Yuhei Kawakoya | NTT R&D Website
(2021-2023) Publications Books "Analyzing Malware: Fighting against infection incidents with free tools
https://www.rd.ntt/e/organization/researcher/special/s_011.html
Yasuyuki Tanaka | NTT Social Informatics Laboratories | NTT R&D Website
Security PrincipalYasuyuki Tanaka Engaged in research on the efficiency and advancement of malware analysis
https://www.rd.ntt/e/sil/overview/evangelist/yasuyuki_tanaka.html
Kazufumi Aoki | NTT Social Informatics Laboratories | NTT R&D Website
technologies and malware analytic technologies. Currently, I am seeking to establish cyber attack
https://www.rd.ntt/e/sil/overview/evangelist/kazufumi_aoki.html
Toshinori Usui | NTT Social Informatics Laboratories | NTT R&D Website
) Research Encouragement Award (first author) CSS2021 Outstanding Paper Award (first author) anti-Malware
https://www.rd.ntt/e/sil/overview/evangelist/toshinori_usui.html
川古谷 裕平 | NTT R&D Website
-Architecture Unpacking for Linux IoT Malware", RAID, 2023 "Script Tainting Was Doomed From The Start (By Type
https://www.rd.ntt/organization/researcher/special/s_011.html
Makoto Iwamura | NTT R&D Website
Penetration Tester's Guide", O'Reilly Japan, 2012. "Analyzing Malware: Fighting against infection incidents
https://www.rd.ntt/e/organization/researcher/superior/s_038.html
PowerPoint プレゼンテーション
Security education and training Security consulting, etc. Forensics Malware analysis Provision of
https://www.rd.ntt/e/sil/overview/NTTannual2023_e_web.pdf
Introduction of Evangelists | NTT Social Informatics Laboratories | NTT R&D Website
, including honeypot, Web security, malware analysis, mobile app/device analysis, IoT device/firmware analysis
https://www.rd.ntt/e/sil/overview/evangelist/
Daiki Chiba | NTT Social Informatics Laboratories | NTT R&D Website
. (Engineering) Academic Activities Program Committee, IPSJ Anti Malware Engineering Workshop (MWS) (2016-2022
https://www.rd.ntt/e/sil/overview/evangelist/daiki_chiba.html
NTT Communication Science Laboratories Open House 2013 Network anomaly detection using big data analysis - Analyzing network failure/cyber attacks and their root causes -
from Evolving Malware,” NTT Technical Review, Vol. 10, No. 10, 2012. T. Kimura, T. Mori, K. Ishibashi
https://www.rd.ntt/cs/event/openhouse/2013/exhibition/bigdata5/index_en.html
poster_en4.pdf
Malware,” NTT Technical Review, Vol. 10, No. 10, 2012. Mitsuaki Tsunakawa Security Management & Operations
https://www.rd.ntt/cs/event/openhouse/2013/exhibition/bigdata5/poster_en4.pdf
NTT コミュニケーション科学基礎研究所 オープンハウス2013 ビッグデータ分析によるネットワーク異常対策 ~ネットワーク故障、サイバー攻撃などのNW異常を早期に検出~
Countermeasure Technologies for Cyber Attacks from Evolving Malware,” NTT Technical Review, Vol. 10, No. 10, 2012
https://www.rd.ntt/cs/event/openhouse/2013/exhibition/bigdata5/
碓井 利宣|NTT社会情報研究所|NTT R&D Website
) 2015年度 情報通信システムセキュリティ(ICSS)研究賞(主著) SANS DFIR Advanced Malware Analysis Tournament 1位 学会役員等 MWS2024プロ
https://www.rd.ntt/sil/overview/evangelist/toshinori_usui.html
Security to protect and create a smart world|NTT R&D Website
adequate security in place, criminals are using malware on small companies that have inadequate security
https://www.rd.ntt/e/security/0001.html
岩村 誠 | NTT R&D Website
and Interpretable Endpoint Malware Detection", ACSAC 2019. Makoto Iwamura, "The Mystery of WannaCry
https://www.rd.ntt/organization/researcher/superior/s_038.html
Mitsuaki Akiyama | NTT R&D Website
Security (ACNS) Program Committee (2021, 2022) anti-Malware and anti-cyberattacks engineering WorkShop (MWS
https://www.rd.ntt/e/organization/researcher/superior/s_001.html
Security Transparency Assurance Technology for Analysis and Visualization of Software Components | NTT R&D Website
this vulnerability can result in an information leak. Malware may also be injected to a software
https://www.rd.ntt/e/research/JN202302_20964.html
Network Security|NTT R&D Website
belonging to organizations related to the Games, and targeted attacks toward malware infections. To obtain
https://www.rd.ntt/e/research/JN202112_16446.html
LLMInjectionTaxonomy_v1_20241225.pdf
.” http s://kai-greshake.de/posts/llm-malware/. [23] Greshake, K. (2023) “In Escalating Order of Stupidity
https://www.rd.ntt/sil/project/LLMInjectionTaxonomy/LLMInjectionTaxonomy_v1_20241225.pdf
PowerPoint プレゼンテーション
システム、多様なマルウェアを一体化したハッキングツール の危険度 https://wired.jp/article/pipedream-ics-malware/ 26 サイバー攻撃を受けた組織
https://www.rd.ntt/sil/overview/NTTannual2023_j_web.pdf
Prev
Next