論文
Taishin Saito, Masaki Hashimoto and Kuniyasu Suzaki, Benign Activity Extraction for Dependency Reduction in Data Provenance-based Attack Analysis, International Workshop on Security(IWSEC 2025@Fukuoka 25-27/Nov)
Tuo Chen, Reoma Matsuo, Ryota Shioya and Kuniyasu Suzaki, Analyzing and Mitigating the SSB Vulnerability in an MDP-Equipped RISC-V Processor, International Workshop on Security(IWSEC 2025@Fukuoka 25-27/Nov)
Takashi Yagawa, Tadanori Teruya, Kuniyasu Suzaki, and Hirotake Abe, Delegating Verification for Remote Attestation using TEE, SysTEX2024 (7th Workshop on System Software for Trusted Execution) co-located with IEEE Euro S&P'24
Kazuki Matsuo, Satoshi Tanda, Yuhei Kawakoya, Kuniyasu Suzaki, and Tatsuya Mori, "SmmPack: Obfuscation for SMM Modules with TPM Sealed Key" DIMVA(Conference on Detection of Intrusions and Malware & Vulnerability Assessment)2024
Taichi Takemura, Ryo Yamamoto, and Kuniyasu Suzaki, TEE-PA: TEE Is a Cornerstone for Remote Provenance Auditing on Edge Devices With Semi-TCB , IEEE Access 12, 26536-26549, Feb/2024
Trong-Thuc Hoang, Ckristian Duran, Ronaldo Serrano, Marco Sarmiento, Khai-Duy Nguyen, Akira Tsukamoto, Kuniyasu Suzaki, and Cong-Kha Pha, Trusted Execution Environment Hardware by Isolated Heterogeneous Architecture for Key Scheduling , IEEE Access 10 146014-46027 April/2022
Ronaldo Serrano, Ckristian Duran, Marco Sarmiento, Trong-Thuc Hoang, Akira Tsukamoto, Kuniyasu Suzaki, and Cong-Kha Pham, A Robust and Healthy Against PVT Variations TRNG based on Frequency Collapse , IEEE Access 10 41852-41862 April/2022
Anh-Tien Le, Trong-Thuc Hoang, Ba-Anh Dao, Akira Tsukamoto, Kuniyasu Suzaki, and Cong-Kha Pham, A Real-time Cache side-channel attack detection system on RISC-V Out-of-order processor , IEEE Access 9 164597-164612 Dec/2021
Ba-Anh Dao, Trong-Thuc Hoang, Anh-Tien Le, Akira Tsukamoto, Kuniyasu Suzaki, and Cong-Kha Pham, Correlation Power Analysis Attack Resisted Cryptographic RISC-V SoC with Random Dynamic Frequency Scaling Countermeasure , IEEE Access 9 151993-152014 Nov/2021
Kota Yoshida, Kuniyasu Suzaki, and Takeshi Fujino, Towards Trusted IoT Sensing Systems: Implementing PUF as Secure Key Generator for Root of Trust and Message Authentication Code , Workshop on Hardware and Architectural Support for Security and Privacy (HASP) 1-8 18/Oct/2021
Kuniyasu Suzaki, Kenta Nakajima, Tsukasa Oi, and Akira Tsukamoto, TS-Perf: General Performance Measurement of Trusted Execution Environment and Rich Execution Environment on Intel SGX, Arm TrustZone, and RISC-V Keystone , IEEE Access 9 133520-133530 13/Sep/2021
Ronaldo Serrano, Ckristian Duran, Trong-Thuc Hoang, Marco Sarmiento, Khai-Duy Nguyen, Akira Tsukamoto, Kuniyasu Suzaki, and Cong-Kha Pham, A Fully Digital True Random Number Generator With Entropy Source Based in Frequency Collapse , IEEE Access 9 105748-105755 July/2021
Ba-Anh Dao, Trong-Thuc Hoang, Anh-Tien Le, Akira Tsukamoto, Kuniyasu Suzaki, and Cong-Kha Pham, Exploiting the Back-Gate Biasing Technique as a Countermeasure Against Power Analysis Attacks , IEEE Access 9 24768-24786 Feb/2021
Kuniyasu Suzaki, Akira Tsukamoto, Andy Green, and Mohammad Mannan, Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment for Disposable IoT devices , Annual Computer Security Applications Conference (ACSAC) 7/Dec/2020
Ryousei Takano, and Kuniyasu Suzaki, Disaggregated Accelerator Management System for Cloud Data Centers , IEICE TRANSACTIONS on Information and Systems Dec/2020
Kuniyasu Suzaki, Kenta Nakajima, Akira Tsukamoto, and Tsukasa Oi, Library Implementation and Performance Analysis of GlobalPlatform TEE Internal API for Intel SGX and RISC-V Keystone , The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2020) Dec/2020
Kuniyasu Suzaki, Yohei Hori, Kazukuni Kobara, and Mohammad Mannan, DeviceVeil: Robust Authentication for Individual USB Devices Using Physical Unclonable Functions , IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) June/2019
解説記事
須崎有康, AI時代の安全なデータ処理「Confidential Computing」:機密コンピューティングの技術的特徴~低レイヤの開発課題とAI/機械学習等への適用が期待される新しい機能を解説~ , 情報処理学会誌「情報処理」 66(7) e8-e14 2025年6月
須崎有康, IoTデバイスにおけるTEE(Trusted Execution Environment)の実装 , システム制御情報学会誌「システム/制御/情報」 68(5) 185-190 2024年5月
須崎有康, RISC-V におけるプロセッサセキュリティ機構とシステムアーキテクチャ—TEE (Trusted Execution Environment), Hardware Root of Trust, Remote Attestation , 須崎有康, システム制御情報学会誌「システム/制御/情報」 67(9) 379-384 2023年9月
須崎有康, Trusted Execution Environmentの実装とそれを支える技術 , 電子情報通信学会 基礎・境界ソサイエティ Fundamentals Review 14(2) 107-117 2020年10月1日
須崎有康, and 佐々木 貴之, Trusted Execution Environmentによるシステムの堅牢化, 情報処理学会学会誌「情報処理」 61(6) 576-579 2020年5月
講演
Tuo Chen, Reoma Matsuo, Ryota Shioya and Kuniyasu Suzaki, Speculative Store Bypass Vulnerability in a Memory Dependence Predictor-Equipped RISC-V Processor (PDF ), OSCAR: Open-Source Computer Architecture Research (ISA2025 workshop), 2025/6/21
Kuniyasu Suzaki, Current Remote Attestation on IoT --- Arm TrustZone OP-TEE With VERAISON Verifier --- (Video , PDF ), OpenSSF Day Tokyo 2025, 2025/6/18
須崎有康, Remote attestation is necessary for CVM (Video , PDF ), IIJ技術研究所セミナー 2025年5月18日
Kuniyasu Suzaki, Remote Attestation on Arm TrustZone OP-TEE with VERAISON Verifier --- current status and future plan --- (Video PDF ), FOSDEM 2025 Attestation devroom , 2025/2/2
Kuniyasu Suzaki, Why Do Current Remote Attestation Methods Not Suit VM-Type Confidential Computing?
(Video ), FOSDEM 2025 Confidential Computing devroom , 2025/2/1
RISC-Vのセキュリティ技術(TEE, Root of trust, Remote Attestation), 組込みシステム技術協会 第6回 RISC-V Webセミナー 2022年5月25日
須崎有康, 遠隔デバイスとの信頼を築くための技術とその標準 TEEP(Trusted Execution Environment Provisioning)とRATS (Remote ATtestation procedureS), 第11回サイバーセキュリティ国際シンポジウム 2021年10月
須崎有康, TEE(Trusted Execution Environment)と それに関する研究開発動向, 電子情報通信学会 デジタルサービス・プラットフォーム技術 特別研究専門委員会 2021年9月
須崎有康, TEE (Trusted Execution Environment)とは何か?, 日本ソフトウェア科学会 ディペンダブルシステムワークショップ (DSW2020) 2021年3月
須崎有康, TEE (Trusted Execution Environment)は 第⼆の仮想化技術になるか︖, 第32回コンピュータシステム・シンポジウム(ComSys2020)招待講演, 2020年12月