default search action
Yoshihiro Oyama
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j11]Jonghak Yuh, Yen-Lung Jason Li, Heguang Li, Yoshihiro Oyama, Cynthia Hsu, Pradeep Anantula, Gwang Yeong Stanley Jeong, Anirudh Amarnath, Siddhesh Darne, Sneha Bhatia, Tianyu Tang, Aditya Arya, Naman Rastogi, Naoki Ookuma, Hiroyuki Mizukoshi, Alex Yap, Demin Wang, Steve Kim, Yonggang Wu, Min Peng, Jason Lu, Tommy Ip, Seema Malhotra, Taekeun Han, Masatoshi Okumura, Jiwen Liu, Jeongduk John Sohn, Hardwell Chibvongodze, Muralikrishna Balaga, Akihiro Matsuda, Chen Chen, Indra K. V, V. S. N. K. Chaitanya G., Venky Ramachandra, Yosuke Kato, Ravi Kumar, Huijuan Wang, Farookh Moogat, In-Soo Yoon, Kazushige Kanda, Takahiro Shimizu, Noboru Shibata, Kosuke Yanagidaira, Takuyo Kodama, Ryo Fukuda, Yasuhiro Hirashima, Mitsuhiro Abe:
A 1-Tb 4-b/cell 4-Plane 162-Layer 3-D Flash Memory With 2.4-Gb/s IO Interface. IEEE J. Solid State Circuits 58(1): 316-328 (2023) - [j10]Yoshihiro Oyama, Hirotaka Kokubo:
Forced continuation of malware execution beyond exceptions. J. Comput. Virol. Hacking Tech. 19(4): 483-501 (2023) - 2022
- [c32]Jong Yuh, Jason Li, Heguang Li, Yoshihiro Oyama, Cynthia Hsu, Pradeep Anantula, Stanley Jeong, Anirudh Amarnath, Siddhesh Darne, Sneha Bhatia, Tianyu Tang, Aditya Arya, Naman Rastogi, Naoki Ookuma, Hiroyuki Mizukoshi, Alex Yap, Demin Wang, Steve Kim, Yonggang Wu, Min Peng, Jason Lu, Tommy Ip, Seema Malhotra, David Han, Masatoshi Okumura, Jiwen Liu, John Sohn, Hardwell Chibvongodze, Muralikrishna Balaga, Aki Matsuda, Chakshu Puri, Chen Chen, Indra K. V, Chaitanya G, Venky Ramachandra, Yosuke Kato, Ravi Kumar, Huijuan Wang, Farookh Moogat, In-Soo Yoon, Kazushige Kanda, Takahiro Shimizu, Noboru Shibata, Takashi Shigeoka, Kosuke Yanagidaira, Takuyo Kodama, Ryo Fukuda, Yasuhiro Hirashima, Mitsuhiro Abe:
A 1-Tb 4b/Cell 4-Plane 162-Layer 3D Flash Memory With a 2.4-Gb/s I/O Speed Interface. ISSCC 2022: 130-132 - 2020
- [j9]Osamu Tatebe, Shukuko Moriwake, Yoshihiro Oyama:
Gfarm/BB - Gfarm File System for Node-Local Burst Buffer. J. Comput. Sci. Technol. 35(1): 61-71 (2020)
2010 – 2019
- 2019
- [j8]Hiromu Yakura, Shinnosuke Shinozaki, Reon Nishimura, Yoshihiro Oyama, Jun Sakuma:
Neural malware analysis with attention mechanism. Comput. Secur. 87 (2019) - [c31]Yoshihiro Oyama:
How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement. DIMVA 2019: 197-218 - [c30]Yoshihiro Oyama, Takumi Miyashita, Hirotaka Kokubo:
Identifying Useful Features for Malware Detection in the Ember Dataset. CANDAR Workshops 2019: 360-366 - 2018
- [j7]Yoshihiro Oyama:
Investigation of the Diverse Sleep Behavior of Malware. J. Inf. Process. 26: 461-476 (2018) - [j6]Yoshihiro Oyama:
Trends of anti-analysis operations of malwares observed in API call logs. J. Comput. Virol. Hacking Tech. 14(1): 69-85 (2018) - [c29]Hiromu Yakura, Shinnosuke Shinozaki, Reon Nishimura, Yoshihiro Oyama, Jun Sakuma:
Malware Analysis of Imaged Binary Samples by Convolutional Neural Network with Attention Mechanism. CODASPY 2018: 127-134 - [c28]Yoshihiro Oyama:
Skipping Sleeps in Dynamic Analysis of Multithreaded Malware. DSC 2018: 1-8 - 2017
- [j5]Takahiro Okumura, Yoshihiro Oyama:
Grammar Compression of Call Traces in Dynamic Malware Analysis. J. Inf. Process. 25: 229-233 (2017) - [c27]Hiromu Yakura, Shinnosuke Shinozaki, Reon Nishimura, Yoshihiro Oyama, Jun Sakuma:
Malware Analysis of Imaged Binary Samples by Convolutional Neural Network with Attention Mechanism. AISec@CCS 2017: 55-56 - 2016
- [j4]Yoshihiro Oyama, Jun Murakami, Shun Ishiguro, Osamu Tatebe:
Implementation of a deduplication cache mechanism using content-defined chunking. Int. J. High Perform. Comput. Netw. 9(3): 190-205 (2016) - [j3]Yoshihiro Oyama, Shun Ishiguro, Jun Murakami, Shin Sasaki, Ryo Matsumiya, Osamu Tatebe:
Experimental analysis of operating system jitter caused by page reclaim. J. Supercomput. 72(5): 1946-1972 (2016) - 2015
- [j2]Yoshihiro Oyama, Takaaki Tomiyama:
Process recovery by rollback and input modification. Int. J. Commun. Networks Distributed Syst. 15(1): 61-83 (2015) - [j1]Yoshihiro Oyama, Yudai Kawasaki, Kazushi Takahashi:
Checkpointing an Operating System Using a Parapass-through Hypervisor. J. Inf. Process. 23(2): 132-141 (2015) - [c26]Shin Sasaki, Kazushi Takahashi, Yoshihiro Oyama, Osamu Tatebe:
RDMA-Based Direct Transfer of File Data to Remote Page Cache. CLUSTER 2015: 214-225 - [c25]Shin Sasaki, Ryo Matsumiya, Kazushi Takahashi, Yoshihiro Oyama, Osamu Tatebe:
RDMA-Based Cooperative Caching for a Distributed File System. ICPADS 2015: 344-353 - 2014
- [c24]Yoshihiro Oyama, Natsuki Ogawa, Yudai Kawasaki, Kazuhiro Yamamoto:
ADvisor: A Hypervisor for Displaying Images on a Desktop. CANDAR 2014: 412-418 - [c23]Yoshihiro Oyama, Shun Ishiguro, Jun Murakami, Shin Sasaki, Ryo Matsumiya, Osamu Tatebe:
Reduction of operating system jitter caused by page reclaim. ROSS@ICS 2014: 9:1-9:8 - 2012
- [c22]Keisuke Okamura, Yoshihiro Oyama:
Controlling the speed of virtual time for malware deactivation. APSys 2012: 6 - [c21]Yoshihiro Oyama, Tran Truong Duc Giang, Yosuke Chubachi, Takahiro Shinagawa, Kazuhiko Kato:
Detecting malware signatures in a thin hypervisor. SAC 2012: 1807-1814 - [c20]Shun Ishiguro, Jun Murakami, Yoshihiro Oyama, Osamu Tatebe:
Optimizing Local File Accesses for FUSE-Based Distributed Storage. SC Companion 2012: 760-765 - 2011
- [c19]Yoshihiro Oyama, Youhei Hoshi:
A Hypervisor for Injecting Scenario-Based Attack Effects. COMPSAC 2011: 682-687 - 2010
- [c18]Tsutomu Nomoto, Yoshihiro Oyama, Hideki Eiraku, Takahiro Shinagawa, Kazuhiko Kato:
