Takayuki Sasaki, Tomoya Inazawa, Youhei Yamaguchi, Simon Parkin, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto, "Am I Infected? Lessons from Operating a Large-Scale IoT Security Diagnostic Service," USENIX Security 2025 (accepted).
Hiroki Nakano, Takashi Koide, Daiki Chiba, Katsunari Yoshioka, Tsutomu Matsumoto, "Uncovering Suspicious Posts on Abandoned Blogs," 2025 IEEE International Conference on Communications (ICC), Communication and Information System Security Symposium, 2025.
Iori Suzuki, Yin Minn Pa Pa, Nguyen Anh Thi Van, Katsunari Yoshioka, "DeFiIntel: A Dataset Bridging On-Chain and Off-Chain Data for DeFi Token Scam Investigation," Proc. 7th Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb 2025), 2025.
Rui Tanabe, Yuta Inoue, Daigo Ichikawa, Takahiro Kasama, Dai Inoue, Katsunari Yoshioka and Tsutomu Matsumoto, "Customized Malware: Identifying Target Systems using Personally Identifiable Information," The 48th IEEE International Conference on Computers, Software, and Applications (COMPSAC 2024) , pp.1007-1012, 2024 (Short paper), 10.1109/COMPSAC61105.2024.00137.
Kyohei Takao, Chika Hiraishi, Rui Tanabe, Kazuki Takada, Akira Fujita, Daisuke Inoue, Garlos Ganan, Michel van Eeten, Katsunari Yoshioka, and Tsutomu Matsumoto, "VT-SOS: A Cost-effective URL Warning utilizing VirusTotal as a Second Opinion Service," Proc. 2024 IEEE Network Operations and Management Symposium (NOMS 2024), 2024 (Short Paper), 10.1109/NOMS59830.2024.10575506.
Takayuki Sasaki, Takaya Noma, Yudai Morii, Toshiya Shimura, Michel van Eeten, Katsunari Yoshioka, and Tsutomu Matsumoto, "Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network," Proc. 45th IEEE Symposium on Security and Privacy (IEEE S&P 2024), pp.2291-2309, 2024, 10.1109/SP54263.2024.00117.
Radu Anghel, Swaathi Vetrivel, Elsa Turcios Rodriguez, Kaichi Sameshima, Daisuke Makita, Katsunari Yoshioka, Carlos Ganan and Yury Zhauniarovich, "Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks," Proc. 28th European Symposium on Research in Computer Security (ESORICS2023) , pp.23-41 2023, 10.1007/978-3-031-51476-0_2.
Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Katsunari Yoshioka, Michel van Eeten, Carlos H. Ganan, "Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries," Proc. The 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2023), pp.513-526, 2023, 10.1145/3607199.3607241.
Yin Minn Pa Pa, Shunsuke Tanizaki, Tetsui Kou, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto, "An Attacker's Dream? Exploring the Capabilities of ChatGPT for Developing Malware," Proc. 16th Workshop on Cybersecurity Experimentation and Test (CSET 2023) , pp.10-18, 2023, 10.1145/3607505.3607513.
Swaathi Vetrivel, Arman Noroozian, Daisuke Makita, Katsunari Yoshioka, Michel van Eeten, Carlos H. Ganan, "Birds of a Feather? A Comparative Analysis of DDoS Victimisation by IoT Botnet and Amplification Attacks." Proc. The 22nd Workshop on the Economics of Information Security (WEIS2023), 2023.
Hiroki Nakano, Daiki Chiba, Takashi Koide, Naoki Fukushi, Takeshi Yagi, Takeo Hariu, Katsunari Yoshioka and Tsutomu Matsumoto, "Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts," Proc. The 18th International Conference on Availability, Reliability and Security (ARES 2023) , Article No.: 6, Pages 1 – 12, 2023, 10.1145/3600160.3600163.
Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto, "Who are you? OSINT-based Profiling of Infrastructure Honeypot Visitors," 11th International Symposium on Digital Forensics and Security (ISDFS 2023), 2023, 10.1109/ISDFS58141.2023.10131856.
Hiroki Yasui, Takahiro Inoue, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto, "SPOT: Analyzing IoT Ransomware Attacks using Bare Metal NAS Devices," Proc. The 17th Asia Joint Conference on Information Security (AsiaJCIS2022), pp.16-23, 2022. (Best Paper Award), 10.1109/AsiaJCIS57030.2022.00013
Takahiro Ueda, Takayuki Sasaki, Katsunari Yoshioka, and Tsutomu Matsumoto, "An Internet-wide View of Connected Cars: Discovery of Exposed Automotive Devices," Proc. The 2nd International Workshop on Security and Privacy in Intelligent Infrastructures (SP2I 2022) , Article No.: 146, Pages 1-8, 2022, 10.1145/3538969.3543802.
Mizuki Kondo, Rui Tanabe, Natsuo Shintani, Daisuke Makita, Katsunari Yoshioka, and Tsutomu Matsumoto, "Amplification Chamber: Dissecting the Attack Infrastructure of Memcached DRDoS Attacks," Proc. The 19th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA2022), pp.178-196, 2022, 10.1007/978-3-031-09484-2_10.
Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Jakob Bleier, Katsunari Yoshioka, Martina Lindorfer, Michel van Eeten, Carlos H. Ganan, "No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis," The 17th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2022), pp.309-321, 2022, 10.1145/3488932.3517408.
Takayuki Sasaki, Akira Fujita, Carlos Hernandez Ganan, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto, "Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices," Proc. 43rd IEEE Symposium on Security and Privacy (IEEE S&P), pp.2379-2396, 2022, 10.1109/SP46214.2022.9833730.
Jia Wang, Takayuki Sasaki, Kazumasa Omote, Katsunari Yoshioka, Tsutomu Matsumoto, "Multifaceted Analysis of Malicious Ethereum Accounts and Corresponding Activities," Proc. 6th International Conference on Cryptography, Security and Privacy (CSP 2022), pp.71-79, 2022. (Best Presentation Award), 10.1109/CSP55486.2022.00022.
Seiya Kato, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto, "Adaptive Observation of Emerging Cyber Attacks targeting Various IoT Devices," IFIP/IEEE International Symposium on Integrated Network Management (IM), pp.143-151, 2021.
Gerry Wan, Liz Izhikevich, David Adrian, Katsunari Yoshioka, Ralph Holz, Christian Rossow, Zakir Durumeric, "On the Origin of Scanning: The Impact of Location on Internet-Wide Scans," The 2020 Internet Measurement Conference (IMC), pp.662-679, 2020, 10.1145/3419394.3424214.
Takeshi Takahashi, Christopher Kruegel, Giovanni Vigna, Katsunari Yoshioka, Daisuke Inoue, "Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs?" Proc. 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID2020), pp.93-106, 2020.
Yusuke Takahashi, Shigeyoshi Shima, Rui Tanabe, Katsunari Yoshioka, "APTGen: An Approach towards Generating Practical Dataset Labelled with Targeted Attack Sequences," Proc. 13th USENIX Workshop on Cyber Security Experimentation and Test, (USENIX CSET'20), Article No.: 8, Page 8, 2020.
Rui Tanabe, Tatsuya Tamai, Akira Fujita, Ryoichi Isawa, Katsunari Yoshioka, Tsutomu Matsumoto, Carlos Ganan and Michel Van Eeten, "Disposable Botnets: Examining the Anatomy of IoT Botnet Infrastructure," Proc. International Conference on Availability, Reliability, and Security (ARES2020), Article No.: 7, Pages 1 – 10, 2020, 10.1145/3407023.3409177.
Takashi Koide, Daiki Chiba, Mitsuaki Akiyama, Katsunari Yoshioka, and Tsutomu Matsumoto, "It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites," Proc. The Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2020) , pp.171-191, 2020 (Best Paper Award), 10.1007/978-3-030-52683-2_9.
Shun Morishita, Takuya Hoizumi, Wataru Ueno, Rui Tanabe, Carlos Hernandez Gañán, Michel J.G. van Eeten, Katsunari Yoshioka, and Tsutomu Matsumoto, "Detect Me If You... Oh Wait. An Internet-Wide View of Self-Revealing Honeypots," IFIP/IEEE International Symposium on Integrated Network Management (IFIP/IEEE IM2019), pp. 134-143, 2019.
O. Cetin, C. Gañán, L. Altena, D. Inoue, T. Kasama, K. Tamiya, Y. Tie, K. Yoshioka, M. van Eeten, "Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai," The Network and Distributed System Security Symposium (NDSS 2019), 2019. (NDSS 2019 Distinguished Paper Award), 10.14722/ndss.2019.23438.
Rui Tanabe, Wataru Ueno, Kou Ishii, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Christian Rossow, "Evasive Malware via Identifier Implanting," Proc. The Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2018), LNCS, vol. 10885, pp. 162 - 184, 2018, 10.1007/978-3-319-93411-2_8.
