Meet Our Faculty Members

Lectures in charge

  • Operating Systems
  • Information Device Technology
  • Information System Architecture

Course

System Design Course, Security, Risk Management Course

Profile

Kuniyasu Suzaki received his Master's degree in Computer Science from Tokyo University of Agriculture and Technology (TUAT) in 1990. He earned his Ph.D. from the University of Tokyo in 2007. In 1991, he joined the Electrotechnical Laboratory (ETL). In 2001, ETL and other research institutes under the Ministry of Economy, Trade and Industry (METI) were consolidated into the National Institute of Advanced Industrial Science and Technology (AIST). During his time at ETL and AIST, he was a visiting scholar at the Australian National University (ANU) and the University of Illinois Urbana-Champaign (UIUC). He is currently a professor at the Graduate School of Information Security, Institute of Information Security (IISEC).

Research Achievement

  1. Taichi Takemura, RyoYamamoto, and Kuniyasu Suzaki, TEE-PA: TEE Is a Cornerstone for Remote Provenance Auditing on Edge Devices With Semi-TCB, IEEE ACCESS 12, 2024.
  2. Kuniyasu Suzaki, Kenta Nakajima, Tsukasa Oi, and Akira Tsukamoto, TS-Perf: General Performance Measurement of Trusted Execution Environment and Rich Execution Environment on Intel SGX, Arm TrustZone, and RISC-V Keystone, IEEE Access 9, 2022.
  3. Kuniyasu Suzaki, Akira Tsukamoto, Andy Green, and Mohammad Mannan, Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment for Disposable IoT devices, Annual Computer Security Applications Conference (ACSAC), 2020.
  4. Kuniyasu Suzaki, Yohei Hori, Kazukuni Kobara, and Mohammad Mannan, DeviceVeil: Robust Authentication for Individual USB Devices Using Physical Unclonable Functions, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2019.
  5. Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi, and Cyrille Artho, Memory deduplication as a threat to the guest OS, European Workshop on System Security (EuroSec), 2011.

Research Themes

  • System Software Security (Operating System, Virtual Machine, Confidential Computing, Remote Attestation)
  • Hardware Security (RISC-V, TEE: Trusted Execution Environment, TPM, Secure Element)