Updated on 2024/09/20

写真a

 
KURACHI Ryo
 
Organization
Graduate School of Informatics Center for Embeded Computing Systems Designated associate professor
Graduate School
Graduate School of Informatics
Title
Designated associate professor

Degree 1

  1. Doctor (Information Science) ( 2012.9   Nagoya University ) 

Research Interests 3

  1. Real-Time System

  2. Embedded Computing System

  3. Information Security

Research Areas 5

  1. Others / Others  / Real-time system, Embedded System

  2. Informatics / Information network

  3. Informatics / Information security

  4. Informatics / Software

  5. Informatics / Computer system

Current Research Project and SDGs 2

  1. Security countermeasures for in-vehicle systems

  2. Scheduling method for in-vehicle networks

Research History 1

  1. AISIN AW CO., LTD.

    2000.4 - 2006.4

      More details

    Country:Japan

Education 1

  1. Nagoya University   Graduate School, Division of Information Science   Department of Information Engineering

    2011.4 - 2012.9

      More details

    Country: Japan

Professional Memberships 1

  1. Information Processing Society of Japan

 

Papers 60

  1. Timing Analysis of CAN FD for Security-Aware Automotive Cyber-Physical Systems

    Xie Y., Zeng G., Kurachi R., Xiao F., Takada H., Hu S.

    IEEE Transactions on Dependable and Secure Computing     2022

     More details

    Publisher:IEEE Transactions on Dependable and Secure Computing  

    The CAN FD emerges as a promising CAN technology inside the ACPS due to its advantages of high data-phase bit-rate and message payload. HSM based security solution is recommended by auto industry to protect CAN FD from potential security attacks, but it induces new challenges on timing analysis of CAN FD messages, which is left open in the literature. This paper develops the first security-aware system model to describe the processing of CAN FD messages, and presents a new WCRT analysis to bound the interference induced by security-critical messages. We give the theoretical proof that our WCRT analysis can upper bound the response time of CAN FD messages. Using a small message set, we show that the WCRT computed by our new analysis is only 14% percent higher than the true WCRT obtained from an exhaustive search based simulator. By comparing with existing method, the number of impacted messages increases along with the increasing number of security critical messages, and for the two typical CAN FD systems, the percentage of WCRT increase varies from 12.43% to 14.57% and 7.0% to 10.89%, respectively; the percentage of WCRT decrease varies from 3.29% to 6.04% and 4.13% to 7.93%, respectively.

    DOI: 10.1109/TDSC.2022.3194712

    Scopus

  2. Evaluation of Automotive Event Data Recorder towards Digital Forensics.

    Ryo Kurachi, Takanari Katayama, Takamitsu Sasaki, Masaki Saito, Yoshimasa Ajioka

    95th IEEE Vehicular Technology Conference   Vol. 2022-June   page: 1 - 7   2022

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    In recent years, research and hacking verification experiments have been conducted on cybersecurity countermeasures in vehicles. However, establishing digital forensics technology related to vehicle hacking remains a problem for clarifying the facts, methods, and effects when hacking via an in-vehicle network actually occurs. Digital forensics refers to the methods and procedures for handling digital information recorded on digital devices or elsewhere without loss of evidentiary value, and is regarded as important by various law enforcement agencies, including the police. Some vehicles are already fitted with an event data recorder (EDR) that records the vehicle state, and digital forensics is performed on the EDR when a vehicle accident occurs. The present study surveyed and performed experiments on EDRs, and verified that information related to evidence of hacking can be obtained in addition to conventional information about a traffic accident. Furthermore, this paper discusses security measures for the EDR are discussed from the perspective of performing digital forensics.

    DOI: 10.1109/VTC2022-Spring54318.2022.9860722

    Web of Science

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/vtc/vtc2022s.html#KurachiKSSA22

  3. Optimizing Extensibility of CAN FD for Automotive Cyber-Physical Systems.

    Yong Xie, Gang Zeng, Ryo Kurachi, Fu Xiao 0001, Hiroaki Takada

    IEEE Transactions on Intelligent Transportation Systems   Vol. 22 ( 12 ) page: 7875 - 7886   2021.12

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    Extensibility is an important optimization objective for the E/E architecture of automotive cyber-physical systems (ACPS), while little attention has paid to the extensibility-aware design of in-vehicle network. To address this problem, this paper formulates a trade-off problem that balances the bandwidth utilization and the extensibility from the initial design of CAN FD. We firstly propose a new extensibility model and the related evaluation metric, and then two optimization algorithms, namely, the mixed integer linear programming (MILP) approach and the simulated annealing (SA) based heuristic approach, are proposed to resolve the trade-off problem for mid-sized and industry sized signal sets, respectively. The experiment results show the efficiency of the proposed extensibility metric and the optimization algorithms. By comparing with state-of-the-art algorithm, the MILP reduces the increase range of the bandwidth utilization of the extended signal set by 18.17% to 57.64% averagely, and 49.22% to 89.40% maximally, with only 0.06% to 0.79% bandwidth utilization overhead; the SA approach can reduces the increase range of the bandwidth utilization of the extended signal set by 12.71% to 58.33% averagely, and 40.08% to 89.40% maximally, with only 0.06% to 0.8% bandwidth utilization overhead.

    DOI: 10.1109/TITS.2021.3059769

    Web of Science

    Scopus

  4. Secure Implementation of Authenticated Encryption in SROS2 for Embedded Systems and Its Evaluation

    Takemoto Shu, Nishida Kanata, Nozaki Yusuke, Honda Shinya, Kurachi Ryo, Yoshikawa Masaya

    IEEJ Transactions on Electronics, Information and Systems   Vol. 140 ( 8 ) page: 939 - 948   2020.8

     More details

    Language:Japanese   Publisher:The Institute of Electrical Engineers of Japan  

    <p>With the expansion of Society 5.0, the realization of a short-term development and secure implementation for a smart factory system is required. SROS2, an open-source platform applicable to industrial robots, realizes short-term development and implements secure communication using AES-GCM. On the other hand, AES-GCM is reported to be vulnerable in computational security. Therefore, a secure encryption alternative to AES-GCM and its evaluation are needed. For these reasons, this research incorporates SROS2 with a secure certified encryption alternative to AES-GCM. The evaluation experiments in this study performed on a computer and Raspberry Pi 3 Model B, and the results revealed the effectiveness of dedicated hardware implementation.</p>

    DOI: 10.1541/ieejeiss.140.939

    Scopus

    CiNii Research

    J-GLOBAL

  5. Balancing Bandwidth Utilization and Interrupts: Two Heuristic Algorithms for the Optimized Design of Automotive CPS.

    Yong Xie, Gang Zeng, Ryo Kurachi, Xin Peng, Guoqi Xie, Hiroaki Takada

    IEEE Trans. Ind. Informatics   Vol. 16 ( 4 ) page: 2382 - 2392   2020.4

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    To realize the optimized design of the automotive cyber-physical system, it is required to consider the interplay between the communication and computation. However, the existing research about the design of the controller area network (CAN) with flexible data rate (CAN FD) ignores this, it only considers the minimization of the bandwidth utilization and neglects the fact that it would trigger too many unnecessary message receiving interrupts (MRIs) on message receiving electronic control units. To address this problem, this article formulates a tradeoff problem that balances the bandwidth utilization and the number of unnecessary MRIs during the design of the CAN FD. We first propose an algorithm to analyze the number of unnecessary MRIs triggered by the packed messages, and then, two heuristic algorithms, namely, the Top-Down approach and the Hybrid approach, are proposed to resolve the tradeoff problem for midsized and large signal sets, respectively. The experiment results show that compared with the state-of-the-art algorithm, the Top-Down approach reduces the unnecessary MRIs by 10.48%-99.89% with only 0.02%-1.32% bandwidth utilization overhead, the Hybrid approach reduces the unnecessary MRIs by 23.15%-99.63% with only 0.13%-2.07% bandwidth utilization overhead.

    DOI: 10.1109/TII.2019.2936240

    Web of Science

    Scopus

  6. A Simultaneous Attack Scenario Generation Method Using the Parallel Behavior Model.

    Toshiyuki Fujikura, Ryo Kurachi

    91st IEEE Vehicular Technology Conference   Vol. 2020-May   page: 1 - 7   2020

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    To achieve high traceability from requirements to test scenarios, a test scenario generation method has been widely recognized as being an integral aspect of model-based development. However, it is difficult to make effective test scenarios that have sufficient requirement coverage including hazardous conditions. In this study, we propose a test scenario generation method from formalized functional requirements. Based on results from a hazard analysis, this technique is able to generate the scenario that reveals hazardous situations by specifying a hazardous state as the end-state of a scenario. Furthermore, by modeling attack targets and methods, test scenarios leading to a hazardous state by malicious simultaneous external attacks are generated. A parallelization technique for generating simultaneous attack test scenarios is shown. Using the exhaustive path-finding approach, our results show the ability to achieve high requirement coverage compared to the existing approaches. The proposed method uses a model checking method and cannot escape from the state explosion. However, it is able to reach real problems by modeling the highly-abstract requirement areas and specifying partial scenarios.

    DOI: 10.1109/VTC2020-Spring48590.2020.9129076

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/vtc/vtc2020s.html#FujikuraK20

  7. Threat Analysis Framework for Safety Architectures in SCDL.

    Kenji Taguchi 0001, Ryo Kurachi, Kiyoshi Sasaki, Nobuhiko Nakamura, Kazuki Tomonaga, Shuhei Yamashita

    Computer Safety, Reliability, and Security - 39th International Conference(SAFECOMP)   Vol. 12234 LNCS   page: 341 - 354   2020

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:Springer  

    Cybersecurity threats have become a reality for safety critical systems such as automobiles, railways and avionics witnessing cybersecurity incidents and research reports from white hackers. Threat analysis plays an important role to identify potential threats in early stages of the system development and it is a common understanding that the threat analysis for safety critical systems need to assess an effect caused by threats against safety. In this paper, we propose a threat analysis framework on safety concepts required by ISO 26262 in an architecture description language SCDL (Safety Concept Description Language) specifically designed for safety concepts modeling in ISO 26262 and demonstrate the effectiveness of our framework on a case study. Our research result shows the potential usage of SCDL for threat analysis and effect analysis between functional safety and cybersecurity.

    DOI: 10.1007/978-3-030-54549-9_23

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/safecomp/safecomp2020.html#0001KSNTY20

  8. Towards Minimizing MAC Utilization for Controller Area Network.

    Ryo Kurachi, Hiroaki Takada, Hiroshi Ueda, Shuhei Takimoto

    AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security(AutoSec@CODASPY)     page: 45 - 50   2020

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:ACM  

    In recent years, frequent spoofing attacks targeting automotive control systems have been reported. To address this issue, automotive manufactures seek to assign a message authentication code(MAC) to ensure the security of these systems. As it is challenging to assign an authenticator to all messages due to limitations in transfer capacity, automotive manufactures are seeking to assign it to only a certain type of message. In this study, a method of spoofing detection is proposed that makes use of one of the critical messages referred to as Keep Alive Messages.

    DOI: 10.1145/3375706.3380557

    Web of Science

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/codaspy/autosec2020.html#KurachiTUT20

  9. Execution-variance-aware task allocation for energy minimization on the big.LITTLE architecture. Reviewed

    Yang Qin, Gang Zeng, Ryo Kurachi, Yutaka Matsubara, Array

    SUSCOM   Vol. 22   page: 155 - 166   2019.6

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    With the increasing computational demands of applications, the research of energy-efficient heterogeneous multiprocessor scheduling is becoming more and more important. The problem can be addressed as allocating tasks to the right cores and setting the appropriate operating frequencies. In this paper, we present a task allocation algorithm for a single-ISA big.LITTLE architecture which consists of two different types of cores: high-performance core and energy-efficient core. Based on the execution variance of two types of cores, a heuristic that approximate the optimal load distribution is proposed. We experimentally simulate our method and compare it with the state-of-the-art solutions. Experimental results show that average 20.4% less energy consumption (and up to 60.2% for some cases) can be saved from the typical Little-Core-First with satisfying the deadline constraints of all tasks.

    DOI: 10.1016/j.suscom.2018.10.001

    Web of Science

    Scopus

  10. A proposal of the device disabler for controller area network

    Hiroshi Ueda, Ryo Kurachi, Shinya Honda, Hiroaki Takada, Naoki Adachi, Yukihiro Miyashita

    SEI Technical Review   ( 88 ) page: 82 - 86   2019.4

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    Recently, quite a number of security attacks against Controller Area Network (CAN) have been reported. Many automotive companies are planning to adopt security countermeasures to strengthen security of their in-vehicle systems while saving the costs. This paper proposes a method to block unauthorized CAN-bus access using our enhanced CAN controller that prevents the transmission of messages from a malicious electronic control unit. We demonstrate the effectiveness of our device disabler on a CAN with Flexible Date rate buses.

    Scopus

  11. Security/Timing-Aware Design Space Exploration of CAN FD for Automotive Cyber-Physical Systems.

    Yong Xie, Gang Zeng, Ryo Kurachi, Hiroaki Takada, Guoqi Xie

    IEEE Trans. Ind. Informatics   Vol. 15 ( 2 ) page: 1094 - 1104   2019.2

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    The controller area network with flexible data-rate (CAN FD) is the new generation of the CAN technology to meet the daily increasing bandwidth requirement for automotive cyber-physical systems (ACPS). However, ACPS is a security-critical system, an efficient security/timing-aware design space exploration (DSE) method is required to fully utilize CAN FD's high data phase data rate. In this paper, we propose an AUTOSAR-compliant system model that integrates both timing and security constraint, an integrated mixed-integer linear programming formulation (i-MILP) for the optimal DSE of CAN FD, and a divide-and-conquer approach to the i-MILP (dc-MILP) to address its timing complexity problem. The experiment results show that dc-MILP scales well for industrial-size systems and saves 1.94%-4.76% bandwidth utilization and guarantees the schedulability for more signal sets by comparing with the state-of-the-art algorithm.

    DOI: 10.1109/TII.2018.2851939

    Web of Science

    Scopus

  12. WCRT Analysis and Evaluation for Sporadic Message-Processing Tasks in Multicore Automotive Gateways.

    Guoqi Xie, Gang Zeng, Ryo Kurachi, Hiroaki Takada, Zhetao Li, Renfa Li, Keqin Li 0001

    IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.   Vol. 38 ( 2 ) page: 281 - 294   2019.2

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    We study the worst case response time (WCRT) analysis and evaluation for sporadic message-processing tasks in a multicore automotive gateway of a controller area network (CAN) cluster. We first build a multicore automotive gateway on CAN clusters. Two WCRT analysis methods for message-processing tasks in the multicore gateway are subsequently presented based on global and partitioned scheduling paradigms. We evaluate the WCRT results of two analysis methods with real message sets provided by the automaker, and present the design optimization guide.

    DOI: 10.1109/TCAD.2018.2812119

    Web of Science

    Scopus

  13. Exact WCRT Analysis for Message-Processing Tasks on Gateway-Integrated In-Vehicle CAN Clusters.

    Guoqi Xie, Gang Zeng, Ryo Kurachi, Hiroaki Takada, Renfa Li, Keqin Li 0001

    ACM Trans. Embed. Comput. Syst.   Vol. 17 ( 6 ) page: 95 - 29   2019.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    A typical automotive integrated architecture is a controller area network (CAN) cluster integrated by a central gateway. This study proposes a novel and exact worst-case response time (WCRT) analysis method for message-processing tasks in the gateway. We first propose a round search method to obtain lower bound on response time (LBRT) and upper bound on response time (UBRT), respectively. We then obtain the exact WCRT belonging to the scope of the LBRT and UBRT with an effective non-exhaustive exploration. Experimental results on a real CAN message set reveal that the proposed exact analysis method can reduce 99.99999% combinations on large-scale CAN clusters.

    DOI: 10.1145/3284178

    Web of Science

    Scopus

  14. Evaluation of Security Access Service in Automotive Diagnostic Communication.

    Ryo Kurachi, Hiroaki Takada, Kentaro Takei, Takaaki Iinuma, Yuki Satoh, Manabu Nakano, Hideki Matsushima, Jun Anzai, Toshihisa Nakano

    89th IEEE Vehicular Technology Conference   Vol. 2019-April   page: 1 - 7   2019

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/VTCSpring.2019.8746714

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/vtc/vtc2019s.html#KurachiTTISNMAN19

  15. Evaluation of Security Access Service in Automotive Diagnostic Communication

    Kurachi Ryo, Takada Hiroaki, Takei Kentaro, Iinuma Takaaki, Satoh Yuki, Nakano Manabu, Matsushima Hideki, Anzai Jun, Nakano Toshihisa

    2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING)     2019

     More details

    Language:Japanese  

    Web of Science

  16. Energy-Efficient Intra-Task DVFS Scheduling Using Linear Programming Formulation.

    Yang Qin, Gang Zeng, Ryo Kurachi, Yixiao Li, Yutaka Matsubara, Hiroaki Takada

    IEEE Access   Vol. 7   page: 30536 - 30547   2019

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    In real-time embedded systems, minimizing energy consumption is one of the most important tasks. Intra-task dynamic voltage and frequency scaling (DVFS) has been the subject of much research in the task boundary of time-constrained applications for energy reduction. The problem of optimizing energy consumption with respect to intra-task DVFS scheduling can be addressed by assigning proper operational frequencies to individual basic blocks in a program while guaranteeing the deadline. Based on the profile information of a task, we first formulate the problem in terms of integer linear programming (ILP) regarding different assumptions of transition overhead. To verify the effectiveness of ILP formulations, the most representative intra-task DVFS techniques are taken for comparisons. The results of the experiments demonstrate that the proposed ILP method achieves greater energy savings than the existing approaches. Moreover, it determines the optimal scheduling strategy in reasonable execution time for applications with a limited number of blocks.

