TAKIMOTO Eiji
Information Technology Center | Associate Professor |
Last Updated :2025/04/27
■researchmap
Profile Information
Name (Japanese)
EIJIName (Kana)
TAKIMOTO
Research Areas
Research History
- Apr. 2022 - Present, Nara Women's University, 情報基盤センター, 准教授
- Dec. 2020 - Mar. 2022, Hiroshima Institute of Technology, 情報学部, 講師
- 01 Apr. 2017, Ritsumeikan University, College of Information Science and Engineering
- 01 Apr. 2010 - 30 Mar. 2016, Ritsumeikan University, College of Information Science and Engineering
- 01 Apr. 2004 - 31 Jan. 2010, ATR, Adaptive Communications Research Laboratories, Researcher
Education
- Mar. 2004, Ritsumeikan University Graduate School, Graduate School of Science and Engineering, Science and Engineering Major Doctoral course second term (Doctoral)
- Mar. 2001, Ritsumeikan University Graduate School, Graduate School of Science and Engineering, Information Science and Systems Engineering Major Doctoral course first term
- Mar. 1999, Ritsumeikan University, College of Science and Engineering, Department of Information Science
Teaching Experience
- Introduction to Information Processing I, Nara Women's University, Apr. 2023 - Present
- Mathematics, Data Science, AI, Nara Women's University, Oct. 2022 - Dec. 2023
- Graduation Research 3, Ritsumeikan University
- Graduation Research 1, Ritsumeikan University
- Programming Practice 1, Ritsumeikan University
- Graduation Research 2, Ritsumeikan University
Professional Memberships
■Ⅱ.研究活動実績
Published Papers
- Refereed, Mathematics, Directional Handover Analysis with Stochastic Petri Net and Poisson Point Process in Heterogeneous Networks, Zhiyi Zhu; Junjun Zheng; Eiji Takimoto; Patrick Finnerty; Chikara Ohta, Jan. 2025, Scientific journal, 10.3390/math13030349
- Refereed, Proceedings of the 2024 13th International Conference on Networks, Communication and Computing, ACM, Extending Network Simulator ns-3 for Analyzing IoT Malware, Jun'ichiro Hara; Koichi Mouri; Eiji Takimoto, 20 Dec. 2024, 73, 80, International conference proceedings, 10.1145/3711650.3711661
- Refereed, 2024 6th International Conference on System Reliability and Safety Engineering (SRSE), IEEE, Evaluating the A3RSRP Handover to Determine Optimal Performance in HetNet using Stochastic Petri Net, Zhiyi Zhu; Junjun Zheng; Eiji Takimoto; Patrick Finnerty; Chikara Ohta, 11 Oct. 2024, 469, 474, International conference proceedings, 10.1109/srse63568.2024.10772558
- Refereed, IEEE Access, Institute of Electrical and Electronics Engineers (IEEE), A CQI and Hysteretic-Based Decision Algorithm to Prevent Handover Failures for Pedestrian Mobility in Mobile Communication HetNet, Zhiyi Zhu; Eiji Takimoto; Patrick Finnerty; Chikara Ohta, 03 Jul. 2024, 12, 92348, 92367, Scientific journal, 10.1109/ACCESS.2024.3422529
- Refereed, International Journal of Information Security, Springer Science and Business Media LLC, Value-utilized taint propagation: toward precise detection of apps’ information flows across Android API calls, Hiroki Inayoshi; Shohei Kakei; Eiji Takimoto; Koichi Mouri; Shoichi Saito, Oct. 2022, Scientific journal, 10.1007/s10207-022-00603-9
- Refereed, IEICE Transactions on Information & Systems, Firewall Traversal Method by Pseudo-TCP Encapsulation., Keigo Taga; Junjun Zheng; Koichi Mouri; Shoichi Saito; Eiji Takimoto, 2022, 105, 1, 105, 115, Scientific journal, 10.1587/transinf.2021edp7050
- Refereed, Proceedings of the 29th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2021), IEEE, Performance evaluation of heterogeneous cellular networks using stochastic Petri nets, Zhiyi Zhu; Toshikazu Nishimura; Eiji Takimoto; Junjun Zheng, Sep. 2021, 1, 6, International conference proceedings, 10.23919/SoftCOM52868.2021.9559100
- Proceedings of the 16th International Conference on Availability, Reliability and Security, ACM, VTDroid: Value-based Tracking for Overcoming Anti-Taint-Analysis Techniques in Android Apps, Hiroki Inayoshi; Shohei Kakei; Eiji Takimoto; Koichi Mouri; Shoichi Saito, 17 Aug. 2021, International conference proceedings, 10.1145/3465481.3465759
- Proceedings - 2020 7th International Conference on Information Science and Control Engineering, ICISCE 2020, Institute of Electrical and Electronics Engineers Inc., New Queue Management Scheme to Improve PiggyCode with Delayed-ACK Option, Eiji Takimoto; Shoichi Saito; Koichi Mouri, TCP communications on wireless multi-hop net-works are bi-directional communications using DATA packets and ACK packets. These properties increase the hidden node problem and the intra-flow interference. PiggyCode, which is an existing scheme focused on bi-directionality of DATA packets and ACK packets, reduces the number of transmissions by applying Network Coding to the DATA packets and ACK packets when relaying these packets. Although some studies have considered the improvement of PiggyCode by insertion of the wait time, they did not take the Delayed-ACK option into account. In this paper, we propose a novel queue management scheme to consider the Delayed-ACK option. Furthermore, we confirm the efficiency of the proposed method via experimental evaluations., 01 Dec. 2020, 900, 906, International conference proceedings, 10.1109/ICISCE50968.2020.00186
- Refereed, 情報処理学会論文誌ジャーナル(Web), Data Leakage Prevention System using Network-wide Dynamic Taint Tracking by TCP, 松本隆志; 松本隆志; 瀧本栄二; 齋藤彰一; 毛利公一, Dec. 2019, 60, 12
- Refereed, 情報処理学会論文誌ジャーナル(Web), Dynamic Analysis System for Detection of Device Identifier Transmission in Android, 福田泰平; 福田泰平; ZHENG Junjun; 瀧本栄二; 齋藤彰一; 毛利公一, Dec. 2019, 60, 12
- Refereed, AsiaJCIS 2019, Prevention of Data Leakage due to Implicit Information Flows in Android Applications, Hiroki Inayoshi; Shohei Kakei; Eiji Takimoto; Koichi Mouri; Shoichi Saito, Aug. 2019, 103-110
- Refereed, International MultiConference of Engineers and Computer Scientists 2019 (IMECS 2019), Implementation of Virtual Machine Monitor-Based Stack Trace Mechanism on Windows 10 x64, Yuya Yamashita; Junjun Zheng; Shoichi Saito; Eiji Takimoto; Koichi Mouri, Mar. 2019, 100-105
- Refereed, International MultiConference of Engineers and Computer Scientists 2019 (IMECS 2019), Firewall Traversal Method by Inserting Pseudo TCP Header into QUIC, Keigo Taga; Junjun Zheng; Koichi Mouri; Shoichi Saito; Eiji Takimoto, Mar. 2019, 216-221
- Refereed, International Symposium on Computing and Networking (CANDAR), User-Side Updating of Third-Party Libraries for Android, Hiroki Ogawa; Eiji Takimoto; Koichi Mouri; Shoichi Saito, Nov. 2018, 452-458
- Refereed, 情報処理学会論文誌, JDWPによる動的解析を利用したAndroidアプリケーションの端末識別情報利用実態調査, 福田 泰平; 明田 修平; 瀧本 栄二; 齋藤 彰一; 毛利 公一, Sep. 2018, 59, 9, 1678-1688
- Refereed, 情報処理学会論文誌, 動的解析ログを活用した静的解析補助手法, 中島 将太; 大月 勇人; 明田 修平; 瀧本 栄二; 齋藤 彰一; 毛利 公一, Feb. 2018, 59, 2, 800-811
- Refereed, 電子情報通信学会論文誌(B), 無線メッシュネットワークにおけるパケット順序エラーに対するフィードバックを用いたTCP高速再送制御の制御手法, 明田 修平; 瀧本 栄二; 齋藤 彰一; 毛利 公一, Feb. 2018, J101-B, 2, 122-132
- Not Refereed, 情報処理学会論文誌ジャーナル(Web), Mocha: XSS Prevention System Applying CSP to HTML Hybrid Applications Independent of Developers, 竹内俊輝; 竹内俊輝; 瀧本栄二; 毛利公一; 齋藤彰一, Dec. 2018, 59, 12, 2155-2165
- Refereed, International MultiConference of Engineers and Computer Sciencists 2017 (IMECS 2017), Improvement of Acknowledgment Mechanism for TCP with Network Coding, Yosuke Mitsuzumi; Shuhei Aketa; Eiji Takimoto; Shoichi Saito; Koichi Mouri, Mar. 2017, 2, 608-613
- Refereed, International MultiConference of Engineers and Computer Sciencists 2017 (IMECS 2017), Network Coding with Wait Time Insertion and Configuration for TCP Communications in Wireless Multi-hop Networks, Eiji Takimoto; Shuhei Aketa; Shoichi Saito; Koichi Mouri, Mar. 2017, 2, 577-582