Ryoichi Isawa, Tao Ban, Ying Tie, Katsunari Yoshioka, Daisuke Inoue, "Evaluating Disassembly-Code Based Similarity between IoT Malware Samples," Proc. AsiaJCIS 2018, pp. 89-94, 2018, 10.1109/AsiaJCIS.2018.00023.
Akira Yokoyama, Kou Ishii, Rui Tanabe, Yin Minn Papa, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Michael Brengel, Michael Backes, Christian Rossow, "SANDPRINT: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion," Proc. Research in Attacks, Intrusions, and Defenses (RAID16), Lecture Notes in Computer Science, pp.165–187, 2016, 10.1007/978-3-319-45719-2_8.
Arman Noroozian, Maciej Korczynski, Carlos Hernandez Ganan, Daisuke Makita, Katsunari Yoshioka, Michel van Eeten, "Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service," Proc. Research in Attacks, Intrusions, and Defenses (RAID16), Lecture Notes in Computer Science, pp. 368-389, 2016, 10.1007/978-3-319-45719-2_17.
Yosuke Kikuchi, Hiroshi Mori, Hiroki Nakano, Katsunari Yoshioka, Tsutomu Matsumoto, Michel van Eeten, "Evaluating Malware Mitigation by Android Market Operators," 9th USENIX Workshop on Cyber Security Experimentation and Test (USENIX CSET 2016), 2016.
Satomi Saito, Satoru Torii, Katsunari Yoshioka and Tsutomu Matsumoto, "Wamber: Defending Web Sites on Hosting Services with Self-Learning Honeypots," The 11th Asia Joint Conference on Information Security (AsiaJCIS2016), pp.60-66, 2016, 10.1109/AsiaJCIS.2016.32.
Jiawei Su, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto, "An efficient method for detecting obfuscated suspicious JavaScript based on text pattern analysis," Proc. 2016 ACM International Workshop on Traffic Measurements for Cybersecurity, WTMC2016, pp.3–11, 2016, 10.1145/2903185.2903189.
Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, and Tsutomu Matsumoto, Takahiro Kasama, Christian Rossow, "IoTPOT: Analysing the Rise of IoT Compromises," 9th USENIX Workshop on Offensive Technologies (USENIX WOOT 2015), 2015.
Lukas Kramer, Johannes Krupp, Daisuke Makita, Tomomi Nishizoe, Takashi Koide, Katsunari Yoshioka, Christian Rossow, "AmpPot: Monitoring and Defending Amplification DDoS Attacks," Proc. Research in Attacks, Intrusions, and Defenses (RAID15), Lecture Notes in Computer Science, Vol. 9404, pp. 615-636, 2015, 10.1007/978-3-319-26362-5_28.
Jiawei Su, Katsunari Yoshioka, Junji Shikata and Tsutomu Matsumoto, “Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection,” Proc. of the The 18th Annual International Conference on Information Security and Cryptology (ICISC 2015), LNCS, Springer, Seoul, Korea, November 25th-27th, 2015, pp.278–293, 10.1007/978-3-319-30840-1_18.
Yin Minn Pa Pa, K. Yoshioka, T. Matsumoto, "Search Engine Based Investigation on Misconfiguration of Zone Transfer," AsiaJCIS2013, pp. 56 - 62, 2013 (Best Paper Award)
T. Kasama, K. Yoshioka, D. Inoue, and T. Matsumoto, "Malware Detection Method by Catching Their Random Behavior in Multiple Executions," 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, pp. 262 - 266, 2012.
T. Fujii, K. Yoshioka, J.Shikata, and T. Matsumoto, "An Efficient Dynamic Detection Method for Various x86 Shellcodes," 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, pp. 284 - 289, 2012.
K. Yoshioka, Y. Hosobuchi, T. Orii, and T. Matsumoto, "Vulnerability in Public Malware Sandbox Analysis Systems," IEEE 10th Annual International Symposium on Applications and the Internet, SAINT2010, pp 265 - 268, 2010.
T. Kasama, K. Yoshioka, T. Matsumoto, M. Yamagata, M. Eto, D. Inoue, and K. Nakao, "Malware Sandbox Analysis with Automatic Collection of Server Responses using Dummy Client," Proc. 5th Joint Workshop on Information Security, JWIS 2010, pp. 67 - 81, 2010.
M. Eto, K. Sonoda, D. Inoue, K. Yoshioka, and K. Nakao, "A Proposal of Malware Distinction Method based on Scan Patterns using Spectrum Analysis," LNCS Vol. 5864, pp. 565 - 572, 2009.
D. Inoue, K. Yoshioka, M. Eto, M. Yamagata, E. Nishino, J. Takeuchi, K. Ohkouchi, and K. Nakao, “An Incident Analysis System nicter and Its Analysis Engines Based on Data Mining Techniques,” 15th International Conference on Neural Information Processing of the Asia-Pacific Neural Network Assembly, ICONIP 2008, LNCS Vol 5506, pp579-586, 2009.
K. Yoshioka, T. Kasama, and T. Matsumoto, "Sandbox Analysis with Controlled Internet Connection for Observing Temporal Changes of Malware Behavior," Proc. 4th Joint Workshop on Information Security, JWIS 2009, 3a-2, 2009.
K. Yoshioka, T. Matsumoto, "Fingerprinting Traffic Log," Proc. 2008 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.143-146, 2008.
K. Yoshioka, D. Inoue, M. Eto, Y. Hoshizawa, H. Nogawa, K. Nakao, "Malware Sandbox Analysis for Extracting Exploit Codes," Proc. 3rd Joint Workshop on Information Security, JWIS 2008, pp. 572 - 586, 2008. (Best Paper Award)
D. Inoue, M. Eto, K. Yoshioka, S. Baba, K. Suzuki, J. Nakazato, K. Ohtaka, K. Nakao, "nicter: An Incident Analysis System Toward Binding Network Monitoring with Malware Analysis," Proc. WOMBAT Workshop on Information Security Threats Data Collection and Sharing, 2008, WISTDCS '08, IEEE Computer Society Press, pp. 58 - 66, 2008.
D. Inoue, K. Yoshioka, M. Eto, Y. Hoshizawa, K. Nakao, “Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity,” Proc. 2008 IEEE International Conference on Communications, ICC 2008, pp. 1715 - 1721, 2008.
K. Sonoda, K. Yoshioka, O. Takizawa, "Information Hiding for Public Address Audio Signal using FH/FSK Spread-spectrum Scheme," 2006 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Vol. 2, pp. 279 - 282, 2007.
K. Nakao, K. Yoshioka, D. Inoue, M. Eto, "A Novel Concept of Network Incident Analysis based on Multi-layer Observations of Malware Activities," Proceedings of The 2nd Joint Workshop on Information Security,JWIS2007, pp. 267 - 279, 2007 (Best Paper Award).
K. Yoshioka, K. Sonoda, O. Takizawa, T. Matsumoto, "Information Hiding on Lossless Data Compression," 2006 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 15 - 18, 2006.
K. Nakao, K. Yoshioka, D. Inoue, M. Eto, K. Rikitake, "nicter: An Incident Analysis System using Correlation between Network Monitoring and Malware Analysis," Proceedings of The 1st Joint Workshop on Information Security,JWIS2006, pp. 363 - 377, 2006.
K. Sonoda、K. Yoshioka、O. Takizawa、K. Nakao, "Digital Audio Watermarking Based on Quantization Index Modulation of Wavelet Domain," The 9th Western Pacific Acoustics Conference (WESPAC IX 2006), Session HU-1-2, No.549, 2006.
K. Yoshioka, K. Sonoda, O. Takizawa, K. Nakao, "Hiding Information into Emergency Public Address Sound," The 9th Western Pacific Acoustics Conference (WESPAC IX 2006), Session HU-1-2, No.447, 2006.
K. Akai, M. Murano, I. Murase, K. Makino, O. Takizawa, T. Matsumoto, M. Suzuki, K. Yoshioka and H. Nakagawa, "Implementing XML Information Hiding by XSLT," Proceedings of STEG'04:Pacific Rim Workshop on Digital Steganography, 2004, pp.96 -100, 2004.
K. Yoshioka, J. Shikata, T. Matsumoto, "Systematic treatment of collusion secure codes: security definitions and their relations," Proceedings of 6th Information Security Conference (ISC'03), Lecture Notes in Computer Science, Volume 2851, pp. 408 - 421, 2003.
Koji Nakao, Daisuke Inoue, Katsunari Yoshioka, "Unveiling IoT Threats: A Case Study on Darknet and Honeypot Analysis," IEEE Computer, vol.58, pp37-45, 2025, 10.1109/MC.2025.3531364.
Takayuki Sasaki, Jia Wang, Kazumasa Omote, Katsunari Yoshioka, Tsutomu Matsumoto, "EtherWatch: A Framework for Detecting Suspicious Ethereum Accounts and Their Activities," IPSJ Journal, Vol.65, No.9, 2024, 10.2197/ipsjjip.32.789.
