Hybrid Cloud and Security Research Group - Papers and Publications


Academic Papers and Publications

2022

  • Application Integrity Protection on Kubernetes cluster based on Manifest Signature Verification
    Ruriko Kudo, Hirokuni Kitahara, Kugamoorthy Gajananan, Yuji Watanabe
    Journal of Information Processing, 2022, Volume 30, Pages 626-635
    ( IPSJ 論文誌「
    量子時代をみすえたコンピュータセキュリティ技術」特集 )
  • Enabling Kubernetes Resource Integrity Protection with Policy
    (ポリシーによる Kubernetes リソースのインテグリティ保護 の実現)
    Ruriko Kudo, Hirokuni Kitahara, Yuji Watanabe
    Multimedia, Distributed, Cooperative, and Mobile Symposium (DICOMO 2022)

2021

  • Real-time Container Integrity Monitoring for Large-Scale Kubernetes Cluster 
    Hirokuni Kitahara, Kugamoorthy Gajananan, Yuji Watanabe
    Special issue of "Computer Security Technologies for Realizing Society 5.0"
    ( IPSJ 論文誌「Society 5.0を実現するコンピュータセキュリティ技術」特集 )

  • Integrity Protection for Kubernetes Resource Based on Digital Signature
    Ruriko Kudo, Hirokuni Kitahara, Kugamoorthy Gajananan, Yuji Watanabe
    IEEE International Conference on Cloud Computing (IEEE CLOUD 2021)
  • Konveyor Move2Kube: Automated Replatforming of Applications to Kubernetes
    Padmanabha V. Seshadri, Harikrishnan Balagopal, Pablo Loyola, Akash Nayak, Chander Govindarajan, Mudit Verma, Ashok Pon Kumar, Amith Singhee
    IEEE International Conference on Cloud Computing (IEEE CLOUD 2021)
  • Integrity Protection for Kubernetes Resource based on Manifest Signature Verification
    (マニフェスト署名検証に基づくKubernetesリソースのインテグリティ保護 )
    Ruriko Kudo, Hirokuni Kitahara, Kugamoorthy Gajananan, Yuji Watanabe
    Computer Security Symposium (CSS 2021)

2020

  • Automating Domain Squatting Detection Using Representation Learning
    Pablo Loyola, Kugamoorthy Gajananan, Hirokuni Kitahara, Yuji Watanabe, Fumiko Satoh
    IEEE International Conference on Big Data (IEEE Big Data 2020)

  • Highly-Scalable Container Integrity Monitoring for Large-Scale Kubernetes Cluster
    Hirokuni Kitahara, Kugamoorthy Gajananan, Yuji Watanabe
    IEEE International Conference on Big Data (IEEE Big Data 2020)

  • Multi-factor-based Motion Detection for Server Rack Doors Left Open
    Ruriko Kudo, Yasuharu KatsunoFumiko Satoh
    IEEE International Conference on Services Computing (SCC 2020), pp. 457-459.

  • Blackbox Mutation Detection for Runtime Application Integrity on Kubernetes Cluster
    (アプリケーションインテグリティのための Kubernetes クラスタにおけるブ ラックボックス型変更検出
    )
    Hirokuni Kitahara, Yuji Watanabe 
    Symposium on Cryptography and Information Security (SCIS 2020)

2019

  • Towards Federated Graph Learning for Collaborative Financial Crimes Detection
    Toyotaro Suzumura, Yi Zhou, Natahalie Baracaldo, Guangnan Ye, Keith Houck, Ryo Kawahara, Ali Anwar, Lucia Larise Stavarache, Yuji Watanabe, Pablo Loyola, Daniel Klyashtorny, Heiko Ludwig, Kumar Bhaskaran
    arXiv e-prints, arXiv:1909.12946
  • An Edit-centric Approach for Wikipedia Article Quality Assessment
    Edison Marrese-Taylor, Pablo Loyola, Yutaka Matsuo
    Proceedings of the 5th Workshop on Noisy User-generated Text (W-NUT 2019), pp. 381-386.

