Updated on 2024/03/22

写真a

 
MATSUBARA Yutaka
 
Organization
Graduate School of Informatics Department of Computing and Software Systems 2 Associate professor
Graduate School
Graduate School of Informatics
Undergraduate School
School of Informatics Department of Computer Science
Title
Associate professor
Contact information
メールアドレス

Degree 1

  1. Doctor (Information Science) ( 2011.3   Nagoya University ) 

Research Areas 1

  1. Informatics / Software

Professional Memberships 3

  1. Institute of Electrical and Electronics Engineers

  2. Information Processing Society of Japan

  3. 電子情報通信学会

Awards 4

  1. 優秀論文賞

    2023.7   マルチメディア、分散、協調とモバイルシンポジウム(DICOMO2022)   ブロックチェーンを活用した IoT機器のソフトウェア更新フレームワーク

    中西遼太, 松原豊, 高田広章

     More details

    Award type:Award from Japanese society, conference, symposium, etc. 

  2. 第19回ディペンダブルシステムワークショップ(DSW 2021) 最優秀論文発表賞

    2021.12   日本ソフトウェア科学会   MaaSの高信頼化を目的としたレジリエンスエンジニアリング手法

    周正書, 松原豊, 高田広章

     More details

    Award type:Award from Japanese society, conference, symposium, etc. 

  3. Specially Selected Paper

    2021.3  

     More details

    Award type:Honored in official journal of a scientific society, scientific journal 

  4. Best Software Paper Award

    2020.9   EV3RT: A Real-time Software Platform for LEGO Mindstorms EV3

    Yixiao Li,Yutaka Matsubara,Hiroaki Takada

     More details

    Award type:Honored in official journal of a scientific society, scientific journal 

 

Papers 32

  1. Resilience analysis and design for mobility-as-a-service based on enterprise architecture modeling

    Zhou, ZS; Matsubara, Y; Takada, H

    RELIABILITY ENGINEERING & SYSTEM SAFETY   Vol. 229   2023.1

     More details

    Language:Japanese   Publisher:Reliability Engineering and System Safety  

    The development of a service that integrates multiple systems, platforms, and businesses, such as Mobility as a Service (MaaS), has attracted the attention of engineers and scholars. However, because of the complexity of the interactions of its subsystems, it is difficult to ensure the reliability of an integrated service, and the analysis approach of the individual subsystems that influence each other is insufficient. Even though many studies on functional safety for road vehicles have been conducted, there are currently no theoretical or experimental reports on MaaS reliability issues at the service level. To fill the void, we propose in this paper a resilience analysis method to facilitate the development of reliable mobility services. As a result, we proposed a novel MaaS resilience analysis and design method. We contend that a connection with enterprise architecture modeling helps to address resilience concerns for MaaS reliability. The claim is based on the close connection between resilience and reliability. Furthermore, we conduct a controlled experiment to demonstrate the efficacy of the proposed method and compare it quantitatively to a referenced method.

    DOI: 10.1016/j.ress.2022.108812

    Web of Science

    Scopus

  2. Schfuzz: Detecting Concurrency Bugs with Feedback-Guided Fuzzing

    Ito, H; Matsubara, Y; Takada, H

    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, ENASE 2023   Vol. 2023-April   page: 273 - 282   2023

     More details

    Publisher:International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE - Proceedings  

    It is challenging to detect concurrency bugs with fuzzing. There are two main reasons for this. First, manifesting them by exploring input space is inefficient because they only occur under specific interleavings. Second, re-giving an input detected a bug in a fuzzing campaign does not necessarily reproduce the bug because typical runtimes do not schedule threads deterministically. This research proposes Schfuzz, a novel approach for detecting concurrency bugs with feedback-guided fuzzing. This approach executes programs under test deterministically based on test cases generated by fuzzers. In addition, it feeds back dynamic memory-access orders to aid fuzzers in detecting concurrency bugs more efficiently and effectively. We evaluate Schfuzz with a hand-made motivating example and four benchmark programs from SCTBench (Thomson et al., 2016). The result shows that it can detect concurrency bugs more efficiently and effectively than traditional feedback-guided fuzzing.