Using a Hypervisor to Migrate Running Operating Systems to Secure Virtual Machines. COMPSAC 2010: 37-46 - [c17]Keisuke Okamura, Yoshihiro Oyama:
Load-based covert channels between Xen virtual machines. SAC 2010: 173-180
2000 – 2009
- 2009
- [c16]Sho Ohtahara, Takayuki Kamiyama, Yoshihiro Oyama:
Anomaly-Based Intrusion Detection System Sharing Normal Behavior Databases among Different Machines. CIT (1) 2009: 217-222 - [c15]Yu Adachi, Yoshihiro Oyama:
Malware analysis system using process-level virtualization. ISCC 2009: 550-556 - [c14]Yoshihiro Oyama, Yoshiki Kaneko, Hideya Iwasaki:
Kenro: a virtual machine monitor mostly described in Haskell. SAC 2009: 1940-1941 - [c13]Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimoto, Kazumasa Omote, Shoichi Hasegawa, Takashi Horie, Manabu Hirano, Kenichi Kourai, Yoshihiro Oyama, Eiji Kawai, Kenji Kono, Shigeru Chiba, Yasushi Shinjo, Kazuhiko Kato:
BitVisor: a thin hypervisor for enforcing i/o device security. VEE 2009: 121-130 - 2008
- [c12]Koichi Onoue, Yoshihiro Oyama, Akinori Yonezawa:
Control of system calls from outside of virtual machines. SAC 2008: 2116-1221 - 2007
- [c11]Tomohiro Shioya, Yoshihiro Oyama, Hideya Iwasaki:
A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications. ASIAN 2007: 297-311 - 2006
- [c10]Khaled Ragab, Yoshihiro Oyama, Akinori Yonezawa:
K-Interleaving Rendezvous Overlay Network Construction Scheme. ACIS-ICIS 2006: 208-213 - [c9]Yoshinori Kobayashi, Eric Y. Chen, Yoshihiro Oyama, Akinori Yonezawa:
Protecting Web Servers from Octopus Attacks. SAINT 2006: 82-85 - [c8]Koichi Onoue, Yoshihiro Oyama:
A Virtual Machine Migration System Based on a CPU Emulator. VTDC@SC 2006: 3 - 2005
- [c7]Yoshihiro Oyama, Koichi Onoue, Akinori Yonezawa:
Speculative Security Checks in Sandboxing Systems. IPDPS 2005 - 2004
- [c6]Takashi Masuyama, Frédéric Peschanski, Yoshihiro Oyama, Akinori Yonezawa:
MobileScope: A Programming Language with Objective Mobility. ICDCS Workshops 2004: 542-547 - [c5]Mizuki Oka, Yoshihiro Oyama, Hirotake Abe, Kazuhiko Kato:
Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix. RAID 2004: 223-237 - 2002
- [c4]Kazuhiko Kato, Yoshihiro Oyama:
SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation. ISSS 2002: 112-132 - 2001
- [c3]Yoshihiro Oyama, Kenjiro Taura, Akinori Yonezawa:
Fusion of Concurrent Invocations of Exclusive Methods. PaCT 2001: 293-307 - 2000
- [c2]Yoshihiro Oyama, Kenjiro Taura, Akinori Yonezawa:
Online Computation of Critical Paths for Multithreaded Languages. IPDPS Workshops 2000: 301-313
1990 – 1999
- 1997
- [c1]Yoshihiro Oyama, Kenjiro Taura, Akinori Yonezawa:
An Efficient Compilation Framework for Languages Based on a Concurrent Process Calculus. Euro-Par 1997: 546-553
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint