[Japanese]

Researcher

Toshihiro Yamauchi

Title

JST PRESTO IoT Area "Research for IoT Fundamental Software for Isolating Program Execution Environment on IoT Devices"

Outline

The purpose of this research is to establish fundamental technology to improve the security of IoT devices from the viewpoint of system software. In particular, I will study the methods that mitigate the influence of vulnerability of IoT devices, reduce the attack surface, and optimize the security policy of access control.

Research Results

  1. Shugo Shiraishi, Akifumi Fukumoto, Eitaro Shioji, Mitsuaki Akiyama, Toshihiro Yamauchi,
    "Research for Security Functions for IoT Devices Forcing on Firmware,"
    Information and Communication System Security (ICSS), vol.119, no.437, pp.37-42, (3, 2020).

  2. Eisuke Matsushita, Toshihiro Yamauchi,
    "An Improvement Method of Security Function of IoT Device Using Seccomp,"
    IEICE General Conference 2020, p.118, (3, 2020).

  3. Shugo Shiraishi, Akifumi Fukumoto, Ryota Yoshimoto, Eitaro Shioji, Mitsuaki Akiyama, Toshihiro Yamauchi,
    "Large-scale Survey on Secure Development of IoT Devices by Software Analysis and Vendor Interview,"
    Computer Security Symposium 2020 (CSS2020), pp.875-882, (10, 2020). (CSS2020 Excellence Paper Award)

  4. Toshihiro Yamauchi, Ryota Yoshitani, Katsunari Yoshioka,
    "Analysis Focusing on Commands of Telnet Logs on IoT Devices,"
    The 83rd National Convention of IPSJ, vol.3, pp.393-394, (3, 2021).

  5. Toshihiro Yamauchi, Ryota Yoshimoto,
    "Suggestion and Evaluation of Access Control by Seccomp Filter Applications through LKM,"
    The 93rd Computer Security Group (CSEC)・The 53rd Internet and Operation Technology (IOT) Joint Session, Information Processing Society of Japan Report, vol.2021-CSEC-93, no.12, pp.1-6, (5, 2021).

  6. Toshihiro Yamauchi, Ryota Yoshimoto, Takahiro Baba, Katsunari Yoshioka,
    "Analysis of Commands of Telnet Logs Illegally Connected to IoT Devices,"
    Proceedings of 2021 10th International Congress on Advanced Applied Informatics (IIAI-AAI 2021), pp.913-915, (7, 2021).

  7. Takahiro Baba, Kensuke Baba, Toshihiro Yamauchi,
    "Malware Classification by Deep Learning Using the Characteristics of Hash Functions,"
    The 20th Forum on Information Technology (FIT2021), vol.4, pp.43-46, (8, 2021).

  8. Shugo Shiraishi, Akifumi Fukumoto, Ryota Yoshimoto, Eitaro Shioji, Mitsuaki Akiyama, Toshihiro Yamauchi,
    "Large-scale Survey on Secure Development of IoT Devices by Software Analysis and Vendor Interview,"
    The 16th International Workshop on Security (IWSEC 2021), Invited session, (9, 2021).

  9. Kaito Shiba, Hiroki Kuzuno, Toshihiro Yamauchi,
    "Investigation of Threats in the Secure World of OP-TEE,"
    Computer Security Symposium 2021 (CSS2021), vol.2021, pp.661-667, (10, 2021).

  10. Takahiro Baba, Kensuke Baba, Katsunari Yoshioka, Toshihiro Yamauchi,
    "Analysis by Clustering Focusing on Telnet Connection Log Commands to IoT Devices,"
    Computer Security Symposium 2021 (CSS2021), vol.2021, pp.692-696, (10, 2021).

  11. Yutaro Osako, Toshihiro Yamauchi, Katsunari Yoshioka, Takuya Fujihashi, Takashi Watanabe, Shunsuke Saruwatari,
    "Research of the Classification Methods for IoT Malware,"
    Computer Security Symposium 2021 (CSS2021), vol.2021, pp.697-704, (10, 2021).

  12. Shugo Shiraishi, Ryota Yoshimoto, Eitaro Shioji, Mitsuaki Akiyama, Toshihiro Yamauchi,
    "Research of Security Issues of IoT Supply Chain and A Large-scale Survey of Actual Situation Focusing on the Differences of Software,"
    The 58th Information and Communication System Security (ICSS), vol.121, no.410, ICSS2021-76, pp.105-110, (3, 2022). (ICSS2021 Research Award)

  13. Takahiro Baba, Kensuke Baba, Toshihiro Yamauchi,
    "Malware Classification by Deep Learning Using Characteristics of Hash Functions,"
    Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022), vol.2, pp.480-481, Springer Nature (2022.03).
    The 36th International Conference on Advanced Information Networking and Applications (AINA-2022)

  14. Masato Miki, Toshihiro Yamauchi,
    "Evaluation on Applicability and Protection of LSM-based MAC Systems in IoT Devices,"
    The 21st Forum on Information Technology (FIT2022), vol.4, pp.147-150, (9,2022).

  15. Kaito Shiba, Hiroki Kuzuno, Toshihiro Yamauchi,
    "Design of Prevention Method against Attacks Using Buffer Overflows in TAs in OP-TEE,"
    Computer Security Symposium 2022 (CSS 2022), vol.2022, pp.872-878, (10.2022).

  16. Masato Miki, Toshihiro Yamauchi,
    "Design on LSM-based MAC System by Machine Learning in IoT Devices,"
    Computer Security Symposium 2022 (CSS 2022), vol.2022, pp.546-553, (10.2022).

  17. Toshihiro Yamauchi, Ryota Yoshimoto, Katsunari Yoshioka,
    "Proposal of Attack Prevention Method by Access Control Focusing on Infection Process of IoT Malware,"
    Computer Security Symposium 2022 (CSS 2022), vol.2022, pp.160-167, (10.2022). (CSS2022 Exellence Paper Award)

Talk, Panel, etc.

  1. Toshihiro Yamauchi,
    "FIT2021 Event「B-3 The Future Led by IoT:~Searching the IoT Future Vision toward Society after Corona~」,"
    The 20th Forum on Information Technology (FIT2021), (8, 2021).

  2. Toshihiro Yamauchi,
    "The Situation of Open Source for Embedded Devices~Research of Application Rates of Software Version and Security Functions~,"
    ET & IoT 2021, CCDS IoT Security Hot Topic, (11, 2021).

  3. Toshihiro Yamauchi,
    "The Situation of Device Software and Malware Infection Methods and Influences,"
    Okayama Information Security Association FY2021 (Reiwa3) Autumn Term Seminar, (3, 2022).

  4. Toshihiro Yamauchi,
    "Investigation About IoT Device Software and IoT Malware Infection Method,"
    ATR Security Technology Seminar 2022, (3, 2022).