    DOI: 10.5220/0011722100003464

    Web of Science

    Scopus

  3. Developing Reliable Digital Healthcare Service Using Semi-Quantitative Functional Resonance Analysis

    Zhou, ZS; Matsubara, Y; Takada, H

    COMPUTER SYSTEMS SCIENCE AND ENGINEERING   Vol. 45 ( 1 ) page: 35 - 50   2023

     More details

    Language:Japanese   Publisher:Computer Systems Science and Engineering  

    Since entering the era of Industry 4.0, the concept of Healthcare 4.0 has also been put forward and explored by researchers. How to use Information Technology (IT) to better serve people’s healthcare is one of the most featured emerging directions in the academic circle. An important field of Healthcare 4.0 research is the reliability engineering of healthcare service. Because healthcare systems often affect the health and even life of their users, developers must be very cautious in the design, development, and operation of these healthcare systems and services. The problems to be solved include the reliability of business process, system functions, and personal healthcare data. The Functional Resonance Analysis Method (FRAM) has been applied in reliability engineering for safety-critical systems in available studies, using both qualitative and quantitative approaches. However, the method has not been applied in the field of digital healthcare services development. Therefore, to narrow the gap, we present in this paper a semi-quantitative functional resonance analysis method to develop reliable healthcare services for diabetics. Moreover, this paper has tried to improve the reliability design of the service-oriented architecture (SOA) of traditional insulin pump therapy by system thinking.

    DOI: 10.32604/csse.2023.030848

    Web of Science

    Scopus

  4. A Performance Evaluation of Embedded Multi-core Mixed-criticality System Based on PREEMPT_RT Linux

    Li Yixiao, Matsubara Yutaka, Takada Hiroaki, Suzuki Kenji, Murata Hideaki

    Journal of Information Processing   Vol. 31 ( 0 ) page: 78 - 87   2023

     More details

    Language:English   Publisher:Information Processing Society of Japan  

    <p>The use of Linux in the domain of embedded systems is growing very fast. Due to the complexity of hardware and software on Linux-based platforms, it is challenging to meet the performance requirements, especially for the mixed-criticality system with both real-time and best-effort tasks. We propose a reference design of Linux-based mixed-criticality system using PREEMPT_RT patch to improve real-time performance and QEMU/KVM virtual machine to reduce interferences. An evaluation environment of the proposed design is built with recent software and hardware to investigate the performance characteristics via experimental measurements. We measure and analyze the baseline kernel latency, the system throughput and the real-time performance under multiple conditions. In detailed analysis, we reveal novel insights on the real-time capabilities and limitations of Linux-based embedded systems. The results show that our design can meet the 100<i>µ</i>s deadline goal of 1kHz real-time task with high probability under various extreme interferences, and can deliver high throughput for best-effort workload.</p>

    DOI: 10.2197/ipsjjip.31.78

    Scopus

    CiNii Research

  5. A Quantitative Approach for System of Systems' Resilience Analyzing Based on ArchiMate

    Zhang, HJ; Matsubara, Y; Takada, H

    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2023 WORKSHOPS   Vol. 14182   page: 47 - 60   2023

     More details

    Publisher:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)  

    With the development of IT technology and the increasing demand for service integration, the widespread application of System of Systems (SoS) is inevitable in the era to come. Among numerous key issues related to SoS, analyzing the resilience of SoS is a challenging problem. Although many studies and discussions for system engineering have provided solutions for this problem, two significant characteristics of SoS, which are the independence of Constituent systems (CSs) and the involvement of multiple stakeholders, are ignored. Based on these two characteristics, this paper proposed a quantitative method for analyzing the resilience of SoS. The method includes visual modeling of the SoS using the EA tool ArchiMate, quantitatively simulating the model based on defining the value of service capacities of the CSs and evaluating and designing resilience from multiple stakeholders’ perspectives. Finally, a case study based on Mobility as a Service (MaaS) is presented. By analyzing resilience of MaaS, the critical node is identified, and by resilience redesign, the resilience of the SoS is improved after enhancement.