    DOI: 10.1109/ACCESS.2019.2902353

    Web of Science

    Scopus

  17. Energy-Aware Task Allocation for Heterogeneous Multiprocessor Systems by Using Integer Linear Programming

    Qin Yang, Zeng Gang, Kurachi Ryo, Matsubara Yutaka, Takada Hiroaki

    Journal of Information Processing   Vol. 27 ( 0 ) page: 136 - 148   2019

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Information Processing Society of Japan  

    <p>Energy-aware task allocation of embedded systems is one of the most important issues in recent decades. A classical solution to solve the issue is Integer Linear Programming (ILP). However, given the considerable time consumption, it is effective only to the extent that the scale of the problem is small. How to use ILP to solve large allocation problems on heterogeneous multiprocessor systems to minimize energy consumption is still a challenge. This paper proposes two ILP formulations to deal with it. One complete ILP(1) is used to derive a feasible allocation, and the other simplified ILP(2) is for calculating the desired minimum energy. Then the desired minimum energy can be used as a reference to evaluate the intermediate solution of ILP(1) and decide its timeout. Besides, to find out the best-suited platform for a given workload, a flexible design which presents flexibilities and choices in core assignment, is considered for further energy saving. For example, the optimal core number design and core type design are generated as two independent ILP formulations, denoted as ILP(3) and ILP(4). The experimental results on randomly generated task sets demonstrate that, compared with the fixed platform, automatically synthesizing a flexible core assignment saves more energy.</p>

    DOI: 10.2197/ipsjjip.27.136

    Scopus

    CiNii Research

  18. DDCAN: Delay-Time Deliverable CAN Network.

    Ryo Kurachi, Hiroaki Takada, Naoki Adachi, Hiroshi Ueda, Yukihiro Miyashita

    19th IEEE International Conference on Software Quality, Reliability and Security Companion     page: 36 - 41   2019

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    The Controller Area Network (CAN) is widely used in in-vehicle networks. As increasing the number of Electronic Control Units (ECUs) in an in-vehicle system, the delay of the CAN message is critical issues to achieve high accuracy of the control applications. This protocol employs an arbitration mechanism for priority-based transmission, therefore, although it is easy to estimate the worst-case response time (WCRT) of each message by using real-time scheduling theory, there is no way to know the delay time at which each CAN message was generated in the run-time environment. To address this issue, in this paper, we propose a method is to notify the real delay time of each message without synchronizing to global time between each node in the run-time environment. Our proposed method can provide the delay time of each CAN message with a small improvement so it can be applied for the existing in-vehicle systems.

    DOI: 10.1109/QRS-C.2019.00020

    Web of Science

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/qrs/qrs2019c.html#KurachiTAUM19

  19. Asymmetric Key-Based Secure ECU Replacement Without PKI.

    Ryo Kurachi, Hiroaki Takada, Naoki Adachi, Hiroshi Ueda, Yukihiro Miyashita

    19th IEEE International Symposium on High Assurance Systems Engineering(HASE)   Vol. 2019-January   page: 234 - 240   2019

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Many threat cases for in-vehicle systems have been reported and various methods to enhance automotive security have been proposed in recent years. One of the methods proposed is a means for detecting possible CAN message spoofing by attaching a message authentication code(MAC) to controller area network (CAN) messages. It is expected, however, that MAC generation keys are compromised during the replacement of ECUs if malicious dealers or repair shops are attackers. For this reason, a secure ECU replacement method is proposed in this paper.

    DOI: 10.1109/HASE.2019.00043

    Web of Science

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/hase/hase2019.html#KurachiTAUM19

  20. An Attack Scenario Generation Method Using the Behavior Model.

    Toshiyuki Fujikura, Ryo Kurachi

    24th IEEE Pacific Rim International Symposium on Dependable Computing(PRDC)   Vol. 2019-December   page: 59 - 60   2019

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    To achieve high traceability from requirements to test scenarios, a test scenario generation method has been widely recognized as being an integral aspect of model-based development. In this study, we propose a test scenario generation method from formalized functional requirements which employs the approach with the 'fluent' proposition. Based on results from a hazard analysis, this technique is able to generate test scenarios that reveals hazardous situations by specifying a hazardous state as their end-state of a scenario. Furthermore, by modeling attack targets and methods, test scenarios leading to a hazardous state by malicious external attacks are generated.

    DOI: 10.1109/PRDC47002.2019.00025

    Web of Science

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/prdc/prdc2019.html#FujikuraK19

  21. A Test Scenario Generation Method for High Requirement Coverage by using KAOS Method.

    Toshiyuki Fujikura, Ryo Kurachi

    19th IEEE International Conference on Software Quality, Reliability and Security Companion     page: 542 - 543   2019

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    To achieve high traceability from requirements to test scenarios, a test scenario generation method has been widely recognized as being an integral aspect of model-based development. In this paper, we propose a test scenario generation method from formalized functional requirements which employs the KAOS-based approach with the fluent proposition. Based on safety requirements, this technique is able to generate the scenario that reveals hazardous situations by specifying a hazard state as the end state of a scenario. By using exhaustive pathfinding approach, our results show the ability to achieve the high requirement coverage compared to existing approaches.

    DOI: 10.1109/QRS-C.2019.00115

    Web of Science

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/qrs/qrs2019c.html#FujikuraK19

  22. Performance Evaluation of CAESAR Authenticated Encryption on SROS2.

    Shu Takemoto, Kanata Nishida, Yusuke Nozaki, Masaya Yoshikawa, Shinya Honda, Ryo Kurachi

    AICCC 2019: 2nd Artificial Intelligence and Cloud Computing Conference(AICCC)     page: 168 - 172   2019

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:ACM  

    With the expansion of Industry 4.0, the factory automation (FA) system has become more complex due to wireless communication between multiple devices. Therefore, short-term development and secure communication are required for development cost and cyber-security issues. For this reason, a secure robot operating system 2 (SROS2) was developed. SROS2 is an open-source platform applicable to industrial robots. SROS2 achieves short-term development with various libraries and implements encryption and authentication by embedding advanced encryption standard - Galois/counter mode (AES-GCM). On the other hand, AES-GCM has been reported to be vulnerable to spoofing. Therefore, a secure encryption algorithm to replace AES-GCM is required. In addition, the system must be able to operate without problems after replacement. For these reasons, this study embeds secure authenticated encryption instead of AES-GCM in SROS2. The results of an evaluation experiment on the latency of the encryption algorithm showed that Ascon is more effective than AES-GCM.

    DOI: 10.1145/3375959.3375976

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/aiccc/aiccc2019.html#TakemotoNNYHK19

  23. Threat to Control Systems

    Kurachi Ryo

    SYSTEMS, CONTROL AND INFORMATION   Vol. 62 ( 4 ) page: 124 - 129   2018.4

     More details

    Language:Japanese   Publisher:THE INSTITUTE OF SYSTEMS, CONTROL AND INFORMATION ENGINEERS  

    DOI: 10.11509/isciesci.62.4_124

    CiNii Books

    CiNii Research

    J-GLOBAL

    Other Link: https://ndlsearch.ndl.go.jp/books/R000000004-I028937031

  24. Energy-Aware Task Allocation for Large Task Sets on Heterogeneous Multiprocessor Systems.

    Yang Qin, Gang Zeng, Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada

    16th IEEE International Conference on Embedded and Ubiquitous Computing(EUC)     page: 158 - 165   2018

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE Computer Society  

    In recent decades, the research of energy-aware scheduling on heterogeneous multiprocessor systems is becoming more and more popular. A classic method for real-time task allocation is Linear Programming (LP). However, existing LP formulations are usually regarded as ineffective in solving large-scale allocation problems due to the unacceptable time consumption. In this work, we propose two integer linear programming (ILP) formulations to deal with the allocation problems for large task sets. One exact ILP(1) is formulated to derive an intermediate solution, and the other relaxed ILP(2) is considered to calculate the desired minimum energy. Then the desired minimum energy can be taken as a reference to evaluate the optimality of the intermediate solution. Experimental results on randomly generated task sets demonstrate that our method achieves average 19.2% less energy within limited time than the classic greedy and the state-of-the-art heuristic algorithm.

    DOI: 10.1109/EUC.2018.00031

    Web of Science

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/euc/euc2018.html#QinZKMT18

  25. Further Analysis with Linear Programming on Blocking Time Bounds for Partitioned Fixed Priority Multiprocessor Scheduling

    Ma Zhongqi, Kurachi Ryo, Zeng Gang, Takada Hiroaki

    Journal of Information Processing   Vol. 26 ( 0 ) page: 540 - 548   2018

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Information Processing Society of Japan  

    <p>The recently developed FMLP<sup>+</sup> provides significant advantages for partitioned fixed priority scheduling, since it ensures asymptotically optimal <i>O</i>(<i>n</i>) maximum priority-inversion blocking. The constraints under the FMLP<sup>+</sup> can be exploited to determine bounds on the blocking time. However, these bounds may be pessimistic since shared resources local to a processor do not incur priority-inversion blocking in some cases. Consequently, a schedulable task set may be erroneously judged as unschedulable because of these pessimistic values. Based on our analysis, additional constraints were added to compute the maximum blocking time bound of each task with linear programming and the corresponding worst-case response time. The results of experiments show our proposed strategy is less pessimistic than existing strategies. Meanwhile, we also demonstrate that local resource sharing should be used instead of global resource sharing where possible.</p>

    DOI: 10.2197/ipsjjip.26.540

    Scopus

    CiNii Research

  26. Problem and solution for automotive cybersecurity: Focused on autonomous driving and V2X

    KURACHI Ryo

    Journal of Information Processing and Management   Vol. 60 ( 10 ) page: 690 - 700   2018

     More details

    Language:Japanese   Publisher:Japan Science and Technology Agency  

    <p>In recent years, automobiles are expected to create new value by connecting with various devices. In the future, it is expected that a communication function called V2X will be installed for automatic operation, and it will become an important position as IoT more and more. On the other hand, it is pointed out that many of the current vehicles are not sufficiently security measures. For this reason, security enhancement is required in the future. Moreover, automobile security has various problems and is expected to become more and more important in the future. This paper focuses on the overview of IoT and information security issues in automotive industry.</p>

    DOI: 10.1241/johokanri.60.690

    CiNii Books

    CiNii Research

    J-GLOBAL

    Other Link: https://ndlsearch.ndl.go.jp/books/R000000004-I028743777

  27. Sliding Window Optimized Information Entropy Analysis Method for Intrusion Detection on In-Vehicle Networks.

    Wufei Wu, Yizhi Huang, Ryo Kurachi, Gang Zeng, Guoqi Xie, Renfa Li, Keqin Li 0001

    IEEE Access   Vol. 6   page: 45233 - 45245   2018

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    With the considerable growth of cybersecurity risks in modern automobiles, cybersecurity issues in the in-vehicle network environment have attracted significant attention from security researchers in recent years. Enhancing the cybersecurity ability of in-vehicle networks while considering the computing resource and cost constraints become an urgent issue. To address this problem, a novel information entropy-based method is proposed in this paper, which uses a fixed number of messages as sliding windows. By improving the sliding window strategy and optimizing the decision conditions, the detection accuracy is increased and the false positive rate is reduced. Experimental results demonstrate that the proposed method can provide real-time response to attacks with a considerably improved detection precision for intrusion detection in the in-vehicle network environment.

