default search action
Kuniyasu Suzaki
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Taichi Takemura, Ryo Yamamoto, Kuniyasu Suzaki:
TEE-PA: TEE Is a Cornerstone for Remote Provenance Auditing on Edge Devices With Semi-TCB. IEEE Access 12: 26536-26549 (2024) - [c35]Kazuki Matsuo, Satoshi Tanda, Kuniyasu Suzaki, Yuhei Kawakoya, Tatsuya Mori:
SmmPack: Obfuscation for SMM Modules with TPM Sealed Key. DIMVA 2024: 439-459 - [c34]Takashi Yagawa, Tadanori Teruya, Kuniyasu Suzaki, Hirotake Abe:
Delegating Verification for Remote Attestation Using TEE. EuroS&P Workshops 2024: 186-192 - [i3]Kazuki Matsuo, Satoshi Tanda, Kuniyasu Suzaki, Yuhei Kawakoya, Tatsuya Mori:
SmmPack: Obfuscation for SMM Modules with TPM Sealed Key. CoRR abs/2405.04355 (2024) - 2023
- [j15]Anh-Tien Le, Trong-Thuc Hoang, Ba-Anh Dao, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham:
A cross-process Spectre attack via cache on RISC-V processor with trusted execution environment. Comput. Electr. Eng. 105: 108546 (2023) - 2022
- [j14]Ronaldo Serrano, Ckristian Duran, Marco Sarmiento, Trong-Thuc Hoang, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham:
A Robust and Healthy Against PVT Variations TRNG Based on Frequency Collapse. IEEE Access 10: 41852-41862 (2022) - [j13]Trong-Thuc Hoang, Ckristian Duran, Ronaldo Serrano, Marco Sarmiento, Khai-Duy Nguyen, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham:
Trusted Execution Environment Hardware by Isolated Heterogeneous Architecture for Key Scheduling. IEEE Access 10: 46014-46027 (2022) - [c33]Anh-Tien Le, Trong-Thuc Hoang, Ba-Anh Dao, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham:
Spectre attack detection with Neutral Network on RISC-V processor. ISCAS 2022: 2467-2471 - [c32]Binh Kieu-Do-Nguyen, Trong-Thuc Hoang, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham:
High-performance Multi-function HMAC-SHA2 FPGA Implementation. NEWCAS 2022: 30-34 - 2021
- [j12]Ba-Anh Dao, Trong-Thuc Hoang, Anh-Tien Le, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham:
Exploiting the Back-Gate Biasing Technique as a Countermeasure Against Power Analysis Attacks. IEEE Access 9: 24768-24786 (2021) - [j11]Ronaldo Serrano, Ckristian Duran, Trong-Thuc Hoang, Marco Sarmiento, Khai-Duy Nguyen, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham:
A Fully Digital True Random Number Generator With Entropy Source Based in Frequency Collapse. IEEE Access 9: 105748-105755 (2021) - [j10]Kuniyasu Suzaki, Kenta Nakajima, Tsukasa Oi, Akira Tsukamoto:
TS-Perf: General Performance Measurement of Trusted Execution Environment and Rich Execution Environment on Intel SGX, Arm TrustZone, and RISC-V Keystone. IEEE Access 9: 133520-133530 (2021) - [j9]Ba-Anh Dao, Trong-Thuc Hoang, Anh-Tien Le, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham:
Correlation Power Analysis Attack Resisted Cryptographic RISC-V SoC With Random Dynamic Frequency Scaling Countermeasure. IEEE Access 9: 151993-152014 (2021) - [j8]Anh-Tien Le, Trong-Thuc Hoang, Ba-Anh Dao, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham:
A Real-Time Cache Side-Channel Attack Detection System on RISC-V Out-of-Order Processor. IEEE Access 9: 164597-164612 (2021) - [j7]Ryousei Takano, Kuniyasu Suzaki:
Disaggregated Accelerator Management System for Cloud Data Centers. IEICE Trans. Inf. Syst. 104-D(3): 465-468 (2021) - [c31]Trong-Thuc Hoang, Ckristian Duran, Ronaldo Serrano, Marco Sarmiento, Khai-Duy Nguyen, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham:
System-on-Chip Implementation of Trusted Execution Environment with Heterogeneous Architecture. HCS 2021: 1-16 - [c30]Ronaldo Serrano, Ckristian Duran, Trong-Thuc Hoang, Marco Sarmiento, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham:
