Publications

academic paper

  • Keisuke Sakai, Kosuke Takeshige, Kazuki Kato, Naoki Kurihara, Katsumi Ono, M. Hashimoto, "An Automatic Detection System for Fake Japanese Shopping Sites Using fastText and LightGBM," IEEE Access, 2023. (Reject-Resubmission Allowed)
  • Norimitsu Ito, M. Hashimoto, A. Otsuka, "Feature Extraction Methods for Binary Code Similarity Detection Using Neural Machine Translation Models," IEEE Access, 2023. (Reject-Resubmission Allowed)
  • Y. Masubuchi, M. Hashimoto, A. Otsuka, "SIBYL: A Method for Detecting Similar Binary Functions Using Machine Learning," IEICE Transactions on Information and Systems, Vol. E105-D, No.4, pp.-, Apr. 2022. (To be published).
  • Yamauchi T, Akao Y, Yoshitani R, Nakamura Y, Hashimoto M. Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes. International Journal of Information Security. 2020. https://doi.org/10.1007/s10207-020-00514-7
  • Masaki Hashimoto : Access Control Technology and Its Latest Trends, Journal of Japan Society for Security Management, Vol.29, No.3, pp.21-27, 2016.
  • Tomio Ando, Masaki Hashimoto , Toshihiro Yamauchi: Secure File Access Log External Storage Mechanism by Virtualization Technology, IPSJ Journal, Vol.54, No.2, pp.585-595, Feb. 2013.
  • Kiei Harada, Tetsuo Handa, Masaki Hashimoto , Hidehiko Tanaka: Mandatory Access Control Method Based on Application Execution Status, IPSJ Journal, Vol.53, No.9, pp.2130-2147, Sep. 2012.
  • Masaki Hashimoto , Norio Ando, ​​Toshiyuki Maeda, Hidehiko Tanaka: Trends in OS research for improving information security, IPSJ Journal: Computing Systems (ACS), Vol.5, No.2, pp.51-62 , Mar. 2012.
  • Masaki Hashimoto , Mira Kin, Hidenori Tsuji, Hidehiko Tanaka: IPSJ Transactions on Authorization Policy Based on Logic Programming, Vol.51, No.9, pp.1682-1691, Sep. 2010.

International conference / peer-reviewed oral presentation

  • M. Kadoguchi, H. Kobayashi, S. Hayashi, A. Otsuka and M. Hashimoto, "Deep Self-Supervised Clustering of the Dark Web for Cyber Threat Intelligence," 2020 IEEE International Conference on Intelligence and Security Informatics (ISI), Arlington, VA, USA, 2020, pp. 1-6, doi: 10.1109/ISI49825.2020.9280485.
  • H. Kobayashi, M. Kadoguchi, S. Hayashi, A. Otsuka and M. Hashimoto, "An Expert System for Classifying Harmful Content on the Dark Web," 2020 IEEE International Conference on Intelligence and Security Informatics (ISI), Arlington, VA, USA, 2020, pp. 1-6, doi: 10.1109/ISI49825.2020.9280536.
  • M. KADOGUCHI, S. HAYASHI, M. Hashimoto and A. OTSUKA, "Exploring the Dark Web for Cyber Threat Intelligence using Machine Leaning," 2019 IEEE International Conference on Intelligence and Security Informatics (ISI), Shenzhen, China, 2019, pp. 200-202, doi: 10.1109/ISI.2019.8823360.
  • Toshihiro Yamauchi, Yohei Akao, Ryota Yoshitani, Yuichi Nakamura, Masaki Hashimoto: Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes, Proceedings of the 2018 IEEE Conference on Dependable and Secure Computing (IEEE DSC 2018), pp.172-179, 2018.
  • Masaki Hashimoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka: Policy Description Language for Dynamic Access Control Models, DASC ’09: Proceedings of the 8th IEEE International Symposium on Dependable, Autonomic & Secure Computing, IEEE Computer Society, pp. 37–42, Dec. 2009.
