Kuniyasu Suzaki

Orcid: 0000-0003-0912-0087

According to our database1, Kuniyasu Suzaki authored at least 49 papers between 1993 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
TEE-PA: TEE Is a Cornerstone for Remote Provenance Auditing on Edge Devices With Semi-TCB.
IEEE Access, 2024

2023
A cross-process Spectre attack via cache on RISC-V processor with trusted execution environment.
Comput. Electr. Eng., January, 2023

2022
A Robust and Healthy Against PVT Variations TRNG Based on Frequency Collapse.
IEEE Access, 2022

Trusted Execution Environment Hardware by Isolated Heterogeneous Architecture for Key Scheduling.
IEEE Access, 2022

High-performance Multi-function HMAC-SHA2 FPGA Implementation.
Proceedings of the 20th IEEE Interregional NEWCAS Conference, 2022

Spectre attack detection with Neutral Network on RISC-V processor.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2022

2021
Disaggregated Accelerator Management System for Cloud Data Centers.
IEICE Trans. Inf. Syst., 2021

TS-Perf: General Performance Measurement of Trusted Execution Environment and Rich Execution Environment on Intel SGX, Arm TrustZone, and RISC-V Keystone.
IEEE Access, 2021

A Fully Digital True Random Number Generator With Entropy Source Based in Frequency Collapse.
IEEE Access, 2021

A Real-Time Cache Side-Channel Attack Detection System on RISC-V Out-of-Order Processor.
IEEE Access, 2021

Correlation Power Analysis Attack Resisted Cryptographic RISC-V SoC With Random Dynamic Frequency Scaling Countermeasure.
IEEE Access, 2021

Exploiting the Back-Gate Biasing Technique as a Countermeasure Against Power Analysis Attacks.
IEEE Access, 2021

Towards Trusted IoT Sensing Systems: Implementing PUF as Secure Key Generator for Root of Trust and Message Authentication Code.
Proceedings of the HASP '21: Workshop on Hardware and Architectural Support for Security and Privacy, 2021

ChaCha20-Poly1305 Crypto Core Compatible with Transport Layer Security 1.3.
Proceedings of the 18th International SoC Design Conference, 2021

System-on-Chip Implementation of Trusted Execution Environment with Heterogeneous Architecture.
Proceedings of the IEEE Hot Chips 33 Symposium, 2021

2020
Low-power high-performance 32-bit RISC-V microcontroller on 65-nm silicon-on-thin-BOX (SOTB).
IEICE Electron. Express, 2020

Quick Boot of Trusted Execution Environment With Hardware Accelerators.
IEEE Access, 2020

Library Implementation and Performance Analysis of GlobalPlatform TEE Internal API for Intel SGX and RISC-V Keystone.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Cryptographic Accelerators for Trusted Execution Environment in RISC-V Processors.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020

Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment for Disposable IoT devices.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
DeviceVeil: Robust Authentication for Individual USB Devices Using Physical Unclonable Functions.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
Safe Trans Loader: Mitigation and Prevention of Memory Corruption Attacks for Released Binaries.
Proceedings of the Advances in Information and Computer Security, 2018

2016
Bare-Metal Container: Direct Execution of a Container Image on a Remote Machine with an Optimized Kernel.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
Using Checkpointing and Virtualization for Fault Injection.
Int. J. Netw. Comput., 2015

2014
A Knoppix-based demonstration environment for JPF.
ACM SIGSOFT Softw. Eng. Notes, 2014

Rollback mechanism of nested virtual machines for protocol fuzz testing.
Proceedings of the Symposium on Applied Computing, 2014

Kernel Memory Protection by an Insertable Hypervisor Which Has VM Introspection and Stealth Breakpoints.
Proceedings of the Advances in Information and Computer Security, 2014

2013
Implementation of a Memory Disclosure Attack on Memory Deduplication of Virtual Machines.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

2012
Inter-domain Communication Protocol for Real-time File Access Monitor of Virtual Machine.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

Why do software packages conflict?
Proceedings of the 9th IEEE Working Conference of Mining Software Repositories, 2012

2011
Sources of Inter-package Conflicts in Debian
CoRR, 2011

A Lightweight Access Log Filter of Windows OS Using Simple Debug Register Manipulation.
Proceedings of the Security Technology, 2011

Memory deduplication as a threat to the guest OS.
Proceedings of the Fourth European Workshop on System Security, 2011

Security considered harmful a case study of tradeoff between security and usability.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
Moving from Logical Sharing of Guest OS to Physical Sharing of Deduplication on Virtual Machine.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

2007
Xenprobus, a Lightweight User-Space Probing Framework for Xen Virtual Machine.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007

Mobile Thin-Client System with Fault Tolerance and Scalability by "HTTP-FUSE-KNOPPIX-BOX".
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2007

OS Circular: Internet Client for Reference.
Proceedings of the 21th Large Installation System Administration Conference, 2007

2006
KNOPPIX/Math: Portable and Distributable Collection of Mathematical Software and Free Documents.
Proceedings of the Mathematical Software, 2006

2005
SFS-Knoppix which Boots from Internet.
Proceedings of the WEBIST 2005, 2005

SFS-KNOPPIX.
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005

Dynamic Load Balancing Using Network Transferable Computer.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

2003
Adaptable Load Balancing Using Network Transferable Computer Associated with Mobile IP.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

1999
Scheduling on AP/Linux for Fine and Coarse Grain Parallel Processes.
Proceedings of the Job Scheduling Strategies for Parallel Processing, 1999

1998
Job Scheduling Strategies for Networks of Workstations.
Proceedings of the Job Scheduling Strategies for Parallel Processing, 1998

Implementing the Combination of Time Sharing and Space Sharing on AP/Linux.
Proceedings of the Job Scheduling Strategies for Parallel Processing, 1998

1997
Design of Combination of Time Sharing and Space Sharing For Parallel Task Scheduling.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1997

1996
Multi-tasking Method on Parallel Computers which Combines a Contiguous and Non-contiguous Processor Partitioning Algorithm.
Proceedings of the Applied Parallel Computing, 1996

1993
Adaptive algorithm selection method (AASM) for dynamic software tuning.
Proceedings of the Seventeenth Annual International Computer Software and Applications Conference, 1993


  Loading...