List of completed thesis titles

List of graduates and thesis titles

2022
  • Bozhou Lin, Proposal of ransomware defense system based on decoy file and behavior analysis
  • Kunihito Adachi, Developing Security Checklists to Raise Awareness of Legacy Industrial Control System Operators
  • Keisuke Sakai, An automatic detection system for fake shopping sites from newly registered domains using fastText and LightGBM
2021
  • Yasutaka Kimura, Development of an Intelligence Extraction System for the Dark Web using AI
  • Keisuke Shiraishi, Research on Resilient Architecture for Autonomous IoT Systems
  • Huang Mingyang, Relationship between Occupation and Phishing Success Rate
  • Kazuki Kato, Development of a Web Crawling System for Detecting Fake Sites
2020
  • Moritoshi Aoyagi, Feature extraction method for binary code similarity comparison using neural machine translation model
  • Yusuke Kobayashi, Proposal of security policy analysis method for TOMOYO Linux
  • Kosuke Takahashi, Client delegation method for cheat countermeasures on servers using Intel SGX
  • Takayuki Chiwaki, Countermeasure method using Rust against attacks using memory corruption vulnerability
  • Ima Masubuchi, Proposal of Function Embedding Method for Detection of Similar Binary Code
2019
  • Hitoshi Inoue, HTTP request investigation and suggestion of how to identify fake User-Agent values
  • Masashi Kadoguchi, Intelligence Extraction on the Dark Web Using Machine Learning
  • Atsushi Kanda, Identification of encrypted communication using randomness
  • Hanae Kobayashi, Development of Automatic Classification Expert System for Illegal Harmful Information Spreading on the Dark Web
2018
  • Hiroki Inoue, Access Control Policy Protection Method Using TrustZone Technology
  • Yuka Ogura, Visualization method of secure OS / intrusion prevention effect using Processing language
  • Naoki Kurihara, Fake Site Detection Using Machine Learning
  • Masaki Sugio, Verification of Effectiveness of Deception Technology Using Decoy System
  • Shuhei Segawa, Initial study of vulnerability inspection tool for short-range wireless communication
  • Yasuhiro Mitsuishi, Current Status and Issues of Maritime Cyber ​​Security
2017
  • Makoto Ashizu, Study on Evaluation Method of Memory Forensics Tool
  • Takuya Koike, Linkage method of malignant activity based on process information and file access information
  • Tadashi Shimomura, Malware detection method by machine learning focusing on the functional type of malignant activity
  • Takeyo Tamura, Malware detection method based on similarity of functions in PE using CNN
  • Shota Hayashi, Threat Intelligence Extraction Method Using Machine Learning
  • Akemi Mizuta, How to Use and Manage Confidential Information in Connected Industries
2016
  • Nobutaka Suetsugu, Behavior consideration for each malware function classification based on the frequency of API call usage
  • Ikuo Tanaka, Functional Evaluation of Memory Forensic Tools for Malware Detection
2015
  • Yudai Tomaru, Proposal of method with process activity link for intrusion prevention