- Not Refereed, 第79回情報処理学会全国大会講演論文集, 高信頼な組込みシステムに向けた障害情報収集機能を持つ監視用OSの試作, 山本 遼介; 片山 吉章; 明田 修平; 瀧本 栄二; 毛利 公一, Mar. 2017, 1, 173-174
- Not Refereed, 情報処理学会研究報告, 情報漏洩防止のためのTCPによるネットワークワイドなテイント追跡手法, 松本 隆志; 明田 修平; 瀧本 栄二; 齋藤 彰一; 毛利 公一, 2017, 2016-CSEC-75, 11, 1-8
- Not Refereed, コンピュータセキュリティシンポジウム2017(CSS2017)論文集, JDWPによる動的解析を利用したAndroidアプリケーションの外部モジュール利用実態調査, 福田 泰平; 明田 修平; 瀧本 栄二; 齋藤 彰一; 毛利 公一, 2017, 537-544
- Not Refereed, コンピュータセキュリティシンポジウム2017(CSS2017)論文集, 仮想計算機モニタを用いたWindows 10 64bit環境におけるスタックトレースの実現, 山下 雄也; 明田 修平; 瀧本 栄二; 齋藤 彰一; 毛利 公一, 2017, 495-502
- Not Refereed, 情報処理学会研究報告, AndroidアプリケーションにおけるRuntime Permission要求時の挙動調査, 河合 佑紀; 明田 修平; 半井 明大; 窪田 歩; 瀧本 栄二; 毛利 公一, 2017, 2017-SPT-024, 125, 1-7, 195
- Not Refereed, 電子情報通信学会技術研究報告, 高速無線通信を想定したTCP再送オフロードのデバイスドライバによる実装とその評価, 黒竹 俊太; 明田 修平; 瀧本 栄二; 齋藤 彰一; 毛利 公一, 2017, 116, 497, 55-60
- Not Refereed, 情報処理学会研究報告, RINArray:配列構造復元による侵入検知システムの精度向上, 榑林 秀晃; 瀧本 栄二; 毛利 公一; 齋藤 彰一, 2017, 2017-CSEC-76, 24, 1-8
- Not Refereed, 情報処理学会研究報告, プロセス耐障害性向上システムOrthrosにおけるコンテナマイグレーション手法, 新美 渓介; 瀧本 栄二; 毛利 公一; 齋藤 彰一, 2017, 2017-OS-139, 11, 1-8
- Not Refereed, 情報処理学会研究報告, 多重OS実行環境におけるカーネル間メモリ監視による障害検知機構の実装, 松下 馨; 岩間 響子; 瀧本 栄二; 毛利 公一; 齋藤 彰一, 2017, 2017-OS-139, 2, 1-8
- Not Refereed, 電子情報通信学会 暗号と情報セキュリティシンポジウム(SCIS2017), AndroidにおけるJDWPを利用したAPI呼出し元モジュール特定手法, 福田 泰平; 岩田 直樹; 明田 修平; 瀧本 栄二; 川端 秀明; 半井 明大; 窪田 歩; 毛利 公一, 2017, 3D3-5, 1-8
- Not Refereed, 電子情報通信学会 暗号と情報セキュリティシンポジウム(SCIS2017), Androidアプリケーションへのコード挿入を用いたAPI呼出し元モジュール特定手法, 岩田 直樹; 明田 修平; 瀧本 栄二; 川端 秀明; 半井 明大; 窪田 歩; 毛利 公一, 2017, 3D3-4, 1-8
- Not Refereed, 情報処理学会論文誌, コンパイラを用いた情報フロー制御による情報漏洩防止機構, 奥野 航平; 内匠 真也; 大月 勇人; 瀧本 栄二; 毛利 公一, Dec. 2016, 57, 12, 2836-2848
- Not Refereed, 電子情報通信学会論文誌(B), 無線メッシュネットワークにおける経路変更に起因する冗長なTCP高速再送制御の抑制手法, 明田 修平; 瀧本 栄二; 大月 勇人; 齋藤 彰一; 毛利 公一, Aug. 2016, J99-B, 8, 612-624
- Not Refereed, International MultiConference of Engineers and Computer Scientists 2015 (IMECS 2015), Identifying System Calls Invoked by Malware using Branch Trace Facilities, Yuto Otsuki; Eiji Takimoto; Shoichi Saito; Eric W. Cooper; Koichi Mouri, Mar. 2016, 1, 145-151
- Refereed, Identification of System Call Invoker by Branch Trace Facilities, Yuto Otsuki; Eiji Takimoto; Shoichi Saito; Koichi Mouri, 15 Feb. 2016, 57, 2, 756, 768, Scientific journal
- Not Refereed, 情報処理学会研究報告, 動的テイント解析機能を利用したOSによる細粒度データ出力制御手法, 松本 隆志; 明田 修平; 瀧本 栄二; 齋藤 彰一; 毛利 公一, 2016, 2016-CSEC-75, 1, 1-8
- Not Refereed, コンピュータシステム・シンポジウム論文集, Intel DPDKを用いたネットワーク遅延エミュレータの開発, 明田 修平; 広渕 崇宏; 瀧本 栄二; 毛利 公一; 高野 了成, 2016, 2016, 147-152
- Not Refereed, コンピュータセキュリティシンポジウム2016(CSS2016)論文集, CPUによるリターンアドレス書換え攻撃検知とソフトウェア支援, 久保田 曹嗣; 明田 修平; 瀧本 栄二; 齋藤 彰一; 毛利 公一, 2016, 2016, 2, 718-725
- Not Refereed, コンピュータセキュリティシンポジウム2016(CSS2016)論文集, 動的解析ログを活用した静的解析補助手法の提案, 中島 将太; 明田 修平; 瀧本 栄二; 齋藤 彰一; 毛利 公一, 2016, 526-533
- Not Refereed, 電子情報通信学会技術研究報告, 経路変更に起因する順序エラーを考慮した無線メッシュネットワーク向けTCP輻輳制御, 明田 修平; 瀧本 栄二; 齋藤 彰一; 毛利 公一, 2016, 116, 171, 77-82
- Not Refereed, 情報処理学会論文, コンパイラとOSの連携によるデータフロー追跡手法, 内匠 真也; 奥野 航平; 大月 勇人; 瀧本 栄二; 毛利 公一, Dec. 2015, 56, 12, 2313-2323, 2323
- Not Refereed, 電子情報通信学会論文誌(B), マルチキューNICを用いたIPsecの並列化手法の実装と評価, 小川 拡; 齋藤 彰一; 安井 裕亮; 川島 龍太; 瀧本 栄二; 毛利 公一; 松尾 啓志, Jul. 2015, J98-B, 7, 557-569
- Not Refereed, International MultiConference of Engineers and Computer Scientists 2015 (IMECS 2015), Suppressing Redundant TCP Retransmissions in Wireless Mesh Networks, Shuhei Aketa; Eiji Takimoto; Yuto Otsuki; Shoichi Saito; Eric W. Cooper; Koichi Mouri, Mar. 2015, 2, 556-561
- Not Refereed, 情報処理学会論文誌, マルウェア観測のための仮想計算機モニタを用いたシステムコールトレース手法, 大月 勇人; 瀧本 栄二; 齋藤 彰一; 毛利 公一, Sep. 2014, 55, 9, 2034-2046
- Not Refereed, Lecture Notes in Electrical Engineering, Springer Verlag, Tracing malicious injected threads using alkanet Malware analyzer, Yuto Otsuki; Eiji Takimoto; Takehiro Kashiyama; Shoichi Saito; Eric W. Cooper; Koichi Mouri, Recently, malware has become a major security threat to computers. Responding to threats from malware requires malware analysis and understanding malware behavior. However, malware analysts cannot spend the time required to analyze each instance of malware because unique variants of malware emerge by the thousands every day. Dynamic analysis is effective for understanding malware behavior within a short time. The method of analysis to execute the malware and observe its behavior using debugging and monitoring tools. We are developing Alkanet, a malware analyzer that uses a virtual machine monitor based on BitVisor. Alkanet can analyze malware even if the malware applies anti-debugging techniques to thwart analysis by dynamic analysis tools. In addition, analysis overhead is reduced. Alkanet executes malware on Windows XP, and traces system calls invoked by threads. Therefore, the system can analyze malware that infects other running processes. Also, the system call logs are obtained in real time via a IEEE 1394 interface. Other programs can readily examine the log and process the analysis results to understand intentions of malware behavior. In this paper, we describe the design and implementation of Alkanet. We confirm that Alkanet analyzes malware behaviors, such as copying itself, deleting itself, and creating new processes. We also confirm that Alkanet accurately traces threads injected by malware into other processes. © 2014 Springer Science+Business Media Dordrecht., 2014, 247, 283, 299, International conference proceedings, 10.1007/978-94-007-6818-5_21
- Not Refereed, IET Seminar Digest, Institution of Engineering and Technology, A hybrid loop-free routing protocol for wireless mesh networks, Eiji Takimoto; Shuhei Aketa; Yuto Otsuki; Shoichi Saito; Koichi Mouri, A loop-free routing protocol for wireless mesh networks that uses two hybrid methods to solve routing loop problems is proposed. The hybrid methods are as follows: 1) dynamic and static metrics and 2) reactive routing protocol RREQ/RREP mechanisms and proactive methods. The proposed protocol adopts incremental routing to construct routes in the initial state. Simulation evaluations indicate that routing loops occurred when existing routing protocols, such as OLSR, were used. In addition, throughput and communication delay fluctuated significantly with existing methods. No routing loops occurred with the proposed protocol. The proposed protocol achieves stable transition of throughput and low communication delay., 2014, 2014, 655, International conference proceedings, 10.1049/cp.2014.1396
- Not Refereed, 情報処理学会論文誌, 複数異種無線環境における自律分散型経路制御方式, 瀧本 栄二; 樫山 武浩; 毛利 公一; 滝沢 泰久, Feb. 2013, 54, 2, 596-609
- Not Refereed, 情報処理学会論文誌, コールスタックの制御データ検査によるスタック偽装攻撃検知, 冨永 悠生; 樫山 武浩; 瀧本 栄二; 桑原 寛明; 毛利 公一; 齋藤 彰一; 上原 哲太郎; 國枝 義敏, Sep. 2012, 53, 9, 2075-2085
- Not Refereed, INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, IMECS 2012, VOL I, INT ASSOC ENGINEERS-IAENG, Design and Implementation of DF-Salvia which Provides Mandatory Access Control based on Data Flow, Shozo Ida; Takehiro Kashiyama; Eiji Takimoto; Shoichi Saito; Eric Wallace Cooper; Koichi Mouri, Recently, incidents in which data such as private information has leaked have occurred frequently. In many cases, the main causes of data leakage are as follows: taking data out illegally or unfairly, erroneous operation by a user with authority to access the data. We developed the operating system Salvia for the purpose of preventing data leakage resulting from these causes. Salvia provides the capability to attach data protection policies to each file. In addition, Salvia monitors resource access that may incur the possibility of data leakage. When a process requests to access to such resources, Salvia allows the operation only if it does not violate the policies of all files which are read by the process. That is, Salvia controls resource access by process. In this paper, we propose DF-Salvia, based on Salvia. An access control unit of DF-Salvia is data flow, which is finer-grained than the process-based access control of Salvia. This means that DF-Salvia applies a policy not to each process but to each data flow in a process in order to limit the extent of the effect of the policy to corresponding data flow. The results show a solution to the problem of over-restriction of irrelevant data., 2012, 1, 182, 189, International conference proceedings