    DOI: 10.1109/ACCESS.2018.2865169

    Web of Science

    Scopus

  28. Proposal of HILS-Based In-Vehicle Network Security Verification Environment

    Ryo Kurachi, Toshiyuki Fujikura

    SAE Technical Papers   Vol. 2018-April   2018

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)  

    We propose a security-testing framework to analyze attack feasibilities for automotive control software by integrating model-based development with model checking techniques. Many studies have pointed out the vulnerabilities in the Controller Area Network (CAN) protocol, which is widely used in in-vehicle network systems. However, many security attacks on automobiles did not explicitly consider the transmission timing of CAN packets to realize vulnerabilities. Additionally, in terms of security testing for automobiles, most existing studies have only focused on the generation of the testing packets to realize vulnerabilities, but they did not consider the timing of invoking a security testing. Therefore, we focus on the transmit timing of CAN packets to realize vulnerabilities. In our experiments, we have demonstrated the classification of feasible attacks at the early development phase by integrating the model checking techniques into a virtualized environment.

    DOI: 10.4271/2018-01-0013

    Scopus

  29. Improving secure coding rules for automotive software by using a vulnerability database.

    Ryo Kurachi, Hiroaki Takada, Masato Tanabe, Jun Anzai, Kentaro Takei, Takaaki Iinuma, Manabu Maeda, Hideki Matsushima

    2018 IEEE International Conference on Vehicular Electronics and Safety(ICVES)     page: 1 - 8   2018

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    In automotive software development, secure coding is required to enhance the security level because the secure coding guidelines state that vulnerability of software must be eliminated. However, secure coding is difficult to incorporate because it provides different assumptions from the coding guidelines of product development for existing automobiles. More specifically, in the automobile industry, MISRA-C is applied to improve the reliability of software. To achieve higher dependability and security level, an original guideline was developed in this study for the AUTOSAR adaptive platform. In this paper, we discuss the secure coding guidelines for strengthening security in classic and adaptive platforms.

    DOI: 10.1109/ICVES.2018.8519496

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/icves/icves2018.html#KurachiTTATIMM18

  30. Improving secure coding rules for automotive software by using a vulnerability database

    Kurachi, R; Takada, H; Tanabe, M; Anzai, J; Takei, K; Iinuma, T; Maeda, M; Matsushima, H

    2018 IEEE INTERNATIONAL CONFERENCE ON VEHICULAR ELECTRONICS AND SAFETY (ICVES 2018)     2018

     More details

    Language:Japanese  

    Web of Science

  31. IDH-CAN: A Hardware-Based ID Hopping CAN Mechanism With Enhanced Security for Automotive Real-Time Applications. Reviewed

    Wufei Wu, Ryo Kurachi, Gang Zeng, Yutaka Matsubara, Hiroaki Takada, Renfa Li, Keqin L

    IEEE Access   Vol. 6   page: 54607 - 54623   2018

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    Cybersecurity is increasingly important for the safety and reliability of autonomous vehicles. The controller area network (CAN) is the most widely used in-vehicle network for automotive safety-critical applications. Enhancing the cybersecurity ability of CAN while considering the real-time, schedulability, and cost constraints becomes an urgent issue. To address this problem, a real-time, and schedulability analysis-guaranteed security mechanism [identification hopping CAN (IDH-CAN)] is proposed in this paper, which aims to improve the security performance of CAN under the constraints of automotive real-time applications. In order to support the operation of the IDH-CAN mechanism, an IDH-CAN controller is also designed and implemented on a field-programmable gate array, which can work as a hardware firewall in the data link layer of CAN to isolate cyberattacks from the physical layer. Meanwhile, to maximize the information entropy of the CAN message ID on the physical layer, the ID hopping table generation and optimization algorithms for IDH-CAN are also proposed. Then, information security evaluation experiments based on information entropy comparison are deployed. The simulation and practical evaluations demonstrate the effectiveness of the proposed mechanism in defending reverse engineering, targeted denial of service, and replay attacks without violating real-time and schedulability constraints.

    DOI: 10.1109/ACCESS.2018.2870695

    Web of Science

    Scopus

  32. ID Hopping CAN Controller Design with Obfuscated Priority Assignment.

    Shan Ding, Tong Zhao, Ryo Kurachi, Gang Zeng

    2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)     page: 94 - 99   2018

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE Computer Society  

    Controller Area Network (CAN) is the most widely employed real-Time communication protocol for safety-critical applications. Recently, an issue of security countermeasure for CAN is the limited bandwidth of CAN. For this reason, the ID hopping technology has been proposed to improve the security with limited resource by varying the ID of a message when transmitting it on the CAN bus. However, the existing ID hopping method is not effective in terms of ID variation. In this paper, we propose a real-Time and security mechanism to improve the security effect of ID hopping. Firstly, we obfuscate the priority of messages with two MILP models and a greedy algorithm called 'Priority Bound Decision Algorithm', making priority different on the application layer. Secondly, combining the ID-hopping, our method can enhance the diversity of IDs on the data link layer. Thirdly, the results of security analysis indicate that our proposal can hinder the targeted DoS, replay attack and reverse engineering better than some existing methods.

    DOI: 10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00029

    Web of Science

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/dasc/dasc2018.html#DingZKZ18

  33. An optimized design of CAN FD for automotive cyber-physical systems Reviewed

    Xie Yong, Zeng Gang, Ryo Kurachi, Xie Guoqi, Dou Yong, Zhou Zhili

    JOURNAL OF SYSTEMS ARCHITECTURE   Vol. 81   page: 101 - 111   2017.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:ELSEVIER SCIENCE BV  

    CAN with flexible data rate (CAN FD) is considered the next generation in-vehicle network standard for automotive cyber-physical systems. CAN FD supports a data phase bit-rate of up to 10 Mbps and message payload of up to 64 bytes. However, the substantial differences regarding the allowed message payloads and the heterogeneity of the signal periods indicate the need for a systematic design method to fully utilize its large transmission bandwidth. We propose an optimized design method for CAN FD to minimize bandwidth utilization while meeting the signal timing constraint. First, two slack evaluation metrics are defined for the quantitative analysis of the potential packing choices. Based on these metrics, we propose a clustering-based signal packing algorithm, and the schedulability of the signals and the packed messages are both verified. The proposed method is compared with other design methods proposed for both CAN and CAN FD. The experimental results demonstrated that our method is the most bandwidth efficient and can meet the timing constraint simultaneously.

    DOI: 10.1016/j.sysarc.2017.10.008

    Web of Science

    Scopus

  34. WCRT Analysis of CAN Messages in Gateway-Integrated In-Vehicle Networks Reviewed

    Guoqi Xie, Gang Zeng, Ryo Kurachi, Hiroaki Takada, Zhetao Li, Renfa Li, Keqin Li

    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY   Vol. 66 ( 11 ) page: 9623 - 9637   2017.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC  

    In modern automobiles, gateways are commonly used to connect several subsystems of controller area networks (CANs) to achieve integrated architecture and distributed cross-bus functionalities. To analyze the real-time property of such in-vehicle networks, worst-case response time (WCRT) analysis for gateway-integrated CAN messages has been studied recently. However, the WCRTs obtained are quite pessimistic. In this study, we examine in detail the various actual arriving orders of gateway messages and then propose an explorative WCRT computation method. It is proved that the obtained WCRT results are safe WCRT bounds. Experimental results for real message set demonstrate as much as 24% reduction of WCRT compared with those obtained using the state-of-the-art methods.

