YOSHIOKA Katsunari

Affiliation

Faculty of Environment and Information Sciences, Division of Social Environment and Information

Job Title

Professor

Research Fields, Keywords

Network Security, Information and Communication System Security, Information Security

YNU Research Center

Research Center for Information and Physical Security

Related SDGs




写真a

The Best Research Achievement in Research Career 【 display / non-display

  • 【Published Thesis】 Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network  2024.05

    【Published Thesis】 Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices  2022.01

    【Awards】 O. Cetin, C. Gañán, L. Altena, D. Inoue, T. Kasama, K. Tamiya, Y. Tie, K. Yoshioka, M. van Eeten, "Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai," The Network and Distributed System Security Symposium (NDSS 2019), 2019  2019

The Best Research Achievement in the last 5 years 【 display / non-display

  • 【Published Thesis】 Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network  2024.05

    【Published Thesis】 Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices  2022.01

    【Awards】 O. Cetin, C. Gañán, L. Altena, D. Inoue, T. Kasama, K. Tamiya, Y. Tie, K. Yoshioka, M. van Eeten, "Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai," The Network and Distributed System Security Symposium (NDSS 2019), 2019  2019

    【Published Thesis】 No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis  2022.05

    【Published Thesis】 On the Origin of Scanning: The Impact of Location on Internet-Wide Scans  2020.10

YNU Research Center 【 display / non-display

  • Research Center for Information and Physical Security

Degree 【 display / non-display

  • Doctor of Engineering - Yokohama National University

Campus Career 【 display / non-display

  • 2023.4
     
     

    Duty   Yokohama National UniversityFaculty of Environment and Information Sciences   Division of Social Environment and Information   Professor  

  • 2011.4
    -
    2023.3

    Duty   Yokohama National UniversityFaculty of Environment and Information Sciences   Division of Social Environment and Information   Associate Professor  

  • 2007.12
    -
    2011.3

    Duty   Yokohama National UniversityInterdisciplinary Research Center   Specially Appointed Assistant Professor  

  • 2023.4
     
     

    Concurrently   Yokohama National UniversityCollege of Engineering Science   Department of Mathematics, Physics, Electrical Engineering and Computer Science   Professor  

  • 2023.4
     
     

    Concurrently   Yokohama National UniversityGraduate School of Environment and Information Sciences   Department of Information Media and Environment Sciences   Professor  

display all >>

External Career 【 display / non-display

  • 2016.4
     
     

    National Institute of Advanced Industrial Science and Technology  

  • 2014.4
     
     

    National Institute of Information and Communications Technology  

  • 2005.4
    -
    2007.11

    National Institute of Information and Communications Technology   Researcher  

Academic Society Affiliations 【 display / non-display

  • 2022
     
     
     

    ACM

  • 2008
     
     
     

    電子情報通信学会

  • 2002
     
     
     

    Information Processing Society of Japan

Research Areas 【 display / non-display

  • Manufacturing Technology (Mechanical Engineering, Electrical and Electronic Engineering, Chemical Engineering) / Communication and network engineering

  • Others / Others

 

Research Career 【 display / non-display

  • サイバー攻撃観測・分析システムnicterの研究開発

    The Other Research Programs  

    Project Year: 2005.4 - 2007.12

  • Observation, analysis and response of malwares

    Project Year:

Books 【 display / non-display

  • 論文誌「Society 5.0を実現するコンピュータセキュリティ技術」特集

    吉岡克成( Role: Edit)

    情報処理学会   [Reviewed]

     More details

    Language:Japanese Book type:Scholarly book

  • 研究開発の俯瞰報告書  システム・情報科学技術分野

    国立研究開発法人科学技術振興機構 研究開発戦略センター( Role: Other)

    科学技術推進機構 

     More details

    Language:Japanese Book type:Report

  • IoTにおける攻撃手法の調査とVectra AI社製品の有用性について

    平山 俊明、坂口 武生, 吉岡 克成(監修)( Role: Supervisor (editorial))

    日商エレクトロニクス株式会社 

     More details

    Language:Japanese Book type:Report

  • 横浜国立大学・BB ソフトサービス共同研究プロジェクト 研究開発成果報告書

    横浜国立大学・BBSS IoT サイバーセキュリティ共同研究プロジェクト( Role: Joint author)

    横浜国立大学・BBSS IoT サイバーセキュリティ共同研究プロジェクト 

     More details

    Language:Japanese Book type:Report

  • Traffic Measurements for Cyber Security

    Wojciech Mazurczyk, Maciej Korczynski, Koji Nakao, Engin Kirda, Cristian Hesselman, Katsunari Yoshioka( Role: Joint author)

    IEEE  ( ISBN:1558-1896

     More details

    Language:English Book type:Scholarly book

display all >>

Thesis for a degree 【 display / non-display

  • Design, Analysis, and Application of Collusion Secure Codes

    Katsunari Yoshioka

    2005.3

    Doctoral Thesis   Single Work  

  • A Study of Fingerprinting Code and Its Resiliency against Alterations

    2002

    Master Thesis   Single Work  

Papers 【 display / non-display

  • Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices

    Takayuki Sasaki, Akira Fujita, Carlos Hernandez Ganan, Michel van Eeten, Katsunari Yoshioka, Tsutom … Show more authors

    Proc. 43rd IEEE Symposium on Security and Privacy (IEEE S&P)   2022.1  [Reviewed]

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)   Single Work  

  • No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis

    Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Jakob Bleier, Katsunari Yoshioka, Martina Lindorfer, M … Show more authors

    The 17th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2022)   2022.5  [Reviewed]

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Single Work  

  • Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network

    2024.5  [Reviewed]

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Single Work  

  • Observation of Human-Operated Accesses Using Remote Management Device Honeypot

    SASAKI Takayuki, KAWAGUCHI Mami, KUMAGAI Takuhiro, YOSHIOKA Katsunari, MATSUMOTO Tsutomu

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E107.A ( 3 )   291 - 305   2024.3  [Reviewed]

    DOI CiNii Research

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:一般社団法人 電子情報通信学会   Joint Work  

    <p>In recent years, cyber attacks against infrastructure have become more serious. Unfortunately, infrastructures with vulnerable remote management devices, which allow attackers to control the infrastructure, have been reported. Targeted attacks against infrastructure are conducted manually by human attackers rather than automated scripts. Here, open questions are how often the attacks against such infrastructure happen and what attackers do after intrusions. In this empirical study, we observe the accesses, including attacks and security investigation activities, using the customized infrastructure honeypot. The proposed honeypot comprises (1) a platform that easily deploys real devices as honeypots, (2) a mechanism to increase the number of fictional facilities by changing the displayed facility names on the WebUI for each honeypot instance, (3) an interaction mechanism with visitors to infer their purpose, and (4) tracking mechanisms to identify visitors for long-term activities. We implemented and deployed the honeypot for 31 months. Our honeypot observed critical operations, such as changing configurations of a remote management device. We also observed long-term access to WebUI and Telnet service of the honeypot.</p>

  • SPOT: In-depth Analysis of IoT Ransomware Attacks Using Bare Metal NAS Devices

    Yasui Hiroki, Inoue Takahiro, Sasaki Takayuki, Tanabe Rui, Yoshioka Katsunari, Matsumoto Tsutomu

    Journal of Information Processing   32 ( 0 )   23 - 34   2024  [Reviewed]

    DOI CiNii Research

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:一般社団法人 情報処理学会   Joint Work  

    <p>Ransomware attacks targeting Network Attached Storage (NAS) devices have occurred steadily in the threat landscape since 2019. Early research has analyzed the functionality of IoT ransomware binaries but failed to reveal its operation and attack infrastructure. In this paper, we propose an attack observation system named SPOT, which uses popular bare metal NAS devices, QNAP, as the honeypot and the malware sandbox to conduct an in-depth analysis of IoT ransomware attacks. During the six-month observation from September 2021 to March 2022, we observed on average, 130 hosts per day accessing from the Internet to compromise the NAS devices. Moreover, we executed 48 ransomware samples downloaded from VirusTotal in the SPOT sandbox. We identified seven remote Onion proxy servers used for C&C connection and successfully observed three samples infecting the NAS device to connect them to the C&C server behind the TOR network. The ransom notes gave two kinds of contact points; instruction web pages and email addresses. Though the email addresses were not reachable, we could access the instruction website. We kept monitoring the website and observed a “30% discount campaign” for ransom payments. We also interacted with the threat actor via online support chat on the website, but we were banned from the channel because we asked about their organization. We observe that the degree of automation in the attack operation is much higher compared to the carefully tailored and targeted ransomware attacks. While each case of successful ransom payment is limited to 0.03 BTC, the automated nature of the attacks would maximize the frequency of such successful cases.</p>