- Not Refereed, 情報処理学会論文誌 コンピューティングシステム, 仮想計算機モニタXenにおけるRTOS向け割込み通知方式, 渡邉 和樹; 片山 吉章; 松本 利夫; 瀧本 栄二; 樫山 武浩; 毛利 公一, 2012, 5, 4, 87-100, 100
- Not Refereed, WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2012, VOL I, INT ASSOC ENGINEERS-IAENG, Alkanet: A Dynamic Malware Analyzer based on Virtual Machine Monitor, Yuto Otsuki; Eiji Takimoto; Takehiro Kashiyama; Shoichi Saito; Eric W. Cooper; Koichi Mouri, Recently, malware has become a major security threat to computers. Responding to threats from malware requires malware analysis and understanding malware behavior. However, malware analyst cannot spend the time required to analyze each instance of malware because unique variants of malware emerge by the thousands every day. Dynamic analysis is effective for understanding malware behavior within a short time. The method of analysis to execute the malware and observe its behavior using debugging and monitoring tools. We are developing Alkanet, a malware analyzer that uses a virtual machine monitor based on BitVisor. Alkanet can analyze malware even if the malware applies anti-debugging techniques to thwart analysis by dynamic analysis tools. In addition, analysis overhead is reduced. Alkanet executes malware on Windows XP, and traces system calls invoked by threads. Therefore, the system can analyze malware that infects other running processes. Also, the system call trace logs are obtained in real time via a IEEE 1394 interface. Other programs can readily examine the log and process the analysis results to understand intentions of malware behavior. In this paper, we describe the design and implementation of Alkanet. We confirm that Alkanet analyzes malware behaviors, such as copying itself, deleting itself, and creating new processes. We also confirm that Alkanet accurately traces threads injected by malware into other processes., 2012, 1, 36, 44, International conference proceedings
- Not Refereed, Proceedings of the Innovative Architecture for Future Generation High-Performance Processors and Systems (IWIA 2012), Secure Call and Return Instructions for Mimicry Attack Detection, Yuuki Tominaga; Takehiro Kashiyama; Eiji Takimoto; Hiroaki Kuwabara; Koichi Mouri; Shoichi Saito; Tetsutaro Uehara; Yoshitoshi Kunieda, 2012, 55-60
- Refereed, 2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, IEEE, Evaluation of Multi-Channel Flooding for Inter-Vehicle Communication, Eiji Takimoto; Yoshihisa Kondo; Satoko Itaya; Ryutaro Suzuki; Sadao Obana, Flooding protocols are efficient for communications on instable network such as inter-vehicle communications because there is no necessity of complex procedures to build routes for data forwarding. In this paper, we propose a multi-channel flooding protocol using multi-interface WLAN terminals for improving robustness of communications. In simulation test, we show that packet loss rate can be reduced with parallel-redundant packet transmission using multi-channel, and transmission delay can also be reduced compared to serial-redundant packet transmission using single-channel. In experimental test, we confirm that the multi-channel flooding is also effective in real enviromnent., 2008, 960, 965, International conference proceedings
MISC
- An Information Gathering Method for Intra-Organizational Malicious Communication Using a Disguised Environment with Non-Existent Servers, Jun'ichiro, Hara; Koichi, Mouri; Eiji, Takimoto, 15 Oct. 2024, 1587, 1593
- 15 May 2024, 68, 5, 197, 197, 10.11509/isciesci.68.5_197
- Not Refereed, Jan. 2024
- Not Refereed, Oct. 2022, 1156, 1162
- 17 Feb. 2022, 2022, 1, 541, 542
- 電子情報通信学会技術研究報告(Web), A Method for Preventing Retransmission due to Subflow Disconnection in MPTCP, 堤下裕次郎; 毛利公一; ZHENG Junjun; 瀧本栄二, 2021, 121, 173(CQ2021 37-62)
- 情報処理学会研究報告(Web), Understanding Malware’s Actual Behaviors from Dynamic System Call Tracer’s Log, 森本康太; 鄭俊俊; 瀧本栄二; 齋藤彰一; 毛利公一, 2020, 2020, SPT-36
- 2020, 2020, CSEC-88
- 電子情報通信学会技術研究報告, Influence of congestion window size on load distribution mechanism of MPTCP, 鈴東佑馬; 西村俊和; 毛利公一; 瀧本栄二, 2020, 119, 461(IN2019 76-148)(Web)
- 電子情報通信学会大会講演論文集(CD-ROM), A Consideration on HMM-based Malware Classification Using API Call Sequence, 大江弘晃; 瀧本栄二; 毛利公一; ZHENG Junjun, 2020, 2020
- 電子情報通信学会技術研究報告, Study of Congestion Control Algorithm Switch Considering Path Characteristics on MPTCP, 鈴東佑馬; 西村俊和; 毛利公一; 瀧本栄二, 2019, 118, 480(SITE2018 68-87)
- 2019, 2019, OS-145
- 2019, 18th
- 2019, 18th
- 電子情報通信学会技術研究報告, Implementation and Evaluation of Firewall Traversal Method by Inserting Pseudo TCP Header on End-nodes, 多可啓悟; 毛利公一; ZHENG Junjun; 齋藤彰一; 瀧本栄二, 2019, 119, 342(IN2019 45-64)(Web)
- 2019, 18th
- 2018, 2018, 2
- 2018, 2018, 2
- A Study of TCP Retransmission Offload for Wireless Communications, 07 Mar. 2016, 115, 496, 49, 54
- IEICE technical report. ASN, Ambient intelligence and sensor networks, The Institute of Electronics, Information and Communication Engineers, A Study of Implementation of PiggyCode and an Improvement Method, TCP communications on wireless multi-hop networks is bi-directional communications using DATA packets and ACK packets. These properties increase the hidden node problem and the flow within the interference. PiggyCode, which is an existing study focused on bi-directivitiy of DATA packets and ACK packets, reduces the number of transmissions by applying Network Coding to the DATA packets and ACK packets when relaying these packets. We had verifed the proposed method to improve coding rate by inserting wait time, and had proved on a simulator. In this paper, we prove the validity of the proposed method by the result of evaluations in real environment. Furthermore, we propose a performance improving method according to the findings obtained from real machine experiments., 02 Mar. 2015, 114, 480, 285, 292
- IEICE technical report. MoNA, Mobile network and applications, The Institute of Electronics, Information and Communication Engineers, A Study of Implementation of PiggyCode and an Improvement Method, TCP communications on wireless multi-hop networks is bi-directional communications using DATA packets and ACK packets. These properties increase the hidden node problem and the flow within the interference. PiggyCode, which is an existing study focused on bi-directivitiy of DATA packets and ACK packets, reduces the number of transmissions by applying Network Coding to the DATA packets and ACK packets when relaying these packets. We had verifed the proposed method to improve coding rate by inserting wait time, and had proved on a simulator. In this paper, we prove the validity of the proposed method by the result of evaluations in real environment. Furthermore, we propose a performance improving method according to the findings obtained from real machine experiments., 02 Mar. 2015, 114, 479, 245, 252
