Personal information

Activities

Employment (2)

INSTITUTE of INFORMATION SECURITY: Yokohama, Kanagawa, JP

2022-09-01 to present | Professor (Information Security)
Employment
Source: Self-asserted source
Kuniyasu Suzaki

National Institute of Advanced Industrial Science and Technology (AIST): Koto-ku, Tokyo, JP

1991-04-01 to 2022-08-31 | Senior Researcher (Cyber Physical Security Research Center)
Employment
Source: Self-asserted source
Kuniyasu Suzaki

Education and qualifications (3)

University of Tokyo: Tokyo, JP

2009-07-23 to 2009-07-23 | Doctor of Philosophy in the field of Information Science and Technology (Graduate School of Information Science and Technology)
Education
Source: Self-asserted source
Kuniyasu Suzaki

Tokyo University of Agriculture and Technology: Tokyo, JP

1988-04 to 1990-03 | Master of Engineering (Graduate School of Engineering)
Education
Source: Self-asserted source
Kuniyasu Suzaki

Tokyo University of Agriculture and Technology: Tokyo, JP

1983-03 to 1988-03 | Bachelor of Engineering (Department of Engineering)
Education
Source: Self-asserted source
Kuniyasu Suzaki

Works (50 of 58)

Items per page:
Page 1 of 2

TS-Perf: General Performance Measurement of Trusted Execution Environment and Rich Execution Environment on Intel SGX, Arm TrustZone, and RISC-V Keystone

IEEE Access
2021-09-13 | Journal article | Author
Part of ISSN: 2169-3536
Contributors: Kuniyasu Suzaki; Kenta Nakajima; Tsukasa Oi; Akira Tsukamoto
Source: Self-asserted source
Kuniyasu Suzaki

A Fully Digital True Random Number Generator With Entropy Source Based in Frequency Collapse

IEEE Access
2021-07-26 | Journal article
Part of ISSN: 2169-3536
Source: Self-asserted source
Kuniyasu Suzaki

Disaggregated Accelerator Management System for Cloud Data Centers

IEICE Transactions on Information and Systems
2021-03-01 | Journal article
Part of ISSN: 0916-8532
Part of ISSN: 1745-1361
Source: Self-asserted source
Kuniyasu Suzaki

Exploiting the Back-Gate Biasing Technique as a Countermeasure Against Power Analysis Attacks

IEEE Access
2021-02-05 | Journal article
Part of ISSN: 2169-3536
Source: Self-asserted source
Kuniyasu Suzaki

Library Implementation and Performance Analysis of GlobalPlatform TEE Internal API for Intel SGX and RISC-V Keystone

2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
2020-12 | Conference paper
Part of ISBN: 9781665403924
Source: Self-asserted source
Kuniyasu Suzaki

Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment for Disposable IoT devices

Annual Computer Security Applications Conference
2020-12-07 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Cryptographic Accelerators for Trusted Execution Environment in RISC-V Processors

2020 IEEE International Symposium on Circuits and Systems (ISCAS)
2020-10 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Quick Boot of Trusted Execution Environment With Hardware Accelerators

IEEE Access
2020-04-13 | Journal article
Part of ISSN: 2169-3536
Source: Self-asserted source
Kuniyasu Suzaki

DeviceVeil: Robust Authentication for Individual USB Devices Using Physical Unclonable Functions

2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
2019-06 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Safe Trans Loader: Mitigation and Prevention of Memory Corruption Attacks for Released Binaries

International Workshop on Security
2018 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Bare-Metal Container: Direct Execution of a Container Image on a Remote Machine with an Optimized Kernel

High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), 2016 IEEE 18th International Conference on
2016 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Using Checkpointing and Virtualization for Fault Injection

International Journal of Networking and Computing
2015 | Journal article
Source: Self-asserted source
Kuniyasu Suzaki

A Knoppix-based demonstration environment for JPF

ACM SIGSOFT Software Engineering Notes
2014 | Journal article
Source: Self-asserted source
Kuniyasu Suzaki

Kernel memory protection by an insertable hypervisor which has VM introspection and stealth breakpoints

International Workshop on Security
2014 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Rollback mechanism of nested virtual machines for protocol fuzz testing

Proceedings of the 29th Annual ACM Symposium on Applied Computing
2014 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Using checkpointing and virtualization for fault injection

Computing and Networking (CANDAR), 2014 Second International Symposium on
2014 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Implementation of a memory disclosure attack on memory deduplication of virtual machines

IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
2013 | Journal article
Source: Self-asserted source
Kuniyasu Suzaki

Effects of memory randomization, sanitization and page cache on memory deduplication

European Workshop on System Security (EuroSec 2012)
2012 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Impact on Chunk Size on Deduplication and Disk Prefetch

Recent Advances in Computer Science and Information Engineering
2012 | Book chapter
Source: Self-asserted source
Kuniyasu Suzaki

Inter-domain Communication Protocol for Real-time File Access Monitor of Virtual Machine.