    DOI: 10.1007/978-3-031-40953-0_5

    Web of Science

    Scopus

  6. Design and Implementation of RTOS-Aware Control-Flow Integrity Mechanism for Microcontroller-Based Systems

    KAWADA Tomoaki, HONDA Shinya, MATSUBARA Yutaka, TAKADA Hiroaki

    Computer Software   Vol. 39 ( 2 ) page: 2_39 - 2_68   2022.4

     More details

    Language:Japanese   Publisher:Japan Society for Software Science and Technology  

    <p>CFI (Control-Flow Integrity) is a class of defensive techniques against control-flow attacks such as Return-Oriented Programming. We propose a lightweight CFI scheme for RTOS-based applications, <I>TZmCFI</I>, which utilizes TrustZone for Armv8-M, a hardware-assisted security feature for embedded systems with tight resource constraints. TZmCFI embodies several existing CFI techniques to provide a self-contained toolset for building an instrumented application. The toolset is comprised of a modified LLVM-based compiler and a runtime library called <I>Monitor</I>. The modified LLVM code generator implements the traditional shadow stack technique by inserting calls to Monitor. To protect exception handlers, Monitor replaces an application's exception vector table and wrap interrupt handlers with <I>exception trampolines</I>, which implement variations of the <I>shadow exception stack</I> technique we proposed in our previous work. The performance evaluation on NXP Semiconductors LPC55S69 indicated a <I>-</I>7–35% increase in the execution times of FreeRTOS+MPU system calls and a 9.36% runtime overhead on CoreMark.</p>

    DOI: 10.11309/jssst.39.2_39

    Scopus

    CiNii Research

  7. Quantitative Security Assurance Case for In-vehicle Embedded Systems

    Zhou, ZS; Matsubara, Y; Takada, H

    2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021     page: 43 - 50   2021

     More details

    Language:Japanese   Publisher:Proceedings - 2021 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing and International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2021  

    Technological advances are transforming the automotive industry by increasing the number of computer-controlled auto components that provide information to remote systems through various means of communication. The changes have created new opportunities for cyber-attacks. To enable the engineering of in-vehicle embedded systems within road vehicles to keep up with changing technology and attack methods, in this year, ISO and SAE will jointly release the international standard ISO/SAE 21434. However, to date there are few studies about how to apply the standard to academia and industry. To fill this gap, the paper proposes an approach to develop assurance cases for cybersecurity argument of road vehicle in compliance with ISO/SAE 21434. We analyze the standard, and then propose a model-based approach to automotive cybersecurity assurance. After that, case studies are carried out to verify the effectiveness of the proposed method. Finally, the paper is concluded by discussing the limitations and future directions of the study.

    DOI: 10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00022

    Web of Science

    Scopus

  8. esprof: A Generic Profiling Infrastructure for Multi/Many-Core Embedded Systems Reviewed

    LI Yixiao, MATSUBARA Yutaka, TAKADA Hiroaki

    Computer Software   Vol. 37 ( 1 ) page: 1_54 - 1_67   2020.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:Japan Society for Software Science and Technology  

    <p>Embedded systems are moving to multi-core and many-core platforms to satisfy the ever-growing demand for computing power. Complex task like autonomous driving will include both real-time applications and high-performance applications. Research has shown that traditional RTOS can be optimized to provide good scalability for parallel computing. The lack of performance analysis tools, however, is one of the major obstacles for identifying bottlenecks.<br/>In this paper, we first discuss the characteristics and challenges of existing tools used in high-performance computing. To meet the requirements of embedded systems, a generic infrastructure for creating customized profilers flexibly and effortlessly is then presented. As an example, a scalable and optimized call graph profiler has been developed. At last, we evaluate our profiler and existing profiler by measuring benchmark application on a 36-core platform. The results show that our profiler can provide much higher accuracy with very low overhead.</p>

    DOI: 10.11309/jssst.37.1_54

    Scopus

    CiNii Research

  9. 柔軟なCPUリソースアカウントのためのcgroupの拡張手法

    松下瑛佑,松原豊,高田広章

    第59回EMB合同研究発表会(ETNET2022)     2022.3

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

  10. BFQスケジューラにおけるストレージ I/O帯域保証による応答性向上

    長谷川博紀,松原豊,加藤寿和,山本整,水口武尚,高田広章

    第59回EMB合同研究発表会(ETNET2022)     2022.3

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

  11. MaaSの高信頼化を目的としたレジリエンスエンジニアリング手法

    周 正書,松原 豊,高田 広章

    第19回ディペンダブルシステムワークショップ (DSW 2021)     2021.12

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

  12. コンテナ型仮想化における低レベルランタイムの性能評価

    西村惇,李奕驍,松下瑛佑 ,松原豊,高田広章

    第58回組込みシステム研究発表会     2021.11

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

  13. Quantitative Security Assurance Case for In-vehicle Embedded Systems Reviewed

    Zhengshu Zhou, Yutaka Matsubara and Hiroaki Takada

    IEEE CyberSciTech/PICom/DASC/CDBCom 2021     2021.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  14. TZmCFI: RTOS-Aware Control-Flow Integrity Using TrustZone for Armv8-M Reviewed

    Tomoaki Kawada, Shinya Honda, Yutaka Matsubara, Hiroaki Takada

    International Journal of Parallel Programming   Vol. 49 ( 2 ) page: 216 - 236   2021.4

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:Springer Science and Business Media LLC  

    <title>Abstract</title>Control-Flow Integrity (CFI) is a class of defensive techniques against control-flow attacks such as Return-Oriented Programming. We propose a light-weight CFI scheme for RTOS-based applications, TZmCFI, which utilizes TrustZone for Armv8-M, a hardware-assisted security feature for embedded systems with tight resource constraints. TZmCFI embodies several existing CFI techniques to provide a comprehensive protection. The traditional shadow stack technique is used to ensure stack integrity and validate function returns. To protect exception handlers, TZmCFI extends <italic>shadow exception stacks</italic>, which are a variant of the traditional shadow stack technique we proposed in our previous work, for RTOS integration and performance improvement. We conducted an experiment on Arm Versatile Express Cortex-M Prototyping System (V2M-MPS2+) to evaluate the run-time overhead of the proposed system.

    DOI: 10.1007/s10766-020-00673-z

    Web of Science

    Scopus

    Other Link: http://link.springer.com/article/10.1007/s10766-020-00673-z/fulltext.html

  15. アプリケーションからのストレージアクセス分析手法

    長谷川博紀, 松原豊, 加藤寿和, 山本整, 高田広章

    第56回EMB合同研究発表会(ETNET2021)     2021.3

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

  16. ハイパーバイザにおけるハードウェアの共有分析手法

    鈴木 健太, 松原 豊, 守谷 友和, 本谷 謙治, 岩切 英之, 高田 広章

    第56回組込みシステム合同研究発表会(ETNET2021)     2021.3

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

  17. ミドルウェアに対するCoverage-based Greybox Fuzzingの適用 Reviewed

    伊藤 弘将, 松原 豊, 高田 広章

    情報処理学会論文誌   Vol. 62 ( 3 ) page: 877 - 890   2021.3

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

  18. Agile Software Design Verification and Validation (V&V) for Automated Driving Reviewed

    Yixiao Li, Yutaka Matsubara, Daniel Olbrys, Kazuhiro Kajio, Hiroaki Takada

    Proceedings of FISITA 2020     2020.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  19. Safety design concepts for statistical machine learning components toward accordance with functional safety standards

    Akihisa Morikawa, Yutaka Matsubara

    CoRR   Vol. abs/2008.01263   2020.8

     More details

    Authorship:Last author   Language:English   Publishing type:Research paper (other academic)  

    In recent years, curial incidents and accidents have been reported due to
    un-intended control caused by misjudgment of statistical machine learning
    (SML), which include deep learning. The international functional safety
    standards for Electric/Electronic/Programmable (E/E/P) systems have been widely
    spread to improve safety. However, most of them do not recom-mended to use SML
    in safety critical systems so far. In practical the new concepts and methods
    are urgently required to enable SML to be safely used in safety critical
    systems. In this paper, we organize five kinds of technical safety concepts
    (TSCs) for SML components toward accordance with functional safety standards.
    We discuss not only quantitative evaluation criteria, but also development
    process based on XAI (eXplainable Artificial Intelligence) and Automotive SPICE
    to improve explainability and reliability in development phase. Fi-nally, we
    briefly compare the TSCs in cost and difficulty, and expect to en-courage
    further discussion in many communities and domain.

    arXiv

    Other Link: http://arxiv.org/pdf/2008.01263v1

  20. Transforming Concurrent Programs with Semaphores into Logically Constrained Term Rewrite Systems Reviewed

    Misaki Kojima, Naoki Nishida, Yutaka Matsubara

    Informal Proceedings of WPTE 2020     page: 12   2020.6

     More details

    Authorship:Last author   Language:English   Publishing type:Research paper (international conference proceedings)  

  21. Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS -- a collection of Technical Notes Part 1 International coauthorship

    Robin Bloomfield, Gareth Fletcher, Heidy Khlaaf, Philippa Ryan, Shuji Kinoshita, Yoshiki Kinoshit, Makoto Takeyama, Yutaka Matsubara, Peter Popov, Kazuki Imai, Yoshinori Tsutake

    CoRR   Vol. abs/2003.00789   2020.2

     More details

    Language:English   Publishing type:Research paper (other academic)  

    This report provides an introduction and overview of the Technical Topic
    Notes (TTNs) produced in the Towards Identifying and closing Gaps in Assurance
    of autonomous Road vehicleS (Tigars) project. These notes aim to support the
    development and evaluation of autonomous vehicles. Part 1 addresses:
    Assurance-overview and issues, Resilience and Safety Requirements, Open Systems
    Perspective and Formal Verification and Static Analysis of ML Systems. Part 2:
    Simulation and Dynamic Testing, Defence in Depth and Diversity,
    Security-Informed Safety Analysis, Standards and Guidelines.

    arXiv

    Other Link: http://arxiv.org/pdf/2003.00789v1

  22. Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS -- a collection of Technical Notes Part 2 International coauthorship

    Robin Bloomfield, Gareth Fletcher, Heidy Khlaaf, Philippa Ryan, Shuji Kinoshita, Yoshiki Kinoshit, Makoto Takeyama, Yutaka Matsubara, Peter Popov, Kazuki Imai, Yoshinori Tsutake

    CoRR   Vol. abs/2003.00790   2020.2

     More details

    Language:English   Publishing type:Research paper (other academic)  

    This report provides an introduction and overview of the Technical Topic
    Notes (TTNs) produced in the Towards Identifying and closing Gaps in Assurance
    of autonomous Road vehicleS (Tigars) project. These notes aim to support the
    development and evaluation of autonomous vehicles. Part 1 addresses:
    Assurance-overview and issues, Resilience and Safety Requirements, Open Systems
    Perspective and Formal Verification and Static Analysis of ML Systems. This
    report is Part 2 and discusses: Simulation and Dynamic Testing, Defence in
    Depth and Diversity, Security-Informed Safety Analysis, Standards and
    Guidelines.

    arXiv

    Other Link: http://arxiv.org/pdf/2003.00790v1

  23. Energy-Aware Task Allocation for Heterogeneous Multiprocessor Systems by Using Integer Linear Programming Reviewed

    Yang Qin, Gang Zeng, Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada,

    Journal of Information Processing   Vol. 60 ( 2 ) page: 136-148   2019.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: https://doi.org/10.2197/ipsjjip.27.136

  24. IDH-CAN: A Hardware-Based ID Hopping CAN Mechanism With Enhanced Security for Automotive Real-Time Applications Reviewed

    Wufei Wu, Ryo Kurachi, Gang Zeng, Yutaka Matsubara, Hiroaki Takada, Renfa Li, Keqin Li

      Vol. 6 ( 1 ) page: 54607-54623   2018.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/ACCESS.2018.2870695

  25. Execution-variance-aware task allocation for energy minimization on the big.LITTLE architecture Reviewed

    Yang Qin, Gang Zeng, Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada

    ELSEVIER Sustainable Computing: Informatics and Systems     2018.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: https://doi.org/doi:10.1016/j.suscom.2018.10.001