display all >>

Review Papers 【 display / non-display

  • サイバーセキュリティの最先端の研究をしています

    吉岡克成

    情報通信研究機構サイバーセキュリティシンポジウム2023   2023

     More details

    Authorship:Lead author, Last author, Corresponding author   Language:Japanese   Publishing type:Lecture material (seminar, tutorial, course, lecture, etc.)   Single Work  

  • エンドポイントセキュリティ製品の公開情報に基づく定性評価

    森井 裕大 , 渡辺露文, 佐々木貴之, 田辺瑠偉, 徐浩源, 吉岡克成

    日本HPWOLF SECURITY   2022.12

     More details

    Authorship:Corresponding author   Language:Japanese   Publishing type:Article, review, commentary, editorial, etc. (other)   Single Work  

  • システム、人、そしてサプライチェーン 守るべきポイントへ先行投資せよ

    吉岡克成

    日経ビジネス電子版Special   2022.1

     More details

    Language:Japanese   Publishing type:Article, review, commentary, editorial, etc. (trade magazine, newspaper, online media)   Single Work  

  • IoTセキュリティ研究開発の最新動向

    吉岡克成,田辺瑠偉,佐々木貴之

    公益財団法人総合安全工学研究所 セイフティエンジニアリング   2022

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Rapid communication, short report, research note, etc. (scientific journal)   Single Work  

  • コネクテッドカーはインターネット上から発見可能か?― 広域スキャンによる車載機器探索とセキュリティ分析―

    植田 岳洋, 佐々木 貴之, 吉岡 克成, 松本 勉

    自動車技術会誌   2022

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Article, review, commentary, editorial, etc. (trade magazine, newspaper, online media)   Single Work  

display all >>

Works 【 display / non-display

  • Am I Infected? IoTマルウェア感染・脆弱性を検査するWebサイト・サービス

    2022.2

     More details

    Work type:Web Service   Location:https://amii.ynu.codes/  

    Other Link: https://amii.ynu.codes/

  • DRDoS attack observatory

    2021.5

     More details

    Work type:Database science  

Industrial Property Rights 【 display / non-display

  • Method of network monitoring and device

     More details

    Patent/Registration no:US Patent 10560473 

  • Message authentication method in communication system and communication system

    Katsunari Yoshioka, et. al.

     More details

    Patent/Registration no:US Patent 9331854 

  • マルウェアの類似性検査方法及び装置

    吉岡克成 他

     More details

    Patent/Registration no:5083760 

  • データ類似性検査方法及び装置

    吉岡克成 他

     More details

    Patent/Registration no:4883409 

  • 系列データ間の類似性検査方法及び装置

    吉岡克成 他

     More details

    Patent/Registration no:4883408 

Awards 【 display / non-display

  • 発明表彰功労賞

    2023.4   横浜国立大学  

    Individual or group name of awards:吉岡克成

  • Best Paper Award

    2022.8   AsiaJCIS2022  

  • 2021年度情報通信システムセキュリティ研究賞

    2022.6   電子情報通信学会情報通信システムセキュリティ研究専門委員会  

    Individual or group name of awards:吉岡克成 他

  • CSEC優秀研究賞, 2022.

    2022.3   情報処理学会   IoTマルウェア感染解析における通信形態及びアップリンク速度の推定手法

    Individual or group name of awards:黄 緒平、望月 俊輔、吉岡 克成

  • 2022年度 JPCERT/CC 感謝状

    2022   JPCERT/CC  

    Individual or group name of awards:吉岡克成

display all >>

Grant-in-Aid for Scientific Research 【 display / non-display

  • 人間中心のIoTセキュリティに関する実証研究

    Grant number:23K11099  2023.4 - 2026.3

    Grant-in-Aid for Scientific Research(C)

  • 機械学習とドメイン知識を導入した攻撃生成過程のモデル化と実データによる検証

    2021.4 - 2025.3

    科学研究費補助金  Grant-in-Aid for Scientific Research(B)

    Investigator(s):小澤 誠一

      More details

    Grant type:Competitive

  • ブロックチェーンを基盤とする高信頼性を持った自立分散型監視技術(分担)

    2019 - 2021

    科学研究費補助金  Grant-in-Aid for Scientific Research(B)

    Investigator(s):面 和成

      More details

    Grant type:Competitive

  • IoTのアプリ化に向けたコンテキストアウェア・セキュリティ制御技術(分担)

    2019 - 2021

    科学研究費補助金  Grant-in-Aid for Scientific Research(B)

    Investigator(s):森 達哉

      More details

    Grant type:Competitive

Other external funds procured 【 display / non-display

  • 電波の有効利用のための IoT マルウェア無害化/無機能化技術等に関する研究開発

    2020.8 - 2023.3

    Ministry of Public Management, Home Affairs, Posts and Telecommunications  総務省委託研究

  • デジタルツインによるサイバー・フィジカル連携型セキュリティ基盤

    Grant number:05201  2022 - 2024.3

    NICT委託研究

  • Web媒介型攻撃対策技術の実用化に向けた研究開発

    2016.4 - 2021.3

    NICT委託研究

  • 自動運転(システムとサービスの拡張)/新たなサイバー攻撃手法と対策技術に関する調査研究

    2020.10 - 2023.3

    戦略的イノベーション創造プログラム(SIP)

  • 重要IoT機器のセキュリティ対策に関する調査

    2020.7 - 2021.1

    Ministry of Public Management, Home Affairs, Posts and Telecommunications  総務省「重要IoT機器のセキュリティ対策に係る調査の請負」(NTTコミュニケーションズ株式会社との共同研究「重要IoT機器のセキュリティ対策に関する調査」として実施)

    Investigator(s):吉岡克成

display all >>

Presentations 【 display / non-display

  • あらゆるモノが繋がる時代のサイバーセキュリティ~我が国の状況、取り組み、課題を中心に~

    吉岡克成

    「R031ハイブリッド量子ナノ技術委員会」第10回研究会  日本学術振興会産学連携委員会

     More details

    Event date: 2023.3

    Language:Japanese   Presentation type:Oral presentation (general)  

  • 多様化するサイバー攻撃最新動向~平常時にこそ取り組むべきサイバーセキュリティ対策~

    吉岡克成

    セキュリティ総合カンファレンス 

     More details

    Event date: 2023.3

    Language:Japanese   Presentation type:Oral presentation (general)  

  • ビジネス化が進むサイバー攻撃 第一人者に聞く脅威アクターの最新エコシステム

    吉岡克成

    扶桑電通株式会社セミナー  富士通株式会社

     More details

    Event date: 2023.3

    Language:English   Presentation type:Oral presentation (general)  

  • IoTにおけるサイバー攻撃の最新動向と対策

    吉岡克成

    情報処理学会全国大会  一般社団法人情報処理学会

     More details

    Event date: 2023.3

    Language:Japanese   Presentation type:Oral presentation (general)  

  • サイバーセキュリティの最先端の研究をしています

    吉岡克成

    NICTサイバーセキュリティシンポジウム2023  NICT サイバーセキュリティ研究所

     More details

    Event date: 2023.2

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:東京都港区港南  

display all >>

Preferred joint research theme 【 display / non-display

  • network monitoring and malware analysis

Past of Collaboration and Commissioned Research 【 display / non-display

  • 住宅内情報セキュリティに関する研究

    Offer organization: 一般社団法人重要生活機器連携セキュリティ協議会   Funded Research offered by Enterprises  

    Project Year: 2022.11  -  2022.12 

  • セキュリティ・エージェントブロックリスト生成に関する研究

    Offer organization: 株式会社クルウィット   Cooperative Research within Japan  

    Project Year: 2022.8  -  2023.6 

  • サイバー攻撃の再現手法の研究

    Offer organization: 日本電気株式会社   Cooperative Research within Japan  

    Project Year: 2022.6  -  2023.3 

  • IoT機器向けサイバー攻撃に関する研究

    Offer organization: 三菱電機株式会社   Cooperative Research within Japan  

    Project Year: 2022.4  -  2023.3 

  • IoT機器向けサイバー攻撃に関する研究

    Offer organization: 三菱電機株式会社   Cooperative Research within Japan  

    Project Year: 2021.4  -  2022.3 

display all >>

 

Charge of on-campus class subject 【 display / non-display

  • 2024   Applied Security Informatics

    Interfaculty Graduate School of Innovative and Practical Studies

  • 2024   Security Informatics Ⅱ

    Interfaculty Graduate School of Innovative and Practical Studies

  • 2024   Exercise in Information System Management

    Graduate School of Environment and Information Sciences

  • 2024   Information System Management

    Graduate School of Environment and Information Sciences

  • 2024   Security Analysis II

    Graduate School of Environment and Information Sciences

display all >>

Charge of off-campus class subject 【 display / non-display

  • セキュリティ

  • 高度技術活用研修「コンピュータネットワーク」

  • [先端科学技術とイノベーション]"IoTにおけるサイバー攻撃の現状~ミライウイルスの大流行とその後~"

  • ウエアラブルIoT技術特論

    Institution:東京医科歯科大学

  • [先端科学技術とイノベーション]"IoTにおけるサイバー攻撃の現状~ミライウイルスの大流行とその後~"

display all >>

 

Committee Memberships 【 display / non-display

  • 科学技術振興機構 先端科学技術委員会分野別委員会

    2023 - 2024  委員

     More details

    Committee type:Government 

  • 内閣官房内閣サイバーセキュリティセンター(NISC)「サイバー攻撃被害に係る情報の共有・公表ガイダンス」 検討会

    2022  委員

     More details

    Committee type:Government 

  • 科学技術振興機構 戦略的創造研究推進事業さきがけ IoTが拓く未来

    2019  領域アドバイザ

     More details

    Committee type:Academic society 

  • ACM ASIA Conference on Computer and Communications Security (ASIACCS2023).

    2022  program committee member

     More details

    Committee type:Academic society 

  • 情報処理推進機構, JISEC認証審議委員会

    2022  委員

     More details

    Committee type:Government 

display all >>

Social Contribution(Extension lecture) 【 display / non-display

  • マルウェア感染・脆弱性確認サービスの一般提供

    Role(s): Official expert, Investigator

    2022.2

  • 重要IoT機器調査・注意喚起活動

    Role(s): Official expert, Investigator

    2017

  • IoTマルウェア情報の外部組織への提供

    Role(s): Official expert

    2015

  • サービス妨害攻撃速報のISP等への配信

    Role(s): Official expert, Investigator

    2014

  • 横浜国大におけるIoTサイバーセキュリティ研究成果の紹介~サイバー公衆衛生(ハイジーン)向上へ向けた取り組み~

    Role(s): Other

    三菱電機  三菱電機社内セミナー  2022.7

display all >>

Media Coverage 【 display / non-display

  • あなたの家からサイバー犯罪!?

    NHK  NHK News Web  2023.5

  • あなたも踏み台に? 家庭用ルーターのセキュリティー対策に要注意【警視庁記者徹底解説】

    テレビ東京  テレ東BIZビジネスオンデマンド  2023.4

  • 「高額バイト」投稿、3万4千件

    共同通信、他38社  2023.3

  • 1秒間に数十の攻撃が今この瞬間にも!? パスワード解除、ウイルス感染…もはや他人ごとではない脅威のサイバー攻撃

    読売テレビ  かんさい情報ネット ten.  2023.3

  • 相次ぐサイバー攻撃 対策は?

    NHK  NHKラジオ第1 Nらじ  Nらじ  2023.1

display all >>

Academic Activities 【 display / non-display

  • Norton クイズで備えるサイバー防犯訓練 監修

    Role(s): Supervision (editorial)

    2022 - 2023

     More details

    Type:Scientific advice/Review 

  • 研究開発の俯瞰報告書 システム・情報科学技術分野 執筆協力者

    Role(s): Other

    科学技術振興機構  2021

  • IoT Security Forumの企画・運営

    Role(s): Planning, management, etc.

    副実行委員長  2015

     More details

    Type:Competition, symposium, etc.