Qingxin Mao, Daisuke Makita, Michel Van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto, "Characteristics Comparison between Carpet Bombing-type and Single Target DRDoS Attacks Observed by Honeypot," IPSJ Journal, Vol.65, No.9, 2024, 10.2197/ipsjjip.32.731.
Hiroki Yasui, Takahiro Inoue, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto, "SPOT: In-depth Analysis of IoT Ransomware Attacks using Bare Metal NAS Devices," Journal of Information Processing, Vol.65, No.1, 2023, 10.2197/ipsjjip.32.23.
Xuping Huang, Shunsuke Mochizuki, Akira Fujita, Katsunari Yoshioka, "Simulating and Estimating the Effectiveness of Security Notification by ISP to Malware-Infected Users," Journal of Information Processing, Vol.31, pp.165-173, 2023, 10.2197/ipsjjip.31.165.
Xuping Huang, Shunsuke Mochizuki, Katsunari Yoshioka, "Connection Type Identification and Uplink Speed Estimation of Malware Infected Hosts," Journal of Information Processing, Vol.30, pp.859-864, 2022, 10.2197/ipsjjip.30.859.
Rui Tanabe, Tsuyufumi Watanabe, Akira Fujita, Ryoichi Isawa, Carlos Gañán, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto, "Disposable Botnets:Long-term Analysis of IoT Botnet Infrastructure," IPSJ Journal, Vol.63, No.9, 2022, 10.2197/ipsjjip.30.577.
Hiroki Nakano, Daiki Chiba, Takashi Koide, Mitsuaki Akiyama, Katsunari Yoshioka, Tsutomu Matsumoto, "Exploring Event-synced Navigation Attacks across User-generated Content Platforms in the Wild," IPSJ Journal, Vol.63, No.5, 2022, 10.2197/ipsjjip.30.372.
Aamir Bokhari, Yuta Inoue, Seiya Kato, Katsunari Yoshioka, Tsutomu Matsumoto, "Empirical Analysis of Security and Power-Saving Features of Port Knocking Technique Applied to an IoT Device," Journal of Information Processing, Vol 29, Volume 29 pp.572-580, 2021. (情報処理学会特選論文), 10.2197/ipsjjip.29.572.
Bo Sun,Tao Ban, Chansu Han, Takeshi Takahashi, Katsunari Yoshioka, Junichi Takeuchi, Abdolhossein Sarrafzadeh, Meikang Qiu, and Daisuke Inoue, "Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated with Targeted Email Attacks," IEEE Access, Vol.9, pp. 87962-87971, 2021, 10.1109/ACCESS.2021.3082000.
Takashi Koide, Daiki Chiba, Mitsuaki Akiyama, Katsunari Yoshioka, and Tsutomu Matsumoto, “Understanding the Fake Removal Information Advertisement Sites,” Journal of Information Processing, 2021 (情報処理学会特選論文, 2021年度 Journal of Information Processing Outstanding Paper Award), 10.2197/ipsjjip.29.392.
Takashi Koide, Daiki Chiba, Mitsuaki Akiyama, Katsunari Yoshioka, and Tsutomu Matsumoto, “To Get Lost is to Learn the Way: An Analysis of Multi-step Social Engineering Attacks on the Web,” IEICE Transactions on Information and Systems, Volume E104-A No.1, pp.162-181, 2021, 10.1587/transfun.2020CIP0005.
Kazuki Tamiya, Aamir H. Bokhari, Yuta Ezawa, Sou Nakayama, Ying Tie, Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto, "Dangers of IP Camera . An Observational Study on Peeping," Journal of Information Processing, Vol.61, No.9, 2020(情報処理学会特選論文), 10.2197/ipsjjip.28.502.
森下瞬, 上野航, 田辺瑠偉, Carlos Ganan, Michel J.G. van Eeten, 吉岡克成, 松本勉, "広域ネットワークスキャンに基づくオープンソースハニーポットの運用実態調査," 情報処理学会論文誌, Vol.61, No.9, pp.1397–1413, 2020, 10.20729/00206788.
Chun-Jung Wu, Katsunari Yoshioka, and Tsutomu Matsumoto, "ThingGate: A gateway for managing traffic of bare-metal IoT honeypot," IPSJ Journal, Vol.61, No.9, 2020, 10.2197/ipsjjip.28.481.
Hiroki Nakano, Fumihiro Kanei, Yuta Takata, Mitsuaki Akiyama and Katsunari Yoshioka, "Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities," IEICE Trans. Vol.E101-D,No.11, 2018, 10.1587/transinf.2017ICP0009.
Yin Minn Pa Pa, Suzuki Shogo, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Christian Rossow "IoTPOT: A Novel Honeypot for Revealing Current IoT Threats," Journal of Information Processing, Vol. 57, No. 4, 2016.
田辺瑠偉, 鈴木将吾, Yin Minn Pa Pa, 吉岡克成, 松本勉, "マルウェア感染ホストへのリモート再侵入により感染拡大を阻止する手法," 情報処理学会論文誌, Vol. 57, No. 9, pp. 2021 - 2033, 2016.(情報処理学会特選論文).
Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto, "Detecting Malicious Domains and Authoritative Name Servers Based on Their Distinct Mappings to IP Addresses," Journal of Information Processing, Vol. 23, No. 5, pp. 623-632, 2015, 10.2197/ipsjjip.23.623.
T. Kasama, K. Yoshioka, D. Inoue, T. Matsumoto, "Catching The Behavioral Differences between Multiple Executions for Malware Detection," IEICE Trans., Vol. E96-A No.1 pp. 225-232, 2013.
T. Kasama, K. Yoshioka, T. Matsumoto, M. Yamagata, M. Eto, D. Inoue, K. Nakao, "Malware Sandbox Analysis with Efficient Observation of Herder's Behavior, " Journal of Information Processing, Vol. 20, No. 4, pp. 835 - 845, 2012.
K. Yoshioka, Y. Hosobuchi, T. Orii, and T. Matsumoto, "Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems," Journal of Information Processing, Vol. 52, No.3, 1144-1159, 2011.
H. C. Kim, T. Orii, K. Yoshioka, D. Inoue, J. Song, M. Eto, J. Shikata, T. Matsumoto, and K. Nakao, "An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation," IEICE Trans. Vol. E94D, No. 9, pp. 1778 - 1791, 2011.
笠間貴弘, 織井達憲, 吉岡克成, 松本勉, "公開型マルウェア動的解析システムに対するデコイ挿入攻撃の脅威," Journal of Information Processing, Vol. 52, No. 9, pp. 2761 - 2774, 2011.(情報処理学会推薦論文)
M. Eto, K. Sonoda, D. Inoue, K. Yoshioka, K. Nakao, "Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis," IEICE Trans. Vol. E93D, No.5, pp. 1106 - 1116, 2010.
K. Yoshioka, and T. Matsumoto "Multi-pass Malware Sandbox Analysis with Controlled Internet Connection," IEICE Trans. E93A, No. 1, pp. 210-218, 2010.
D. Inoue, K. Yoshioka, M. Eto, Y. Hoshizawa, and K, Nakao, "Automated Malware Analysis System and its Sandbox for Revealing Malware's Internal and External Activities," IEICE Trans. Vol. E92D, No. 5, pp. 945-954, 2009.
K. Nakao, D. Inoue, M. Eto, and K. Yoshioka, "Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks based on Darknet Monitoring," IEICE Trans. Vol. E92D, No. 5, pp. 787-798, 2009. (Invited Paper)
K. Yoshioka, D. Inoue, M. Eto, Y. Hoshizawa, H. Nogawa and K, Nakao, "Malware sandbox analysis for secure observation of vulnerability exploitation," IEICE Trans. Vol. E92D, No. 5, pp. 955 - 966, 2009.
K. Yoshioka, K. Sonoda, O. Takizawa, and T. Matsumoto, "Information Hiding on Lossless Data Compression," Journal of Digital Information Management, Volume 6, Number 2, pp. 151 - 156, 2008.
K. Yoshioka, J. Shikata, T. Matsumoto, "On collusion security of random codes," IEICE transactions, Vol.E88-A, No.1, pp. 296 - 304, 2005.
K. Yoshioka, J. Shikata, T. Matsumoto, "Collusion secure codes: systematic security definitions and their relations," IEICE transactions, Vol.E87-A, No.5, pp. 1162-1171, 2004.
K. Yoshioka, T. Matsumoto, "Random-error-resilience of a short collusion-secure code," IEICE transactions, Vol.E86-A, No.5, pp. 1147 - 1155, 2003.
K. Yoshioka, T. Matsumoto, "Random-Error-Resilient Tracing Algorithm for a Collusion-Secure Fingerprinting Code," IPSJ Journal, Vol.43, No.8, pp. 2502 - 2510, 2002.
