Suzaki Lab
(Security for System Software and Hardware)
News
ACSAC2025 Honolulu Ph.D Candidate Sawa's paper”Analysis of Encryption Key Zeroization from System-wide Perspective” is accepted. The tool "Periodic-AESKeyFinder" is opened as the artifact.
Masami Ichikawa released MTCFuzz (Multi-target Coverage-based Greybox Fuzzing) and found Linux bug CVE-2025-40031 .
Professor Suzaki recived TCG Award 2025 (Suzaki is the last.) from from TCG(Trusted Computing Group)
International Workshop on Security(IWSEC 2025@Fukuoka 25-27/Nov) First Submission 2 papers are accepted.
Benign Activity Extraction for Dependency Reduction in Data Provenance-based Attack Analysis, Taishin Saito, *Masaki Hashimoto and Kuniyasu Suzaki (*Kanagawa University)
Analyzing and Mitigating the SSB Vulnerability in an MDP-Equipped RISC-V Processor, Tuo Chen, *Reoma Matsuo, *Ryota Shioya and Kuniyasu Suzaki (*University of Tokyo)
OSCAR: Open-Source Computer Architecture Research (ISA2025 workshop 6/21 @ Waseda Univ.) Tao Chen talked "Speculative Store Bypass Vulnerability in a Memory Dependence Predictor-Equipped RISC-V Processor"(PDF )
OpenSSF Day Tokyo 2025 (6/18 Wed @ Hilton Tokyo Odaiba) Suzaki talked "Current Remote Attestation on IoT --- Arm TrustZone OP-TEE With VERAISON Verifier ---" (Video , PDF )
FY2025 Suzaki lab starts with Kenichiro Muto(D1), Toyofumi Sawa(D1), Hikari Suda(M2), Masami Ichikawa(M2), Mari Hikichi(M1), Masaki Soshima(M1), iroaki Kato(M1), and Hikaru Ujigawa(M1).
FOSDEM 2025 Attestation devroom . Our proposal "Remote Attestation on Arm TrustZone OP-TEE with VERAISON Verifier --- current status and future plan --- " is accepted.
Old articles
Reseach Topic
CREST Project Zero-Trust IoT
TEE: Trusted Execution Environment
RISC-V
Confidential Computing
Root of Trust
Other system software (OS, Hypervisor) security and hardware security are welcome.
Supervisor
Kuniyasu Suzaki
Contact