  26. IoT機器への適用に向けたTLS1.3の性能評価

    小松大河, 松原豊, 高田広章

    コンピュータセキュリティシンポジウム2018論文集   Vol. 2018 ( 2 ) page: 569 - 576   2018.10

     More details

    Language:Japanese  

  27. Energy-Aware Task Allocation for Large Task Sets on Heterogeneous Multiprocessor Systems Reviewed

    Yang Qin, Gang Zeng, Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada

    Proceedings of 16th International Conference on Embedded and Ubiquitous Computing (EUC)     page: 158-165   2018.10

     More details

    Language:English  

  28. ブロックチェーン技術を用いたIoT機器向けセキュアアップデートフレームワーク Reviewed

    長柄啓悟, 松原豊, 高田広章

    組込みシステムシンポジウム2018論文集   Vol. 2018   page: 36-39   2018.8

     More details

    Language:Japanese  

  29. Arm TrustZone for Armv8-M を利用したマルチタスク対応 CFI の検討 Reviewed

    河田智明, 本田晋也, 松原豊, 高田 広章

    組込みシステムシンポジウム2018論文集   Vol. 2018   page: 71 - 74   2018.8

     More details

    Language:Japanese  

  30. ROS2と軽量DDSの組込みシステムに対する適用性評価

    小澤慶祐, 本田晋也, 松原豊, 高田広章, 加藤 寿和, 山本 整

    研究報告組込みシステム(EMB)   Vol. 2018-EMB-48 ( 2 ) page: 1-8   2018.6

     More details

    Language:Japanese  

  31. つながる社会とクルマのセーフティ&セキュリティの動向と展望

    松原豊, 倉地亮, 高田広章

    自動車技術   Vol. 72 ( 5 ) page: 87-93   2018.5

     More details

    Authorship:Lead author   Language:Japanese  

  32. FRAM/STPA: Hazard Analysis Method for FRAM Model Reviewed

    Yoshinari Toda, Yutaka Matsubara, Hiroaki Takada

    Proceedings of FRAMily 2018     page: 1-7   2018.5

     More details

    Language:English  

▼display all

MISC 2

  1. MBSEツールを用いたAUTOSARプラットフォームのビジュアルモデリングと設計手法

    高田光隆, 松原豊

    情報処理学会研究報告(Web)   Vol. 2022 ( ARC-248 )   2022

     More details

  2. Cybersecurity in a New Era of Mobility - Toward Enhancement of Japan Brand -:2. CASE Evolution and Cybersecurity in Automotive Domain