国際会議(ポスター・Work-in-progressセッション, デモ)
Mizuho Hasegawa, Akihide Saino, Akira Fujita, Kazuki Takada, Rui Tanabe, Carlos H. Ganan, Michel van Eeten, Katsunari Yoshioka, "Poster: Do You Sell This? Utilizing Product Searches to Find SEO-driven Fake Shopping Sites," NDSS2025 poster session, 2025.
Ryota Honda, Junnosuke Kushibiki, Takayuki Sasaki, Simon Parkin, Carlos H. Ganan, Michel van Eeten, Katsunari Yoshioka, "Poster: An Analysis of IoT Device Manufacturer's Security Advice to User Through Companion Apps," NDSS2025, poster session, 2025.
Daichi Uezono, Junnosuke Kushibiki, Takayuki Sasaki, Satoshi Hara, Yury Zhauniarovich, Carlos H. Ganan, Michel van Eeten, Katsunari Yoshioka, "Poster: DarkWrt: Towards Building a Dataset of Potentially Unwanted Functions in IoT Devices," NDSS2025, poster session, 2025.
Zhewei Huang, Yin Minn Pa Pa, Katsunari Yoshioka, "Exploring the Impact of LLM Assisted Malware Variants on Anti-Virus Detection," Experience and Practice Track, The 2024 7th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2024), 2024.
Mizuho Hasegawa, Yamato Kawaguchi, Hiroaki Takayama, Yasuhiro Kunimine, Hidekazu Tanaka, Shintaro Kawamura, Akira Fujita, Shingo Yasuda, Daisuke Inoue, Nobuyo Fujiwara, Kazuki Takada, Rui Tanabe, Katsunari Yoshioka, "A Case Study of URL Blocklist Maintenance," Experience and Practice Track, The 2024 7th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2024), 2024.
Yamato Kawaguchi, Kazuki Takada, Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto, "Investigating Black-Market Jobs on Social Networking Service," Experience and Practice Track, The 2024 7th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2024), 2024.
Yu Arai, Katsunari Yoshioka, and Tsutomu Matsumoto, "Evasion attacks against Next-Generation AntiVirus software and antivirus software implementing hybrid detection," AsiaJCIS2023, poster session, 2023.
Xuping Huang, Shunsuke Mochizuki and Katsunari Yoshioka, "Simulation of Security Notification to Malware-infected Users by ISP," International Workshop on Security (IWSEC) 2022, poster session, 2022.
Yutaro Osako, Toshihiro Yamauchi, Katsunari Yoshioka, Takuya Fujihashi, Takashi Watanabe, Shunsuke Saruwatari "Poster: Visualization Result of String-based CPU Architecture Independent IoT Malware Clustering," The Network and Distributed System Security (NDSS), 2022. (Poster Session).
Xuping Huang, Shunsuke Mochizuki and Katsunari Yoshioka, "Towards Estimating Radio Resources Wasted by IoT Botnet Attacks", International Workshop on Security (IWSEC), Poster Session, 2021. (Best Poster Award)
Toshihiro Yamauchi, Ryota Yoshimoto, Takahiro Baba, Katsunari Yoshioka, "Analysis of commands of Telnet logs illegally connected to IoT devices, Proceedings of 2021 10th International Congress on Advanced Applied Informatics (IIAI-AAI 2021), 12th International Conference on E-Service and Knowledge Management (ESKM 2021), pp.913-915, 2021, poster, 10.1109/IIAI-AAI53430.2021.00160.
Takeshi Takahashi, Yuki Umemura, Chansu Han, Tao Ban, Keisuke Furumoto, Ohnori Nakamura, Katsunari Yoshioka, Junichi Takeuchi, Noboru Murata, Yoshiaki Shiraishi, "Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines?" Work in Progress Session, The 19th International Conference on Pervasive Computing and Communications (PerCom 2021), Pages: 376-379, 2021, 10.1109/PerComWorkshops51409.2021.9431125.
Satoshi Hara, Jia Xiong, Tatsuya Tamai, Kazuki Tamiya, Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto, "Verification of malware dynamic analysis method using real and virtual IoT devices," IWSEC2019, poster session, 2019.
Kazuki Takada, Kunihiro Shiraishi, Katsunari Yoshioka, Tsutomu Matsumoto, "Proposal of whitelist based detection of MITB attacks using browser extension," AsiaJCIS2019, poster session, 2019.
Tao Ban, Ryoichi Isawa, Katsunari Yoshioka, "A Cross-Platform Study on IoT Malware," The 11th International Conference on Mobile Computing and Ubiquitous Networking, Poster, 2018, 10.23919/ICMU.2018.8653580.
Takashi Koide, Daisuke Makita, Katsunari Yoshioka, Tsutomu Matsumoto, "Observation and Analysis of TCP-based Reflection DDoS Attacks Using Honeypot," Research in Attacks, Intrusions, and Defenses (RAID15), Poster session, 2015.
K. Yoshioka, "PRACTICE: botnet tracking for detecting emerging threats," Work-In-Progress Session, AsiaJCIS2013, 2013.
R. Tanabe, K. Yoshioka, and T. Matsumoto, "Detecting Intrusion using Dummy Credentials," Work-In-Progress Session, AsiaJCIS2013, 2013.
T. Matsumoto, M. Hata, M. Tanabe, K. Yoshioka, K. Oishi, "A Method of Preventing Unauthorized Data Transmission in Controller Area Network," The 2012 IEEE 75th Vehicular Technology Conference, Poster Session, 2012.
H. Mori, K. Yoshioka, T. Matsumoto, “Proposal of Visualization Method and User Interface for Analyzing Traffic Observed by Long-term Malware Sandbox Analysis,” IWSEC2012, Poster sesson, 2012.
Yin Minn Pa Pa, K. Yoshioka, T. Matsumoto, “Search Engine Based Investigation on Misconfiguration of Zone Transfer,” IWSEC2012, Poster Session, 2012.
D. Inoue, M. Suzuki, M. Eto, K. Yoshioka, and K. Nakao, "DAEDALUS: Novel Application of Large-scale Darknet Monitoring for Practical Protection of Live Networks," 12th International Symposium on Recent Advances in Intrusion Detection, RAID2009, LNCS, Vol. 5758, pp. 381 - 382, 2009. (poster session)
Qingxin Mao, Yin Minn Pa Pam, Rui Tanabe, Katsunari Yoshioka, "Linking IoT Attacks to Cybercrime-as-a-Service Offerings Using LLM and DNS Data," 電子情報通信学会情報システムセキュリティ研究会, 2025.
Aiman Syazwan Bin Abdul Razak, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto, "Unveiling the Shadows: Analyzing Cryptocurrency Address Management and Fund Movement of Darknet Markets," 電子情報通信学会情報通信システムセキュリティ研究会, 2024.
Natsuo Shintani, Daisuke Makita, Katsunari Yoshioka, Tsutomu Matsumoto, "Measurement and Factor Analysis of the Impact of Amplification DDoS Attacks Observed by Amppot," 情報処理学会CSEC研究会, 2021.
Jiawei Su, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto, "A fast detecting method for obfuscated malicious JavaScript based on text pattern analysis," IEICE Tech. Rep., vol. 115, no. 488, ICSS2015-58, pp. 65-70, 2016.
K. Yoshioka, D. Inoue, M. Eto, K. Nakao, "Malware Behavior Analysis with Isolated Low-interaction Honeypot," 電子情報通信学会暗号と情報セキュリティシンポジウム2008, 概要集, pp. 290, 2008.
D. Inoue, M. Eto, K. Yoshioka, K. Nakao, "Malware Behavior Analysis under Isolated Darknet Environment," 電子情報通信学会暗号と情報セキュリティシンポジウム2008, 概要集, pp. 289, 2008.
松本勉, 有沢大輔, 吉岡克成, "ディジタル文書への筆跡を用いたバイオメトリック署名方式の試み," 電子情報通信学会暗号と情報セキュリティシンポジウム2008, 概要集, pp. 160, 2008.
山形昌也,村田康裕,井上大介,衛藤将史,吉岡克成,中尾康二, "マクロ解析環境における全ポートアクセス環境を考慮した変化点検出エンジンの拡張," 電子情報通信学会暗号と情報セキュリティシンポジウム2008, 概要集, pp. 197, 2008.
K. Yoshioka, M. Eto, D. Inoue, K. Nakao, "Macro-Micro Correlation Analysis for Binding Darknet Traffic and Malwares," 電子情報通信学会暗号と情報セキュリティシンポジウム2007 概要集, pp. 111, 2007.
井上大介, 衛藤将史, 吉岡克成, 星澤祐二, 伊沢 亮一, 森井 昌克, 中尾 康二, "Micro Analysis System for Analyzing Malware Code and its Behavior on nicter," 電子情報通信学会暗号と情報セキュリティシンポジウム2007 概要集, pp. 110, 2007.