- IPSJ SIG Notes, Information Processing Society of Japan (IPSJ), A Data Flow Tracking Method Collaborated by Compiler and OS, Many information leakage incidents are caused by human error. To prevent from these information leakage, we develop DF-Salvia that prevents an output based on a policy whom users set to a file. DF-Salvia tracks data flow inside a process by compiler and OS. In this paper, we propose this data flow tracking method. Compiler creates data flow information and inserts data flow tracking code to source code for analyzing dynamic data flow. OS analyzes data flow in run-time according to them. In the results of applying this method to applications, we conformed what DF-Salvia can prevent from information leakage by tracking data flow., 26 Feb. 2015, 2015, 12, 1, 8
- IPSJ SIG Notes, Information Processing Society of Japan (IPSJ), A Data Loss Prevention System By Compiler and Information Flow Control, Many data loss incidents have reported to be caused by human error. This paper proposes a data loss prevention system caused by human error, that's called User-mode DF-Salvia. Our system breaks the procedures of human-mistaken data output and restricts data usage by information flow control. An output is controlled by a protection policy associated with a data source file. To get a protection policy when outputting the data, we use the dynamic information tracking technique as dynamic taint analysis. These features for access control are inserted to an application program by code transform in compiler. These applications make possible to control itself. Therefore, a user can simply deploy the access control system by replacement of an application and reduce deployment costs. Our system is evaluated by real applications published on the internet and we confirmed data loss prevetion., 26 Feb. 2015, 2015, 13, 1, 8
- Information Processing Society of Japan (IPSJ), A Study of Implementation of PiggyCode and an Improvement Method, TCP communications on wireless multi-hop networks is bi-directional communications using DATA packets and ACK packets. These properties increase the hidden node problem and the flow within the interference. PiggyCode, which is an existing study focused on bi-directivitiy of DATA packets and ACK packets, reduces the number of transmissions by applying Network Coding to the DATA packets and ACK packets when relaying these packets. We had verifed the proposed method to improve coding rate by inserting wait time, and had proved on a simulator. In this paper, we prove the validity of the proposed method by the result of evaluations in real environment. Furthermore, we propose a performance improving method according to the findings obtained from real machine experiments., 23 Feb. 2015, 2015, 55, 1, 8
- 情報処理学会研究報告(Web), Information Processing Society of Japan (IPSJ), A Detection Method of Return Address Overwriting Attacks Based on Instruction Extension Using QEMU, 柴田達也; 奥野航平; 大月勇人; 瀧本栄二; 毛利公一, Cyber-attacks are major threat. Commonly, these attacks attempt to exploit software vulnerabilities. In particular, attackers have exploited buffer overflow vulnerabilities for a long time. Many protection techniques were proposed to protect from buffer overflow attacks, but these techniques cannot prevent attacks completely. In this paper, we present a return address overwriting detection system. Our system disallows to attackers to exploit buffer overflow vulnerabilities. Our system works on CPU which has an extended feature and additional instructions. We implemented it to the hardware emulator QEMU. Furthermore, we confirmed the system with test programs on a prototype OS., 26 Feb. 2015, 2015, DPS-162, 1, 8
- Identifying of System Call Invoker by Branch Trace Facilities, 15 Oct. 2014, 2014, 2, 843, 850
- Proceedings of the Society Conference of IEICE, The Institute of Electronics, Information and Communication Engineers, B-6-34 A Dynamic Redundancy Adjustment Based on Link Quality for Erasure Correcting Coding, Tanaka Tatsuya; Aketa Shuhei; Otsuki Yuto; Takimoto Eiji; Mouri Koichi, 09 Sep. 2014, 2014, 2, 34, 34
- Proceedings of the Society Conference of IEICE, The Institute of Electronics, Information and Communication Engineers, B-7-41 A Localization of TCP Retransmission Control by Splitting TCP Connection in MANETs, Akagawa Sho; Aketa Shuhei; Otsuki Yuto; Takimoto Eiji; Mouri Koichi, 09 Sep. 2014, 2014, 2, 98, 98
- A Proposal for Live Update of Linux Kernel on Multiple OSes Execution Platform, 21 Jul. 2014, 2014, 23, 1, 8
- IEICE technical report. Social Implications of Technology and Information Ethics, The Institute of Electronics, Information and Communication Engineers, Implementation of Simple StackTrace and its Application to Permission Control System in Android, TAKASE TAKUHO; HIOKI SHOTA; SAITO SHOICHI; TAKIMOTO EIJI; MOURI KOICHI; MATSUO HIROSHI, 03 Jul. 2014, 114, 116, 47, 53
- IPSJ SIG technical reports, Information Processing Society of Japan (IPSJ), Implementation of Simple StackTrace and its Application to Permission Control System in Android, Takuho Takase; Shota Hioki; Shoichi Saito; Eiji Takimoto; Koichi Mouri; Hiroshi Matsuo, 26 Jun. 2014, 2014, 7, 1, 7
- IPSJ SIG Notes, Information Processing Society of Japan (IPSJ), Implementation of Simple StackTrace and its Application to Permission Control System in Android, Takuho Takase; Shota Hioki; Shoichi Saito; Eiji Takimoto; Koichi Mouri; Hiroshi Matsuo, 26 Jun. 2014, 2014, 7, 1, 7
- IPSJ SIG Technical Reports, Information Processing Society of Japan (IPSJ), A Proposal for Parallelization of IPsec Tunneling by Packet Flows, Hiromu Ogawa; Shoichi Saito; Ryota Kawashima; Eiji Takimoto; Koichi Mouri; Hiroshi Matsuo, 21 Jun. 2014, 2014, 10, 1, 8
- 11 Mar. 2014, 2014, 1, 325, 326
- Proceedings of the IEICE General Conference, The Institute of Electronics, Information and Communication Engineers, B-7-81 A Study of Issues Wireless Interface Aggregation, Okada Kazuma; Aketa Shuhei; Otsuki Yuto; Takimoto Eiji; Mouri Koichi, 04 Mar. 2014, 2014, 2, 256, 256
- Proceedings of the IEICE General Conference, The Institute of Electronics, Information and Communication Engineers, D-6-14 Precision Improvement Approach of CPU Throttling in Linux Control Groups, Togashi Souta; Otsuki Yuto; Takimoto Eiji; Mouri Koichi, 04 Mar. 2014, 2014, 1, 62, 62
- IEICE technical report. MoNA, Mobile network and applications, The Institute of Electronics, Information and Communication Engineers, Improving the Suppression Method of Redundant TCP Retransmission Caused by Route Modification, AKETA Shuhei; OTSUKI Yuto; MOURI Koichi; TAKIMOTO Eiji, Link state routing protocols modify routes according to the change of link quality. The route modification improves communication performance, otherwise, it causes temporal packet arrival order errors. TCP may retransmit caused by such order errors. However, the retransmissions caused not by packet losses are not only redundant but also a waste of wireless resources. We have proposed the method to suppress the redundant retransmission by discarding Dup-ACKs. Although, the method has a prospect that TCP is trapped in the disruption of communication. The disruption leads to RTO. Therefore, we improve the method by addition the delay to ACKs instead of the discard of them. In this paper, we describes the detail of the improvement proposal and its evaluations by simulation., 21 Nov. 2013, 113, 304, 29, 34
- IEICE technical report. Information and communication system security, The Institute of Electronics, Information and Communication Engineers, Dynamic Permission Control to Prevent Unexpected Information Leakage on Android, WATANABE KANAKO; OTSUKI YUTO; TAKIMOTO EIJI; SAITO SHOICHI; MOURI KOICHI, Android controls accesses to privacy information by "permission". A user can check what permis-sions will be granted to an application on its installation. However, the user must grant all the permissions requested by the application to install. Thus, it is difficult for the user to refuse granting the permissions. Furthermore, android does not notify the user that the application is acquiring privacy information at run-time. Therefore, malicious applications can leak privacy information without a notification to the user. This paper describes implementation of dynamic permission controller that notifies a user that an application is acquiring privacy information at runtime. This function achieves that the user can select the application's behavior, such as acquiring privacy information or not. As a result, privacy information leakage without user's intention will be preserved., 18 Jul. 2013, 113, 137, 159, 166
- Technical report of IEICE. ISEC, The Institute of Electronics, Information and Communication Engineers, Dynamic Permission Control to Prevent Unexpected Information Leakage on Android, WATANABE KANAKO; OTSUKI YUTO; TAKIMOTO EIJI; SAITO SHOICHI; MOURI KOICHI, Android controls accesses to privacy information by "permission". A user can check what permis-sions will be granted to an application on its installation. However, the user must grant all the permissions requested by the application to install. Thus, it is difficult for the user to refuse granting the permissions. Furthermore, android does not notify the user that the application is acquiring privacy information at run-time. Therefore, malicious applications can leak privacy information without a notification to the user. This paper describes implementation of dynamic permission controller that notifies a user that an application is acquiring privacy information at runtime. This function achieves that the user can select the application's behavior, such as acquiring privacy information or not. As a result, privacy information leakage without user's intention will be preserved., 18 Jul. 2013, 113, 135, 159, 166
- Dynamic Permission Control to Prevent Unexpected Information Leakage on Android, 11 Jul. 2013, 2013, 23, 1, 8
- Technical report of IEICE. CQ, The Institute of Electronics, Information and Communication Engineers, A Method Based on Difference among Sequence Numbers to Suppress Redundant TCP Retransmission Caused by Route Modification, AKETA Shuhei; OTSUKI Yuto; MOURI Koichi; TAKIMOTO Eiji, Link state routing protocols modify routes according to the change of link quality. Route modification improves communication performance, otherwise, it causes temporal packet arrival order errors. TCP may retransmit caused by such order errors. However, the retransmissions caused not by packet losses are not only redundant but also a waste of wireless resources. Our proposal method discriminates whether the causation of arrival order errors is packet loss or route modification, and discards Dup-ACK to suppress the redundant retransmissions. In this paper, we describe the detail of the proposal and its evaluations by simulation., 11 Jul. 2013, 113, 123, 61, 66
- Proceedings of the IEICE General Conference, The Institute of Electronics, Information and Communication Engineers, D-10-4 Code Translation in Compiler for Detection and Correction of Memory Errors, Wakabayashi Hiroaki; Katayama Yoshiaki; Deguchi Masahiro; Takimoto Eiji; Mouri Koichi, 05 Mar. 2013, 2013, 1, 150, 150
- Proceedings of the IEICE General Conference, The Institute of Electronics, Information and Communication Engineers, D-6-11 Performance Evaluation of CPU Throttling in Linux Control Groups, Togashi Souta; Katayama Yoshiaki; Kirimura Masayuki; Takimoto Eiji; Mouri Koichi, 05 Mar. 2013, 2013, 1, 58, 58
- Proceedings of the IEICE General Conference, The Institute of Electronics, Information and Communication Engineers, B-7-73 ASuppression Method of TCP Retransmission Control Caused by Route Modification in MANETs, Aketa Shuhei; Takimoto Eiji; Mouri Koichi, 05 Mar. 2013, 2013, 2, 217, 217
- 2013, 2013, 4
- IEICE technical report. Information networks, The Institute of Electronics, Information and Communication Engineers, Application of Network Coding Technique to TCP Communications in Wireless Multi-hop Networks, Ko Kaiei; Takimoto Eiji; Mouri Koichi, TCP communications on wireless multi-hop networks have properties of traffic and inference increase with acknowledgement packets(ACK). PiggyCode, which is an existing study focused on bidirectionality of DATA packets and ACK packets, reduces number of the transmission by encoding DATA packets and ACK packets. Although, the effect of PiggyCode depends on transmission rate. In this paper, we propose a method to enhance the effect of network coding technique regardless of transmission rate by inserting waiting time into packet relay processes, and we prove the effect by simulation result. In addition, we also propose another method to dynamically adjust the waiting time according to hop counts and traffic., 13 Dec. 2012, 112, 352, 45, 50
- Malware Analysis Report 2012 using Malware Analyzer Alkanet, 23 Oct. 2012, 2012, 3, 106, 113
- Not Refereed, 情報処理学会論文誌トランザクション(CD-ROM), Management Method of Interrupts for RTOS in Xen Hypervisor, 渡邉和樹; 片山吉章; 松本利夫; 瀧本栄二; 樫山武浩; 毛利公一, 15 Oct. 2012, 2012, 1, ROMBUNNO.KONPYUTINGUSHISUTEMU,VOL.5,NO.4,87-100
- 06 Mar. 2012, 2012, 1, 167, 169
- 06 Mar. 2012, 2012, 1, 631, 633
- A Method to Get Result of System Calls for Malware Analysis, 12 Oct. 2011, 2011, 3, 95, 100
- Analysis of Data Spread between Data Flows in Cooperation with Compiler and OS, 12 Oct. 2011, 2011, 3, 768, 773
- Threat of Script abuse Android Permissions and Static Analysis, 05 May 2011, 2011, 3, 1, 6
- Management of interrupt for RTOS using MSI in Xen Hypervisor, 06 Apr. 2011, 2011, 27, 1, 9
- Management of interrupt for RTOS using MSI in Xen Hypervisor, 06 Apr. 2011, 2011, 27, 1, 9
- A Route Management Method for Multi-Channel Multi-Hop Wireless LAN Systems, 03 Mar. 2011, 2011, 3, 1, 6
- Program analysis for mandatory access control based on data flow information, 03 Mar. 2011, 2011, 45, 1, 6
- A Route Management Method for Multi-Channel Multi-Hop Wireless LAN Systems, 03 Mar. 2011, 2011, 3, 1, 6
- 02 Mar. 2011, 2011, 1, 183, 184
- 02 Mar. 2011, 2011, 1, 511, 513
- 02 Mar. 2011, 2011, 1, 513, 515
- 02 Mar. 2011, 2011, 1, 133, 135
- IEICE technical report, Proposal and evaluation of a frequency channel control method on inter-vehicle communication systems (MM-SA) for safe driving support, 09 Sep. 2009, 109, 187, 1, 8
- Proposal and Evaluation of a Frequency Channel Control Method on Inter-Vehicle Communication Systems (MM-SA) for Safe Driving Support, TAKIMOTO Eiji; SHAGDAR Oyunchimeg; OHYAMA Takashi; MIURA Ryu; OBANA Sadao, 02 Sep. 2009, 2009, 1, 1, 8
- Proceedings of the Society Conference of IEICE, The Institute of Electronics, Information and Communication Engineers, B-5-113 Public-Private Cooperative Cognitive Radio Access Networks(II-a) : A Multihop Route Construction Method, Sakai Kengo; Tamai Morihiko; Takimoto Eiji; Tang Suhua; Yomo Hiroyuki; Hasegawa Akio; Ueda Tetsuro; Obana Sadao, 01 Sep. 2009, 2009, 1, 463, 463
- 情報処理学会研究報告, A Proposal and Consideration on a Management Method of Surrounding Vehicle in Vehicle-to-Vehicle Communication Systems for Safe Driving, 瀧本栄二; 大山卓; 三浦龍; 小花貞夫, 2009, 2009, 24(ITS-36)
- Proceedings of the IEICE General Conference, The Institute of Electronics, Information and Communication Engineers, B-19-35 A Proposal of the Label Distribution Method on Reactive Routing Control, Takimoto Eiji; Suzuki Ryutaro; Obana Sadao, 05 Mar. 2008, 2008, 2, 539, 539
