• 565 Citations
  • 12 h-Index
1994 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Article

A case for static analysis of linux to find faults in interrupt request handlers

Yoshimura, T. & Kono, K., 2016, In : Journal of Information Processing. 24, 3, p. 573-582 10 p.

Research output: Contribution to journalArticle

Amberate: A framework for automated vulnerability scanners for web applications

Kosuga, Y. & Kono, K., 2011 Dec 8, In : Computer Software. 28, 4, p. 175-195 21 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

An extensible protocol-processing code generator from definitions of application-layer protocols

Abe, K., Iwasaki, H. & Kono, K., 2007 Jun 11, In : Computer Software. 24, 2, p. 150-163 14 p.

Research output: Contribution to journalArticle

An integrated laboratory for processor organization, compiler design, and computer networking

Abe, K., Tateoka, T., Suzuki, M., Maeda, Y., Kono, K. & Watanabe, T., 2004 Aug 1, In : IEEE Transactions on Education. 47, 3, p. 311-320 10 p.

Research output: Contribution to journalArticle

20 Citations (Scopus)

A state-aware protocol fuzzer based on application-layer protocols

Kitagawa, T., Hanaoka, M. & Kono, K., 2011 May, In : IEICE Transactions on Information and Systems. E94-D, 5, p. 1008-1017 10 p.

Research output: Contribution to journalArticle

Automatically checking for session management vulnerabilities in web applications

Takamatsu, Y., Kosuga, Y. & Kono, K., 2013 Jul 30, In : IPSJ Online Transactions. 6, 1, p. 17-27 11 p.

Research output: Contribution to journalArticle

Automatic Tuning of the Keep-alive Parameter of Web Servers based on Request-waiting Intervals.

Sugiki, A., Kono, K. & Iwasaki, H., 2007 Jan, In : Computer Software. 24, 2, p. 68-78 11 p.

Research output: Contribution to journalArticle

A VMM-level approach to shortening downtime of operating systems reboots in software updates

Yamada, H. & Kono, K., 2014 Oct 1, In : IEICE Transactions on Information and Systems. E97D, 10, p. 2663-2675 13 p.

Research output: Contribution to journalArticle

Basic mechanism of elastic server groups - Dynamic adaptation to load fluctuation

Agetsuma, M., Kono, K., Iwasaki, H. & Masuda, T., 2006 Jul 1, In : Systems and Computers in Japan. 37, 8, p. 24-37 14 p.

Research output: Contribution to journalArticle

Clustering performance anomalies based on similarity in processing time changes

Iwata, S. & Kono, K., 2012 Jun 15, In : IPSJ Online Transactions. 5, 1, p. 1-12 12 p.

Research output: Contribution to journalArticle

Cooperative GPGPU scheduling for consolidating server workloads

Suzuki, Y., Yamada, H., Kato, S. & Kono, K., 2018 Dec 1, In : IEICE Transactions on Information and Systems. E101D, 12, p. 3019-3037 19 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Detection of visual clickjacking vulnerabilities in incomplete defenses

Takamatsu, Y. & Kono, K., 2015 Jul 15, In : Journal of information processing. 23, 4, p. 513-524 12 p.

Research output: Contribution to journalArticle

Efficient update activation for virtual machines in iaas cloud computing environments

Yamada, H., Tonosaki, S. & Kono, K., 2014 Jan 1, In : IEICE Transactions on Information and Systems. E97-D, 3, p. 469-479 11 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Exploiting mobile code for user-transparent distribution of application-level protocols

Agetsuma, M., Kono, K., Iwasaki, H. & Masuda, T., 2005 Jan 1, In : Systems and Computers in Japan. 36, 1, p. 44-57 14 p.

Research output: Contribution to journalArticle

File systems are hard to test — Learning from XFStests

Aota, N. & Kono, K., 2019 Feb, In : IEICE Transactions on Information and Systems. 2, p. 269-279 11 p.

Research output: Contribution to journalArticle

Filtering false positives based on server-side behaviors

Shimamura, M., Hanaoka, M. & Kono, K., 2008 Feb, In : IEICE Transactions on Information and Systems. E91-D, 2, p. 264-276 13 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

GPUvm: GPU Virtualization at the Hypervisor

Suzuki, Y., Kato, S., Yamada, H. & Kono, K., 2016 Sep 1, In : IEEE Transactions on Computers. 65, 9, p. 2752-2766 15 p., 7349172.

Research output: Contribution to journalArticle

16 Citations (Scopus)

Honeyguide: A VM migration-aware network topology for saving energy consumption in data center networks

Shirayanagi, H., Yamada, H. & Kono, K., 2013 Sep, In : IEICE Transactions on Information and Systems. E96-D, 9, p. 2055-2064 10 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)

Instruction filters for mitigating attacks on instruction emulation in hypervisors

Ishiguro, K. & Kono, K., 2020 Jul 1, In : IEICE Transactions on Information and Systems. E103D, 7, p. 1660-1671 12 p.

Research output: Contribution to journalArticle

Open Access

Lightweight recovery from kernel failures using phase-based reboot

Yamakita, K., Yamada, H. & Kono, K., 2012 Jun 15, In : IPSJ Online Transactions. 5, 1, p. 59-70 12 p.

Research output: Contribution to journalArticle

Logging inter-thread data dependencies in linux kernel

Kubota, T., Aota, N. & Kono, K., 2020 Jul 1, In : IEICE Transactions on Information and Systems. E103D, 7, p. 1633-1646 14 p.

Research output: Contribution to journalArticle

Open Access

MashCache: Taming flash crowds by using their good features

Horie, H., Asahara, M., Yamada, H. & Kono, K., 2012, In : IPSJ Online Transactions. 5, 1, p. 21-33 13 p.

Research output: Contribution to journalArticle

Minimizing Privileged Code in Setuid Programs using Fine-grained Protection Domains.

Shinagawa, T., Kono, K. & Masuda, T., 2004 Jan, In : Computer Software. 21, 2, p. 107-113 7 p.

Research output: Contribution to journalArticle

P2P-Based approach to finding replica server locations for alleviating flash crowds

Asaharata, M., Kono, K., Kojima, T. & Hayakawaf, A., 2010 Nov, In : IEICE Transactions on Information and Systems. E93-D, 11, p. 3027-3037 11 p.

Research output: Contribution to journalArticle

Reducing security policy size for internet servers in secure operating systems

Yokoyama, T., Hanaoka, M., Shimamura, M., Kono, K. & Shinagawa, T., 2009, In : IEICE Transactions on Information and Systems. E92-D, 11, p. 2196-2206 11 p.

Research output: Contribution to journalArticle

Report on the Asia-Pacific systems workshop 2015 (APSys'15)

Heiser, G., Kono, K., Park, K. & Van Renesse, R., 2016 Mar 11, In : Operating Systems Review (ACM). 50, 1, p. 1-2 2 p.

Research output: Contribution to journalArticle

Screening legitimate and fake/crude antivirus software

Kasuya, M. & Kono, K., 2014 Jan 1, In : IPSJ Online Transactions. 7, 2014, p. 43-51 9 p.

Research output: Contribution to journalArticle

TCP reassembler for layer7-aware network intrusion detection/prevention systems

Hanaoka, M., Shemamura, M. & Kono, K., 2007 Dec, In : IEICE Transactions on Information and Systems. E90-D, 12, p. 2019-2032 14 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Traveling forward in time to newer operating systems using shadowreboot

Yamada, H. & Kono, K., 2013 Aug, In : ACM SIGPLAN Notices. 48, 7, p. 121-130 10 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Tuning mechanisms for two major parameters of Apache web servers

Sugiki, A., Kono, K. & Iwasaki, H., 2008 Oct 1, In : Software - Practice and Experience. 38, 12, p. 1215-1240 26 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Using fault injection to analyze the scope of error propagation in linux

Yoshimura, T., Yamada, H. & Kono, K., 2013 Jul 30, In : IPSJ Online Transactions. 6, 1, p. 55-64 10 p.

Research output: Contribution to journalArticle

Why is it (thought) so difficult to write Software Papers?

Gondow, K., Akashi, O., Ichiji, H., Iwasaki, H., Kono, K., Toyoda, M. & Ueda, K., 2009, In : Computer Software. 26, 4, p. 17-29 13 p.

Research output: Contribution to journalArticle