & Kono, K., 2008 Feb, In : IEICE Transactions on Information and Systems. E91-D, 2, p. 264-276 13 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Tuning mechanisms for two major parameters of Apache web servers

Sugiki, A., Kono, K. & Iwasaki, H., 2008 Oct 1, In : Software - Practice and Experience. 38, 12, p. 1215-1240 26 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2009

Reducing security policy size for internet servers in secure operating systems

Yokoyama, T., Hanaoka, M., Shimamura, M., Kono, K. & Shinagawa, T., 2009, In : IEICE Transactions on Information and Systems. E92-D, 11, p. 2196-2206 11 p.

Research output: Contribution to journalArticle

Why is it (thought) so difficult to write Software Papers?

Gondow, K., Akashi, O., Ichiji, H., Iwasaki, H., Kono, K., Toyoda, M. & Ueda, K., 2009, In : Computer Software. 26, 4, p. 17-29 13 p.

Research output: Contribution to journalArticle

2010

P2P-Based approach to finding replica server locations for alleviating flash crowds

Asaharata, M., Kono, K., Kojima, T. & Hayakawaf, A., 2010 Nov, In : IEICE Transactions on Information and Systems. E93-D, 11, p. 3027-3037 11 p.

Research output: Contribution to journalArticle

2011

Amberate: A framework for automated vulnerability scanners for web applications

Kosuga, Y. & Kono, K., 2011 Dec 8, In : Computer Software. 28, 4, p. 175-195 21 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

A state-aware protocol fuzzer based on application-layer protocols

Kitagawa, T., Hanaoka, M. & Kono, K., 2011 May, In : IEICE Transactions on Information and Systems. E94-D, 5, p. 1008-1017 10 p.

Research output: Contribution to journalArticle

2012

Clustering performance anomalies based on similarity in processing time changes

Iwata, S. & Kono, K., 2012 Jun 15, In : IPSJ Online Transactions. 5, 1, p. 1-12 12 p.

Research output: Contribution to journalArticle

Lightweight recovery from kernel failures using phase-based reboot

Yamakita, K., Yamada, H. & Kono, K., 2012 Jun 15, In : IPSJ Online Transactions. 5, 1, p. 59-70 12 p.

Research output: Contribution to journalArticle

MashCache: Taming flash crowds by using their good features

Horie, H., Asahara, M., Yamada, H. & Kono, K., 2012, In : IPSJ Online Transactions. 5, 1, p. 21-33 13 p.

Research output: Contribution to journalArticle

2013

Automatically checking for session management vulnerabilities in web applications

Takamatsu, Y., Kosuga, Y. & Kono, K., 2013 Jul 30, In : IPSJ Online Transactions. 6, 1, p. 17-27 11 p.

Research output: Contribution to journalArticle

Honeyguide: A VM migration-aware network topology for saving energy consumption in data center networks

Shirayanagi, H., Yamada, H. & Kono, K., 2013 Sep, In : IEICE Transactions on Information and Systems. E96-D, 9, p. 2055-2064 10 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)

Traveling forward in time to newer operating systems using shadowreboot

Yamada, H. & Kono, K., 2013 Aug, In : ACM SIGPLAN Notices. 48, 7, p. 121-130 10 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Using fault injection to analyze the scope of error propagation in linux

Yoshimura, T., Yamada, H. & Kono, K., 2013 Jul 30, In : IPSJ Online Transactions. 6, 1, p. 55-64 10 p.

Research output: Contribution to journalArticle

2014

A VMM-level approach to shortening downtime of operating systems reboots in software updates

Yamada, H. & Kono, K., 2014 Oct 1, In : IEICE Transactions on Information and Systems. E97D, 10, p. 2663-2675 13 p.

Research output: Contribution to journalArticle

Efficient update activation for virtual machines in iaas cloud computing environments

Yamada, H., Tonosaki, S. & Kono, K., 2014 Jan 1, In : IEICE Transactions on Information and Systems. E97-D, 3, p. 469-479 11 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Screening legitimate and fake/crude antivirus software

Kasuya, M. & Kono, K., 2014 Jan 1, In : IPSJ Online Transactions. 7, 2014, p. 43-51 9 p.

Research output: Contribution to journalArticle

2015

Detection of visual clickjacking vulnerabilities in incomplete defenses

Takamatsu, Y. & Kono, K., 2015 Jul 15, In : Journal of information processing. 23, 4, p. 513-524 12 p.

Research output: Contribution to journalArticle

2016

A case for static analysis of linux to find faults in interrupt request handlers

Yoshimura, T. & Kono, K., 2016, In : Journal of Information Processing. 24, 3, p. 573-582 10 p.

Research output: Contribution to journalArticle

GPUvm: GPU Virtualization at the Hypervisor

Suzuki, Y., Kato, S., Yamada, H. & Kono, K., 2016 Sep 1, In : IEEE Transactions on Computers. 65, 9, p. 2752-2766 15 p., 7349172.

Research output: Contribution to journalArticle

16 Citations (Scopus)

Report on the Asia-Pacific systems workshop 2015 (APSys'15)

Heiser, G., Kono, K., Park, K. & Van Renesse, R., 2016 Mar 11, In : Operating Systems Review (ACM). 50, 1, p. 1-2 2 p.

Research output: Contribution to journalArticle

2018

Cooperative GPGPU scheduling for consolidating server workloads

Suzuki, Y., Yamada, H., Kato, S. & Kono, K., 2018 Dec 1, In : IEICE Transactions on Information and Systems. E101D, 12, p. 3019-3037 19 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2019

File systems are hard to test — Learning from XFStests

Aota, N. & Kono, K., 2019 Feb, In : IEICE Transactions on Information and Systems. 2, p. 269-279 11 p.

Research output: Contribution to journalArticle

2020

Instruction filters for mitigating attacks on instruction emulation in hypervisors

Ishiguro, K. & Kono, K., 2020 Jul 1, In : IEICE Transactions on Information and Systems. E103D, 7, p. 1660-1671 12 p.

Research output: Contribution to journalArticle

Open Access

Logging inter-thread data dependencies in linux kernel

Kubota, T., Aota, N. & Kono, K., 2020 Jul 1, In : IEICE Transactions on Information and Systems. E103D, 7, p. 1633-1646 14 p.

Research output: Contribution to journalArticle

Open Access