2018

  • Villani at SemEval-2018 Task 8: Semantic Extraction from Cybersecurity Reports using Representation Learning
    Pablo Loyola, Kugamoorthy Gajananan, Yuji Watanabe, Fumiko Satoh

    Proceedings of The 12th International Workshop on Semantic Evaluation, pp. 885-889.
  • Modeling Sentiment Polarity in Support Ticket Data for Predicting Cloud Service Subscription Renewal
    Kugmoorthy Gajananan, Pablo Loyola, Yasuharu Katsuno, Asim Munawar, Trent Scott, Fumiko Satoh

    IEEE International Conference on Services Computing (SCC 2018), pp. 49-56. [Best Paper Award]
  • Bug Localization by Learning to Rank and Represent Bug Inducing Changes
    Pablo Loyola, Kugmoorthy Gajananan, Fumiko Satoh
    International Conference on Information and Knowledge Management (CIKM), pp. 657-665.
  • A Unified Framework for Specifying Cost Models of IT Service Offerings
    Kugamoorthy Gajananan, Aly Megahed, Shubhi Asthana and Taiga Nakamura
    INFORMS International Conference Service Science (CSS), pp. 151-160.
  • Generative Model of Combosquatting Domain Names and Evaluation
    (Combosquattingドメインネームの生成モデルとその評価)
    Hirokuni Kitahara, Yuji Watanabe
    Computer Security Symposium (CSS 2018)
     
  • ChatBot System for Vulnerability Detecting using Environmental Metrics
    (環境情報を用いた脆弱性検出のチャットボット)

    Alisa Arno, Ai Ishida, Ruriko Kudo, Yuji Watanabe
    Computer Security Symposium (CSS 2018)

2017

  • Leveraging the Serverless Architecture for Securing Linux Containers
    Nilton Bila, Paolo Dettori, Ali Kanso, Yuji Watanabe, Alaa Youssef
    IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 401-404.
  • A Method for Estimating Annual Cost Reduction of IT Service Deals
    Kugamoorthy Gajananan, Aly Megahed, Shubhi Asthana, Valeria Becker, Taiga Nakamura, Mark Smith
    IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), pp. 45-50.
  • A Method for Selecting Peer Deals in IT Service Contracts
    Aly Megahed, Shubhi Asthana, Valeria Becker, Taiga Nakamura, Kugamoorthy Gajananan

    IEEE International Conference on Artificial Intelligence and Mobile Services (AIMS), pp. 1-7.
  • A Cognitive Prioritization for Reports Generated in Resource Constrained Applications
    Shubhi Asthana, Aly Megahed, Valeria Becker, Taiga Nakamura, Kugamoorthy Gajananan

    IEEE International Conference on Services Computing (SCC), pp. 418-425.
  • Edge-side Security Event Management for Plug-and-Play IoT
    Fumiko Satoh, Takuya Mishina, Naoto Sato, Yoichi Hatsutori

    Symposium on Cryptography and Information Security (SCIS 2017)
  • クラウド上での安全なコンテナー活用にむけたセキュリティ分析の自動化
    Yuji Watanabe, Ai Ishida
    Symposium on Cryptography and Information Security (SCIS 2017)

2016

  • Vibration-base Key Exchange among Multiple Smart Devices on the Desk
    Alisa Arno, Kentaroh Toyoda, Yuji Watanabe, Iwao Sasase, P. Takis Mathiopoulos
    Image Processing and Communications 21(2), 33-42. 
  • Security, Compliance, and Agile Deployment of Personal Identifiable Information Solutions on a Public Cloud
    Katsuno Yasuharu, Kundu Ashish, Das Koushik K, Takahashi Hitomi, Schloss Robert, Dey Prasenjit, Mohania Mukesh
    IEEE 9th International Conference on Cloud Computing (CLOUD), pp. 359-366.
  • Optimizing Schedule for Parallel Software Deployments Based on Profiles of Network Activity and Installation Time in Cloud Environments
    Hitomi Takahashi,  Yasuharu Katsuno

    IEEE 9th International Conference on Cloud Computing (CLOUD), pp. 742-749.
  • Top-Down Pricing of IT Services Deals with Recommendation for Missing Values of Historical and Market Data
    Aly Megahed, Kugamoorthy Gajananan, Shubhi Asthana, Valeria Becker, Mark Smith, Taiga Nakamura
    International Conference on Service-Oriented Computing, pp. 745-760.
  • A Top-Down Pricing Algorithm for IT Service Contracts Using Lower Level Service Data
    Kugamoorthy Gajananan, Aly Megahed, Mari Abe, Taiga Nakamura, Mark Smith
    IEEE International Conference on Services Computing (SCC), pp. 720-727.
  • Threat Scenario Analysis of a SIEM System for IoT Devices
    (IoT向けSIEMシステム設計のための脅威シナリオ検討)
    Takuya Mishina, Kouichi Ono, Seiji Muntetoh, Naoto Sato, Yoichi Hatsutori, Fumiko Satoh
    第73回CSEC研究発表会
  • Automated Vulnerability Evaluation System for Containers on Cloud
    (クラウド上のコンテナサービスに対する パッケージ脆弱性自動評価システム)
    Ai Ishida, Yuji Watanabe
    Computer Security Symposium (CSS)

* Please refer the papers before 2015 in member's page.