Suzaki Lab
(Security for System Software and Hardware)
News
- FY2025 Suzaki lab starts with Kenichiro Muto(D2), Toyofumi Sawa(D2), Masaki Soshima(M2), iroaki Kato(M2), Hikaru Ujigawa(M2), Huang Junlin(M1), Yasuyuki Sano(M1), Nobuyuki Tabuchi(M1), Keita Yamamoto(M1), and Gaku Yamamoto(M1).
- BlackHat Asia 2026 (21-24/Feb/2026). Ph.D Candidate Sawa's proposal "Breaking the Illusion of Key Zeroization: How OS, Libraries, and Hardware Keep Your AES Keys Alive" is accepted.
- FOSDEM 2026 Confidential Computing Devroom (1/Feb/2026). Our proposal "Lesson from Cloud Confidential Computing Remote Attestation Sample" is accepted. (Slide PDF) (Video)
- We released remote attestation samples on cloud CVM (Azure, AWS, GCP) for AMD SEV-SNP, Intel SGX, Intel TDX, and AWS Nitro.
- ACSAC2025 Honolulu Ph.D Candidate Sawa's paper”Analysis of Encryption Key Zeroization from System-wide Perspective”is accepted. The tool "Periodic-AESKeyFinder" is opened as the artifact.
- Masami Ichikawa released MTCFuzz (Multi-target Coverage-based Greybox Fuzzing) and found Linux bug CVE-2025-40031.
- Professor Suzaki recived TCG Award 2025 (Suzaki is the last.) from from TCG(Trusted Computing Group)
- Old articles
Reseach Topic
- CREST Project Zero-Trust IoT
- TEE: Trusted Execution Environment
- RISC-V
- Confidential Computing
- Root of Trust
- Other system software (OS, Hypervisor) security and hardware security are welcome.
Supervisor
- Kuniyasu Suzaki

- Contact