Takayuki Sasaki, Tomoya Inazawa, Youhei Yamaguchi, Simon Parkin, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto, "Am I Infected? Lessons from Operating a Large-Scale IoT Security Diagnostic Service," USENIX Security 2025 (accepted).
Hiroki Nakano, Takashi Koide, Daiki Chiba, Katsunari Yoshioka, Tsutomu Matsumoto, "Uncovering Suspicious Posts on Abandoned Blogs," 2025 IEEE International Conference on Communications (ICC), Communication and Information System Security Symposium, 2025.
Iori Suzuki, Yin Minn Pa Pa, Nguyen Anh Thi Van, Katsunari Yoshioka, "DeFiIntel: A Dataset Bridging On-Chain and Off-Chain Data for DeFi Token Scam Investigation," Proc. 7th Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb 2025), 2025.
Rui Tanabe, Yuta Inoue, Daigo Ichikawa, Takahiro Kasama, Dai Inoue, Katsunari Yoshioka and Tsutomu Matsumoto, "Customized Malware: Identifying Target Systems using Personally Identifiable Information," The 48th IEEE International Conference on Computers, Software, and Applications (COMPSAC 2024) , pp.1007-1012, 2024 (Short paper), 10.1109/COMPSAC61105.2024.00137.
Kyohei Takao, Chika Hiraishi, Rui Tanabe, Kazuki Takada, Akira Fujita, Daisuke Inoue, Garlos Ganan, Michel van Eeten, Katsunari Yoshioka, and Tsutomu Matsumoto, "VT-SOS: A Cost-effective URL Warning utilizing VirusTotal as a Second Opinion Service," Proc. 2024 IEEE Network Operations and Management Symposium (NOMS 2024), 2024 (Short Paper), 10.1109/NOMS59830.2024.10575506.
Takayuki Sasaki, Takaya Noma, Yudai Morii, Toshiya Shimura, Michel van Eeten, Katsunari Yoshioka, and Tsutomu Matsumoto, "Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network," Proc. 45th IEEE Symposium on Security and Privacy (IEEE S&P 2024), pp.2291-2309, 2024, 10.1109/SP54263.2024.00117.
Radu Anghel, Swaathi Vetrivel, Elsa Turcios Rodriguez, Kaichi Sameshima, Daisuke Makita, Katsunari Yoshioka, Carlos Ganan and Yury Zhauniarovich, "Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks," Proc. 28th European Symposium on Research in Computer Security (ESORICS2023) , pp.23-41 2023, 10.1007/978-3-031-51476-0_2.
Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Katsunari Yoshioka, Michel van Eeten, Carlos H. Ganan, "Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries," Proc. The 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2023), pp.513-526, 2023, 10.1145/3607199.3607241.
Yin Minn Pa Pa, Shunsuke Tanizaki, Tetsui Kou, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto, "An Attacker's Dream? Exploring the Capabilities of ChatGPT for Developing Malware," Proc. 16th Workshop on Cybersecurity Experimentation and Test (CSET 2023) , pp.10-18, 2023, 10.1145/3607505.3607513.
Swaathi Vetrivel, Arman Noroozian, Daisuke Makita, Katsunari Yoshioka, Michel van Eeten, Carlos H. Ganan, "Birds of a Feather? A Comparative Analysis of DDoS Victimisation by IoT Botnet and Amplification Attacks." Proc. The 22nd Workshop on the Economics of Information Security (WEIS2023), 2023.
Hiroki Nakano, Daiki Chiba, Takashi Koide, Naoki Fukushi, Takeshi Yagi, Takeo Hariu, Katsunari Yoshioka and Tsutomu Matsumoto, "Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-experts," Proc. The 18th International Conference on Availability, Reliability and Security (ARES 2023) , Article No.: 6, Pages 1 – 12, 2023, 10.1145/3600160.3600163.
Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto, "Who are you? OSINT-based Profiling of Infrastructure Honeypot Visitors," 11th International Symposium on Digital Forensics and Security (ISDFS 2023), 2023, 10.1109/ISDFS58141.2023.10131856.
Hiroki Yasui, Takahiro Inoue, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto, "SPOT: Analyzing IoT Ransomware Attacks using Bare Metal NAS Devices," Proc. The 17th Asia Joint Conference on Information Security (AsiaJCIS2022), pp.16-23, 2022. (Best Paper Award), 10.1109/AsiaJCIS57030.2022.00013
Takahiro Ueda, Takayuki Sasaki, Katsunari Yoshioka, and Tsutomu Matsumoto, "An Internet-wide View of Connected Cars: Discovery of Exposed Automotive Devices," Proc. The 2nd International Workshop on Security and Privacy in Intelligent Infrastructures (SP2I 2022) , Article No.: 146, Pages 1-8, 2022, 10.1145/3538969.3543802.
Mizuki Kondo, Rui Tanabe, Natsuo Shintani, Daisuke Makita, Katsunari Yoshioka, and Tsutomu Matsumoto, "Amplification Chamber: Dissecting the Attack Infrastructure of Memcached DRDoS Attacks," Proc. The 19th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA2022), pp.178-196, 2022, 10.1007/978-3-031-09484-2_10.
Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Jakob Bleier, Katsunari Yoshioka, Martina Lindorfer, Michel van Eeten, Carlos H. Ganan, "No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis," The 17th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2022), pp.309-321, 2022, 10.1145/3488932.3517408.
Takayuki Sasaki, Akira Fujita, Carlos Hernandez Ganan, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto, "Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices," Proc. 43rd IEEE Symposium on Security and Privacy (IEEE S&P), pp.2379-2396, 2022, 10.1109/SP46214.2022.9833730.
Jia Wang, Takayuki Sasaki, Kazumasa Omote, Katsunari Yoshioka, Tsutomu Matsumoto, "Multifaceted Analysis of Malicious Ethereum Accounts and Corresponding Activities," Proc. 6th International Conference on Cryptography, Security and Privacy (CSP 2022), pp.71-79, 2022. (Best Presentation Award), 10.1109/CSP55486.2022.00022.
Seiya Kato, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto, "Adaptive Observation of Emerging Cyber Attacks targeting Various IoT Devices," IFIP/IEEE International Symposium on Integrated Network Management (IM), pp.143-151, 2021.
Gerry Wan, Liz Izhikevich, David Adrian, Katsunari Yoshioka, Ralph Holz, Christian Rossow, Zakir Durumeric, "On the Origin of Scanning: The Impact of Location on Internet-Wide Scans," The 2020 Internet Measurement Conference (IMC), pp.662-679, 2020, 10.1145/3419394.3424214.
Takeshi Takahashi, Christopher Kruegel, Giovanni Vigna, Katsunari Yoshioka, Daisuke Inoue, "Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs?" Proc. 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID2020), pp.93-106, 2020.
Yusuke Takahashi, Shigeyoshi Shima, Rui Tanabe, Katsunari Yoshioka, "APTGen: An Approach towards Generating Practical Dataset Labelled with Targeted Attack Sequences," Proc. 13th USENIX Workshop on Cyber Security Experimentation and Test, (USENIX CSET'20), Article No.: 8, Page 8, 2020.
Rui Tanabe, Tatsuya Tamai, Akira Fujita, Ryoichi Isawa, Katsunari Yoshioka, Tsutomu Matsumoto, Carlos Ganan and Michel Van Eeten, "Disposable Botnets: Examining the Anatomy of IoT Botnet Infrastructure," Proc. International Conference on Availability, Reliability, and Security (ARES2020), Article No.: 7, Pages 1 – 10, 2020, 10.1145/3407023.3409177.
Takashi Koide, Daiki Chiba, Mitsuaki Akiyama, Katsunari Yoshioka, and Tsutomu Matsumoto, "It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites," Proc. The Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2020) , pp.171-191, 2020 (Best Paper Award), 10.1007/978-3-030-52683-2_9.
Shun Morishita, Takuya Hoizumi, Wataru Ueno, Rui Tanabe, Carlos Hernandez Gañán, Michel J.G. van Eeten, Katsunari Yoshioka, and Tsutomu Matsumoto, "Detect Me If You... Oh Wait. An Internet-Wide View of Self-Revealing Honeypots," IFIP/IEEE International Symposium on Integrated Network Management (IFIP/IEEE IM2019), pp. 134-143, 2019.
O. Cetin, C. Gañán, L. Altena, D. Inoue, T. Kasama, K. Tamiya, Y. Tie, K. Yoshioka, M. van Eeten, "Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai," The Network and Distributed System Security Symposium (NDSS 2019), 2019. (NDSS 2019 Distinguished Paper Award), 10.14722/ndss.2019.23438.
Rui Tanabe, Wataru Ueno, Kou Ishii, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Christian Rossow, "Evasive Malware via Identifier Implanting," Proc. The Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2018), LNCS, vol. 10885, pp. 162 - 184, 2018, 10.1007/978-3-319-93411-2_8.
Ryoichi Isawa, Tao Ban, Ying Tie, Katsunari Yoshioka, Daisuke Inoue, "Evaluating Disassembly-Code Based Similarity between IoT Malware Samples," Proc. AsiaJCIS 2018, pp. 89-94, 2018, 10.1109/AsiaJCIS.2018.00023.
Akira Yokoyama, Kou Ishii, Rui Tanabe, Yin Minn Papa, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Michael Brengel, Michael Backes, Christian Rossow, "SANDPRINT: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion," Proc. Research in Attacks, Intrusions, and Defenses (RAID16), Lecture Notes in Computer Science, pp.165–187, 2016, 10.1007/978-3-319-45719-2_8.
Arman Noroozian, Maciej Korczynski, Carlos Hernandez Ganan, Daisuke Makita, Katsunari Yoshioka, Michel van Eeten, "Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service," Proc. Research in Attacks, Intrusions, and Defenses (RAID16), Lecture Notes in Computer Science, pp. 368-389, 2016, 10.1007/978-3-319-45719-2_17.
Yosuke Kikuchi, Hiroshi Mori, Hiroki Nakano, Katsunari Yoshioka, Tsutomu Matsumoto, Michel van Eeten, "Evaluating Malware Mitigation by Android Market Operators," 9th USENIX Workshop on Cyber Security Experimentation and Test (USENIX CSET 2016), 2016.
Satomi Saito, Satoru Torii, Katsunari Yoshioka and Tsutomu Matsumoto, "Wamber: Defending Web Sites on Hosting Services with Self-Learning Honeypots," The 11th Asia Joint Conference on Information Security (AsiaJCIS2016), pp.60-66, 2016, 10.1109/AsiaJCIS.2016.32.
Jiawei Su, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto, "An efficient method for detecting obfuscated suspicious JavaScript based on text pattern analysis," Proc. 2016 ACM International Workshop on Traffic Measurements for Cybersecurity, WTMC2016, pp.3–11, 2016, 10.1145/2903185.2903189.
Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, and Tsutomu Matsumoto, Takahiro Kasama, Christian Rossow, "IoTPOT: Analysing the Rise of IoT Compromises," 9th USENIX Workshop on Offensive Technologies (USENIX WOOT 2015), 2015.
Lukas Kramer, Johannes Krupp, Daisuke Makita, Tomomi Nishizoe, Takashi Koide, Katsunari Yoshioka, Christian Rossow, "AmpPot: Monitoring and Defending Amplification DDoS Attacks," Proc. Research in Attacks, Intrusions, and Defenses (RAID15), Lecture Notes in Computer Science, Vol. 9404, pp. 615-636, 2015, 10.1007/978-3-319-26362-5_28.
Jiawei Su, Katsunari Yoshioka, Junji Shikata and Tsutomu Matsumoto, “Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection,” Proc. of the The 18th Annual International Conference on Information Security and Cryptology (ICISC 2015), LNCS, Springer, Seoul, Korea, November 25th-27th, 2015, pp.278–293, 10.1007/978-3-319-30840-1_18.
Yin Minn Pa Pa, K. Yoshioka, T. Matsumoto, "Search Engine Based Investigation on Misconfiguration of Zone Transfer," AsiaJCIS2013, pp. 56 - 62, 2013 (Best Paper Award)
T. Kasama, K. Yoshioka, D. Inoue, and T. Matsumoto, "Malware Detection Method by Catching Their Random Behavior in Multiple Executions," 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, pp. 262 - 266, 2012.
T. Fujii, K. Yoshioka, J.Shikata, and T. Matsumoto, "An Efficient Dynamic Detection Method for Various x86 Shellcodes," 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, pp. 284 - 289, 2012.
K. Yoshioka, Y. Hosobuchi, T. Orii, and T. Matsumoto, "Vulnerability in Public Malware Sandbox Analysis Systems," IEEE 10th Annual International Symposium on Applications and the Internet, SAINT2010, pp 265 - 268, 2010.
T. Kasama, K. Yoshioka, T. Matsumoto, M. Yamagata, M. Eto, D. Inoue, and K. Nakao, "Malware Sandbox Analysis with Automatic Collection of Server Responses using Dummy Client," Proc. 5th Joint Workshop on Information Security, JWIS 2010, pp. 67 - 81, 2010.
M. Eto, K. Sonoda, D. Inoue, K. Yoshioka, and K. Nakao, "A Proposal of Malware Distinction Method based on Scan Patterns using Spectrum Analysis," LNCS Vol. 5864, pp. 565 - 572, 2009.
D. Inoue, K. Yoshioka, M. Eto, M. Yamagata, E. Nishino, J. Takeuchi, K. Ohkouchi, and K. Nakao, “An Incident Analysis System nicter and Its Analysis Engines Based on Data Mining Techniques,” 15th International Conference on Neural Information Processing of the Asia-Pacific Neural Network Assembly, ICONIP 2008, LNCS Vol 5506, pp579-586, 2009.
K. Yoshioka, T. Kasama, and T. Matsumoto, "Sandbox Analysis with Controlled Internet Connection for Observing Temporal Changes of Malware Behavior," Proc. 4th Joint Workshop on Information Security, JWIS 2009, 3a-2, 2009.
K. Yoshioka, T. Matsumoto, "Fingerprinting Traffic Log," Proc. 2008 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.143-146, 2008.
K. Yoshioka, D. Inoue, M. Eto, Y. Hoshizawa, H. Nogawa, K. Nakao, "Malware Sandbox Analysis for Extracting Exploit Codes," Proc. 3rd Joint Workshop on Information Security, JWIS 2008, pp. 572 - 586, 2008. (Best Paper Award)
D. Inoue, M. Eto, K. Yoshioka, S. Baba, K. Suzuki, J. Nakazato, K. Ohtaka, K. Nakao, "nicter: An Incident Analysis System Toward Binding Network Monitoring with Malware Analysis," Proc. WOMBAT Workshop on Information Security Threats Data Collection and Sharing, 2008, WISTDCS '08, IEEE Computer Society Press, pp. 58 - 66, 2008.
D. Inoue, K. Yoshioka, M. Eto, Y. Hoshizawa, K. Nakao, “Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity,” Proc. 2008 IEEE International Conference on Communications, ICC 2008, pp. 1715 - 1721, 2008.
K. Sonoda, K. Yoshioka, O. Takizawa, "Information Hiding for Public Address Audio Signal using FH/FSK Spread-spectrum Scheme," 2006 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Vol. 2, pp. 279 - 282, 2007.
K. Nakao, K. Yoshioka, D. Inoue, M. Eto, "A Novel Concept of Network Incident Analysis based on Multi-layer Observations of Malware Activities," Proceedings of The 2nd Joint Workshop on Information Security,JWIS2007, pp. 267 - 279, 2007 (Best Paper Award).
K. Yoshioka, K. Sonoda, O. Takizawa, T. Matsumoto, "Information Hiding on Lossless Data Compression," 2006 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 15 - 18, 2006.
K. Nakao, K. Yoshioka, D. Inoue, M. Eto, K. Rikitake, "nicter: An Incident Analysis System using Correlation between Network Monitoring and Malware Analysis," Proceedings of The 1st Joint Workshop on Information Security,JWIS2006, pp. 363 - 377, 2006.
K. Sonoda、K. Yoshioka、O. Takizawa、K. Nakao, "Digital Audio Watermarking Based on Quantization Index Modulation of Wavelet Domain," The 9th Western Pacific Acoustics Conference (WESPAC IX 2006), Session HU-1-2, No.549, 2006.
K. Yoshioka, K. Sonoda, O. Takizawa, K. Nakao, "Hiding Information into Emergency Public Address Sound," The 9th Western Pacific Acoustics Conference (WESPAC IX 2006), Session HU-1-2, No.447, 2006.
K. Akai, M. Murano, I. Murase, K. Makino, O. Takizawa, T. Matsumoto, M. Suzuki, K. Yoshioka and H. Nakagawa, "Implementing XML Information Hiding by XSLT," Proceedings of STEG'04:Pacific Rim Workshop on Digital Steganography, 2004, pp.96 -100, 2004.
K. Yoshioka, J. Shikata, T. Matsumoto, "Systematic treatment of collusion secure codes: security definitions and their relations," Proceedings of 6th Information Security Conference (ISC'03), Lecture Notes in Computer Science, Volume 2851, pp. 408 - 421, 2003.
Koji Nakao, Daisuke Inoue, Katsunari Yoshioka, "Unveiling IoT Threats: A Case Study on Darknet and Honeypot Analysis," IEEE Computer, vol.58, pp37-45, 2025, 10.1109/MC.2025.3531364.
Takayuki Sasaki, Jia Wang, Kazumasa Omote, Katsunari Yoshioka, Tsutomu Matsumoto, "EtherWatch: A Framework for Detecting Suspicious Ethereum Accounts and Their Activities," IPSJ Journal, Vol.65, No.9, 2024, 10.2197/ipsjjip.32.789.
