Publications Academic Year 2013 (Sakai & Goshima Lab.)
International Conferences
-
WEWoRC 2013 (Western European Workshop on Research in Cryptology)
- Tsuyoshi Yamada, Naruki Kurata, Rie Shigetomi Yamaguchi, Masahiro Goshima, Shuichi Sakai:
Minimal Additional Function to Secure Processor for Application Authentication,
WEWoRC (Western European Workshop on Research in Cryptology) (2013).
- Tsuyoshi Yamada, Naruki Kurata, Rie Shigetomi Yamaguchi, Masahiro Goshima, Shuichi Sakai:
-
FPL2013 (The International Conference on Field Programmable Logic and Applications)
- Akihito Tsusaka, Mai Izawa, Rie Uno, Nobuyuki Ozaki, Hideharu Amano:
A HARDWARE COMPLETE DETECTION MECHANISM FOR AN ENERGY EFFICIENT RECONFIGURABLE ACCELERATOR CMA,
FPL (The International Conference on Field Programmable Logic and Applications) (2013).
[ PDF ]
- Akihito Tsusaka, Mai Izawa, Rie Uno, Nobuyuki Ozaki, Hideharu Amano:
-
ACM CODASPY 2014 (Conference on Data and Application Security and Privacy)
- Koki Murakami, Tsuyoshi Yamada, Rie Shigetomi Yamaguchi, Masahiro Goshima and Shuichi Sakai:
A Cloud Architecture for Protecting Guest’s Information from Malicious Operators with Memory Management,
CODASPY ’14 Proceedings of the 4th ACM conference on Data and application security and privacy, pp. 155—158 (2014).
[ download page ]
- Koki Murakami, Tsuyoshi Yamada, Rie Shigetomi Yamaguchi, Masahiro Goshima and Shuichi Sakai:
Domestic Symposiums (with peer review)
-
Symp. on Advanced Computing Systems & Infrastructures (SACSIS 2013) @ Sendai, Japan
- Shuji Yoshida, Soichiro Hirohata, Naruki Kurata, Ryota Shioya, Masahiro Goshima, and Shuichi Sakai:
A Detection/Recovery Scheme of Timing-Fault-Tolerant Out-of-Order Processor,
Symp. on Advanced Computing Systems & Infrastructures (SACSIS), Vol. 2013 (2013). (in Japanese).
- Shuji Yoshida, Soichiro Hirohata, Naruki Kurata, Ryota Shioya, Masahiro Goshima, and Shuichi Sakai:
Oral Presentations
-
Computer Security Symposium 2013 @ Kagawa, Japan
- Tsuyoshi Yamada, Rie Shigetomi Yamaguchi, Masahiro Goshima, Shuichi Sakai:
Application Authentication Using Secure Processor and Formalizing Proofs of Security,
Proceedings of IPSJ Computer Security Symposium 2013, Vol. 2013, No. 4, pp. 1058—1065 (2013). (in Japanese).
[download page] - Koki Murakami, Tsuyoshi Yamada, Rie Shigetomiyamaguchi, Masahiro Goshima, Shuichi Sakai:
A Cloud Architecture for Protecting Guest’s Information Against Attacks of Malicious Operator,
Proceedings of IPSJ Computer Security Symposium 2013, Vol. 2013, No. 4, pp. 1066—1073 (2013). (in Japanese).
[download page]
- Tsuyoshi Yamada, Rie Shigetomi Yamaguchi, Masahiro Goshima, Shuichi Sakai:
-
Symposium on Cryptography and Information Security SCIS 2014 @ Kagoshima, Japan
- Koki Murakami, Rie Shigetomiyamaguchi, Masahiro Goshima, Shuichi Sakai:
A Cloud Architecture for Protectiong Guestfs Information against Theft and Modification by Malicious Operator,
SCIS2014 The 31st Symposium on Cryptography and Information Security, CD-ROM, 3C2-3 (2014). (in Japanese). - Kenjiro Nakata, Rie Shigetomi Yamaguchi, Masahiro Goshima, Shuichi Sakai:
Evaluation of Anonymous Method for Location Histories by using Actual Data,
SCIS2014 The 31st Symposium on Cryptography and Information Security, CD-ROM, 3D3-3 (2014). (in Japanese). - Tsuyoshi Yamada, Rie Shigetomi Yamaguchi, Masahiro Goshima, Shuichi Sakai:
Secure Processor for Protecting VM and its Application Authentication,
SCIS2014 The 31st Symposium on Cryptography and Information Security, CD-ROM, 3F3-3 (2014). (in Japanese).
- Koki Murakami, Rie Shigetomiyamaguchi, Masahiro Goshima, Shuichi Sakai:
Invited Talks
-
IEEE IEEE Computer Society Japan Chapter
- Ryota Shioya:
Register Cache System not for Latency Reduction Purpose,
IEEE Computer Society Japan Chapter Young Author Award 2011(2011).
- Ryota Shioya:
Patent
- Satoshi KATSUNUMA, Masahiro GOSHIMA, Hidetsugu IRIE, Ryota SHIOYA, Shuichi SAKAI:
INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER READABLE RECORDING MEDIUM,
US 8,413,240 B2 (2013).
Thesis
- Mater Thesis
- Kaoru Hayakawa:
An improvement of a phase detection technique with variable-length segments ,
Master thesis, Dept. of Information and Communication Eng, the University of Tokyo, (2013). - Tsuyoshi Yamada:
Secure Processor for Protecting VM and its Application to Authentication,
Master thesis, Dept. of Information and Communication Eng, the University of Tokyo, (2014). - Tsuyoshi Yamada:
Secure Processor for Protecting VM and its Application to Authentication,
Master thesis, Dept. of Information and Communication Eng, the University of Tokyo, (2014). - Souichirou Hirohata:
Applying Method of a Clocking Scheme Enabling Dynamic Time Borrowing,
Master thesis, Dept. of Information and Communication Eng, the University of Tokyo, (2014). - Manami Iwata:
Transactional Memory That Sequentially Executes Conflicting Transactions,
Master thesis, Dept. of Information and Communication Eng, the University of Tokyo, (2014). - Kousuke Asami:
Cache Partitioning based on Instruction Groups,
Master thesis, Dept. of Information and Communication Eng, the University of Tokyo, (2014). - Kouki Murakami:
A Hypervisor for Protecting Information of Public Cloudfs User on Memory and on Storage from Malicious Operators,
Master thesis, Dept. of Information and Communication Eng, the University of Tokyo, (2014). - Akifumi Fujita:
The design and implementation of area-efficient processor “Raishodo”,
Master thesis, Dept. of Information and Communication Eng, the University of Tokyo, (2014).
- Kaoru Hayakawa: