scispace - formally typeset
Search or ask a question
Author

Hiroto Kawashiro

Bio: Hiroto Kawashiro is an academic researcher from NEC. The author has contributed to research in topics: Web server & Web application. The author has an hindex of 2, co-authored 3 publications receiving 4 citations.

Papers
More filters
Patent
21 Jul 2010
TL;DR: In this article, a web vulnerability repair device 50 detects the presence or absence and the type of vulnerability of a web application in a web server 30 and then repairs the vulnerability of the web application using the countermeasure information.
Abstract: PROBLEM TO BE SOLVED: To improve security in a period from the time when a vulnerable part is found in a web application to the time when the vulnerable part is repaired manually.SOLUTION: A web vulnerability repair device 50 detects the presence or absence and the type of vulnerability of a web application in a web server 30. The web vulnerability repair device 50 acquires countermeasure information for repairing the vulnerability by type of vulnerability. Then the web vulnerability repair device 50 repairs the vulnerability of the web application in the web server 30 using the countermeasure information.

2 citations

Patent
19 Jul 2011
TL;DR: In this paper, a web vulnerability patching device (50) detects the presence and type of a vulnerability of web application of a web server (30) using countermeasure information for patching vulnerabilities by vulnerability type.
Abstract: The disclosed web vulnerability patching device (50) detects the presence and type of a vulnerability of a web application of a web server (30). The web vulnerability patching device (50) can acquire countermeasure information for patching vulnerabilities by vulnerability type. Also, the web vulnerability patching device (50) patches the vulnerability of the web application of the web server (30) using the abovementioned countermeasure information. By means of this patching, the security between when a vulnerable portion of a web application is discovered and when manual patching is performed is increased.

2 citations

Patent
Hiroto Kawashiro1, Masahiro Asano1
19 Jul 2011
TL;DR: In this article, a web vulnerability repair apparatus (50) detects the presence of a vulnerability of a web application of a Web server and the type of the vulnerability. And then, the Web vulnerability repair mechanism can repair the vulnerability of the web application using the countermeasure information.
Abstract: A Web vulnerability repair apparatus (50) detects the presence of a vulnerability of a Web application of a Web server (30) and the type of the vulnerability. The Web vulnerability repair apparatus (50) can acquire countermeasure information aimed to repair the vulnerability, according to the type of vulnerability. In addition, the Web vulnerability repair apparatus (50) repairs the vulnerability of the Web application of the Web server (30) using the countermeasure information. By this repair, it is possible to improve the security during the period from the time when a vulnerable part in a Web application is discovered to the time when it is manually repaired.

Cited by
More filters
Patent
26 Jul 2012
TL;DR: In this article, the authors present a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel.
Abstract: The present disclosure provides a system that includes a server hosting an application under test (AUT), an observer configured to monitor instructions executed by the AUT, and a computing device communicatively coupled to the AUT and the observer through a common communication channel. The computing device may be configured to send an application request to the AUT, wherein the application request is configured to expose a potential vulnerability of the AUT. The computing device may receive an application response from the AUT in accordance with the AUT's programming. The computing device may send a service request to the observer, and receive a service response from the observer that contains information corresponding to the instructions executed by the AUT due to the application request, information about the AUT, or information about a server hosting the AUT.

230 citations

Patent
Hisashi Kojima1, Masahiro Nakada1
22 May 2014
TL;DR: In this paper, the authors present an approach to provide effective protection against vulnerability of a device connected to a network by using a comparison unit for outputting a result obtained by comparing the received data with a prescribed pattern, among a plurality of patterns imparted to a test device for estimating behaviour of the device to be protected.
Abstract: One purpose of the present invention is to provide effective protection against vulnerability of a device connected to a network. According to one embodiment of the present invention, provided is a device which filters data received over a network and outputs said data to a device to be protected, and which is provided with: a comparison unit for outputting a result obtained by comparing the received data with a prescribed pattern, among a plurality of patterns imparted to a test device for estimating behaviour of the device to be protected, in which prescribed behaviour is exhibited by the test device; and a blocking unit which, in cases when the comparison result is a positive result signifying that the data should be blocked, blocks the received data.

2 citations

Patent
05 Sep 2019
TL;DR: An inconsistency inspection unit inspects whether there is an inconsistency in the data processing procedure defined in a block diagram by tracing the connection among blocks in the block diagram as discussed by the authors. But inconsistency inspection is not applicable to block diagram acquisition.
Abstract: A block-diagram acquisition unit acquires a block diagram that defines by connection among a plurality of blocks, a data processing procedure to be reflected in a program code. An inconsistency inspection unit inspects whether there is an inconsistency in the data processing procedure defined in the block diagram by tracing the connection among blocks in the block diagram.

1 citations

Patent
Hisashi Kojima1, Masahiro Nakada1
07 Apr 2015
TL;DR: In this paper, an apparatus filters data received through a network and outputs the filtered data to a protection target device, which includes a processor to execute a process including: comparing the received data with a predetermined pattern and outputting a result of comparison, the predetermined pattern being one of a plurality of patterns that are given to a test device configured to estimate a behavior of the protection target devices.
Abstract: An apparatus filters data received through a network and outputs the filtered data to a protection target device. The apparatus includes a processor to execute a process including: comparing the received data with a predetermined pattern and outputting a result of comparison, the predetermined pattern being one of a plurality of patterns that are given to a test device configured to estimate a behavior of the protection target device, the target device exhibiting a predetermined behavior to the predetermined pattern; and intercepting the received data when the result of comparison is a positive result that indicates intercepting the data.

1 citations