Zobrazeno 1 - 10
of 49
pro vyhledávání: '"Yoshihiro Oyama"'
Autor:
Yoshihiro Oyama, Hirotaka Kokubo
Publikováno v:
Journal of Computer Virology and Hacking Techniques.
Publikováno v:
Journal of Computer Science and Technology. 35:61-71
Burst buffer has become a major component to meet the I/O performance requirement of HPC bursty traffic. This paper proposes Gfarm/BB that is a file system for a burst buffer efficiently exploiting node-local storage systems. Although node-local stor
Autor:
Jong Yuh, Jason Li, Heguang Li, Yoshihiro Oyama, Cynthia Hsu, Pradeep Anantula, Stanley Jeong, Anirudh Amarnath, Siddhesh Darne, Sneha Bhatia, Tianyu Tang, Aditya Arya, Naman Rastogi, Naoki Ookuma, Hiroyuki Mizukoshi, Alex Yap, Demin Wang, Steve Kim, Yonggang Wu, Min Peng, Jason Lu, Tommy Ip, Seema Malhotra, David Han, Masatoshi Okumura, Jiwen Liu, John Sohn, Hardwell Chibvongodze, Muralikrishna Balaga, Aki Matsuda, Chakshu Puri, Chen Chen, Indra K V, Chaitanya G, Venky Ramachandra, Yosuke Kato, Ravi Kumar, Huijuan Wang, Farookh Moogat, In-Soo Yoon, Kazushige Kanda, Takahiro Shimizu, Noboru Shibata, Takashi Shigeoka, Kosuke Yanagidaira, Takuyo Kodama, Ryo Fukuda, Yasuhiro Hirashima, Mitsuhiro Abe
Publikováno v:
2022 IEEE International Solid- State Circuits Conference (ISSCC).
Autor:
Yoshihiro Oyama
Publikováno v:
Journal of Information Processing. 26:461-476
Once malware has infected a system, it may lie dormant (or asleep) to control resource consumption speeds, remain undetected until the time of an attack, and thwart dynamic analysis. Because of their aggressive and abnormal use of sleep behavior, mal
Autor:
Yoshihiro Oyama
Publikováno v:
Journal of Computer Virology and Hacking Techniques. 14(1):69-85
Some malwares execute operations that determine whether they are running in an analysis environment created by monitoring software, such as debuggers, sandboxing systems, or virtual machine monitors, and if such an operation finds that the malware is
Autor:
Yoshihiro Oyama, Takahiro Okumura
Publikováno v:
Journal of Information Processing. 25:229-233
A significant number of logs are generated in dynamic malware analysis. Consequently, a method for effectively compressing these logs is required to reduce the amount of memory and storage consumed to store such logs. In this study, we evaluated the
Publikováno v:
CANDAR Workshops
Many studies have been conducted to detect malware based on machine learning of program features extracted using static analysis. In this study, we consider the task of distinguishing between malware and benign programs by learning their surface feat
Autor:
Yoshihiro Oyama
Publikováno v:
Detection of Intrusions and Malware, and Vulnerability Assessment ISBN: 9783030220372
DIMVA
DIMVA
Many malware programs execute operations for analysis evasion. They include sandbox detection through measurement of execution time or executed CPU cycles with a method that exploits the RDTSC instruction. Although the detection technique is widely k
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ee59c24a5f11b7e09b3b224ac0bb4ac7
https://doi.org/10.1007/978-3-030-22038-9_10
https://doi.org/10.1007/978-3-030-22038-9_10
Publikováno v:
Advanced Software Technologies for Post-Peta Scale Computing ISBN: 9789811319235
The storage performance is an issue for supercomputers to facilitate the data-intensive science. To improve the storage bandwidth according to the number of compute nodes, we assume a node-local scale-out storage architecture. The number of local sto
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4b6eb49ae676757a8cc272a3d56abd50
https://doi.org/10.1007/978-981-13-1924-2_6
https://doi.org/10.1007/978-981-13-1924-2_6
Autor:
Yoshihiro Oyama
Publikováno v:
DSC
Many malware programs execute sleeps for various purposes. In the dynamic analysis of malware, the executions of sleep functions are often skipped to reduce analysis time. However, in the analysis of a multithreaded malware program, it must be determ