עקוב אחר
Kuniyasu Suzaki
Kuniyasu Suzaki
IISEC: Institute of Information Security, Graduate School
כתובת אימייל מאומתת בדומיין iisec.ac.jp - דף הבית
כותרת
צוטט על ידי
צוטט על ידי
שנה
Memory deduplication as a threat to the guest OS
K Suzaki, K Iijima, T Yagi, C Artho
Proceedings of the Fourth European Workshop on System Security, 1-6, 2011
1942011
Why do software packages conflict?
C Artho, K Suzaki, R Di Cosmo, R Treinen, S Zacchiroli
2012 9th IEEE Working Conference on Mining Software Repositories (MSR), 141-150, 2012
682012
Software side channel attack on memory deduplication
K Suzaki, K Iijima, T Yagi, C Artho
ACM Symposium on Operating Systems Principles (SOSP 2011), Poster session, 2011
422011
Xenprobes, a lightweight user-space probing framework for xen virtual machine
NA Quynh, K Suzaki
USENIX annual technical conference proceedings, 2007
422007
Input and output control means for computer system storage and a software execution method using same
K Suzaki
US Patent 7,240,239, 2007
362007
Multi-tasking method on parallel computers which combines a contiguous and a non-contiguous processor partitioning algorithm
K Suzaki, H Tanuma, S Hirano, Y Ichisugi, C Connelly, M Tsukamoto
Applied Parallel Computing Industrial Computation and Optimization: Third …, 1996
301996
Ts-perf: General performance measurement of trusted execution environment and rich execution environment on intel sgx, arm trustzone, and risc-v keystone
K Suzaki, K Nakajima, T Oi, A Tsukamoto
IEEE Access 9, 133520-133530, 2021
282021
A fully digital true random number generator with entropy source based in frequency collapse
R Serrano, C Duran, TT Hoang, M Sarmiento, KD Nguyen, A Tsukamoto, ...
IEEE Access 9, 105748-105755, 2021
232021
Job scheduling strategies for networks of workstations
BB Zhou, RP Brent, D Walsh, K Suzaki
Job Scheduling Strategies for Parallel Processing: IPPS/SPDP'98 Workshop …, 1998
231998
Virt-ICE: Next-generation debugger for malware analysis
NA Quynh, K Suzaki
Black Hat USA, 2010
222010
Implementation of a memory disclosure attack on memory deduplication of virtual machines
K Suzaki, K Iijima, T Yagi, C Artho
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2013
212013
Implementing the Combination of Time Sharing and Space Sharing on AP/Linux
K Suzaki, D Walsh
Job Scheduling Strategies for Parallel Processing: IPPS/SPDP'98 Workshop …, 1998
211998
Reboot-oriented IoT: Life cycle management in trusted execution environment for disposable IoT devices
K Suzaki, A Tsukamoto, A Green, M Mannan
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
192020
Quick boot of trusted execution environment with hardware accelerators
TT Hoang, C Duran, DT Nguyen-Hoang, DH Le, A Tsukamoto, K Suzaki, ...
IEEE Access 8, 74015-74023, 2020
192020
Moving from Logical Sharing of Guest {OS} to Physical Sharing of Deduplication on Virtual Machine
K Suzaki, T Yagi, K Iijima, NA Quynh, C Artho, Y Watanebe
5th USENIX Workshop on Hot Topics in Security (HotSec 10), 2010
192010
OS Circular: Internet Client for Reference.
K Suzaki, T Yagi, K Iijima, AQ Nguyen
LISA 7, 1-12, 2007
182007
Trusted execution environment hardware by isolated heterogeneous architecture for key scheduling
TT Hoang, C Duran, R Serrano, M Sarmiento, KD Nguyen, A Tsukamoto, ...
IEEE Access 10, 46014-46027, 2022
172022
Library implementation and performance analysis of GlobalPlatform TEE Internal API for Intel SGX and RISC-V Keystone
K Suzaki, K Nakajima, T Oi, A Tsukamoto
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
172020
Correlation power analysis attack resisted cryptographic RISC-V SoC with random dynamic frequency scaling countermeasure
BA Dao, TT Hoang, AT Le, A Tsukamoto, K Suzaki, CK Pham
IEEE Access 9, 151993-152014, 2021
162021
Exploiting the back-gate biasing technique as a countermeasure against power analysis attacks
BA Dao, TT Hoang, AT Le, A Tsukamoto, K Suzaki, CK Pham
IEEE Access 9, 24768-24786, 2021
162021
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20