ChaCha20-Poly1305 Crypto Core Compatible with Transport Layer Security 1.3. ISOCC 2021: 17-18 - [c29]Kota Yoshida, Kuniyasu Suzaki, Takeshi Fujino:
Towards Trusted IoT Sensing Systems: Implementing PUF as Secure Key Generator for Root of Trust and Message Authentication Code. HASP@MICRO 2021: 4:1-4:8 - 2020
- [j6]Trong-Thuc Hoang, Ckristian Duran, Duc-Thinh Nguyen-Hoang, Duc-Hung Le, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham:
Quick Boot of Trusted Execution Environment With Hardware Accelerators. IEEE Access 8: 74015-74023 (2020) - [j5]Trong-Thuc Hoang, Ckristian Duran, Khai-Duy Nguyen, Tuan-Kiet Dang, Quynh Nguyen Quang Nhu, Phuc Hong Than, Xuan-Tu Tran, Duc-Hung Le, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham:
Low-power high-performance 32-bit RISC-V microcontroller on 65-nm silicon-on-thin-BOX (SOTB). IEICE Electron. Express 17(20): 20200282 (2020) - [c28]Kuniyasu Suzaki, Akira Tsukamoto, Andy Green, Mohammad Mannan:
Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment for Disposable IoT devices. ACSAC 2020: 428-441 - [c27]Trong-Thuc Hoang, Ckristian Duran, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham:
Cryptographic Accelerators for Trusted Execution Environment in RISC-V Processors. ISCAS 2020: 1-4 - [c26]Kuniyasu Suzaki, Kenta Nakajima, Tsukasa Oi, Akira Tsukamoto:
Library Implementation and Performance Analysis of GlobalPlatform TEE Internal API for Intel SGX and RISC-V Keystone. TrustCom 2020: 1200-1208 - [i2]Ryousei Takano, Kuniyasu Suzaki:
Disaggregated Accelerator Management System for Cloud Data Centers. CoRR abs/2010.13594 (2020)
2010 – 2019
- 2019
- [c25]Kuniyasu Suzaki, Yohei Hori, Kazukuni Kobara, Mohammad Mannan:
DeviceVeil: Robust Authentication for Individual USB Devices Using Physical Unclonable Functions. DSN 2019: 302-314 - 2018
- [c24]Takamichi Saito, Masahiro Yokoyama, Shota Sugawara, Kuniyasu Suzaki:
Safe Trans Loader: Mitigation and Prevention of Memory Corruption Attacks for Released Binaries. IWSEC 2018: 68-83 - 2016
- [c23]Kuniyasu Suzaki, Hidetaka Koie, Ryousei Takano:
Bare-Metal Container: Direct Execution of a Container Image on a Remote Machine with an Optimized Kernel. HPCC/SmartCity/DSS 2016: 25-34 - 2015
- [j4]Cyrille Artho, Kuniyasu Suzaki, Masami Hagiya, Watcharin Leungwattanakit, Richard Potter, Eric Platon, Yoshinori Tanabe, Franz Weitl, Mitsuharu Yamamoto:
Using Checkpointing and Virtualization for Fault Injection. Int. J. Netw. Comput. 5(2): 347-372 (2015) - 2014
- [j3]Richard Potter, Cyrille Artho, Kuniyasu Suzaki, Masami Hagiya:
A Knoppix-based demonstration environment for JPF. ACM SIGSOFT Softw. Eng. Notes 39(1): 1-5 (2014) - [c22]Cyrille Artho, Masami Hagiya, Watcharin Leungwattanakit, Eric Platon, Richard Potter, Kuniyasu Suzaki, Yoshinori Tanabe, Franz Weitl, Mitsuharu Yamamoto:
Using Checkpointing and Virtualization for Fault Injection. CANDAR 2014: 144-150 - [c21]Kuniyasu Suzaki, Toshiki Yagi, Kazukuni Kobara, Toshiaki Ishiyama:
Kernel Memory Protection by an Insertable Hypervisor Which Has VM Introspection and Stealth Breakpoints. IWSEC 2014: 48-61 - [c20]Kuniyasu Suzaki, Toshiki Yagi, Akira Tanaka, Yutaka Oiwa, Etsuya Shibayama:
Rollback mechanism of nested virtual machines for protocol fuzz testing. SAC 2014: 1484-1491 - 2013
- [j2]Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi, Cyrille Artho:
Implementation of a Memory Disclosure Attack on Memory Deduplication of Virtual Machines. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 215-224 (2013) - 2012