- IPSJ journal, Information Processing Society of Japan (IPSJ), An Implementation and Evaluation of an Accelerating Method for Flooding, TAKIMOTO EIJI; TAKIZAWA YASUHISA; SUZUKI RYUTARO; OBANA SADAO, Ad-hoc network can construct flexible networks by an autonomous communications among nodes. Therefore, ad-hoc network is expected to apply in the number of different fields. The communication latency is one of important issues in ad-hoc network. In the conventional researches, however, it is not enough to consider the communication latency. For example, the low communication latency is required in the inter-vehicle communication which is one of ad-hoc network applications. Therefore, in this paper, we propose the construction method for reducing the communication latency in the flooding which is a communication method in ad-hoc network. The proposed method can decrease the communication latency by executing the internal processing for flooding within a device driver. Experimental results of the prototype system show that the proposed method can decrease a rate of increasing communication time per hop about 30%., 15 Feb. 2008, 49, 2, 672, 683
- IEICE technical report, The Institute of Electronics, Information and Communication Engineers, An Implementation and Evaluations of Multi-channel Flooding, TAKIMOTO Eiji; KONDO Yoshihisa; ITAYA Satoko; SUZUKI Ryutaro; OBANA Sadao, Ad hoc network technology is effective to realize inter-vehicle communications. And delivering data packets to all vehicles by multi-hop flooding relay is a key technology to deliver urgent packet when the car screeched to a stop. However, one ma jor difficulty is the high packet loss due to unreliable wireless propagation conditions and rapid motion of the vehicles. In this paper, we demonstrate the evaluation of packet loss using parallel redundant flooding in multi-channel ad hoc networks. This method increases robustness for packet loss, and realizes to minimize the transmission delay of the urgent information., 12 Jul. 2007, 107, 148, 91, 94
- IPSJ SIG Notes, Information Processing Society of Japan (IPSJ), A Method of Decreasing Delay of Relay in Ad-hoc Networks, TAKIMOTO Eiji; TAKIZAWA Yasuhisa; SUZUKI Ryutaro; OBANA Sadao, Ad-hoc network can construct flexible networks by a autonomous communications among nodes. Therefore, ad-hoc network is expected to apply in the number of different fields. The responsiveness is one of important issues in ad-hoc network. In the conventional researches, however, it is not enough to consider the responsiveness. For example, the high response is required in the inter-vehicle communication which is one of ad-hoc network applications. Therefore, in this paper, we propose the method for enhancing the responsiveness in the flooding which is a communication method in ad-hoc network. We also describe results of evaluations with a prototype system of the proposed method., 07 Jun. 2007, 2007, 58, 51, 56
- Proceedings of the IEICE General Conference, The Institute of Electronics, Information and Communication Engineers, B-21-16 A fast relay method of wireless unicast communications with quasi-entry of ARP, Takimoto Eiji; Kadowaki Naoto; Obana Sadao, 07 Mar. 2007, 2007, 2, 605, 605
- Forum on Information Technology, L_075 A Method of Decreasing Delay of Relay in Ad-hoc Networks, Takimoto Eiji; Takizawa Yasuhisa; Kadowaki Naoto; Obana Sadao; Okubo Eiji, 21 Aug. 2006, 5, 4, 181, 182
- Information Processing Society of Japan (IPSJ), An Adaptive Control of Mutiple Network Devices in Heterogeneous Networks, MOTOHAMA TSUTOMU; TAKIMOTO EIJI; SUZUKI KAZUHISA; MOURI KOICHI; OKUBO EIJI, Recently, mobile terminals which have multiple network devices are widely used by the advanced communication technology, and users can access the network everywhere. For example, host-spots to which users can connect by his/her own terminal are available in stations, airports, stores, and so on. In such environments, it is possible for each mobile terminal to communicate with the same destination host through multiple network devices. However, since the conventional communication methods are not designed for handling to multiple network devices, the communication resources of each terminal cannot be effectively used. In this paper, we propose a mechanism for using the network devices properly according to the state of the communication and user's preference., 17 Feb. 2006, 2006, 14, 281, 286
- Forum on Information Technology, B-024 Problems of Tree Structured File Systems, Takimoto Eiji; Kadowaki Naoto; Obana Sadao, 22 Aug. 2005, 4, 1, 145, 146
- Information Processing Society of Japan (IPSJ), An Adaptive Scheduling Method on Continuous Media Multiplexed Stream Processing and Its Performance Evaluation, TAKIZAWA YASUHISA; TAKIMOTO EIJI; OKUBO EIJI, In recent researches to aim at the fusion of communication and broadcasting, continuous media processing with MPEG encoding technology are multiplexed stream processing on continuous media with related information. On the other hand, we have proposed new scheduling method which is adaptable for stream processing tasks with timing constraints and processing delay. The proposed method consists of scheduling policy based on the model which modifies Linear Bounded Arrival Process, and adaptation mechanism applied Parallel Distributed Processing model and thermodynamics model. The proposed method is constructed on the premise that stream processing is a single continuous media processing. Therefore, the proposed policy can not apply to multiplexed stream processing on continuous media. In this paper, modification of the policy and mechanism for the proposed method in consideration of multiplexed stream processing on continuous media and its performance evaluation are described., 15 Jun. 2005, 46, 10, 66, 80
- IPSJ SIG Notes, Information Processing Society of Japan (IPSJ), A Mechanism of Communication Continuation for Switching Network Devices, OKUDA Katsumi; TAKIMOTO Eiji; MORI Koichi; OKUBO Eiji, Recently, mobile terminals that have multiple wired and wireless network devices are widely used, and users can access network everywhere. For example, host-spot with which users can connect his/her own terminal are available in stations, airports, stores, and so on. In such environments, the host may switch network devices, while processes are communicating with correspondents in remote hosts. The problem is that switching network device causes lost of existing communication session using IP. In this paper, we propose communication mechanism that uses virtual devices, and the route selection mechanism based on mobile attribute of user processes., 23 Feb. 2005, 2005, 16, 81, 88
- IPSJ SIG Notes, Information Processing Society of Japan (IPSJ), An Adaptive Scheduling Method on Continuous Media Multiplexed Stream Processing and Its Performance Evaluation, TAKIZAWA YASUHISA; TAKIMOTO EIJI; OKUBO EIJI, In recent researches to aim at the fusion of communication and broadcasting, continuous media processing with MPEG encoding technology are multiplexed stream processing on continuous media with related information. On the other hand, we have proposed new scheduling method which is adaptable for stream processing tasks with timing constraints and processing delay. The proposed method is constructed on the premise that stream processing is a single continuous media processing. Therefore, the proposed policy can not apply to multiplexed stream processing on continuous media. In this paper, modification of the policy and mechanism for the proposed method in consideration of multiplexed stream processing on continuous media and its performance evaluation are described., 13 Sep. 2004, 2004, 92, 21, 24
- Forum on Information Technology, M-030 A Mechanism Reflecting the Wireless Condition in a Mixed Reality Network Simulator, Takeda Kazuhiro; Takimoto Eiji; Lambertsen Gaute; Nishio Nobuhiko, 20 Aug. 2004, 3, 4, 151, 152
- IPSJ SIG Notes, Information Processing Society of Japan (IPSJ), A Method for Improving Fault - tolerance by Transactional Memory Operations in the Solelc Distributed Operating System, TAMADA Atsuko; MIZUGUCHI Takao; TAKIMOTO Eiji; SHIBA Masahito; MOURI Koichi; OKUBO Eiji, In Solelc, the operating system consists of abstraction layers and a kernel. The abstraction layers work on each computer and provide the environment which the kernel works. The kernel uses functions provided by the abstraction layers and manages the resources of all computers. By this construction method, the kernel itself works in a location-transparent fashion, and it becomes possible to manage all resources on multiple computers with a single kernel. However, since a single kernel works on multiple computers, the entire system might stop when a certain computer breaks down. In order to improve the reliability and availability of the system, it is necessary to provide functions for fault-tolerance. In this paper, we propose a method for improving fault-tolerance by transactional memory operations. This method utilizes the memory redundancy on the virtual space shared by all computers which Solelc manages., 26 Feb. 2004, 2004, 17, 41, 48
- IPSJ SIG Notes, Information Processing Society of Japan (IPSJ), A Method of Spreading System Calls in Solelc Distributed Operating System, TAMADA Atsuko; MIZUGUCHI Takao; NAGAMUNE Koichi; TAKIMOTO Eiji; SHIBA Masahito; MOURI Koichi; OKUBO Eiji, We have been developing Solelc distributed operating system. Plural computers on which Solelc works are managed by an operating system, and the kernel can work location-transparently in Solelc. Therefore, system call processings are distributed to plural computers, and so operating system work efficiently. In this paper, a method of spreading system calls in Solelc are described., 27 Feb. 2003, 2003, 19, 55, 60
- 2003, 2003, 19, 1, 6
- IPSJ SIG Notes, Information Processing Society of Japan (IPSJ), A Study on Integration model for Context - Aware System in Mobile Environment, TAKIZAWA YASUHISA; TAKIMOTO EIJI; OKUBO EIJI, The advances in micro-electronics technology have made computers smaller, cheaper, and faster. This trend, along with other industry advances, has promoted the development and rapid market growth of small computers that can be carried from place to place. It has also created a revolution in the consumer marketplace where computers are now commonly embedded in everything from household appliances to automobiles. It is now possible to carry computers with us and to communicate on the spur of the moment with computers embedded in the world around us. For this reason, it pays attention to the ubiquitous computing systems which aim to provide people with ubiquitous access to information, communication, and computation. The challenge of these systems is to exploit the changing environment with a new class of applications that are aware of the context in which they are run. Such Context-Aware software adapts according to the location of use, the collection of nearby people and objects, the accessible devices, as well as changes to those objects over time. A system with these capabilities surveys the computing environment and reacts to changes to that environment. There are many context categories in the environments, but most systems adapt single or few categories of context. In this report, we suppose that the Real Context-Aware Computing is composed by more than one software components which adapt single or few categories of context, we descirbe the integrate model for interaction with single or few context aware software components., 28 Nov. 2002, 2002, 114, 85, 88
- Information Processing Society of Japan (IPSJ), A Construction Method of Distributed Operateing System Based on Agents, Takimoto Eiji; Shiba Masahito; Okubo Eiji, In the conventional distributed systems, it is difficult to adapt to change of environment. This is because computers that consist of a system are closely related each other, in order to efficiently use system resources. It is possible to improve flexibility for change of environment by making each computer work autonomously and managing system resources of other computers only if those resources are requested. In this paper, a construction method of distributed system based on agent is described. By using this method, distributed system that each computer can run autonomously is realized., 14 Feb. 2002, 2002, 13, 117, 123
- Information Processing Society of Japan (IPSJ), Java Virtual Machine on Easel Real-Time Operating System, Okuyama Gen; Takimoto Eiji; Shiba Masahito; Okubo Eiji, We have been developing a Java VM (Virtual Machine) on Easel real-time operating system. Generally speaking, to use Java in real-time systems is improper from the following reasons: overhead of class loading, necessity of garbage collection, and lack of function for timing guarantee. To solve these problems, we have been developing the Java VM, which is extented for real-time systems, on Easel real-time operating system., 14 Feb. 2002, 2002, 13, 87, 93
- IPSJ SIG Notes, Information Processing Society of Japan (IPSJ), A Real -Time Window Sytem on Easel Real- Time Operating System, MITAMURA Akira; TAKIMOTO Eiji; SHIBA Masahito; OKUBO Eiji, We have been developing Easel real-time operating system as a platform for multi-media applications. In multi-media field, a certain window system is necessary, because in order that many threads share a display. When users replay the continuous media such as video, not only the threads for replaying but also the window system which actually draws video frames has to keep the right time. However, conventional window systems can not guarantee real-time restrictions. To cope with this problem, we have been developing the real-time window system which can guarantee real-time restrictions. In this paper, the structure and organization of the real-time window system on Easel is described., 28 Jun. 2001, 2001, 65, 153, 160
- IEICE technical report. Computer systems, The Institute of Electronics, Information and Communication Engineers, A Real-Time Window Sytem on Easel Real-Time Operating System, MITAMURA Akira; TAKIMOTO Eiji; SHIBA Masahito; OKUBO Eiji, We have been developing Easel real-time operating system as a platform for multi-media applications. In multi-media field, a certain window system is necessary, because in order that many threads share a display. When users replay the continuous media such as video, not only the threads for replaying but also the window system which actually draws video frames has to keep the right time. However, conventional window systems can not guarantee real-time restrictions. To cope with this problem, we have been developing the real-time window system which can guarantee real-time restrictions. In this paper, the structure and organization of the real-time window system on Easel is described., 22 Jun. 2001, 101, 152, 65, 72
- 13 Mar. 2001, 2001, 1, 35, 36
- 13 Mar. 2001, 2001, 1, 27, 28
- An Implementation of Two-Level Scheduler on Real-Time Operating System R^2, 09 Mar. 1999, 58, 63, 64
Presentations
- Oral presentation, 09 Mar. 2023, 07 Mar. 2023 - 10 Mar. 2023
- Oct. 2019, Oct. 2019 - Oct. 2019
- Oct. 2019, Oct. 2019 - Oct. 2019
- Oct. 2019, Oct. 2019 - Oct. 2019
- Hiroki Inayoshi; Shohei Kakei; Eiji Takimoto; Koichi Mouri; Shoichi Saito, AsiaJCIS 2019, Prevention of Data Leakage due to Implicit Information Flows in Android Applications, Aug. 2019, Aug. 2019 - Aug. 2019
- Keigo Taga; Junjun Zheng; Koichi Mouri; Shoichi Saito; Eiji Takimoto, International MultiConference of Engineers and Computer Scientists 2019 (IMECS 2019), Firewall Traversal Method by Inserting Pseudo TCP Header into QUIC, Mar. 2019, Mar. 2019 - Mar. 2019
- Yuya Yamashita; Junjun Zheng; Shoichi Saito; Eiji Takimoto; Koichi Mouri, International MultiConference of Engineers and Computer Scientists 2019 (IMECS 2019), Implementation of Virtual Machine Monitor-Based Stack Trace Mechanism on Windows 10 x64, Mar. 2019, Mar. 2019 - Mar. 2019
- 電子情報通信学会技術研究報告, MPTCPにおけるパス特性を考慮した輻輳制御アルゴリズム選択に関する検討, Mar. 2019
- 情報処理学会研究報告 2019-OS-145, ゲストOSのファイルキャッシュ識別によるメモリ重複除外, Mar. 2019
- 情報処理学会研究報告 2019-OS-145, ゲストOSのファイルキャッシュ識別によるメモリ重複除外, Feb. 2018
- 電子情報通信学会技術研究報告, QUICへの擬似TCPヘッダ挿入によるファイアウォールトラバーサル手法, 2018
- コンピュータセキュリティシンポジウム2018(CSS2018)論文集, プロセス内処理に対する遠隔認証手法の提案と実装, 2018
- コンピュータセキュリティシンポジウム2018(CSS2018)論文集, ヒープ領域に対するソースコード不要のIntel MPX命令適用手法, 2018
- コンピュータセキュリティシンポジウム2018(CSS2018)論文集, 動的解析においてログが取得できないマルウェアの実態調査, 2018
- コンピュータセキュリティシンポジウム2018(CSS2018)論文集, AlkanetにおけるMeltdown対策済Windowsのシステムコールトレース手法, 2018
- コンピュータセキュリティシンポジウム2018(CSS2018)論文集, Androidにおけるランタイムパーミッションのクラス別適用手法, 2018
- 情報処理学会研究報告, IEEE802.11 MAC拡張による高信頼1対2通信方式の無線ネットワークコーディングへの適用, 2018
- 電子情報通信学会技術研究報告, パケット順序エラーに対するフィードバックを用いたTCP高速再送制御の制御手法の実環境評価, 2018
- 山本 遼介; 片山 吉章; 明田 修平; 瀧本 栄二; 毛利 公一, 第79回情報処理学会全国大会講演論文集, 高信頼な組込みシステムに向けた障害情報収集機能を持つ監視用OSの試作, Mar. 2017, Mar. 2017 - Mar. 2017
- Eiji Takimoto; Shuhei Aketa; Shoichi Saito; Koichi Mouri, International MultiConference of Engineers and Computer Sciencists 2017 (IMECS 2017), Network Coding with Wait Time Insertion and Configuration for TCP Communications in Wireless Multi-hop Networks, Mar. 2017, Mar. 2017 - Mar. 2017
- Yosuke Mitsuzumi; Shuhei Aketa; Eiji Takimoto; Shoichi Saito; Koichi Mouri, International MultiConference of Engineers and Computer Sciencists 2017 (IMECS 2017), Improvement of Acknowledgment Mechanism for TCP with Network Coding, Mar. 2017, Mar. 2017 - Mar. 2017
- 新美 渓介; 瀧本 栄二; 毛利 公一; 齋藤 彰一, 情報処理学会研究報告, プロセス耐障害性向上システムOrthrosにおけるコンテナマイグレーション手法, 2017, 2017 - 2017
- 榑林 秀晃; 瀧本 栄二; 毛利 公一; 齋藤 彰一, 情報処理学会研究報告, RINArray:配列構造復元による侵入検知システムの精度向上, 2017, 2017 - 2017
- 黒竹 俊太; 明田 修平; 瀧本 栄二; 齋藤 彰一; 毛利 公一, 電子情報通信学会技術研究報告, 高速無線通信を想定したTCP再送オフロードのデバイスドライバによる実装とその評価, 2017, 2017 - 2017
- 河合 佑紀; 明田 修平; 半井 明大; 窪田 歩; 瀧本 栄二; 毛利 公一, 情報処理学会研究報告, AndroidアプリケーションにおけるRuntime Permission要求時の挙動調査, 2017, 2017 - 2017
- 山下 雄也; 明田 修平; 瀧本 栄二; 齋藤 彰一; 毛利 公一, コンピュータセキュリティシンポジウム2017(CSS2017)論文集, 仮想計算機モニタを用いたWindows 10 64bit環境におけるスタックトレースの実現, 2017, 2017 - 2017
- 福田 泰平; 明田 修平; 瀧本 栄二; 齋藤 彰一; 毛利 公一, コンピュータセキュリティシンポジウム2017(CSS2017)論文集, JDWPによる動的解析を利用したAndroidアプリケーションの外部モジュール利用実態調査, 2017, 2017 - 2017
- 松本 隆志; 明田 修平; 瀧本 栄二; 齋藤 彰一; 毛利 公一, 情報処理学会研究報告, 情報漏洩防止のためのTCPによるネットワークワイドなテイント追跡手法, 2017, 2017 - 2017
- 情報処理学会コンピュータシステム・シンポジウム論文集, 仮想計算機モニタXenにおけるRTOS向け割込み通知機構, 2011
Industrial Property Rights
- Patent right, 無線通信装置, 瀧本 栄二; 大山 卓; オユーンチメグ シャグダル; 三浦 龍; 小花 貞夫, 株式会社国際電気通信基礎技術研究所, 特願2008-282630, 01 Nov. 2008, 特開2010-108457, 13 May 2010, 特許第5412697号, 22 Nov. 2013, j_global
- Patent right, 無線装置およびそれを備えた無線ネットワーク, 瀧本 栄二; 大山 卓; 鈴木 龍太郎; 小花 貞夫, 株式会社国際電気通信基礎技術研究所, 特願2008-232136, 10 Sep. 2008, 特開2010-068206, 25 Mar. 2010, 特許第5396596号, 01 Nov. 2013, j_global
- Patent right, 端末装置、経路制御装置およびそれを備えた通信ネットワークシステム, シャグダル オユーンチメグ; 湯 素華; 谷口 典之; 玉井 森彦; 酒井 憲吾; 瀧本 栄二; 四方 博之; 長谷川 晃朗; 植田 哲郎; 小花 貞夫, 株式会社国際電気通信基礎技術研究所, 特願2009-200342, 31 Aug. 2009, 特開2011-055109, 17 Mar. 2011, 特許第5360655号, 13 Sep. 2013, j_global
- Patent right, 無線装置、およびそれを備えた無線ネットワーク, 大山 卓; 瀧本 栄二; シャグダル オユーンチメグ; ヌリ シラジ マハダド; 鈴木 龍太郎; 小花 貞夫, 株式会社国際電気通信基礎技術研究所, 特願2010-529680, 08 Jul. 2009, 特許第5325890号, 26 Jul. 2013, j_global
- Patent right, 端末装置およびそれを備えた通信ネットワークシステム, 酒井 憲吾; 玉井 森彦; 瀧本 栄二; シャグダル オユーンチメグ; 湯 素華; 谷口 典之; 四方 博之; 長谷川 晃朗; 植田 哲郎; 小花 貞夫, 株式会社国際電気通信基礎技術研究所, 特願2009-197730, 28 Aug. 2009, 特開2011-049929, 10 Mar. 2011, j_global
- Patent right, 無線装置、通信制御方法, 大山 卓; オユーンチメグ シャグダル; 瀧本 栄二; 三浦 龍; 小花 貞夫, 株式会社国際電気通信基礎技術研究所, 特願2008-288613, 11 Nov. 2008, 特開2010-118731, 27 May 2010, j_global
- Patent right, 無線装置, 瀧本 栄二; 大山 卓; 鈴木 龍太郎; 小花 貞夫, 株式会社国際電気通信基礎技術研究所, 特願2008-191691, 25 Jul. 2008, 特開2010-034624, 12 Feb. 2010, j_global
Research Projects
- 基盤研究(C), 01 Apr. 2022 - 31 Mar. 2026, 22K12037, 耐解析機能を逆用したマルウェアの活動抑制システムに関する研究開発, 瀧本 栄二, 日本学術振興会, 科学研究費助成事業 基盤研究(C), 広島工業大学, 4290000, 3300000, 990000, kaken
- Grant-in-Aid for Early-Career Scientists, 01 Apr. 2018 - 31 Mar. 2022, 18K18045, the realistic network oriented simulator for network security, 瀧本 栄二, Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Early-Career Scientists, 4160000, 3200000, 960000, 当該年では,コロナウイルス感染症による緊急事態宣言が2回も発令されたため,思うような進捗を出すことが困難であった.自宅就業を余儀なくされたため,シミュレータ開発用のPCが使用できないという問題があった.そこで,VirtualBoxを用いた仮想環境を使用してDDoS攻撃の再現を行った.
具体的な研究内容としては,前年度から行っているDDoS攻撃の高速・効率的な解消スキームについて,スキームで使用するメッセージ形式の策定と仮想環境上でのプロトタイプ実装を行った.メッセージ形式は,まず既存のセキュリティアラートプロトコルやThreat通知プロトコルを網羅的に調査した.次に,DDoS攻撃に関連するパケット,トラフィックの特定に最低限必要となる情報を文献を基に調査し,ミニマムセットを抽出し,メッセージ形式を定義した.メッセージの交換には,現在RFCで規格化が進んでいるDDoS Open Threat Signaling(DOTS)プロトコルをベースとし,DOTSでは想定されていないグローバルな情報集約・配信サーバを導入し,インターネットワイドなDDoS攻撃対策を迅速に行えるようにした.
プロトタイプ実装では,DDoS攻撃の検知からインターネットを構成するインターネットサービスプロバイダ(ISP)インターネットエクスチェンジポイント(IXP)上に用意したサーバへの攻撃通知の自動化と通知に応じた攻撃遮断と緩和機能をpythonで実装した.
プロトタイプ実装を用いた簡易評価の結果,DDoS攻撃の検知から対策が行われるまでの時間,およびネットワークのDDoS攻撃トラフィックの流通量を大きく減らすことが確認できた.
当該研究の成果については,2021年度にジャーナル投稿する予定である., kaken - Grant-in-Aid for Scientific Research (C), 01 Apr. 2015 - 31 Mar. 2020, 15K00112, Developing such a secure system with cooperation of a compiler and an operating system that can deter Information leakage caused by code rewriting attacks, KUNIEDA Yoshitoshi, Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (C), Ritsumeikan University, 4680000, 3600000, 1080000, Through this research, we intended to construct a final defense line against attacks intruding into user application programs. Specifically, we have proposed two types of feasible defense approach, (1) how to detect any spoofing system calls when issued by using the semantics and file permission level of the application, and (2) how to protect confidential information by putting each own access permission on creating data and propagating it on copying the data., url
- Grant-in-Aid for Young Scientists (B), 01 Apr. 2013 - 31 Mar. 2015, 25730065, Research of Distributed Autonomous Route Management Mechanism in Cognitive Multi-hop Environment, TAKIMOTO Eiji, Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Young Scientists (B), Ritsumeikan University, 3770000, 2900000, 870000, This research focused on the routing loop problem in cognitive multi-hop environment, and developed the distributed autonomous route management method as a countermeasure.
The method restrains routing loops by the hybrid manner, proactive control and reactive control, on each node which organizes a network.
Simulation results shows the proposed method restraints routing loops perfectly, and achieves stable communication speed., url
■Ⅲ.社会連携活動実績
1.公的団体の委員等(審議会、国家試験委員、他大学評価委員,科研費審査委員等)
- 電子情報通信学会センサネットワークとモバイルインテリジェンス(SeMI)研究専門委員会, 専門委員, Apr. 2019 - Present
- 電子情報通信学会, 常任査読委員, Jul. 2016 - Present
- システム制御情報学会, 編集委員, Jun. 2021 - May 2023, Society
- 情報処理学会MBL研究会, 運営委員, Apr. 2018 - Mar. 2022
- 電子情報通信学会, 英語論文誌D 編集委員, Jun. 2017 - May 2021
- 電子情報通信学会 モバイルネットワークとアプリケーション研究会, 専門委員, Jun. 2016 - Mar. 2019
- The 15th International Conference on Applied Cryptography and Network Security (ACNS2017), Organizing Committee, Jul. 2016 - Jul. 2017