Kuniyasu Suzaki
Kuniyasu Suzaki
AIST: National Institute of Advanced Industrial Science and Technology
Verified email at aist.go.jp
TitleCited byYear
Memory deduplication as a threat to the guest OS
K Suzaki, K Iijima, T Yagi, C Artho
Proceedings of the Fourth European Workshop on System Security, 1-6, 2011
1282011
Xenprobes, a lightweight user-space probing framework for xen virtual machine
NA Quynh, K Suzaki
USENIX annual technical conference proceedings, 2007
392007
Input and output control means for computer system storage and a software execution method using same
K Suzaki
US Patent 7,240,239, 2007
362007
Software side channel attack on memory deduplication
K Suzaki, K Iijima, T Yagi, C Artho
ACM Symposium on Operating Systems Principles (SOSP 2011), Poster session, 2011
302011
Why do software packages conflict?
C Artho, K Suzaki, R Di Cosmo, R Treinen, S Zacchiroli
2012 9th IEEE Working Conference on Mining Software Repositories (MSR), 141-150, 2012
292012
Multi-tasking method on parallel computers which combines a contiguous and a non-contiguous processor partitioning algorithm
K Suzaki, H Tanuma, S Hirano, Y Ichisugi, C Connelly, M Tsukamoto
International Workshop on Applied Parallel Computing, 641-650, 1996
291996
Job scheduling strategies for networks of workstations
BB Zhou, RP Brent, D Walsh, K Suzaki
Workshop on Job Scheduling Strategies for Parallel Processing, 143-157, 1998
221998
Implementing the Combination of Time Sharing and Space Sharing on AP/Linux
K Suzaki, D Walsh
Workshop on Job Scheduling Strategies for Parallel Processing, 83-97, 1998
201998
Virt-ICE: Next-generation debugger for malware analysis
NA Quynh, K Suzaki
Black Hat USA, 2010
182010
OS Circular: Internet Client for Reference.
K Suzaki, T Yagi, K Iijima, AQ Nguyen
LISA 7, 1-12, 2007
172007
Moving from Logical Sharing of Guest OS to Physical Sharing of Deduplication on Virtual Machine.
K Suzaki, T Yagi, K Iijima, AQ Nguyen, C Artho, Y Watanebe
HotSec, 2010
142010
Time sharing systems that use a partitioning algorithm on mesh-connected parallel computers
K Suzaki
Proc. Ninth International Conference on Distributed Computing Systems, 268-275, 1996
141996
Implementation of a memory disclosure attack on memory deduplication of virtual machines
K Suzaki, K Iijima, T Yagi, C Artho
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2013
132013
Effects of memory randomization, sanitization and page cache on memory deduplication
K Suzaki, K Iijima, T Yagi, C Artho
European Workshop on System Security (EuroSec 2012), 2012
112012
File system (Ext2) optimization for compressed loopback device
K Kitagawa
Linux-Kongress, Sept. 2006 8, 2006
92006
Suspend and resume method of computer job
K Suzaki
US Patent App. 10/101,100, 2004
92004
Kernel memory protection by an insertable hypervisor which has VM introspection and stealth breakpoints
K Suzaki, T Yagi, K Kobara, T Ishiyama
International Workshop on Security, 48-61, 2014
82014
Network Transferable Computer
K Suzaki
presentation at University of Illinois at Urbana Champaign, presented Jan 24, 2001
82001
KNOPPIX/Math: Portable and distributable collection of mathematical software and free documents
T Hamada, K Suzaki, K Iijima, A Shikoda
International Congress on Mathematical Software, 385-390, 2006
72006
Adaptable load balancing using network transferable computer associated with mobile IP
M Hisayuki, S Inoue, Y Kakuda, K Toda, K Suzaki
23rd International Conference on Distributed Computing Systems Workshops …, 2003
72003
The system can't perform the operation now. Try again later.
Articles 1–20