- [j1]Ruo Ando, Kazushi Takahashi, Kuniyasu Suzaki:
Inter-domain Communication Protocol for Real-time File Access Monitor of Virtual Machine. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 120-137 (2012) - [c19]Cyrille Artho, Kuniyasu Suzaki, Roberto Di Cosmo, Ralf Treinen, Stefano Zacchiroli:
Why do software packages conflict? MSR 2012: 141-150 - 2011
- [c18]Masaki Minami, Kuniyasu Suzaki, Takashi Okumura:
Security considered harmful a case study of tradeoff between security and usability. CCNC 2011: 523-524 - [c17]Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi, Cyrille Artho:
Memory deduplication as a threat to the guest OS. EUROSEC 2011: 1 - [c16]Ruo Ando, Kuniyasu Suzaki:
A Lightweight Access Log Filter of Windows OS Using Simple Debug Register Manipulation. FGIT-SecTech 2011: 215-227 - [i1]Cyrille Artho, Roberto Di Cosmo, Kuniyasu Suzaki, Stefano Zacchiroli:
Sources of Inter-package Conflicts in Debian. CoRR abs/1110.1354 (2011) - 2010
- [c15]Kuniyasu Suzaki, Toshiki Yagi, Kengo Iijima, Anh-Quynh Nguyen, Cyrille Artho, Yoshihito Watanebe:
Moving from Logical Sharing of Guest OS to Physical Sharing of Deduplication on Virtual Machine. HotSec 2010
2000 – 2009
- 2007
- [c14]Kuniyasu Suzaki, Toshiki Yagi, Kengo Iijima, Anh-Quynh Nguyen:
OS Circular: Internet Client for Reference. LISA 2007: 105-116 - [c13]Jun Kanai, Mitaro Namiki, Kuniyasu Suzaki, Toshiki Yagi:
Mobile Thin-Client System with Fault Tolerance and Scalability by "HTTP-FUSE-KNOPPIX-BOX". PDPTA 2007: 207-213 - [c12]Anh-Quynh Nguyen, Kuniyasu Suzaki:
Xenprobus, a Lightweight User-Space Probing Framework for Xen Virtual Machine. USENIX ATC 2007: 15-28 - 2006
- [c11]Tatsuyoshi Hamada, Kuniyasu Suzaki, Kengo Iijima, Arimitsu Shikoda:
KNOPPIX/Math: Portable and Distributable Collection of Mathematical Software and Free Documents. ICMS 2006: 385-390 - 2005
- [c10]Megumi Hisayuki, Shinji Inoue, Yoshiaki Kakuda, Kenji Toda, Kuniyasu Suzaki:
Dynamic Load Balancing Using Network Transferable Computer. ICDCS Workshops 2005: 51-57 - [c9]Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi, Hideyuki Tan, Kazuhiro Goto:
SFS-KNOPPIX. NCA 2005: 247-250 - [c8]Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi, Hideyuki Tan, Kazuhiro Goto:
SFS-Knoppix which Boots from Internet. WEBIST 2005: 214-217 - 2003
- [c7]Megumi Hisayuki, Shinji Inoue, Yoshiaki Kakuda, Kenji Toda, Kuniyasu Suzaki:
Adaptable Load Balancing Using Network Transferable Computer Associated with Mobile IP. ICDCS Workshops 2003: 8-13
1990 – 1999
- 1999
- [c6]Kuniyasu Suzaki, David Walsh:
Scheduling on AP/Linux for Fine and Coarse Grain Parallel Processes. JSSPP 1999: 111-128 - 1998
- [c5]Kuniyasu Suzaki, David Walsh:
Implementing the Combination of Time Sharing and Space Sharing on AP/Linux. JSSPP 1998: 83-97 - [c4]Bing Bing Zhou, Richard P. Brent, David Walsh, Kuniyasu Suzaki:
Job Scheduling Strategies for Networks of Workstations. JSSPP 1998: 143-157 - 1997
- [c3]Kuniyasu Suzaki, Hitoshi Tanuma, Yuuji Ichisugi:
Design of Combination of Time Sharing and Space Sharing For Parallel Task Scheduling. PDPTA 1997: 402-409 - 1996
- [c2]Kuniyasu Suzaki, Hitoshi Tanuma, Satoshi Hirano, Yuuji Ichisugi, Chris Connelly, Michiharu Tsukamoto:
Multi-tasking Method on Parallel Computers which Combines a Contiguous and Non-contiguous Processor Partitioning Algorithm. PARA 1996: 641-650 - 1993
- [c1]Kuniyasu Suzaki, Takio Kurita, Hitoshi Tanuma, Satoshi Hirano:
Adaptive algorithm selection method (AASM) for dynamic software tuning. COMPSAC 1993: 248-256
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 01:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint