default search action
Kenji Kono
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c64]Keita Suzuki, Kenta Ishiguro, Kenji Kono:
Balancing Analysis Time and Bug Detection: Daily Development-friendly Bug Detection in Linux. USENIX ATC 2024: 493-508 - 2023
- [j36]Kenta Ishiguro, Naoki Yasuno, Pierre-Louis Aublin, Kenji Kono:
Revisiting VM-Agnostic KVM vCPU Scheduler for Mitigating Excessive vCPU Spinning. IEEE Trans. Parallel Distributed Syst. 34(10): 2615-2628 (2023) - [c63]Masanobu Nozawa, Satoshi Imamura, Kenji Kono:
Accelerating Multilingual Applications with In-memory Array Sharing. IEEE Big Data 2023: 255-262 - [c62]Mana Senuki, Kenta Ishiguro, Kenji Kono:
Nioh-PT: Virtual I/O Filtering for Agile Protection against Vulnerability Windows. SAC 2023: 1293-1300 - 2022
- [c61]Soichiro Sakamoto, Keita Suzuki, Kenji Kono:
Crash Injection to Persistent Memory for Recovery Code Validation. ISSRE Workshops 2022: 178-184 - 2021
- [j35]Takafumi Kubota, Kenji Kono:
Native Build System for Unity Builds with Sophisticated Bundle Strategies. IEICE Trans. Inf. Syst. 104-D(1): 126-137 (2021) - [j34]Asraa Abdulrazak Ali Mardan, Kenji Kono:
Alleviating File System Journaling Problem in Containers for DBMS Consolidation. IEICE Trans. Inf. Syst. 104-D(7): 931-940 (2021) - [c60]Kenta Ishiguro, Naoki Yasuno, Pierre-Louis Aublin, Kenji Kono:
Mitigating excessive vCPU spinning in VM-agnostic KVM. VEE 2021: 139-152 - 2020
- [j33]Takafumi Kubota, Naohiro Aota, Kenji Kono:
Logging Inter-Thread Data Dependencies in Linux Kernel. IEICE Trans. Inf. Syst. 103-D(7): 1633-1646 (2020) - [j32]Kenta Ishiguro, Kenji Kono:
Instruction Filters for Mitigating Attacks on Instruction Emulation in Hypervisors. IEICE Trans. Inf. Syst. 103-D(7): 1660-1671 (2020) - [j31]Asraa Abdulrazak Ali Mardan, Kenji Kono:
When the Virtual Machine Wins over the Container: DBMS Performance and Isolation in Virtualized Environments. J. Inf. Process. 28: 369-377 (2020) - [c59]Keita Suzuki, Takafumi Kubota, Kenji Kono:
Detecting Struct Member-Related Memory Leaks Using Error Code Analysis in Linux Kernel. ISSRE Workshops 2020: 329-335 - [c58]Ko Natori, Takafumi Kikuchi, Kenji Kono:
Poster: No More Slow Messages: Programmable Packet Handling in Hard IRQ. SRDS 2020: 329-331 - [p1]Kenji Kono, Kenichi Kourai, Hiroshi Yamada:
Application to Operating Systems. Handbook of Software Aging and Rejuvenation 2020: 229-259
2010 – 2019
- 2019
- [j30]Naohiro Aota, Kenji Kono:
File Systems are Hard to Test - Learning from Xfstests. IEICE Trans. Inf. Syst. 102-D(2): 269-279 (2019) - [c57]Takafumi Kubota, Yusuke Suzuki, Kenji Kono:
To unify or not to unify: a case study on unified builds (in WebKit). CC 2019: 42-52 - [c56]Atsutoshi Osuka, Kenji Kono:
A Framework for Building Linux-Based Single-Purpose Appliances Optimized for the Cloud. CloudCom 2019: 305-308 - [c55]Manabu Sugimoto, Takafumi Kubota, Kenji Kono:
Short-Liveness of Error Propagation in Kernel Can Improve Operating Systems Availability. DSN (Supplements) 2019: 23-24 - [c54]Keita Suzuki, Takafumi Kubota, Kenji Kono:
Detecting and Analyzing Year 2038 Problem Bugs in User-Level Applications. PRDC 2019: 65-74 - 2018
- [j29]Yusuke Suzuki, Hiroshi Yamada, Shinpei Kato, Kenji Kono:
Cooperative GPGPU Scheduling for Consolidating Server Workloads. IEICE Trans. Inf. Syst. 101-D(12): 3019-3037 (2018) - [c53]Sho Yuhara, Yusuke Suzuki, Kenji Kono:
An Application Framework for Migrating GPGPU Cloud Applications. CloudCom 2018: 62-66 - [c52]Kenta Ishiguro, Kenji Kono:
Hardening Hypervisors against Vulnerabilities in Instruction Emulators. EuroSec@EuroSys 2018: 7:1-7:6 - 2017
- [c51]Junya Ogasawara, Kenji Kono:
Nioh: Hardening The Hypervisor by Filtering Illegal I/O Requests to Virtual Devices. ACSAC 2017: 542-552 - [c50]Yusuke Suzuki, Hiroshi Yamada, Shinpei Kato, Kenji Kono:
GLoop: an event-driven runtime for consolidating GPGPU applications. SoCC 2017: 80-93 - 2016
- [j28]Takeshi Yoshimura, Kenji Kono:
A Case for Static Analysis of Linux to Find Faults in Interrupt Request Handlers. J. Inf. Process. 24(3): 573-582 (2016) - [j27]Gernot Heiser, Kenji Kono, KyoungSoo Park, Robbert van Renesse:
Report on the Asia-Pacific Systems Workshop 2015 (APSys'15). ACM SIGOPS Oper. Syst. Rev. 50(1): 1-2 (2016) - [j26]Yusuke Suzuki, Shinpei Kato, Hiroshi Yamada, Kenji Kono:
GPUvm: GPU Virtualization at the Hypervisor. IEEE Trans. Computers 65(9): 2752-2766 (2016) - [c49]Asraa Abdulrazak Ali Mardan, Kenji Kono:
Containers or Hypervisors: Which Is Better for Database Consolidation? CloudCom 2016: 564-571 - 2015
- [j25]Yusuke Takamatsu, Kenji Kono:
Detection of Visual Clickjacking Vulnerabilities in Incomplete Defenses. J. Inf. Process. 23(4): 513-524 (2015) - [e1]Kenji Kono, Takahiro Shinagawa:
Proceedings of the 6th Asia-Pacific Workshop on Systems, APSys 2015, Tokyo, Japan, July 27-28, 2015. ACM 2015, ISBN 978-1-4503-3554-6 [contents] - 2014
- [j24]Hiroshi Yamada, Shuntaro Tonosaki, Kenji Kono:
Efficient Update Activation for Virtual Machines in IaaS Cloud Computing Environments. IEICE Trans. Inf. Syst. 97-D(3): 469-479 (2014) - [j23]Hiroshi Yamada, Kenji Kono:
A VMM-Level Approach to Shortening Downtime of Operating Systems Reboots in Software Updates. IEICE Trans. Inf. Syst. 97-D(10): 2663-2675 (2014) - [j22]Masaki Kasuya, Kenji Kono:
Screening Legitimate and Fake/Crude Antivirus Software. Inf. Media Technol. 9(2): 200-208 (2014) - [c48]Hikaru Horie, Masato Asahara, Hiroshi Yamada, Kenji Kono:
Minimizing WAN Communications in Inter-datacenter Key-Value Stores. IEEE CLOUD 2014: 490-497 - [c47]Akane Koto, Kenji Kono, Hiroshi Yamada:
A Guideline for Selecting Live Migration Policies and Implementations in Clouds. CloudCom 2014: 226-233 - [c46]Takeshi Yoshimura, Kenji Kono:
Who Writes What Checkers? - Learning from Bug Repositories. HotDep 2014 - [c45]Nobuo Kikuchi, Takeshi Yoshimura, Ryo Sakuma, Kenji Kono:
Do Injected Faults Cause Real Failures? A Case Study of Linux. ISSRE Workshops 2014: 174-179 - [c44]Kenji Kono, Shunsuke Miyahara, Hiroshi Yamada, Takeshi Yoshimura:
FoxyFeed: Forging Device-Level Asynchronous Events for Kernel Development. PRDC 2014: 145-154 - [c43]Yusuke Takamatsu, Kenji Kono:
Clickjuggler: Checking for incomplete defenses against clickjacking. PST 2014: 224-231 - [c42]Yusuke Suzuki, Shinpei Kato, Hiroshi Yamada, Kenji Kono:
GPUvm: Why Not Virtualizing GPUs at the Hypervisor? USENIX ATC 2014: 109-120 - 2013
- [j21]Hiroki Shirayanagi, Hiroshi Yamada, Kenji Kono:
Honeyguide: A VM Migration-Aware Network Topology for Saving Energy Consumption in Data Center Networks. IEICE Trans. Inf. Syst. 96-D(9): 2055-2064 (2013) - [j20]Yusuke Takamatsu, Yuji Kosuga, Kenji Kono:
Automatically Checking for Session Management Vulnerabilities in Web Applications. Inf. Media Technol. 8(2): 594-604 (2013) - [j19]Takeshi Yoshimura, Hiroshi Yamada, Kenji Kono:
Using Fault Injection to Analyze the Scope of Error Propagation in Linux. Inf. Media Technol. 8(3): 655-664 (2013) - [c41]Hiroshi Yamada, Takumi Sakamoto, Hikaru Horie, Kenji Kono:
Request dispatching for cheap energy prices in cloud data centers. CloudNet 2013: 210-213 - [c40]Hikaru Horie, Masato Asahara, Hiroshi Yamada, Kenji Kono:
Pangaea: A Single Key Space, Inter-datacenter Key-Value Store. ICPADS 2013: 434-435 - [c39]Hiroshi Yamada, Kenji Kono:
Traveling forward in time to newer operating systems using ShadowReboot. VEE 2013: 121-130 - 2012
- [j18]Satoshi Iwata, Kenji Kono:
Clustering Performance Anomalies Based on Similarity in Processing Time Changes. Inf. Media Technol. 7(1): 141-152 (2012) - [j17]Hikaru Horie, Masato Asahara, Hiroshi Yamada, Kenji Kono:
MashCache: Taming Flash Crowds by Using Their Good Features. Inf. Media Technol. 7(2): 601-613 (2012) - [j16]Kazuya Yamakita, Hiroshi Yamada, Kenji Kono:
Lightweight Recovery from Kernel Failures Using Phase-based Reboot. Inf. Media Technol. 7(2): 639-650 (2012) - [c38]Takumi Sakamoto, Hiroshi Yamada, Hikaru Horie, Kenji Kono:
Energy-Price-Driven Request Dispatching for Cloud Data Centers. IEEE CLOUD 2012: 974-976 - [c37]Akane Koto, Hiroshi Yamada, Kei Ohmura, Kenji Kono:
Towards unobtrusive VM live migration for cloud computing platforms. APSys 2012: 7 - [c36]Takeshi Yoshimura, Hiroshi Yamada, Kenji Kono:
Is Linux Kernel Oops Useful or Not? HotDep 2012 - [c35]Hiroki Shirayanagi, Hiroshi Yamada, Kenji Kono:
Honeyguide: A VM migration-aware network topology for saving energy consumption in data center networks. ISCC 2012: 460-467 - [c34]Yusuke Takamatsu, Yuji Kosuga, Kenji Kono:
Automated detection of session management vulnerabilities in web applications. PST 2012: 112-119 - 2011
- [j15]Takahisa Kitagawa, Miyuki Hanaoka, Kenji Kono:
A State-Aware Protocol Fuzzer Based on Application-Layer Protocols. IEICE Trans. Inf. Syst. 94-D(5): 1008-1017 (2011) - [j14]Yuji Kosuga, Miyuki Hanaoka, Kenji Kono:
Generating Effective Attacks for Efficient and Precise Penetration Testing against SQL Injection. Inf. Media Technol. 6(2): 420-433 (2011) - [j13]Toshinori Kojima, Masato Asahara, Kenji Kono, Ai Hayakawa:
Practical Approach to Integrating Network Coordinates with Distributed Hash Tables. Inf. Media Technol. 6(2): 434-449 (2011) - [j12]Yoshihisa Abe, Hiroshi Yamada, Kenji Kono:
User-level Enforcement of Appropriate Background Process Execution. Inf. Media Technol. 6(2): 461-480 (2011) - [c33]Hiroshi Yamada, Kenji Kono:
Traveling forward in time to newer operating systems using ShadowReboot. APSys 2011: 12 - [c32]Shuntaro Tonosaki, Hiroshi Yamada, Kenji Kono:
Efficiently Synchronizing Virtual Machines in Cloud Computing Environments. CloudCom 2011: 154-162 - [c31]Kazuya Yamakita, Hiroshi Yamada, Kenji Kono:
Phase-based reboot: Reusing operating system execution phases for cheap reboot-based recovery. DSN 2011: 169-180 - [c30]Satoshi Iwata, Kenji Kono:
Clustering performance anomalies in web applications based on root causes. ICAC 2011: 221-224 - [c29]Takeshi Yoshimura, Hiroshi Yamada, Kenji Kono:
