Katsunari Yoshioka
Please Note
13 records found
1
Bits and Pieces
Piecing Together Factors of IoT Vulnerability Exploitation
Peering into the Darkness
The Use of UTRS in Combating DDoS Attacks
Bin there, target that
Analyzing the target selection of IoT vulnerabilities in malware binaries
No Spring Chicken
Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis
Disposable Botnets
Long-term Analysis of IoT Botnet Infrastructure
Pay the Piper
DDoS mitigation technique to deter financially-motivated attackers
Disposable botnets
Examining the anatomy of IoT botnet infrastructure
Cleaning Up the Internet of Evil Things
Real-World Evidence on ISP and Consumer Efforts to Remove Mirai