JoWUA
2012 | Journal article
Source: Self-asserted source
Kuniyasu Suzaki

Why do software packages conflict?

Proceedings of the 9th IEEE Working Conference on Mining Software Repositories
2012 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

A Lightweight Access Log Filter of Windows OS Using Simple Debug Register Manipulation

International Conference on Security Technology
2011 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

A SOM based malware visualization system using resource access filter of virtual machine

The 2011 International Conference on Computers, Communications, Control and Automation (CCCA 2011), Hong Kong, China
2011 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Analysis of disk access patterns on file systems for content addressable storage

2011 Linux Symposium
2011 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Memory deduplication as a threat to the guest OS

Proceedings of the Fourth European Workshop on System Security
2011 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Security considered harmful

A case study of tradeoff between security and usability
2011 | Journal article
Source: Self-asserted source
Kuniyasu Suzaki

Security considered harmful a case study of tradeoff between security and usability

Consumer Communications and Networking Conference (CCNC), 2011 IEEE
2011 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Software side channel attack on memory deduplication

ACM Symposium on Operating Systems Principles (SOSP 2011), Poster session
2011 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Sources of inter-package conflicts in debian

arXiv preprint arXiv:1110.1354
2011 | Journal article
Source: Self-asserted source
Kuniyasu Suzaki

Moving from Logical Sharing of Guest OS to Physical Sharing of Deduplication on Virtual Machine.

HotSec
2010 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Virt-ICE: Next-generation debugger for malware analysis

Black Hat USA
2010 | Journal article
Source: Self-asserted source
Kuniyasu Suzaki

Effect of readahead and file system block reallocation for lbcas

Proceedings of the Linux Symposium
2009 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Extraction of properties in C implementations of security APIs for verification of Java applications

3rd Int. Workshop on Analysis of Security APIs
2009 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Trusted boot and platform trust services on 1CD Linux

Trusted Infrastructure Technologies Conference, 2008. APTC'08. Third Asia-Pacific
2008 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Virtual TPM on Xen/KVM for Trusted Computing

online] Virtualization Mini Summit on Linuxsymposium
2008 | Journal article
Source: Self-asserted source
Kuniyasu Suzaki

Dynamic load balancing for the reduction of network traffic using network transferable computers

Electronics and Communications in Japan (Part I: Communications)
2007 | Journal article
Source: Self-asserted source
Kuniyasu Suzaki

Mobile Thin-Client System with Fault Tolerance and Scalability by" HTTP-FUSE-KNOPPIX-BOX".

PDPTA
2007 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Xenprobes, a lightweight user-space probing framework for xen virtual machine

USENIX annual technical conference proceedings
2007 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

‘OS Circulation Environment: Trusted HTTP-FUSE Xenoppix

Linux Conference Australia
2007 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Input and output control means for computer system storage and a software execution method using same

2007-07 | Other
Source: Self-asserted source
Kuniyasu Suzaki

File system (Ext2) optimization for compressed loopback device

Linux-Kongress, Sept. 2006
2006 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

File system (Ext2) optimization for compressed loopback device

Linux-Kongress, Sept. 2006
2006 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

HTTP-FUSE Xenoppix

Ottwa Linux Symposium
2006 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

KNOPPIX/Math: Portable and distributable collection of mathematical software and free documents

International Congress on Mathematical Software
2006 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Trusted boot of http-fuse knoppix

Linux-Kongress 2006
2006 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

A practicable educational contents sharing system utilizing Knoppix Edu series the 1 CD bootable Linux teaching tools

Information Technology Based Higher Education and Training, 2005. ITHET 2005. 6th International Conference on
2005 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Dynamic load balancing using network transferable computer

Distributed Computing Systems Workshops, 2005. 25th IEEE International Conference on
2005 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

SFS-Knoppix which Boots from Internet.

WEBIST
2005 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Adaptable load balancing using network transferable computer associated with mobile IP

null
2003 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki

Scheduling on AP/Linux for fine and coarse grain parallel processes

Workshop on Job Scheduling Strategies for Parallel Processing
1999 | Conference paper
Source: Self-asserted source
Kuniyasu Suzaki
Items per page:
Page 1 of 2