      Vol. 61 ( 4 ) page: 338 - 343   2020.3

     More details

    Language:Japanese  

    CiNii Books

    Other Link: http://id.nii.ac.jp/1001/00203921/

Presentations 19

  1. 組込みシステム開発におけるリスクマネジメントの現状と今後の方向性 Invited

    松原豊

    Jasa 中部セミナー  2021.12  JASA

     More details

    Event date: 2021.12

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

  2. IEC 62853の4観点を活用した,車載ソフトウェア開発における現場課題の分析 Invited

    松原豊

    ET&IoT展2021 スペシャルセッション  2021.11  一般社団法人 組込みシステム技術協会

     More details

    Event date: 2021.11

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

  3. Society 5.0におけるセーフティ&セキュリティの課題とDXによる解決支援 Invited

    松原豊

    DXイノベーションチャレンジ2021  2021.8  DXイノベーションチャレンジ 実行委員会

     More details

    Event date: 2021.8

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

  4. 組込み/IoTセキュリティ Invited

    松原豊

    NANO OPT Media Online  2021.7 

     More details

    Event date: 2021.7

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

  5. 未知なるリスクに適応する社会的ガバナンスの構築に向けて 〜自動車分野を例に〜 Invited

    松原豊

    JSAE オンラインフォーラム  2021.7  JSAE

     More details

    Event date: 2021.7

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

  6. Society 5.0の安全,信頼性確保に向けた課題と解決アプローチ Invited

    松原豊

    第7回DEOS協会オープンシンポジウム  2021.6  DEOS協会

     More details

    Event date: 2021.6

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

  7. 組込み機器のセキュリティ入門 Invited

    松原豊

    組込み機器のセキュリティ入門講座  2021.2.15  しまね産業振興財団/島根県産業技術センター

     More details

    Event date: 2021.2

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:オンライン  

  8. 自動車を取り巻く セーフティとセキュリティの現状と課題 Invited

    松原豊

    電子情報通信学会情報ネットワーク(IN)研究会  2021.1.18  電子情報通信学会情報ネットワーク研究会

     More details

    Event date: 2021.1

    Language:Japanese   Presentation type:Oral presentation (invited, special)  

    Venue:オンライン  

  9. 車載システムの安全規格動向と電子デバイスへの期待 Invited

    松原豊

    第7回電子デバイスフォーラム京都  2020.10.30  日本電子デバイス産業協会

     More details

    Event date: 2020.10

    Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:京都  

  10. 組込みソフトウェアプラットフォームを理解する Invited

    松原豊

    セキュリティ・ネクストキャンプ2020  2020.10.25  情報処理推進機構

     More details

    Event date: 2020.10 - 2020.12

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:オンライン  

  11. 自動運転システムの総合信頼性と社会アーキテクチャ構築に向けて Invited

    松原豊

    JSAE オンラインフォーラム  2020.7.30  自動車技術会

     More details

    Event date: 2020.7

    Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:オンライン  

  12. 開発が進むAUTOSAR Adaptive Platformの現状と課題 Invited

    松原豊

    2019年度第3回スキルアップセミナー 

     More details

    Event date: 2019.12

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:名古屋   Country:Japan  

  13. 車載制御システムの変遷とディペンダビリティ Invited

    松原豊

    第17回ディペンダブルシステムワークショップ 

     More details

    Event date: 2019.12

    Language:Japanese   Presentation type:Oral presentation (invited, special)  

    Venue:東京   Country:Japan  

  14. 自動運転を安心して運営・利用するには? 〜 IEC 62853を活用したアプローチ 〜 Invited

    松原豊

    Embedded Technology&IoT Technology 2019 

     More details

    Event date: 2019.11

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:横浜   Country:Japan  

  15. SEAMS & TIGARS プロジェクトの紹介 Invited

    松原豊

    MaaS DIY Day 

     More details

    Event date: 2019.11

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:札幌   Country:Japan  

  16. IEC 62853を活用したMaaSのディペンダビリティ解析 Invited

    松原豊

    ソフトウェア品質シンポジウム2019 

     More details

    Event date: 2019.9

    Language:Japanese   Presentation type:Oral presentation (invited, special)  

    Venue:東京   Country:Japan  

  17. 組込みリアルタイムOSとIoTシステム演習 Invited

    松原豊

    セキュリティキャンプ全国大会2019 

     More details

    Event date: 2019.8

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:東京   Country:Japan  

  18. 自動運転サービスの継続的な安全性論証と標準化動向 Invited

    松原豊

    Embedded System Technology and Innovation Conference 2019 

     More details

    Event date: 2019.7

    Language:Japanese   Presentation type:Oral presentation (invited, special)  

    Venue:東京   Country:Japan  

  19. 自動運転の安全性論証における IEC 62853の活用 Invited

    松原豊

    第6回DEOS協会オープンシンポジウム 

     More details

    Event date: 2019.6

    Language:Japanese   Presentation type:Oral presentation (invited, special)  

    Venue:東京   Country:Japan  

▼display all

KAKENHI (Grants-in-Aid for Scientific Research) 2

  1. Society5.0を支えるシステムオブシステムズの総合信頼性論証フレームワーク

    Grant number:22K04618  2022.4 - 2026.3

    日本学術振興会  科学研究費助成事業  基盤研究(C)

    松原 豊

      More details

    Authorship:Principal investigator 

    Grant amount:\4160000 ( Direct Cost: \3200000 、 Indirect Cost:\960000 )

    本研究では,Society5.0社会に向けて普及が期待されるシステムオブシステムズを対象にその安全性,信頼性,セキュリティなどを包含する総合信頼性(ディペンダビリティ)の維持,向上を支援する論証フレームワークを構築する。この論証フレームワークを共通基盤として,専門知識が乏しい,ないしは専門分野の異なるステークホルダが一緒に総合信頼性について議論する場を提供する。
    複数の独立したシステムが連携しながらサービスを提供するシステムオブシステムについて,その総合信頼性を論証するためのフレームワークを構築することを目標に掲げている。研究1年目として予定していた研究を進め,研究成果を3本の研究論文にまとめることができた。これらのうち2本は国際論文誌に採録され,もう1本は国際会議に論文投稿を予定している。具体的な研究内容としては,2つの問い(問いA 多様なステークホルダが存在するシステムオブシステムズ(SoS)のサービスを,正確に表現し,かつ共通理解を構築するモデリング手法は何か?問いB 特定のシステムに依存せず,抽象的な総合信頼性要件を,具体的なサービスに適用する際,どのように具体化できるのか?)に対する3つの研究課題(課題A1 ビジネス分野において,ビジネスモデルからサービス,システムを記述するための世界標準モデリング言語であるArchiMateによって,SoSの記述を試みる。課題A2 同一のサービスを,FRAM(Functional Resonance Analysis Method)とArchiMateの両方でモデル化して比較し,モデリング 言語の特徴,記述能力の違い,適用性を定性的に評価する。課題B1 IEC 62853の総合信頼性要件を,適用対象によって具体化すべき要件と,そのまま適用できる要件に分類する)を実施することができた。
    研究計画の1年目で予定していた研究を進めることができた。具体的には,2つの問い(問いA 多様なステークホルダが存在するSoSのサービスを,正確に表現し,かつ共通理解 を構築するモデリング手法は何か?,問いB 特定のシステムに依存せず,抽象的な総合信頼性要件を,具体的なサービスに適用する際,どのように具体化できるのか?)に対する3つの研究課題(課題A1 ビジネス分野において,ビジネスモデルからサービス,システムを記述するための世界標準モデリング言語であるArchiMateによって,SoSの記述を試みる。課題A2 同一のサービスを,FRAMとArchiMateの両方でモデル化して比較し,モデリング 言語の特徴,記述能力の違い,適用性を定性的に評価する。課題B1 IEC 62853の総合信頼性要件(約35ページ)を,適用対象によって具体化すべき要件と,そのまま適用できる要件に分類する。)を実施することができ,3本の研究論文としてまとめることができた。そのうち2本は国際論文誌に採録された。もう1本は国際会議に論文投稿を予定している。
    引き続き,研究計画に従って研究を進めていく。具体的には,研究課題A:世界標準ビジネスモデリングツールArchiMateの適用性について,これまでの研究成果もとに結論づける。研究課題B:総合信頼性要件の具体化手法の確立と適用について,課題B1(IEC 62853の総合信頼性要件を,適用対象によって具体化すべき要件と,そのまま適用できる要件に分類する。)と課題B2(各要件の具体化項目を明確にし,GSNのコンテキストで表現する。このGSNを,総合信頼性要件のテンプレートとして構築する。)を実施する。研究協力者として当初2名の大学院生を予定していたが,結果的には,1名のみとなってしまったので,次年度から1名の追加を試みる。

  2. Security threat analysis system for highly reliable embedded / IoT systems

    Grant number:16K21097  2016.4 - 2020.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Young Scientists (B)

    Yutaka Matsubara

      More details

    The purpose of this study is to establish a threat analysis method, to construct a computer system to support it, and to prototype a security countermeasure method in order to achieve both safety and security of the highly reliable embedded system. As a system that supports the analysis of security threats, a keyword derived from a list of threats found in the past is compiled into a database, and the keywords can be semi-automatically applied to the design of the system to be analyzed. In order to incorporate countermeasures at the system design stage, existing countermeasure technology including fuzzing testing was included into the database.

 

Teaching Experience (On-campus) 2

  1. 情報リテラシー

    2019

  2. 情報リテラシー

    2019