  • Masaki Hashimoto , Mira Kin, Hidenori Tsuji, Hidehiko Tanaka: Research on Multiple Policy Integrated Management Method for Distributed Systems, Proceedings of Computer Systems Symposium, IPSJ Symposium Series, vol.2008, no.12, IPSJ, pp.49-56, 2008.
  • Kazuki Fujisawa, Masaki Hashimoto , Kunio Miyamoto, Kim Mira, Hidenori Tsuji, Hidehiko Tanaka: Proposals for Improving Device Driver Safety in Virtual Machine Monitors, Proceedings of Computer Systems Symposium, Symposium Series of Information Processing Society, vol.2007, no. 14, Information Processing Society, pp.31-38, 2007.
  • Masaki Hashimoto , Mira Kin, Hidenori Tsuji, Hidehiko Tanaka: Initial Study of Access Control Model for Distributed Processing Based on Policy, Proceedings of Computer Systems Symposium, IPSJ Symposium Series, vol.2007, no.14, Information Processing Society of Japan Society of Japan, pp.217-224, 2007.

Oral presentations such as study groups (not peer-reviewed)

  • Hanae Kobayashi, Masaki Hashimoto : Development of an expert system for automatic classification of illegal and harmful information prevailing on the dark web, Research Report Security Psychology and Trust (SPT), 2020-SPT-36 (20), 1-6 (2020-02-02 -24), 2188-8671.
  • Hitoshi Inoue, Masaki Hashimoto : Investigation of HTTP Requests and Proposals for Identification of False User-Agent Values, Research Report Security Psychology and Trust (SPT), 2020-SPT-36 (16), 1-6 (2020-) 02-24), 2188-8671.
  • Moritoshi Aoyagi, Hidenori Tsuji, Masaki Hashimoto : Searching for Similar Binary Codes Between Different Architectures Using Neural Machine Translation Models, Research Report Security Psychology and Trust (SPT), 2020-SPT-36 (8), 1-6 (2020-02-24), 2188-8671.
  • Atsushi Kanda, Masaki Hashimoto : Identification of TLS Communication Using Randomness, Proceedings of Computer Security Symposium 2019, 2019, 683-690 (2019-10-14).
  • Yuka Ogura, Hidenori Tsuji, Masaki Hashimoto : Visualization method of secure OS / intrusion prevention effect by Processing language, Research report Computer security (CSEC), 2019-CSEC-84 (9), 1-8 (2019-02-25) , 2188-8655.
  • Yasuhiro Mitsuishi, Masaki Hashimoto , Hidenori Tsuji, Harumichi Yuasa: Current Status and Issues of Maritime Cyber ​​Security, Research Report Computer Security (CSEC), 2019-CSEC-84 (2), 1-9 (2019-02-25), 2188 -8655.
  • Shuhei Segawa, Hidenori Tsuji, Masaki Hashimoto : Initial Study of Vulnerability Scanner for Short Range Wireless Communication, Research Report Computer Security (CSEC), 2018-CSEC-83 (5), 1-7 (2018-12-06) , 2188-8655.
  • Masaki Sugio, Hidenori Tsuji, Masaki Hashimoto : Evaluation of Efficient Deployment of Deceptive Networks, Research Report Computer Security (CSEC), 2018-CSEC-83 (2), 1-6 (2018-12-06), 2188-8655 ..
  • Naoki Kurihara, Hidenori Tsuji, Masaki Hashimoto : False site detection using machine learning, Shingaku Giho, vol.118, no.315, ICSS2018-56, pp.19-24, November 2018.
  • Hiroki Inoue, Hidenori Tsuji, Masaki Hashimoto : Access Control Policy Protection Method Using TrustZone Technology, Computer Security Symposium 2018 Proceedings, 2018 (2), 941-948.
  • Yuka Ogura, Hidenori Tsuji, Masaki Hashimoto : Visualization of Forced Access Control Effect by TOMOYO Linux, Computer Security Symposium 2018 Proceedings, 2018 (2), 949-955.
  • Yasuhiro Mitsuishi, Masaki Hashimoto , Hidenori Tsuji, Harumichi Yuasa: Current Situation and Issues of Maritime Cyber ​​Security, Computer Security Symposium 2018 Proceedings, 2018 (2), 1213-1220.
  • Tadashi Shimomura, Nobutaka Suetsugu, Hidenori Tsuji, Masaki Hashimoto : Malware detection method by machine learning focusing on the functional type of malignant activity, Shingaku Giho, Vol.117, No.481, ICSS2017-51, pp.121-126, February 2018.
  • Makoto Ashizu, Ikuo Tanaka, Hidenori Tsuji, Masaki Hashimoto : Study on Evaluation Method of Memory Forensics Tool, Shingaku Giho, Vol.117, No.481, ICSS2017-51, pp.115-120, 2018 February.
  • Takuya Koike, Misuke Okubo, Hidenori Tsuji, Masaki Hashimoto : Study on Definition Method of Malignant Activity by Linking Intrasystem Activities, Shingaku Giho, Vol.117, No.481, ICSS2017-51, pp.55-60 , February 2018.
  • Shota Hayashi, Hidenori Tsuji, Masaki Hashimoto : Threat Intelligence Extraction Method Using Machine Learning, IPSJ Research Report, Vol.2018, No.5 (CSEC80), IPSJ, pp.1-8, February 2018 ..
  • Takeyo Tamura, Masaki Hashimoto : Malware detection method by similarity of functions in PE using CNN, IPSJ Research Report, Vol.2017, No.8 (CSEC79), IPSJ, pp.1-6, 2017 November of the year.
  • Nobutaka Suetsugu, Masaki Hashimoto : Consideration of behavior by malware function classification seen from API call, Shingaku Giho, Vol.116, No.328, ICSS2016-40, pp. 9-14, November 2016.
  • Ikuo Tanaka, Masaki Hashimoto : Verification of the effectiveness of memory forensic tools for anti-forensic functions, Proceedings of Computer Security Symposium 2016, 2016 (2), 100-105. (2016-10-04)
  • Takeyasu Yoshimura, Masaki Hashimoto , Hidenori Tsuji, Hidehiko Tanaka: Initial study for building a dynamic analysis environment for Linux malware using TOMOYO Linux, Computer Security Symposium 2016 Proceedings, 2016 (2), 518-525. ( 2016-10-04)
  • Yudai Tomaru, Masaki Hashimoto , Hidehiko Tanaka: Initial study for process activity link method for intrusion prevention, Shingaku Giho, vol. 115, no. 488, ICSS2015-61, pp. 83-88 , March 2016.
  • Masaki Hashimoto , Minetoshi Takizawa, Fumihiko Takayama, Hidenori Tsuji, Hidehiko Tanaka: Toward a Practical Implementation of Mandatory Access Control by Logical Languages, Shingaku Giho, vol. 115, no. 334, ICSS2015-44, pp. 55-60, November 2015.
  • Masaki Hashimoto , Minetoshi Takizawa, Fumihiko Takayama, Hidenori Tsuji, Hidehiko Tanaka: User Space Implementation of SELinux Policy Processing System, Proceedings of Computer System Symposium, 2014, pp.27-35, 2014-11-12.
  • Masaki Hashimoto , Minetoshi Takizawa, Fumihiko Takayama, Hidenori Tsuji, Hidehiko Tanaka: Implementation and Evaluation of Authorization Judgment Mechanism for SELinux by Logical Language, Computer Security Symposium 2014 Proceedings, 2014-2, pp.743-750, 2014- 10-15.
  • Akira Urano, Masaki Hashimoto , Hidenori Tsuji, Hidehiko Tanaka: Initial Study on Trace Detection Method of Anti-Forensic Tools, Computer Security Symposium 2013 Proceedings, 2013-4, pp.163-168, 2013-10-14.
  • Tomohiro Hotta, Masaki Hashimoto , Hidenori Tsuji, Hidehiko Tanaka: Countermeasures against erroneous e-mail transmission considering actual operation, IPSJ Research Report, Vol.2013, No.50 (CSEC60), IPSJ, pp.1-8, 2013.
  • Yusuke Karasawa, Masaki Hashimoto , Hidenori Tsuji, Hidehiko Tanaka: Consideration on Methods to Prevent One-Click Fraud, IEICE Information Security Research Committee, 2013 Cryptography and Information Security Symposium (SCIS2013), 2F4-2, 2013.
  • Masanobu Fellow, Masaki Hashimoto , Hidenori Tsuji, Hidehiko Tanaka: C & C Server Behavior Proposal of Information Extraction System, IEICE Information Security Research Committee, 2013 Cryptography and Information Security Symposium (SCIS2013), 1D1-5, 2013.
  • Tatsuhiko Matsufuji, Masaki Hashimoto , Keiichi Horiai, Hidehiko Tanaka: Improvement of automatic malware classification system by strengthening static analysis, IPSJ Research Report: CSEC [Computer Security], Vol.2012, No.10, pp.1-7 , 2012.
  • Hideki Hatagami, Masaki Hashimoto , Keiichi Horiai, Hidehiko Tanaka: Research on automatic classification method in malware dynamic analysis, IPSJ Research Report: CSEC [Computer Security], Vol.2011, No.51, pp.1- 7, 2011.
  • Masayuki Nakao, Masaki Hashimoto , Kunio Miyamoto, Hidehiko Tanaka: Initial Study on System Integrity Verification Using Software-Based TCB, IEICE Information Security Research Committee, 2010 Cryptography and Information Security Symposium (SCIS2010), 4E2-3, 2010.
  • Masaki Hashimoto , Mira Kin, Hidenori Tsuji, Hidehiko Tanaka: Research on Policy Description Languages ​​Using Logical Languages, Japan Society for Software Science and Technology, 7th Dependent System Workshop (DSW09), Hakodate Onuma Prince Hotel, 2009.
  • Kim Mira, Masaki Hashimoto , Hidenori Tsuji, Hidehiko Tanaka: Examination of Information Leakage Prevention Technology by Self-Destruction Function of Files, Proceedings of Computer Security Symposium, IPSJ Symposium Series, Vol.2008, No.8, Volume 1 Information Processing Society of Japan, pp.115-119, 2008.
  • Kunio Miyamoto, Kazuki Fujisawa, Masaki Hashimoto , Kim Mira, Hidenori Tsuji, Hidehiko Tanaka: A method for judging execution in a virtual machine environment when a program is executed, Proceedings of the Computer Security Symposium, IPSJ Symposium Series, vol. 2007, no.10, Information Processing Society of Japan, pp.549-552, 2007.
  • Kazuki Fujisawa, Masaki Hashimoto , Kunio Miyamoto, Kim Mira, Hidenori Tsuji, Hidehiko Tanaka: Proposals for Improving Device Driver Safety in Virtual Machine Monitors, Information Science and Technology Forum, FIT2007, General Lectures, Volume 4, Information Processing Society of Japan Society, pp.53-54, 2007.
  • Masaki Hashimoto , Kazuki Fujisawa, Kunio Miyamoto, Kim Mira, Hidenori Tsuji, Hidehiko Tanaka: Resource Access Control Using Capability in Distributed Systems, IPSJ Research Report, Vol.2007, No.71 (CSEC38), IPSJ , pp.393-400, 2007.
  • Hidenori Tsuji, Masaki Hashimoto , Kim Mira, Hidehiko Tanaka: Initial Study on Secure OS as Application Platform, IPSJ Research Report, Vol.2007, No.71 (CSEC38), IPSJ, pp.381- 386, 2007.
  • Masaki Hashimoto , Mira Kin, Hidenori Tsuji, Hidehiko Tanaka: A Study for Building a Secure Distributed System, Proceedings of the Computer Security Symposium, IPSJ Symposium Series, vol.2006, no.11, IPSJ, pp. 435-440, 2006.
  • Masaki Hashimoto , Mira Kin, Hidenori Tsuji, Hidehiko Tanaka: Research on Secure Resource Management Methods in Distributed Environments, Information Science and Technology Forum, FIT2006, Proceedings of General Lectures, Volume 4, Information Processing Society of Japan, pp.311-312, 2006.