Can Linux be Rejuvenated without Reboots? WoSAR@ISSRE 2011: 50-55 - 2010
- [j11]Masato Asahara, Kenji Kono, Toshinori Kojima, Ai Hayakawa:
P2P-Based Approach to Finding Replica Server Locations for Alleviating Flash Crowds. IEICE Trans. Inf. Syst. 93-D(11): 3027-3037 (2010) - [j10]Ai Hayakawa, Masato Asahara, Kenji Kono, Toshinori Kojima:
A Strategy for Efficient Update Propagation on Peer-to-Peer Based Content Distribution Networks. Inf. Media Technol. 5(4): 1226-1240 (2010) - [c28]Satoshi Iwata, Kenji Kono:
Narrowing Down Possible Causes of Performance Anomaly in Web Applications. EDCC 2010: 185-190 - [c27]Takahisa Kitagawa, Miyuki Hanaoka, Kenji Kono:
AspFuzz: A state-aware protocol fuzzer based on application-layer protocols. ISCC 2010: 202-208 - [c26]Yusuke Takamatsu, Yuji Kosuga, Kenji Kono:
Automated detection of session fixation vulnerabilities. WWW 2010: 1191-1192
2000 – 2009
- 2009
- [j9]Toshihiro Yokoyama, Miyuki Hanaoka, Makoto Shimamura, Kenji Kono, Takahiro Shinagawa:
Reducing Security Policy Size for Internet Servers in Secure Operating Systems. IEICE Trans. Inf. Syst. 92-D(11): 2196-2206 (2009) - [j8]Tetsuya Yoshida, Hiroshi Yamada, Kenji Kono:
Using a Virtual Machine Monitor to Slow Down CPU Speed for Embedded Time-Sensitive Software Testing. Inf. Media Technol. 4(4): 870-884 (2009) - [c25]Miyuki Hanaoka, Kenji Kono, Toshio Hirotsu:
Performance Improvement by Means of Collaboration between Network Intrusion Detection Systems. CNSR 2009: 262-269 - [c24]Makoto Shimamura, Kenji Kono:
Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks. DIMVA 2009: 68-87 - [c23]Ai Hayakawa, Masato Asahara, Kenji Kono, Toshinori Kojima:
Efficient Update Propagation by Speculating Replica Locations on Peer-to-Peer Networks. ICPADS 2009: 422-431 - [c22]Toshinori Kojima, Masato Asahara, Kenji Kono, Ai Hayakawa:
Embedding Network Coordinates into the Heart of Distributed Hash Tables. Peer-to-Peer Computing 2009: 155-158 - [c21]Toshihiro Yokoyama, Miyuki Hanaoka, Makoto Shimamura, Kenji Kono:
Simplifying security policy descriptions for internet servers in secure operating systems. SAC 2009: 326-333 - [c20]Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimoto, Kazumasa Omote, Shoichi Hasegawa, Takashi Horie, Manabu Hirano, Kenichi Kourai, Yoshihiro Oyama, Eiji Kawai, Kenji Kono, Shigeru Chiba, Yasushi Shinjo, Kazuhiko Kato:
BitVisor: a thin hypervisor for enforcing i/o device security. VEE 2009: 121-130 - 2008
- [j7]Makoto Shimamura, Miyuki Hanaoka, Kenji Kono:
Filtering False Positives Based on Server-Side Behaviors. IEICE Trans. Inf. Syst. 91-D(2): 264-276 (2008) - [j6]Hiroshi Yamada, Kenji Kono:
DiscNice: User-level Regulation of Disk Bandwidth. Inf. Media Technol. 3(1): 37-52 (2008) - [j5]Akiyoshi Sugiki, Kenji Kono, Hideya Iwasaki:
Tuning mechanisms for two major parameters of Apache web servers. Softw. Pract. Exp. 38(12): 1215-1240 (2008) - [c19]Yoshihisa Abe, Hiroshi Yamada, Kenji Kono:
Enforcing appropriate process execution for exploiting idle resources from outside operating systems. EuroSys 2008: 27-40 - [c18]A. Tanoue, Makoto Shimamura, Miyuki Hanaoka, Kenji Kono:
FlexBox: Sandboxing internet servers based on layer-7 contexts. ISCC 2008: 386-391 - 2007
- [j4]Miyuki Hanaoka, Makoto Shimamura, Kenji Kono:
TCP Reassembler for Layer7-Aware Network Intrusion Detection/Prevention Systems. IEICE Trans. Inf. Syst. 90-D(12): 2019-2032 (2007) - [c17]Yuji Kosuga, Kenji Kono, Miyuki Hanaoka, Miho Hishiyama, Yu Takahama:
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection. ACSAC 2007: 107-117 - [c16]Masato Asahara, Akio Shimada, Hiroshi Yamada, Kenji Kono:
Finding candidate spots for replica servers based on demand fluctuation. ICPADS 2007: 1-10 - [c15]Miyuki Hanaoka, Kenji Kono, Makoto Shimamura, Satoshi Yamaguchi:
An Efficient TCP Reassembler Mechanism for Layer7-aware Network Intrusion Detection/Prevention Systems. ISCC 2007: 79-86 - [c14]Hiroshi Yamada, Kenji Kono:
FoxyTechnique: tricking operating system policies with a virtual machine monitor. VEE 2007: 55-64 - 2006
- [j3]Masakuni Agetsuma, Kenji Kono, Hideya Iwasaki, Takashi Masuda:
Basic mechanism of elastic server groups - Dynamic adaptation to load fluctuation. Syst. Comput. Jpn. 37(8): 24-37 (2006) - [c13]Makoto Shimamura, Kenji Kono:
Using Attack Information to Reduce False Positives in Network IDS. ISCC 2006: 386-393 - [c12]Hiroshi Yamada, Kenji Kono:
User-level disk-bandwidth control for resource-borrowing network applications. NOMS 2006 - 2005
- [j2]Masakuni Agetsuma, Kenji Kono, Hideya Iwasaki, Takashi Masuda:
Exploiting mobile code for user-transparent distribution of application-level protocols. Syst. Comput. Jpn. 36(1): 44-57 (2005) - [c11]Akiyoshi Sugiki, Kenji Kono, Hideya Iwasaki:
A Practical Approach to Automatic Parameter-Tuning of Web Servers. ASIAN 2005: 146-159 - 2004
- [j1]Kôki Abe, Takamichi Tateoka, Mitsugu Suzuki, Youichi Maeda, Kenji Kono, Tan Watanabe:
An integrated laboratory for processor organization, compiler design, and computer networking. IEEE Trans. Educ. 47(3): 311-320 (2004) - [c10]Takahiro Shinagawa, Kenji Kono:
Implementing a secure setuid program. Parallel and Distributed Computing and Networks 2004: 301-309 - 2003
- [c9]Wataru Kaneko, Kenji Kono, Kentaro Shimizu:
Preemptive Resource Management: Defending against Resource Monopolizing DoS. Applied Informatics 2003: 662-669 - [c8]Masakuni Agetsuma, Kenji Kono, Hideya Iwasaki, Takashi Masuda:
Self-configurable Mirror Servers for Automatic Adaptation to Service Demand Fluctuation. ASIAN 2003: 18-32 - 2002
- [c7]Takahiro Shinagawa, Kenji Kono, Takashi Masuda:
Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains. ISSS 2002: 172-184 - [c6]Takamichi Tateoka, Mitsugu Suzuki, Kenji Kono, Youichi Maeda, Kôki Abe:
An integrated laboratory for computer architecture and networking. WCAE 2002: 21 - 2001
- [c5]Takeshi Morimoto, Kenji Kono, Ikuo Takeuchi:
YabAI: The First Rescue Simulation League Champion. RoboCup 2001: 49-59 - 2000
- [c4]Kenji Kono, Takashi Masuda:
Efficient RMI: Dynamic Specialization of Object Serialization. ICDCS 2000: 308-315
1990 – 1999
- 1999
- [c3]Masahiko Takahashi, Kenji Kono, Takashi Masuda:
Efficient Kernel Support of Fine-Grained Protection Domains for Mobile Code. ICDCS 1999: 64-73 - 1996
- [c2]Kenji Kono, Kazuhiko Kato, Takashi Masuda:
An Implementation Method of Migratable Distributed Objects Using an RPC Technique Integrated with Virtual Memory Management. ECOOP 1996: 295-315 - 1994
- [c1]Kenji Kono, Kazuhiko Kato, Takashi Masuda:
Smart Remote Procedure Calls: Transparent Treatment of Remote Pointers. ICDCS 1994: 142-151
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint