Takahiro Kasama
National Institute of Information and Communications Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Takahiro Kasama.
recent advances in intrusion detection | 2016
Akira Yokoyama; Kou Ishii; Rui Tanabe; Yinmin Papa; Katsunari Yoshioka; Tsutomu Matsumoto; Takahiro Kasama; Daisuke Inoue; Michael Brengel; Michael Backes; Christian Rossow
To cope with the ever-increasing volume of malware samples, automated program analysis techniques are inevitable. Malware sandboxes in particular have become the de facto standard to extract a program’s behavior. However, the strong need to automate program analysis also bears the risk that anyone that can submit programs to learn and leak the characteristics of a particular sandbox.
symposium on applications and the internet | 2012
Takahiro Kasama; Katsunari Yoshioka; Daisuke Inoue; Tsutomu Matsumoto
Modern malware often changes their runtime behaviors in each execution to tolerate against malware analyses and detections. For example, when a malware copies itself on a file system, it can randomly determine its file name for avoiding the detections. Another example is that when a malware tries to connect its command and control server, it randomly chooses a domain name from a hard-coded domain name list to avoid being blocked by a static blacklist of malicious domain names. We assume that such random behaviors are unnecessary for benign software. Therefore the behaviors can be clues to distinguish malware from benign software. In this paper, we propose a novel malware detection method based on investigating the behavioral difference in multiple executions of suspicious software. Our proposed method conducts dynamic analysis on an executable file multiple times in the same sandbox environment so as to obtain plural lists of API call sequence, and then compares the lists to find the difference between the multiple executions. In the experiments with 5,697 malware samples and 819 benign software samples, the proposed method could detect about 67% malware samples and the false positive rate is about 1%. Moreover, the proposed method could detect 117 malware samples out of 273 malware samples which could not be detected by the antivirus software. Therefore we confirmed the possibility the proposed method may be able to improve the accuracy of malware detection utilizing in combination with other existing methods.
Journal of Information Processing | 2015
Mitsuhiro Hatada; Mitsuaki Akiyama; Takahiro Matsuki; Takahiro Kasama
Substantial research has been conducted to develop proactive and reactive countermeasures against malware threats. Gathering and analyzing data are widely accepted approaches for accelerating the research towards understanding malware threats. However, collecting useful data is not an easy task for individuals or new researchers owing to several technical barriers, such as conducting honeypot operations securely. The anti-Malware engineering WorkShop (MWS) was organized in 2008 to fill this gap; since then, we have shared datasets that are useful for accelerating the data-driven anti-malware research in Japan. This paper provides the definitive collection of the MWS Datasets that are a collection of different datasets for use in anti-malware research. We also report the effectiveness of the MWS Datasets from the viewpoint of published research papers and how to empower some of the papers by using the MWS Datasets. Furthermore, our discussion about issues of the MWS Datasets reveal the future directions for accelerating anti-malware research from the perspectives of dataset collection activity and dataset use activity.
Journal of Information Processing | 2012
Takahiro Kasama; Katsunari Yoshioka; Tsutomu Matsumoto; Masaya Yamagata; Masashi Eto; Daisuke Inoue; Koji Nakao
Recent malware communicate with remote hosts in the Internet for receiving C&C commands and updating themselves, etc., and their behaviors can be diverse depending on the behaviors of the remote hosts. Thus, when analyzing these malware by sandbox analysis, it is important not only to focus behaviors of a malware sample itself but also those of the remote servers that are controlled by attackers. A simple solution to achieve this is to observe the live sample by an Internet-connected sandbox for a long period of time. However, since we do not know when these servers will send meaningful responses, we need to keep the sample being executed in the sandbox, which is indeed a costly operation. Also, leaving the live malware in the Internet-connected sandbox increases the risk that its attacks spill out of the sandbox and induce secondary infections. In this paper, we propose a novel sandbox analysis method using a dummy client, an automatically generated lightweight script to interact with the remote servers instead of the malware sample itself. In the proposed method, at first we execute a malware sample in the sandbox that is connected to the real Internet and Internet Emulator. Secondly, we inspect the traffic observed in the sandbox and filter out highrisk communications. The rest of the traffic data is then used by the dummy client to interact with the remote servers instead of the sample itself and effectively collects the responses from the servers. The collected server responses are then fed back to the Internet Emulator in the sandbox and will be used for improving observability of malware sandbox analysis. In the experiment with malware samples captured in the wild, we indeed observed a considerable number of changes in the responses from the remote servers that were obtained by our dummy client. Also, in comparison with the simple Internet-connected sandbox, the proposed sandbox could improve observability of malware sandbox analysis.
international conference on detection of intrusions and malware, and vulnerability assessment | 2018
Rui Tanabe; Wataru Ueno; Kou Ishii; Katsunari Yoshioka; Tsutomu Matsumoto; Takahiro Kasama; Daisuke Inoue; Christian Rossow
To cope with the increasing number of malware attacks that organizations face, anti-malware appliances and sandboxes have become an integral security defense. In particular, appliances have become the de facto standard in the fight against targeted attacks. Yet recent incidents have demonstrated that malware can effectively detect and thus evade sandboxes, resulting in an ongoing arms race between sandbox developers and malware authors.
WOOT'15 Proceedings of the 9th USENIX Conference on Offensive Technologies | 2015
Yin Minn Pa Pa; Shogo Suzuki; Katsunari Yoshioka; Tsutomu Matsumoto; Takahiro Kasama; Christian Rossow
Archive | 2011
Takahiro Kasama; Daisuke Inoue; Masashi Eto; Junji Nakazato; Koji Nakao
A - Abstracts of IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences (Japanese Edition) | 2016
Takahiro Kasama; Jumpei Shimamura; Daisuke Inoue
Proceedings of the IEICE General Conference | 2015
Takayuki Suzuki; Nanto Suzuki; Takahiro Kasama; Jumpei Shimamura; Daisuke Inoue; Noriharu Miyaho
IEICE technical report. Information and communication system security | 2014
Masaki Kamizono; Yuji Hoshizawa; Takahiro Kasama; Masashi Eto; Daisuke Inoue; Katsunari Yoshioka; Tsutomu Matsumoto
Collaboration
Dive into the Takahiro Kasama's collaboration.
National Institute of Information and Communications Technology
View shared research outputsNational Institute of Information and Communications Technology
View shared research outputsNational Institute of Information and Communications Technology
View shared research outputs