Publications Academic Year 2013 (Sakai & Goshima Lab.)

International Conferences

  • WEWoRC 2013 (Western European Workshop on Research in Cryptology)
    1. Tsuyoshi Yamada, Naruki Kurata, Rie Shigetomi Yamaguchi, Masahiro Goshima, Shuichi Sakai:
      Minimal Additional Function to Secure Processor for Application Authentication,
      WEWoRC (Western European Workshop on Research in Cryptology) (2013).
  • FPL2013 (The International Conference on Field Programmable Logic and Applications)
    1. Akihito Tsusaka, Mai Izawa, Rie Uno, Nobuyuki Ozaki, Hideharu Amano:
      A HARDWARE COMPLETE DETECTION MECHANISM FOR AN ENERGY EFFICIENT RECONFIGURABLE ACCELERATOR CMA,
      FPL (The International Conference on Field Programmable Logic and Applications) (2013).
      [ PDF ]
  • ACM CODASPY 2014 (Conference on Data and Application Security and Privacy)
    1. Koki Murakami, Tsuyoshi Yamada, Rie Shigetomi Yamaguchi, Masahiro Goshima and Shuichi Sakai:
      A Cloud Architecture for Protecting Guest’s Information from Malicious Operators with Memory Management,
      CODASPY ’14 Proceedings of the 4th ACM conference on Data and application security and privacy, pp. 155—158 (2014).
      [ download page ]

Domestic Symposiums (with peer review)

  • Symp. on Advanced Computing Systems & Infrastructures (SACSIS 2013) @ Sendai, Japan
    1. Shuji Yoshida, Soichiro Hirohata, Naruki Kurata, Ryota Shioya, Masahiro Goshima, and Shuichi Sakai:
      A Detection/Recovery Scheme of Timing-Fault-Tolerant Out-of-Order Processor,
      Symp. on Advanced Computing Systems & Infrastructures (SACSIS), Vol. 2013 (2013).   (in Japanese).

Oral Presentations

  • Computer Security Symposium 2013 @ Kagawa, Japan
    1. Tsuyoshi Yamada, Rie Shigetomi Yamaguchi, Masahiro Goshima, Shuichi Sakai:
      Application Authentication Using Secure Processor and Formalizing Proofs of Security,
      Proceedings of IPSJ Computer Security Symposium 2013, Vol. 2013, No. 4, pp. 1058—1065 (2013).   (in Japanese).
      [download page]
    2. Koki Murakami, Tsuyoshi Yamada, Rie Shigetomiyamaguchi, Masahiro Goshima, Shuichi Sakai:
      A Cloud Architecture for Protecting Guest’s Information Against Attacks of Malicious Operator,
      Proceedings of IPSJ Computer Security Symposium 2013, Vol. 2013, No. 4, pp. 1066—1073 (2013).   (in Japanese).
      [download page]
  • Symposium on Cryptography and Information Security SCIS 2014 @ Kagoshima, Japan
    1. Koki Murakami, Rie Shigetomiyamaguchi, Masahiro Goshima, Shuichi Sakai:
      A Cloud Architecture for Protectiong Guestfs Information against Theft and Modification by Malicious Operator,
      SCIS2014 The 31st Symposium on Cryptography and Information Security, CD-ROM, 3C2-3 (2014).   (in Japanese).
    2. Kenjiro Nakata, Rie Shigetomi Yamaguchi, Masahiro Goshima, Shuichi Sakai:
      Evaluation of Anonymous Method for Location Histories by using Actual Data,
      SCIS2014 The 31st Symposium on Cryptography and Information Security, CD-ROM, 3D3-3 (2014).   (in Japanese).
    3. Tsuyoshi Yamada, Rie Shigetomi Yamaguchi, Masahiro Goshima, Shuichi Sakai:
      Secure Processor for Protecting VM and its Application Authentication,
      SCIS2014 The 31st Symposium on Cryptography and Information Security, CD-ROM, 3F3-3 (2014).   (in Japanese).

Invited Talks

Patent

  • Satoshi KATSUNUMA, Masahiro GOSHIMA, Hidetsugu IRIE, Ryota SHIOYA, Shuichi SAKAI:
    INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER READABLE RECORDING MEDIUM,
    US 8,413,240 B2 (2013).

Thesis

  • Mater Thesis
    1. Kaoru Hayakawa:
      An improvement of a phase detection technique with variable-length segments ,
      Master thesis, Dept. of Information and Communication Eng, the University of Tokyo, (2013).
    2. Tsuyoshi Yamada:
      Secure Processor for Protecting VM and its Application to Authentication,
      Master thesis, Dept. of Information and Communication Eng, the University of Tokyo, (2014).
    3. Tsuyoshi Yamada:
      Secure Processor for Protecting VM and its Application to Authentication,
      Master thesis, Dept. of Information and Communication Eng, the University of Tokyo, (2014).
    4. Souichirou Hirohata:
      Applying Method of a Clocking Scheme Enabling Dynamic Time Borrowing,
      Master thesis, Dept. of Information and Communication Eng, the University of Tokyo, (2014).
    5. Manami Iwata:
      Transactional Memory That Sequentially Executes Conflicting Transactions,
      Master thesis, Dept. of Information and Communication Eng, the University of Tokyo, (2014).
    6. Kousuke Asami:
      Cache Partitioning based on Instruction Groups,
      Master thesis, Dept. of Information and Communication Eng, the University of Tokyo, (2014).
    7. Kouki Murakami:
      A Hypervisor for Protecting Information of Public Cloudfs User on Memory and on Storage from Malicious Operators,
      Master thesis, Dept. of Information and Communication Eng, the University of Tokyo, (2014).
    8. Akifumi Fujita:
      The design and implementation of area-efficient processor “Raishodo”,
      Master thesis, Dept. of Information and Communication Eng, the University of Tokyo, (2014).