Kuniyasu Suzaki
Orcid: 0000-0003-0912-0087
According to our database1,
Kuniyasu Suzaki
authored at least 51 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
TEE-PA: TEE Is a Cornerstone for Remote Provenance Auditing on Edge Devices With Semi-TCB.
IEEE Access, 2024
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
2023
A cross-process Spectre attack via cache on RISC-V processor with trusted execution environment.
Comput. Electr. Eng., January, 2023
2022
IEEE Access, 2022
Trusted Execution Environment Hardware by Isolated Heterogeneous Architecture for Key Scheduling.
IEEE Access, 2022
Proceedings of the 20th IEEE Interregional NEWCAS Conference, 2022
Proceedings of the IEEE International Symposium on Circuits and Systems, 2022
2021
IEICE Trans. Inf. Syst., 2021
TS-Perf: General Performance Measurement of Trusted Execution Environment and Rich Execution Environment on Intel SGX, Arm TrustZone, and RISC-V Keystone.
IEEE Access, 2021
A Fully Digital True Random Number Generator With Entropy Source Based in Frequency Collapse.
IEEE Access, 2021
A Real-Time Cache Side-Channel Attack Detection System on RISC-V Out-of-Order Processor.
IEEE Access, 2021
Correlation Power Analysis Attack Resisted Cryptographic RISC-V SoC With Random Dynamic Frequency Scaling Countermeasure.
IEEE Access, 2021
Exploiting the Back-Gate Biasing Technique as a Countermeasure Against Power Analysis Attacks.
IEEE Access, 2021
Towards Trusted IoT Sensing Systems: Implementing PUF as Secure Key Generator for Root of Trust and Message Authentication Code.
Proceedings of the HASP '21: Workshop on Hardware and Architectural Support for Security and Privacy, 2021
Proceedings of the 18th International SoC Design Conference, 2021
System-on-Chip Implementation of Trusted Execution Environment with Heterogeneous Architecture.
Proceedings of the IEEE Hot Chips 33 Symposium, 2021
2020
Low-power high-performance 32-bit RISC-V microcontroller on 65-nm silicon-on-thin-BOX (SOTB).
IEICE Electron. Express, 2020
IEEE Access, 2020
Library Implementation and Performance Analysis of GlobalPlatform TEE Internal API for Intel SGX and RISC-V Keystone.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020
Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment for Disposable IoT devices.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
DeviceVeil: Robust Authentication for Individual USB Devices Using Physical Unclonable Functions.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
2018
Safe Trans Loader: Mitigation and Prevention of Memory Corruption Attacks for Released Binaries.
Proceedings of the Advances in Information and Computer Security, 2018
2016
Bare-Metal Container: Direct Execution of a Container Image on a Remote Machine with an Optimized Kernel.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
2015
Int. J. Netw. Comput., 2015
2014
ACM SIGSOFT Softw. Eng. Notes, 2014
Proceedings of the Symposium on Applied Computing, 2014
Kernel Memory Protection by an Insertable Hypervisor Which Has VM Introspection and Stealth Breakpoints.
Proceedings of the Advances in Information and Computer Security, 2014
2013
Implementation of a Memory Disclosure Attack on Memory Deduplication of Virtual Machines.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
2012
Inter-domain Communication Protocol for Real-time File Access Monitor of Virtual Machine.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
Proceedings of the 9th IEEE Working Conference of Mining Software Repositories, 2012
2011
A Lightweight Access Log Filter of Windows OS Using Simple Debug Register Manipulation.
Proceedings of the Security Technology, 2011
Proceedings of the Fourth European Workshop on System Security, 2011
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011
2010
Moving from Logical Sharing of Guest OS to Physical Sharing of Deduplication on Virtual Machine.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010
2007
Proceedings of the 2007 USENIX Annual Technical Conference, 2007
Mobile Thin-Client System with Fault Tolerance and Scalability by "HTTP-FUSE-KNOPPIX-BOX".
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2007
Proceedings of the 21th Large Installation System Administration Conference, 2007
2006
KNOPPIX/Math: Portable and Distributable Collection of Mathematical Software and Free Documents.
Proceedings of the Mathematical Software, 2006
2005
SFS-Knoppix which Boots from Internet.
Proceedings of the WEBIST 2005, 2005
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005
2003
Adaptable Load Balancing Using Network Transferable Computer Associated with Mobile IP.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003
1999
Proceedings of the Job Scheduling Strategies for Parallel Processing, 1999
1998
Proceedings of the Job Scheduling Strategies for Parallel Processing, 1998
Proceedings of the Job Scheduling Strategies for Parallel Processing, 1998
1997
Design of Combination of Time Sharing and Space Sharing For Parallel Task Scheduling.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1997
1996
Multi-tasking Method on Parallel Computers which Combines a Contiguous and Non-contiguous Processor Partitioning Algorithm.
Proceedings of the Applied Parallel Computing, 1996
1993
Proceedings of the Seventeenth Annual International Computer Software and Applications Conference, 1993