Introduction of Evangelists

Associate Distinguished Researcher/Security Principal Toshinori Usui
  • Associate Distinguished Researcher/Security Principal

    Toshinori Usui

    Research on Improving Attack Resistance of Virtual Execution Environments

    I am engaged in research aimed at identifying parts of interpreters that could be exploited in attacks, in order to devise new attack techniques and their countermeasures ahead of attackers. To support this effort, I also conduct research on automated program analysis techniques.
    Ph.D. in Information Science and Technology

    Awards

    • Computer Security Symposium 2022 (CSS2022) Research Encouragement Award (first author)
    • CSS2021 Outstanding Paper Award (first author)
    • anti-Malware engineering Workshop 2021(MWS2021)Best Paper Award (first author)
    • IPSJ Yamashita SIG Research Award
    • CSS2020 Best Paper Award (first author)
    • CSS2019 Outstanding Paper Award (first author)
    • MWS2018 Best Paper Award (first author)
    • Information and Communication System Security (ICSS) Research Award (first author)
    • 1st place at SANS DFIR Advanced Malware Analysis Tournament

    Academic Activities

    • MWS2024 Program Committee
    • CSS2023 Program Committee
    • CSS2022 Deputy Program Chair
    • CSS2017 Steering Committee

    Publications

    Books

    • Security Contest Challenge Book, Mynavi Publishing Corporation, 2015

    Papers

    • Toshinori Usui, Egg Hunting without Eggs: Identifying Memory Locations of Objects Using Structural Characteristics, REcon 2025.
    • Toshinori Usui, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, and Kanta Matsuura, Bytecode Jiu-Jitsu: Choking Interpreters to Force Execution of Malicious Bytecode, Black Hat USA 2024 Briefings.
    • Toshinori Usui, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, and Kanta Matsuura, Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks, RAID 2022.
    • Toshinori Usui, Yuto Otsuki, Tomonori Ikuse, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, and Kanta Matsuura, Automatic Reverse Engineering of Script Engine Binaries for Building Script API Tracers, ACM DTRAP, Vol. 2, No. 5, pp. 1-31, January, 2021.
    • Toshinori Usui, Tomonori Ikuse, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, and Kanta Matsuura, ROPminer: Learning-Based Static Detection of ROP Chain Considering Linkability of ROP Gadgets, IEICE Trans. Inf. & Syst., Vol. E103-D, No. 7, pp. 1476-1492, July, 2020.
    • Toshinori Usui, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, and Kanta Matsuura, My Script Engines Know What You Did In The Dark: Converting Engines into Script API Tracers, ACSAC 2019.

    Keywords

    • Offensive security, Malware analysis, Interpreter, Virtual machine, Reverse engineering

    More Research Activity