Qingxin Mao, Daisuke Makita, Michel Van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto, "Characteristics Comparison between Carpet Bombing-type and Single Target DRDoS Attacks Observed by Honeypot," IPSJ Journal, Vol.65, No.9, 2024, 10.2197/ipsjjip.32.731.
Hiroki Yasui, Takahiro Inoue, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto, "SPOT: In-depth Analysis of IoT Ransomware Attacks using Bare Metal NAS Devices," Journal of Information Processing, Vol.65, No.1, 2023, 10.2197/ipsjjip.32.23.
Xuping Huang, Shunsuke Mochizuki, Akira Fujita, Katsunari Yoshioka, "Simulating and Estimating the Effectiveness of Security Notification by ISP to Malware-Infected Users," Journal of Information Processing, Vol.31, pp.165-173, 2023, 10.2197/ipsjjip.31.165.
Xuping Huang, Shunsuke Mochizuki, Katsunari Yoshioka, "Connection Type Identification and Uplink Speed Estimation of Malware Infected Hosts," Journal of Information Processing, Vol.30, pp.859-864, 2022, 10.2197/ipsjjip.30.859.
Rui Tanabe, Tsuyufumi Watanabe, Akira Fujita, Ryoichi Isawa, Carlos Gañán, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto, "Disposable Botnets:Long-term Analysis of IoT Botnet Infrastructure," IPSJ Journal, Vol.63, No.9, 2022, 10.2197/ipsjjip.30.577.
Hiroki Nakano, Daiki Chiba, Takashi Koide, Mitsuaki Akiyama, Katsunari Yoshioka, Tsutomu Matsumoto, "Exploring Event-synced Navigation Attacks across User-generated Content Platforms in the Wild," IPSJ Journal, Vol.63, No.5, 2022, 10.2197/ipsjjip.30.372.
Aamir Bokhari, Yuta Inoue, Seiya Kato, Katsunari Yoshioka, Tsutomu Matsumoto, "Empirical Analysis of Security and Power-Saving Features of Port Knocking Technique Applied to an IoT Device," Journal of Information Processing, Vol 29, Volume 29 pp.572-580, 2021. (情報処理学会特選論文), 10.2197/ipsjjip.29.572.
Bo Sun,Tao Ban, Chansu Han, Takeshi Takahashi, Katsunari Yoshioka, Junichi Takeuchi, Abdolhossein Sarrafzadeh, Meikang Qiu, and Daisuke Inoue, "Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated with Targeted Email Attacks," IEEE Access, Vol.9, pp. 87962-87971, 2021, 10.1109/ACCESS.2021.3082000.
Takashi Koide, Daiki Chiba, Mitsuaki Akiyama, Katsunari Yoshioka, and Tsutomu Matsumoto, “Understanding the Fake Removal Information Advertisement Sites,” Journal of Information Processing, 2021 (情報処理学会特選論文, 2021年度 Journal of Information Processing Outstanding Paper Award), 10.2197/ipsjjip.29.392.
Takashi Koide, Daiki Chiba, Mitsuaki Akiyama, Katsunari Yoshioka, and Tsutomu Matsumoto, “To Get Lost is to Learn the Way: An Analysis of Multi-step Social Engineering Attacks on the Web,” IEICE Transactions on Information and Systems, Volume E104-A No.1, pp.162-181, 2021, 10.1587/transfun.2020CIP0005.
Kazuki Tamiya, Aamir H. Bokhari, Yuta Ezawa, Sou Nakayama, Ying Tie, Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto, "Dangers of IP Camera . An Observational Study on Peeping," Journal of Information Processing, Vol.61, No.9, 2020(情報処理学会特選論文), 10.2197/ipsjjip.28.502.
森下瞬, 上野航, 田辺瑠偉, Carlos Ganan, Michel J.G. van Eeten, 吉岡克成, 松本勉, "広域ネットワークスキャンに基づくオープンソースハニーポットの運用実態調査," 情報処理学会論文誌, Vol.61, No.9, pp.1397–1413, 2020, 10.20729/00206788.
Chun-Jung Wu, Katsunari Yoshioka, and Tsutomu Matsumoto, "ThingGate: A gateway for managing traffic of bare-metal IoT honeypot," IPSJ Journal, Vol.61, No.9, 2020, 10.2197/ipsjjip.28.481.
Hiroki Nakano, Fumihiro Kanei, Yuta Takata, Mitsuaki Akiyama and Katsunari Yoshioka, "Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities," IEICE Trans. Vol.E101-D,No.11, 2018, 10.1587/transinf.2017ICP0009.
Yin Minn Pa Pa, Suzuki Shogo, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Christian Rossow "IoTPOT: A Novel Honeypot for Revealing Current IoT Threats," Journal of Information Processing, Vol. 57, No. 4, 2016.
田辺瑠偉, 鈴木将吾, Yin Minn Pa Pa, 吉岡克成, 松本勉, "マルウェア感染ホストへのリモート再侵入により感染拡大を阻止する手法," 情報処理学会論文誌, Vol. 57, No. 9, pp. 2021 - 2033, 2016.(情報処理学会特選論文).
Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto, "Detecting Malicious Domains and Authoritative Name Servers Based on Their Distinct Mappings to IP Addresses," Journal of Information Processing, Vol. 23, No. 5, pp. 623-632, 2015, 10.2197/ipsjjip.23.623.
T. Kasama, K. Yoshioka, D. Inoue, T. Matsumoto, "Catching The Behavioral Differences between Multiple Executions for Malware Detection," IEICE Trans., Vol. E96-A No.1 pp. 225-232, 2013.
T. Kasama, K. Yoshioka, T. Matsumoto, M. Yamagata, M. Eto, D. Inoue, K. Nakao, "Malware Sandbox Analysis with Efficient Observation of Herder's Behavior, " Journal of Information Processing, Vol. 20, No. 4, pp. 835 - 845, 2012.
K. Yoshioka, Y. Hosobuchi, T. Orii, and T. Matsumoto, "Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems," Journal of Information Processing, Vol. 52, No.3, 1144-1159, 2011.
H. C. Kim, T. Orii, K. Yoshioka, D. Inoue, J. Song, M. Eto, J. Shikata, T. Matsumoto, and K. Nakao, "An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation," IEICE Trans. Vol. E94D, No. 9, pp. 1778 - 1791, 2011.
笠間貴弘, 織井達憲, 吉岡克成, 松本勉, "公開型マルウェア動的解析システムに対するデコイ挿入攻撃の脅威," Journal of Information Processing, Vol. 52, No. 9, pp. 2761 - 2774, 2011.(情報処理学会推薦論文)
M. Eto, K. Sonoda, D. Inoue, K. Yoshioka, K. Nakao, "Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis," IEICE Trans. Vol. E93D, No.5, pp. 1106 - 1116, 2010.
K. Yoshioka, and T. Matsumoto "Multi-pass Malware Sandbox Analysis with Controlled Internet Connection," IEICE Trans. E93A, No. 1, pp. 210-218, 2010.
D. Inoue, K. Yoshioka, M. Eto, Y. Hoshizawa, and K, Nakao, "Automated Malware Analysis System and its Sandbox for Revealing Malware's Internal and External Activities," IEICE Trans. Vol. E92D, No. 5, pp. 945-954, 2009.
K. Nakao, D. Inoue, M. Eto, and K. Yoshioka, "Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks based on Darknet Monitoring," IEICE Trans. Vol. E92D, No. 5, pp. 787-798, 2009. (Invited Paper)
K. Yoshioka, D. Inoue, M. Eto, Y. Hoshizawa, H. Nogawa and K, Nakao, "Malware sandbox analysis for secure observation of vulnerability exploitation," IEICE Trans. Vol. E92D, No. 5, pp. 955 - 966, 2009.
K. Yoshioka, K. Sonoda, O. Takizawa, and T. Matsumoto, "Information Hiding on Lossless Data Compression," Journal of Digital Information Management, Volume 6, Number 2, pp. 151 - 156, 2008.
K. Yoshioka, J. Shikata, T. Matsumoto, "On collusion security of random codes," IEICE transactions, Vol.E88-A, No.1, pp. 296 - 304, 2005.
K. Yoshioka, J. Shikata, T. Matsumoto, "Collusion secure codes: systematic security definitions and their relations," IEICE transactions, Vol.E87-A, No.5, pp. 1162-1171, 2004.
K. Yoshioka, T. Matsumoto, "Random-error-resilience of a short collusion-secure code," IEICE transactions, Vol.E86-A, No.5, pp. 1147 - 1155, 2003.
K. Yoshioka, T. Matsumoto, "Random-Error-Resilient Tracing Algorithm for a Collusion-Secure Fingerprinting Code," IPSJ Journal, Vol.43, No.8, pp. 2502 - 2510, 2002.
国際会議(ポスター・Work-in-progressセッション, デモ)
Mizuho Hasegawa, Akihide Saino, Akira Fujita, Kazuki Takada, Rui Tanabe, Carlos H. Ganan, Michel van Eeten, Katsunari Yoshioka, "Poster: Do You Sell This? Utilizing Product Searches to Find SEO-driven Fake Shopping Sites," NDSS2025 poster session, 2025.
Ryota Honda, Junnosuke Kushibiki, Takayuki Sasaki, Simon Parkin, Carlos H. Ganan, Michel van Eeten, Katsunari Yoshioka, "Poster: An Analysis of IoT Device Manufacturer's Security Advice to User Through Companion Apps," NDSS2025, poster session, 2025.
Daichi Uezono, Junnosuke Kushibiki, Takayuki Sasaki, Satoshi Hara, Yury Zhauniarovich, Carlos H. Ganan, Michel van Eeten, Katsunari Yoshioka, "Poster: DarkWrt: Towards Building a Dataset of Potentially Unwanted Functions in IoT Devices," NDSS2025, poster session, 2025.
Zhewei Huang, Yin Minn Pa Pa, Katsunari Yoshioka, "Exploring the Impact of LLM Assisted Malware Variants on Anti-Virus Detection," Experience and Practice Track, The 2024 7th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2024), 2024.
Mizuho Hasegawa, Yamato Kawaguchi, Hiroaki Takayama, Yasuhiro Kunimine, Hidekazu Tanaka, Shintaro Kawamura, Akira Fujita, Shingo Yasuda, Daisuke Inoue, Nobuyo Fujiwara, Kazuki Takada, Rui Tanabe, Katsunari Yoshioka, "A Case Study of URL Blocklist Maintenance," Experience and Practice Track, The 2024 7th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2024), 2024.
Yamato Kawaguchi, Kazuki Takada, Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto, "Investigating Black-Market Jobs on Social Networking Service," Experience and Practice Track, The 2024 7th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2024), 2024.
Yu Arai, Katsunari Yoshioka, and Tsutomu Matsumoto, "Evasion attacks against Next-Generation AntiVirus software and antivirus software implementing hybrid detection," AsiaJCIS2023, poster session, 2023.
Xuping Huang, Shunsuke Mochizuki and Katsunari Yoshioka, "Simulation of Security Notification to Malware-infected Users by ISP," International Workshop on Security (IWSEC) 2022, poster session, 2022.
Yutaro Osako, Toshihiro Yamauchi, Katsunari Yoshioka, Takuya Fujihashi, Takashi Watanabe, Shunsuke Saruwatari "Poster: Visualization Result of String-based CPU Architecture Independent IoT Malware Clustering," The Network and Distributed System Security (NDSS), 2022. (Poster Session).
Xuping Huang, Shunsuke Mochizuki and Katsunari Yoshioka, "Towards Estimating Radio Resources Wasted by IoT Botnet Attacks", International Workshop on Security (IWSEC), Poster Session, 2021. (Best Poster Award)
Toshihiro Yamauchi, Ryota Yoshimoto, Takahiro Baba, Katsunari Yoshioka, "Analysis of commands of Telnet logs illegally connected to IoT devices, Proceedings of 2021 10th International Congress on Advanced Applied Informatics (IIAI-AAI 2021), 12th International Conference on E-Service and Knowledge Management (ESKM 2021), pp.913-915, 2021, poster, 10.1109/IIAI-AAI53430.2021.00160.
Takeshi Takahashi, Yuki Umemura, Chansu Han, Tao Ban, Keisuke Furumoto, Ohnori Nakamura, Katsunari Yoshioka, Junichi Takeuchi, Noboru Murata, Yoshiaki Shiraishi, "Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines?" Work in Progress Session, The 19th International Conference on Pervasive Computing and Communications (PerCom 2021), Pages: 376-379, 2021, 10.1109/PerComWorkshops51409.2021.9431125.
Satoshi Hara, Jia Xiong, Tatsuya Tamai, Kazuki Tamiya, Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto, "Verification of malware dynamic analysis method using real and virtual IoT devices," IWSEC2019, poster session, 2019.
Kazuki Takada, Kunihiro Shiraishi, Katsunari Yoshioka, Tsutomu Matsumoto, "Proposal of whitelist based detection of MITB attacks using browser extension," AsiaJCIS2019, poster session, 2019.
Tao Ban, Ryoichi Isawa, Katsunari Yoshioka, "A Cross-Platform Study on IoT Malware," The 11th International Conference on Mobile Computing and Ubiquitous Networking, Poster, 2018, 10.23919/ICMU.2018.8653580.
Takashi Koide, Daisuke Makita, Katsunari Yoshioka, Tsutomu Matsumoto, "Observation and Analysis of TCP-based Reflection DDoS Attacks Using Honeypot," Research in Attacks, Intrusions, and Defenses (RAID15), Poster session, 2015.
K. Yoshioka, "PRACTICE: botnet tracking for detecting emerging threats," Work-In-Progress Session, AsiaJCIS2013, 2013.
R. Tanabe, K. Yoshioka, and T. Matsumoto, "Detecting Intrusion using Dummy Credentials," Work-In-Progress Session, AsiaJCIS2013, 2013.
T. Matsumoto, M. Hata, M. Tanabe, K. Yoshioka, K. Oishi, "A Method of Preventing Unauthorized Data Transmission in Controller Area Network," The 2012 IEEE 75th Vehicular Technology Conference, Poster Session, 2012.
H. Mori, K. Yoshioka, T. Matsumoto, “Proposal of Visualization Method and User Interface for Analyzing Traffic Observed by Long-term Malware Sandbox Analysis,” IWSEC2012, Poster sesson, 2012.
Yin Minn Pa Pa, K. Yoshioka, T. Matsumoto, “Search Engine Based Investigation on Misconfiguration of Zone Transfer,” IWSEC2012, Poster Session, 2012.
D. Inoue, M. Suzuki, M. Eto, K. Yoshioka, and K. Nakao, "DAEDALUS: Novel Application of Large-scale Darknet Monitoring for Practical Protection of Live Networks," 12th International Symposium on Recent Advances in Intrusion Detection, RAID2009, LNCS, Vol. 5758, pp. 381 - 382, 2009. (poster session)
Qingxin Mao, Yin Minn Pa Pam, Rui Tanabe, Katsunari Yoshioka, "Linking IoT Attacks to Cybercrime-as-a-Service Offerings Using LLM and DNS Data," 電子情報通信学会情報システムセキュリティ研究会, 2025.
Aiman Syazwan Bin Abdul Razak, Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto, "Unveiling the Shadows: Analyzing Cryptocurrency Address Management and Fund Movement of Darknet Markets," 電子情報通信学会情報通信システムセキュリティ研究会, 2024.
Natsuo Shintani, Daisuke Makita, Katsunari Yoshioka, Tsutomu Matsumoto, "Measurement and Factor Analysis of the Impact of Amplification DDoS Attacks Observed by Amppot," 情報処理学会CSEC研究会, 2021.
Jiawei Su, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto, "A fast detecting method for obfuscated malicious JavaScript based on text pattern analysis," IEICE Tech. Rep., vol. 115, no. 488, ICSS2015-58, pp. 65-70, 2016.
K. Yoshioka, D. Inoue, M. Eto, K. Nakao, "Malware Behavior Analysis with Isolated Low-interaction Honeypot," 電子情報通信学会暗号と情報セキュリティシンポジウム2008, 概要集, pp. 290, 2008.
D. Inoue, M. Eto, K. Yoshioka, K. Nakao, "Malware Behavior Analysis under Isolated Darknet Environment," 電子情報通信学会暗号と情報セキュリティシンポジウム2008, 概要集, pp. 289, 2008.
松本勉, 有沢大輔, 吉岡克成, "ディジタル文書への筆跡を用いたバイオメトリック署名方式の試み," 電子情報通信学会暗号と情報セキュリティシンポジウム2008, 概要集, pp. 160, 2008.
山形昌也,村田康裕,井上大介,衛藤将史,吉岡克成,中尾康二, "マクロ解析環境における全ポートアクセス環境を考慮した変化点検出エンジンの拡張," 電子情報通信学会暗号と情報セキュリティシンポジウム2008, 概要集, pp. 197, 2008.
K. Yoshioka, M. Eto, D. Inoue, K. Nakao, "Macro-Micro Correlation Analysis for Binding Darknet Traffic and Malwares," 電子情報通信学会暗号と情報セキュリティシンポジウム2007 概要集, pp. 111, 2007.
井上大介, 衛藤将史, 吉岡克成, 星澤祐二, 伊沢 亮一, 森井 昌克, 中尾 康二, "Micro Analysis System for Analyzing Malware Code and its Behavior on nicter," 電子情報通信学会暗号と情報セキュリティシンポジウム2007 概要集, pp. 110, 2007.