Follow
Yuichiro Kanzaki
Yuichiro Kanzaki
National Institute of Technology, Kumamoto College
Verified email at kumamoto-nct.ac.jp
Title
Cited by
Cited by
Year
Exploiting self-modification mechanism for program protection
Y Kanzaki, A Monden, M Nakamura, K Matsumoto
Proceedings 27th Annual International Computer Software and Applications …, 2003
1112003
Queue-based cost evaluation of mental simulation process in program comprehension
M Nakamura, A Monden, T Itoh, K Matsumoto, Y Kanzaki, H Satoh
Proceedings. 5th International Workshop on Enterprise Networking and …, 2004
392004
Code Artificiality: A Metric for the Code Stealth Based on an N-gram Model
Y Kanzaki, A Monden, C Collberg
1st International Workshop on Software Protection (SPRO 2015), 31-37, 2015
242015
A software protection method based on instruction camouflage
Y Kanzaki, A Monden, M Nakamura, KI Matsumoto
Electronics and Communications in Japan (Part III: Fundamental Electronic …, 2006
232006
Software obfuscation from crackers' viewpoint.
H Yamauchi, Y Kanzaki, A Monden, M Nakamura, K Matsumoto
ACST, 286-291, 2006
192006
A goal-oriented approach to software obfuscation
A Monden, M Nakamura, H Tamada
IJCSNS 8 (9), 59, 2008
152008
On preventing symbolic execution attacks by low cost obfuscation
T Seto, A Monden, Z Yücel, Y Kanzaki
2019 20th IEEE/ACIS International Conference on Software Engineering …, 2019
62019
A software protection method based on time-sensitive code and self-modification mechanism
Y Kanzaki, A Monden
Proceedings of the IASTED International Conference, 2010
52010
Protecting secret information in software processes and products
Y Kanzaki
Nara Institute of Science and Technology, 2006
52006
Pinpointing and hiding surprising fragments in an obfuscated program
Y Kanzaki, C Thomborson, A Monden, C Collberg
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-9, 2015
42015
Characterizing dynamics of information leakage in security-sensitive software process
Y Kanzaki, H Igaki, M Nakamura, A Monden, K Matsumoto
Conferences in Research and Practice in Information Technology Series 108 …, 2005
32005
Java クラスファイルからプログラム指紋を抽出する方法の提案
玉田春昭, 神崎雄一郎, 中村匡秀, 門田暁人, 松本健一
情報処理学会研究報告コンピュータセキュリティ (CSEC) 2003 (74 (2003-CSEC-022)), 127-133, 2003
32003
Evaluation of Software Obfuscation Based on the Randomness of Instructions.
A Futamura, A Monden, H Tamada, Y Kanzaki, M Nakamura, ...
Computer Software 30 (3), 18-24, 2013
22013
Quantitative analysis of information leakage in security-sensitive software processes
Y Kanzaki, H Igaki, M Nakamura, A Monden, K Matsumoto
Information and Media Technologies 1 (1), 121-133, 2006
12006
Reliability Evaluation Framework for Obfuscating Transformations in Program Code.
T Kitaoka, Y Kanzaki, T Ishio, K Shimari, K Matsumoto
コンピュータ ソフトウェア 40 (4), 4_37-4_46, 2023
2023
動的バースマークの自動抽出に向けて~ 比較ソフトウェアの入力からの実行系列の自動抽出~
C Alejandro, H Tamada, Y Kanzaki
2023
Software Reuse Detection Focusing on Text in Binary Code
S Watanabe, A Monden, H Tamada, Y Kanzaki
IEICE Technical Report; IEICE Tech. Rep. 116 (277), 79-84, 2016
2016
An instruction folding method to prevent reverse engineering in java platform
T Ohdo, H Tamada, Y Kanzaki, A Monden
2013 14th ACIS International Conference on Software Engineering, Artificial …, 2013
2013
Obfuscating Cipher Programs against Primary Attacking Tasks
H Yamauchi, Y Kanzaki, A Monden, M Nakamura, K Matsumoto
IEICE Technical Report; IEICE Tech. Rep. 105 (490), 25-30, 2005
2005
Quantitative Analysis of Information Leakage in Security-Sensitive Software Processes
Y Kanzaki, H Igaki, M Nakamura, A Monden, K Matsumoto
IPSJ Digital Courier 1, 322-334, 2005
2005
The system can't perform the operation now. Try again later.
Articles 1–20