Suzaki Lab
(Security for System Software and Hardware)
News
International Workshop on Security(IWSEC 2025@Fukuoka 25-27/Nov) First Submission 2 papers are accepted.
Benign Activity Extraction for Dependency Reduction in Data Provenance-based Attack Analysis, Taishin Saito, *Masaki Hashimoto and Kuniyasu Suzaki (*Kanagawa University)
Analyzing and Mitigating the SSB Vulnerability in an MDP-Equipped RISC-V Processor, Tuo Chen, *Reoma Matsuo, *Ryota Shioya and Kuniyasu Suzaki (*University of Tokyo)
OSCAR: Open-Source Computer Architecture Research (ISA2025 workshop 6/21 @ Waseda Univ.) Tao Chen talked "Speculative Store Bypass Vulnerability in a Memory Dependence Predictor-Equipped RISC-V Processor"(PDF )
OpenSSF Day Tokyo 2025 (6/18 Wed @ Hilton Tokyo Odaiba) Suzaki talked "Current Remote Attestation on IoT --- Arm TrustZone OP-TEE With VERAISON Verifier ---" (Video , PDF )
FY2025 Suzaki lab starts with Kenichiro Muto(D1), Toyofumi Sawa(D1), Hikari Suda(M2), Masami Ichikawa(M2), Mari Hikichi(M1), Masaki Soshima(M1), iroaki Kato(M1), and Hikaru Ujigawa(M1).
FOSDEM 2025 Attestation devroom . Our proposal "Remote Attestation on Arm TrustZone OP-TEE with VERAISON Verifier --- current status and future plan --- " is accepted.
Old articles
Reseach Topic
CREST Project Zero-Trust IoT
TEE: Trusted Execution Environment
RISC-V
Confidential Computing
Root of Trust
Other system software (OS, Hypervisor) security and hardware security are welcome.
Supervisor
Kuniyasu Suzaki 
Contact