    DOI: 10.1109/TVT.2017.2737035

    Web of Science

    Scopus

  35. A Genetic Algorithm for Packing CAN FD Frame with Real-Time Constraints

    DING Shan, ZENG Gang, KURACHI Ryo, HUANG Ruifeng

    IEICE Transactions on Information and Systems   Vol. E100.D ( 10 ) page: 2505 - 2514   2017

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    <p>As a next-generation CAN (Controller Area Network), CAN FD (CAN with flexible data rate) has attracted much attention recently. However, how to use the improved bus bandwidth efficiently in CAN FD is still an issue. Contrasting with existing methods using greedy approximate algorithms, this paper proposes a genetic algorithm for CAN FD frame packing. It tries to minimize the bandwidth utilization by considering the different periods of signals when packing them in the same frame. Moreover, it also checks the schedulability of packed frames to guarantee the real-time constraints of each frame and proposed a merging algorithm to improve the schedulability for signal set with high bus load. Experimental results validate that the proposed algorithm can achieve significantly less bandwidth utilization and improved schedulability than existing methods for a given set of signals.</p>

    DOI: 10.1587/transinf.2017edp7073

    Web of Science

    Scopus

    CiNii Research

    Other Link: http://dblp.uni-trier.de/db/journals/ieicet/ieicet100d.html#journals/ieicet/DingZKH17

  36. Problems and Challenges of Automotive Cybersecurity

    KURACHI Ryo

    The Journal of Reliability Engineering Association of Japan   Vol. 39 ( 2 ) page: 68 - 76   2017

     More details

    Language:Japanese   Publisher:Reliability Engineering Association of Japan  

    DOI: 10.11348/reajshinrai.39.2_68

    CiNii Books

    CiNii Research

    J-GLOBAL

  37. A genetic algorithm for minimizing bandwidth utilization by packing CAN-FD frame Reviewed

    Shan Ding, Ruifeng Huang, Ryo Kurachi, Gang Zeng

    Proceedings - 2016 13th International Conference on Embedded Software and System, ICESS 2016     page: 119 - 124   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Institute of Electrical and Electronics Engineers Inc.  

    As a next-generation CAN (Controller Area Network), CAN-FD (CAN with flexible data rate) has attracted much attention recently. However, how to use the improved bus bandwidth efficiently in CAN-FD is still an issue. Contrasting with existing methods using greedy approximate algorithms, this paper proposes a genetic algorithm for CAN-FD frame packing. It tries to minimize the bandwidth utilization by considering the different periods of signals when packing them in the same frame. Experimental results validate that the proposed algorithm can achieve significantly less bandwidth utilization than existing methods for a given set of signals.

    DOI: 10.1109/ICESS.2016.12

    Web of Science

    Scopus

  38. Further Analysis on Blocking Time Bounds for Partitioned Fixed Priority Multiprocessor Scheduling

    Ma Zhongqi, Kurachi Ryo, Zeng Gang, Takada Hiroaki

    2016 11TH IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL EMBEDDED SYSTEMS (SIES)     2016

     More details

    Language:Japanese  

    Web of Science

  39. Further Analysis on Blocking Time Bounds for Partitioned Fixed Priority Multiprocessor Scheduling Reviewed

    Zhongqi Ma, Ryo Kurachi, Gang Zeng, Hiroaki Takada

    2016 11TH IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL EMBEDDED SYSTEMS (SIES)     page: 226 - 231   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Partitioned fixed priority scheduling is one of the most comprehensively chosen predictable scheduling in practice. The FMLP+ developed in recent years is a better protocol, which ensures asymptotically optimal O(n) maximum priority-inversion blocking. The constraints under several protocols besides the FMLP+ can be exploited to gain the bound on maximum blocking time. However, the blocking time bounds may be pessimistic under the FMLP+ on the ground that shared resources local to a processor do not incur priority-inversion blocking in some cases. It is possible that a schedulable task set is judged as unschedulable because of the pessimistic values. Based on our analysis, a few constraints was added to compute the maximum blocking time of each task, and then its worst-case response time. The results of our experiments show less pessimism than the existing ones. Meanwhile, we also demonstrate the usefulness of the conclusion that global resource sharing should be transformed into local one where possible.

    DOI: 10.1109/SIES.2016.7509435

    Web of Science

    Scopus

  40. Implementation of the CAN-FD Protocol in the Fuzzing Tool beSTORM Reviewed

    Ryosuke Nishimura, Ryo Kurachi, Kazumasa Ito, Takashi Miyasaka, Masaki Yamamoto, Miwako Mishima

    2016 IEEE INTERNATIONAL CONFERENCE ON VEHICULAR ELECTRONICS AND SAFETY (ICVES)     page: 1 - 6   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    With the growth of ECUs that are mounted in automobiles, the transmission capacity of Controller Area Network (CAN), which is currently used by most on-vehicle networks, is becoming insufficient, and therefore CAN With Flexible Data Rate (CAN-FD), presented by Bosch GmbH, is viewed as a nextgeneration standard. Recently, the number of attacks on ECUs connected to CAN has been increasing, and from the viewpoint of CAN security there has been much discussion of safety. However, with regard to CAN-FD, which is an expansion of CAN, although a discussion of safety is needed, that has hardly happened. This paper reports on an implementation that uses the generic fuzzing tool beSTORM to investigate the vulnerability of the CAN-FD protocol. We also aim at practical application by measuring the transmission time for beSTORM test data and by estimating the time required for CAN-FD fuzzing tests.

    DOI: 10.1109/ICVES.2016.7548161

    Web of Science

  41. Implementation of the CAN-FD Protocol in the Fuzzing Tool beSTORM

    Nishimura Ryosuke, Kurachi Ryo, Ito Kazumasa, Miyasaka Takashi, Yamamoto Masaki, Mishima Miwako

    2016 IEEE INTERNATIONAL CONFERENCE ON VEHICULAR ELECTRONICS AND SAFETY (ICVES)     page: 1 - 6   2016

     More details

    Language:Japanese  

    Web of Science

  42. Security authentication system for in-vehicle network

    Hiroshi Ueda, Ryo Kurachi, Hiroaki Takada, Tomohiro Mizutani, Masayuki Inoue, Satoshi Horihata

    SEI Technical Review   ( 81 ) page: 5 - 9   2015.10

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    One of the main concerns for the security of in-vehicle data is spoofing messages on the in-vehicle network. Controller Area Network (CAN) is the most extensively embedded network protocol in vehicles. In the last decade, security attacks in vehicles have been increasing and have been reported in several papers. Therefore, security measures are expected that meet the requirements of real time and cost constraint for in-vehicle control network. In this paper, we propose centralized authentication system in CAN with improved CAN controller. Our experimental results demonstrate that our proposal method is effective on real in-vehicle network environments.

    Scopus

  43. An Integrated Framework for Topology Design of CAN Networks under Real-Time Constraints

    Kurachi Ryo, Chen Yang, Takada Hiroaki, Zeng Gang

    2015 IEEE 82ND VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL)     2015

     More details

    Language:Japanese  

    Web of Science

  44. An Integrated Framework for Topology Design of CAN Networks under Real-Time Constraints Reviewed

    Ryo Kurachi, Yang Chen, Hiroaki Takada, Gang Zeng

    2015 IEEE 82ND VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL)     page: 1 - 5   2015

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Nowadays, in-vehicle network design has become a difficult challenge due to increased complexity and strict real-time constraints. In this work, we propose an integrated framework for CAN network topology design under real-time constraints. The framework integrates topology design with real-time analysis. It firstly allocates electronic control units (ECU) automatically to one of the CAN buses via integer linear programming (ILP) optimization. Then, the worst case response rate (WCRR) results of real-time analysis are fed back to a weighted ILP optimization to further improve the topology design with respect to a real-time property. A case study using a real message set from automaker validated the effectiveness and scalability of the proposed framework.

    DOI: 10.1109/VTCFall.2015.7390840

    Web of Science

    Scopus

  45. Gateway Modeling and Response Time Analysis on CAN Clusters of Automobiles Reviewed

    Guoqi Xie, Gang Zeng, Ryo Kurachi, Hiroaki Takada, Renfa Li

    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS)     page: 1147 - 1153   2015

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    A central gateway is a very important node for connecting the buses to pass messages from one bus to the other bus(es) in current in-vehicle networks. However, transmitting message through gateway causes additional delay to the end-to end delay of messages. Existing methods for analysis of gateway processing delay usually employed experimental measurements which are inefficient and cannot obtain a safe delay bound. Meanwhile, the increased complexity of in-vehicle networks require theoretical analysis (if gateway processing delay to obtain a safe upper bound delay. In this paper, we first construct a central gateway model with CAN clusters, then we propose a novel response time analysis method with rigorous proof to compute the upper bound delay of gateway tasks. Experimental results demonstrated that the proposed approach can obtain the upper bound delay in reasonable time even for a large-scale network workload, and the calculated upper bound is close to the exact worst case delay.

    DOI: 10.1109/HPCC-CSS-ICESS.2015.324

    Web of Science

    Scopus

  46. Schedulability Comparisons between Priority Queue and FIFO Queue for CAN Messages with Offsets Reviewed

    Yang Chen, Ryo Kurachi, Gang Zeng, Hiroaki Takada

    International Journal of Automotive Engineering   Vol. 4 ( 4 ) page: 75-82   2013

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  47. Worst Case Response Time Analysis for Messages in Controller Area Network with Gateway

    Yong Xie, Gang Zeng, Yang Chen, Ryo Kurachi, Hiroaki Takada, Renfa Li

    IEICE Transactions   Vol. 96-D ( 7 ) page: 1467-1477   2013

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  48. Schedulability Comparisons between Priority Queue and FIFO Queue for CAN Messages with Offsets

    Yang Chen, Kurachi Ryo, Gang Zeng, Takada Hiroaki

    International Journal of Automotive Engineering   Vol. 4 ( 4 ) page: 75 - 82   2013

     More details

    Language:English   Publisher:Society of Automotive Engineers of Japan, INC  

    The Controller Area Network (CAN) is a widely used in-vehicle network and its schedulability is particularly
    important. In a CAN system, implementing the priority queues is better than FIFO queues with respect to the schedulability, which is widely recognized by users. In this paper, we investigate whether and how much implementing the priority queues is better than FIFO queues when the offset assignment for CAN messages is conducted. Our results show that usually the priority queues are better, whereas the FIFO queues are better in some specific situations. Furthermore, we propose a new scheduling method for obtaining the advantages of both queues, which improves the schedulability effectively.

    DOI: 10.20485/jsaeijae.4.4_75

    CiNii Research

  49. Worst Case Response Time Analysis for Messages in Controller Area Network with Gateway

    XIE Yong, ZENG Gang, CHEN Yang, KURACHI Ryo, TAKADA Hiroaki, LI Renfa

    IEICE Transactions on Information and Systems   Vol. E96.D ( 7 ) page: 1467 - 1477   2013

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In modern automobiles, Controller Area Network (CAN) has been widely used in different sub systems that are connected by using gateway. While a gateway is necessary to integrate different electronic sub systems, it brings challenges for the analysis of Worst Case Response Time (WCRT) for CAN messages, which is critical from the safety point of view. In this paper, we first analyzed the challenges for WCRT analysis of messages in gateway-interconnected CANs. Then, based on the existing WCRT analysis method proposed for one single CAN, a new WCRT analysis method that uses two new definitions to analyze the interfering delay of sporadically arriving gateway messages is proposed for non-gateway messages. Furthermore, a division approach, where the end-to-end WCRT analysis of gateway messages is transformed into the similar situation with that of non-gateway messages, is adopted for gateway messages. Finally, the proposed method is extended to include CANs with different bandwidths. The proposed method is proved to be safe, and experimental results demonstrated its effectiveness by comparing it with a full space searching based simulator and applying it to a real message set.

    DOI: 10.1587/transinf.e96.d.1467

    Web of Science

    Scopus

    CiNii Research

    Other Link: http://dblp.uni-trier.de/db/journals/ieicet/ieicet96d.html#journals/ieicet/XieZCKTL13

  50. Schedulability Analysis for Messages in Gateway-Interconnected Controller Area Network Reviewed

    Yong Xie, Gang Zeng, Yang Chen, Ryo Kurachi, Hiroaki Takada, Renfa Li

    2012 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE)     page: 83 - 90   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Controller Area Network (CAN) is widely used inside the automobiles. To decrease design complexity and cost, several CAN are utilized in different sub systems and gateway is employed to realize the communication between them. But the employment of gateway brings many challenges for schedulability analysis of CAN messages. We first analyzed the key challenges for schedulability analysis of messages. And then, based on existing method proposed for one single CAN, a new analysis method that is based on interference analysis for dynamically arriving gateway messages is proposed for non-gateway messages. Furthermore, a division approach that transforms the end-to-end schedulability analysis of gateway messages into the similar situation with that of non-gateway messages is proposed for gateway messages. The proposed method is proved to be safe, and by comparing it with a full space searching based simulator and applying to a real message set, its effectiveness is demonstrated as well.

    DOI: 10.1109/ICCVE.2012.23

    Web of Science

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/iccve/iccve2012.html#XieZCKTL12

  51. Design and Evaluation of Scalable CAN Protocol for In-vehicle Networks

    倉地 亮, 高田 広章, 西村 政信

    Transactions of Society of Automotive Engineers of Japan   Vol. 43 ( 2 ) page: 509 - 514   2012

     More details

    Language:Japanese   Publisher:Society of Automotive Engineers of Japan  

    In this paper, a new high-speed bus topology LAN protocol for automobiles is proposed and its compatibility with the traditional CAN protocol is discussed. The transfer rate of traditional CAN cannot be increased due to its bitwise arbitration using message priority and acknowledgment mechanisms. Our proposed protocol avoids collisions by assigning one or more time slots to each ECU within a communication cycle. ACK is informed through the ACK bits included in the header of each frame. Based on this protocol, we implemented a 5 Mbit/s LAN system on which the existing software for CAN is used with small modifications. According to our evaluation, the proposed protocol achieves a short synchronization time during system start-up.

    DOI: 10.11351/jsaeronbun.43.509

    CiNii Books

    CiNii Research

  52. The Worst-Case Response Time Analysis for FIFO-based Offset Assigned CAN Messages

    Chen Yang, Kurachi Ryo, Zeng Gang, Takada Hiroaki

    Journal of Information Processing   Vol. 20 ( 2 ) page: 451 - 462   2012

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Information Processing Society of Japan  

    The Controller Area Network (CAN) is widely employed in automotive control system networks. In the last few years, the amount of data has been increasing rapidly in these networks. With the purpose of improving CAN bandwidth efficiency, scheduling and analysis are considered to be particularly important. As an effective method, it has been known that assigning offsets to the CAN messages can reduce their worst case response time (WCRT). Meanwhile, the fact is that many commercial CAN controllers have been equipped with a priority or first-in-first-out (FIFO) queue to transmit messages to the CAN bus. However, previous researches for WCRT analysis of CAN messages either assumed a priority queue or did not consider the offset. For this reason, in this paper we propose a WCRT analysis method for CAN messages with assigned offset in the FIFO queue. We first present a critical instant theorem, then we propose two algorithms for WCRT calculation based on the given theorem. Experimental results on generated message sets and a real message set have validated the effectiveness of the proposed algorithms.

    DOI: 10.2197/ipsjjip.20.451

    Scopus

    CiNii Research

  53. The Worst-Case Response Time Analysis for FIFO-based Offset Assigned CAN Messages

    Chen Yang, Kurachi Ryo, Zeng Gang, Takada Hiroaki

    Information and Media Technologies   Vol. 7 ( 2 ) page: 841 - 852   2012

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Information and Media Technologies Editorial Board  

    The Controller Area Network (CAN) is widely employed in automotive control system networks. In the last few years, the amount of data has been increasing rapidly in these networks. With the purpose of improving CAN bandwidth efficiency, scheduling and analysis are considered to be particularly important. As an effective method, it has been known that assigning offsets to the CAN messages can reduce their worst case response time (WCRT). Meanwhile, the fact is that many commercial CAN controllers have been equipped with a priority or first-in-first-out (FIFO) queue to transmit messages to the CAN bus. However, previous researches for WCRT analysis of CAN messages either assumed a priority queue or did not consider the offset. For this reason, in this paper we propose a WCRT analysis method for CAN messages with assigned offset in the FIFO queue. We first present a critical instant theorem, then we propose two algorithms for WCRT calculation based on the given theorem. Experimental results on generated message sets and a real message set have validated the effectiveness of the proposed algorithms.

    DOI: 10.11185/imt.7.841

    CiNii Research

  54. A new high-speed bus topology lan protocol compatible with can

    Kurachi R., Takada H., Nishimura M., Horihata S.

    SAE 2011 World Congress and Exhibition     2011.7

     More details

    Language:Japanese   Publisher:SAE 2011 World Congress and Exhibition  

    In this paper, a new high-speed bus topology LAN protocol for automobiles is proposed and its compatibility with the traditional CAN protocol is discussed. The transfer rate of traditional CAN cannot be increased due to its bitwise arbitration using message priority and Acknowledgment mechanisms. Our proposed protocol avoids collisions by assigning one or more time slots to each ECU within a communication cycle. ACK is informed through the ACK bits included in the header of each frame. Based on this protocol, we implemented a 5 Mbit/s LAN system on which the existing software for CAN is used with small modifications. This paper describes the proposed protocol, named "Scalable CAN," and its implementation on FPGA, and demonstrates that existing software can be easily ported to this new protocol. © 2011 SAE International.

    DOI: 10.4271/2011-01-1043

    Scopus

  55. A new high-speed bus topology lan protocol compatible with can

    Kurachi R., Takada H., Nishimura M., Horihata S.

    SAE Technical Papers     2011

     More details

    Language:Japanese   Publisher:SAE Technical Papers  

    In this paper, a new high-speed bus topology LAN protocol for automobiles is proposed and its compatibility with the traditional CAN protocol is discussed. The transfer rate of traditional CAN cannot be increased due to its bitwise arbitration using message priority and Acknowledgment mechanisms. Our proposed protocol avoids collisions by assigning one or more time slots to each ECU within a communication cycle. ACK is informed through the ACK bits included in the header of each frame. Based on this protocol, we implemented a 5 Mbit/s LAN system on which the existing software for CAN is used with small modifications. This paper describes the proposed protocol, named "Scalable CAN," and its implementation on FPGA, and demonstrates that existing software can be easily ported to this new protocol. Copyright © 2011 SAE International.

    Scopus

  56. Schedulability Comparison for CAN Message with Offset: Priority Queue Versus FIFO Queue. Reviewed

    Yang Chen, Ryo Kurachi, Hiroaki Takada, Gang Zeng

    19th International Conference on Real-Time and Network Systems, RTNS '11, Nantes, France, September 29-30, 2011. Proceedings     page: 181 - 192   2011

     More details

    Publishing type:Research paper (international conference proceedings)  

    Other Link: http://dblp.uni-trier.de/db/conf/rtns/rtns2011.html#conf/rtns/ChenKTZ11

  57. Development of scalable CAN protocol

    Ryo Kurachi, Masanobu Nishimura, Hiroaki Takada, Shigeharu Teshima, Yukihiro Miyashita, Satoshi Horihata, Hideki Yamamoto, Akihiro Natsume

    SEI Technical Review   ( 71 ) page: 31 - 36   2010.10

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    In today's automotive industry, FlexRay and other next generation protocols for automotive network communications are gaining attention. However, these protocols are unlikely to replace existing applications in the immediate future due to the cost and reliability problems caused by the replacement. In this paper we propose Scalable CAN, a new automotive network protocol based on the existing CAN (controller area network). Having a new ACK (Acknowledgement) information field, instead of an ACK slot, the Scalable CAN features a transmission speed of 10 Mbps and a new collision resolution algorithm which guarantees the delivery of a message within a given time period. Our simulation analysis indicates that the Scalable CAN protocol is superior to the conventional CAN in throughput performance such as a maximum data transmission speed, scalability, and priority inversion. This paper also includes considerations given for the implementation of the Scalable CAN.

    Scopus

  58. Design and performance analysis of 10 Mbit/s CAN

    Kurachi R., Takada H., Teshima S., Miyashita Y.

    SAE International Journal of Passenger Cars - Electronic and Electrical Systems   Vol. 2 ( 1 ) page: 18 - 26   2009.12

     More details

    Language:Japanese   Publisher:SAE International Journal of Passenger Cars - Electronic and Electrical Systems  

    In this paper, we propose a new automotive network protocol which can transmit data at a speed of 10 Mbit/s. The new automotive protocol "10 Mbit/s CAN" is based on two changes to CAN; a star topology, in which nodes are physically connected using a multi-port gateway, and a new collision resolution algorithm which guarantees delivery of a message within a finite period of time. According to our analysis using a simulator, the "10 Mbit/s CAN" protocol demonstrated several advantages over throughput performance of a conventional CAN, including a maximum possible data transmission speed, high scalability, and reduction of priority inversion. The implementation considerations of "10 Mbit/s CAN" are also reviewed briefly. © 2009 SAE International.

    DOI: 10.4271/2009-01-0126

    Scopus

  59. Design and performance analysis of 10 Mbit/s CAN

    Kurachi R., Takada H., Teshima S., Miyashita Y.

    SAE Technical Papers     page: 18 - 26   2009

     More details

    Language:Japanese   Publisher:SAE Technical Papers  

    In this paper, we propose a new automotive network protocol which can transmit data at a speed of 10 Mbit/s. The new automotive protocol "10 Mbit/s CAN" is based on two changes to CAN; a star topology, in which nodes are physically connected using a multi-port gateway, and a new collision resolution algorithm which guarantees delivery of a message within a finite period of time. According to our analysis using a simulator, the "10 Mbit/s CAN" protocol demonstrated several advantages over throughput performance of a conventional CAN, including a maximum possible data transmission speed, high scalability, and reduction of priority inversion. The implementation considerations of "10 Mbit/s CAN" are also reviewed briefly. Copyright © 2009 SAE International.

    DOI: 10.4271/2009-01-0126

    Scopus

  60. Design and performance analysis of 10 Mbit/s CAN Reviewed

    Ryo Kurachi, Hiroaki Takada, Shigeharu Teshima, Yukihiro Miyashita

    SAE International Journal of Passenger Cars - Electronic and Electrical Systems   Vol. 2 ( 1 ) page: 18 - 26   2009

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    In this paper, we propose a new automotive network protocol which can transmit data at a speed of 10 Mbit/s. The new automotive protocol "10 Mbit/s CAN" is based on two changes to CAN
    a star topology, in which nodes are physically connected using a multi-port gateway, and a new collision resolution algorithm which guarantees delivery of a message within a finite period of time. According to our analysis using a simulator, the "10 Mbit/s CAN" protocol demonstrated several advantages over throughput performance of a conventional CAN, including a maximum possible data transmission speed, high scalability, and reduction of priority inversion. The implementation considerations of "10 Mbit/s CAN" are also reviewed briefly. © 2009 SAE International.

    DOI: 10.4271/2009-01-0126

    Scopus

▼display all

Books 1

  1. CANの高速化と最大遅れ時間解析手法の研究

    倉地 亮

    [出版者不明]  2012 

     More details

    Language:Japanese

    CiNii Books

MISC 58

  1. 自動車のサイバーセキュリティ強化に向けた課題と解決へのアプローチ : 今後重要となる技術開発の方向性—特集 車載ソフトウェアの最新動向とセキュリティ

    倉地 亮

    車載テクノロジー = Automotive technology / 技術情報協会 編   Vol. 9 ( 10 ) page: 1 - 6   2022.7

     More details

    Language:Japanese   Publisher:東京 : 技術情報協会  

    J-GLOBAL

    Other Link: https://ndlsearch.ndl.go.jp/books/R000000004-I032316795

  2. 自動車に迫る脅威とサイバーセキュリティ

    倉地 亮

    名古屋大学情報学研究科年報 Informatica   Vol. 3   page: 58 - 61   2022

     More details

    Language:Japanese   Publisher:『名古屋大学情報学研究科年報 Informatica』編集委員会  

    ミニ特集「セキュリティ」

    DOI: 10.18999/nagjni.03.030

    J-GLOBAL

  3. CASE時代へ向けたサイバーセキュリティの現状と課題—特集 車載ソフトウェアのセキュリティ対策とその課題

    倉地 亮

    車載テクノロジー = Automotive technology / 技術情報協会 編   Vol. 8 ( 9 ) page: 1 - 5   2021.6

     More details

    Language:Japanese   Publisher:東京 : 技術情報協会  

    J-GLOBAL

    Other Link: https://ndlsearch.ndl.go.jp/books/R000000004-I031591451

  4. 車載制御ネットワークのセキュリティ監視システムの研究開発—特集 自動車のサイバーリスクとセキュリティ対策

    倉地 亮

    車載テクノロジー = Automotive technology / 技術情報協会 編   Vol. 7 ( 9 ) page: 6 - 10   2020.6

     More details

    Language:Japanese   Publisher:東京 : 技術情報協会  

    J-GLOBAL

    Other Link: https://ndlsearch.ndl.go.jp/books/R000000004-I030543267

  5. Cybersecurity in a New Era of Mobility - Toward Enhancement of Japan Brand -:2. CASE Evolution and Cybersecurity in Automotive Domain

      Vol. 61 ( 4 ) page: 338 - 343   2020.3

     More details

  6. An Application Level Grammar-Based Fuzzing Test

    藤倉俊幸, 倉地亮

    自動車技術会大会学術講演会講演予稿集(CD-ROM)   Vol. 2020   2020

     More details

  7. A Proposal of the Device Disabler for Controller Area Network

    上田浩史, 倉地亮, 本田晋也, 高田広章, 足立直樹, 宮下之宏

    SEIテクニカルレビュー   ( 194 ) page: 80 - 85   2019.1

     More details

    Language:Japanese  

    CiNii Books

    J-GLOBAL

  8. Real-time Evaluation of Communication Assuming Remote Driving using ROS2

    川上勇剛, 本田晋也, 倉地亮, 中條直也

    情報処理学会研究報告(Web)   Vol. 2019 ( ITS-79 )   2019

     More details

  9. 時刻配送型CANネットワークの提案

    倉地亮, 高田広章, 足立直樹, 上田浩史, 宮下之宏

    情報処理学会研究報告(Web)   Vol. 2019 ( ARC-235 )   2019

     More details

  10. 想定外モデルによる妥当性検証シナリオの生成

    藤倉俊幸, 倉地亮

    自動車技術会大会学術講演会講演予稿集(CD-ROM)   Vol. 2019   2019

     More details

  11. 形式手法を用いたテストシナリオ自動生成の研究 HILS環境を利用したセキュリティおよび安全性試験用テストケース生成

    藤倉俊幸, 倉地亮

    自動車技術会大会学術講演会講演予稿集(CD-ROM)   Vol. 2019   2019

     More details

  12. 低価格計算機上でのROSを用いた自動運転システムの性能評価

    梅田大知, 倉地亮, 本田晋也, 吉川雅弥

    電気・電子・情報関係学会東海支部連合大会講演論文集(CD-ROM)   Vol. 2019   2019

     More details

  13. Safety and Security toward Connected Society and Vehicles

    松原 豊, 倉地 亮, 高田 広章

    自動車技術 = Journal of Society of Automotive Engineers of Japan   Vol. 72 ( 5 ) page: 87 - 93   2018.5

     More details

    Language:Japanese   Publisher:自動車技術会  

    CiNii Books

    J-GLOBAL

  14. ROSを用いたADASのリアルタイム性評価の基礎検討

    川上勇剛, 本田晋也, 倉地亮, 中條直也

    電気・電子・情報関係学会東海支部連合大会講演論文集(CD-ROM)   Vol. 2018   2018

     More details

  15. 車載ネットワークセキュリティ検証環境の開発 HILS環境で利用するテストシナリオ生成

    藤倉俊幸, 倉地亮

    自動車技術会大会学術講演会講演予稿集(CD-ROM)   Vol. 2018   2018

     More details

  16. IDHCC: A Security-Enhanced ID Hopping CAN Controller Design to Guarantee Real-Time Reviewed

    W. Wu, R. Kurachi, G. Zeng, Y. Matsubara, H. Takada, R. Li

    2nd Workshop on Security and Dependability of Critical Embedded Real-Time Systems     page: -   2017.12

     More details

    Language:English   Publishing type:Research paper, summary (national, other academic conference)  

  17. Proposal of Spoofing Detection Based on Keep Alive Messages for Controller Area Network

      Vol. 2017 ( 2 )   2017.10

     More details

    Language:Japanese  

    J-GLOBAL

  18. Safety and Security Issues in the Age of IoT - Toward Strengthening Japanese Industrial Competitiveness -:3. Trend of Safety and Security for Automotive Domain - Toward Autonomous Driving -

    松原 豊, 倉地 亮, 高田 広章

    情報処理   Vol. 58 ( 11 ) page: 972 - 977   2017.10

     More details

    Language:Japanese   Publisher:情報処理学会 ; 1960-  

    本稿では,自動車制御システムを中心にその発展経緯を踏まえて,セーフティとセキュリティに関する現状を整理する.特に,情報処理の観点から,先進運転支援システムや自律走行システムの実用化に向けて,今後取り組むべき課題やその方向性について概説する.

    CiNii Books

    J-GLOBAL

  19. Current Status and Activities of Strengthening Automotive Cybersecurity

    倉地 亮

    自動車技術 = Journal of Society of Automotive Engineers of Japan   Vol. 71 ( 5 ) page: 58 - 65   2017.5

     More details

    Language:Japanese   Publisher:自動車技術会  

    CiNii Books

    J-GLOBAL

  20. Problems and Challenges of Automotive Cybersecurity

    倉地 亮

    信頼性 = The journal of Reliability Engineering Association of Japan : 日本信頼性学会誌   Vol. 39 ( 2 ) page: 68 - 76   2017.3

     More details

    Language:Japanese   Publisher:日本信頼性学会  

    CiNii Books

  21. 車載ネットワークセキュリティ検証環境の開発 HILS環境を利用したCAN攻撃実験用テストケース生成

    藤倉俊幸, 倉地亮

    自動車技術会大会学術講演会講演予稿集(CD-ROM)   Vol. 2017   2017

     More details

  22. 自動車のハッキング事例と自動運転へ向けたセキュリティ対策 (特集 自動運転の実用化へ向けたキーテクノロジー : 技術開発の方向性と課題)

    倉地 亮

    車載テクノロジー = Automotive technology   Vol. 4 ( 1 ) page: 21 - 25   2016.10

     More details

    Language:Japanese   Publisher:技術情報協会  

    J-GLOBAL

  23. Information Security and Safety of Vehicles:3. Safety and Security for In-vehicle Electronic Systems

    倉地 亮, 松原 豊, 高田 広章

    情報処理   Vol. 57 ( 7 ) page: 632 - 637   2016.6

     More details

    Language:Japanese   Publisher:情報処理学会 ; 1960-  

    近年,自動車に対する脆弱性事例が多数報告されており,自動車のセキュリティが注目されている.これまでに販売されている自動車の多くは機能安全規格に対応されつつあり故障などに対して安全ではあるものの,攻撃者からの意図的なサイバー攻撃に対しては対策されておらず,脆弱であることが指摘されている.また,リアルタイム性やコスト制約が厳しい車載制御システムでは情報セキュリティの対策技術をそのまま適用することができない場合があり,車載制御システムの特徴を生かしたセキュリティ対策技術が必要とされている.本解説記事では,車載制御システムに求められる安全性とセキュリティを概説する.

    CiNii Books

    J-GLOBAL

  24. CAN Disabler: Hardware-based Prevention Method of Unauthorized Transmission in CAN and CAN-FD Networks Reviewed

    R. Kurachi, D. Pyun, S. Honda, H. Takada, H. Ueda, S. Horihata

    escar (Embedded Security in Cars Conference) US 2016     page: -   2016.6

     More details

    Language:English   Publishing type:Research paper, summary (national, other academic conference)  

  25. 日本の自動車における情報セキュリティの現状と今後 (特集 ネットと繋がるクルマ)

    倉地 亮

    自動車工業   Vol. 50 ( Apr ) page: 8 - 15   2016.4

     More details

    Language:Japanese   Publisher:日本自動車工業会  

    CiNii Books

    J-GLOBAL

  26. メッセージ認証を用いたCANの集中監視システム Reviewed

    倉地亮, 松原豊, 高田広章, 上田浩史, 堀端啓史

    電子情報通信学会論文誌   Vol. J99-A ( 2 ) page: 118-130   2016.2

     More details

    Language:Japanese   Publishing type:Rapid communication, short report, research note, etc. (scientific journal)  

    J-GLOBAL

  27. ADASのためのGPU組込みプラットフォームの評価

    水野翔太, 中條直也, 本田晋也, 倉地亮, 早川代祐

    電気・電子・情報関係学会東海支部連合大会講演論文集(CD-ROM)   Vol. 2016   2016

     More details

  28. 視性刺激遮断弱視予防を目的としたthread liftを用いた眼瞼形成術

    佐藤大介, 尾崎峰, 成田圭吾, 倉地彩奈, 多久島亮彦, 波利井清紀

    日本頭蓋顎顔面外科学会誌   Vol. 32 ( 3 )   2016

     More details

  29. Linuxを用いた自動運転向けアーキテクチャのリアルタイム性評価

    古田善蔵, 中條直也, 本田晋也, 倉地亮, 早川代祐

    電気・電子・情報関係学会東海支部連合大会講演論文集(CD-ROM)   Vol. 2016   2016

     More details

  30. 車載電子制御技術と車載制御ネットワークの進展 (特集 自動車,メカから電気へ)

    倉地 亮

    電気評論   Vol. 100 ( 12 ) page: 17 - 22   2015.12

     More details

    Language:Japanese   Publisher:電気評論社  

    CiNii Books

    J-GLOBAL

  31. SecGW - Secure Gateway for In-Vehicle Networks Reviewed

    R. Kurachi, H. Takada, T. Mizutani, H. Ueda, S. Horihata

    escar (Embedded Security in Cars Conference) Europe 2015     page: -   2015.11

     More details

    Language:English   Publishing type:Research paper, summary (national, other academic conference)  

  32. Proposal of the Error Frame Monitoring System with Improved Controller Area Network (CAN) Controller

      Vol. 2015 ( 3 ) page: 110 - 115   2015.10

     More details

    Language:Japanese  

    J-GLOBAL

  33. Security Authentication System for In-Vehicle Network

    上田 浩史, 倉地 亮, 高田 広章

    SEIテクニカルレビュー   ( 187 ) page: 1 - 5   2015.7

     More details

    Language:Japanese   Publisher:住友電気工業  

    CiNii Books

    J-GLOBAL

  34. CaCAN - Centralized Authentication System in CAN Reviewed

    R. Kurachi, Y. Matsubara, H. Takada, N. Adachi, Y. Miyashita, S. Horihata

    escar (Embedded Security in Cars Conference) Europe 2014     page: -   2014.11

     More details

    Language:English   Publishing type:Research paper, summary (national, other academic conference)  

  35. A Scheduling Method of RMAP Packets for SpaceWire-D Invited Reviewed

    Y. Chen, M. Takada, R. Kurachi, H. Takada

    Int'l SpaceWire Conference 2013     page: 205-208   2013.6

     More details

    Language:English   Publishing type:Research paper, summary (national, other academic conference)  

  36. Performance Evaluation of the Scalable-CAN Integrated In-Vehicle Network Invited Reviewed

    R. Kurachi, Y. Chen, H. Takada, M. Nishimura, S. Horihata, T. Nakajima

    SAE 2013 World Congress & Exhibition   Vol. 2   page: SAE Technical Paper 2013-01-11   2013.4

     More details

    Language:English   Publishing type:Research paper, summary (national, other academic conference)  

    Today, the Controller Area Network (CAN) is a widely used in-vehicle network. However, due to the constraint of the theoretical upper bound speed of CAN, we proposed Scalable-CAN (SCAN), which employs round-robin scheduling to improve upper bound speed while keeping the compatibility with traditional CAN. Moreover, we proposed the worst-case response time (WCRT) analysis for a single SCAN bus system and showed the real-time performance. In this paper, to apply SCAN to a next-generation in-vehicle network composed of a SCAN bus and a CAN bus, we first propose a schedulability analysis method for the integrated network system. Second, we show its real-time performance and highlight the effects of the bandwidth extension and throughput performance of the SCAN integrated system. Finally, we conclude that SCAN achieves lower latency, high schedulability, and high integrity toward a next-generation in-vehicle network. Copyright © 2013 SAE International.

    DOI: 10.4271/2013-01-1182

    Scopus

  37. Effects of Queueing Jitter on Worst-case Response Times of CAN Messages with Offsets

      Vol. 2012   page: 119 - 126   2012.10

     More details

    Language:English  

  38. Worst Case Response Time Analysis for Messages in Gateway-Interconnected Controller Area Network

      Vol. 2012 ( 3 ) page: 1 - 8   2012.9

     More details

    Language:English  

    CiNii Books

  39. Performance Analysis of Scalable CAN with Worst-case Response Time Analysis

    倉地 亮, 高田 広章, 西村 政信, 堀端 啓史

    情報処理学会論文誌   Vol. 53 ( 8 ) page: 1962 - 1975   2012.8

     More details

    Language:Japanese   Publisher:情報処理学会  

    現在,様々な機能を実現するために,車載ネットワークに流れるデータ量は急激に増加しており,広く採用されているController Area Network(CAN)では回線容量が不足している.しかしながら,CANの最大伝送速度はバス上での送信権の調停やACK応答メカニズムにより制約されており,最大伝送速度を向上させるためにはプロトコルの改良が必要となる.そこで,我々はCANを改良したスケーラブルCANプロトコルを提案している.本論では,スケーラブルCANプロトコルの最大遅れ時間解析手法を提案し,スケーラブルCANプロトコルがCANよりスループットを向上させたことにより,十分なメッセージ量を転送できる能力があることを示す.The Controller Area Network (CAN) is widely employed in in-vehicle networks to install new functions. However, CAN has significant restrictions on upper bound of maximum speed due to its bitwise arbitration and acknowledgement sequences. Therefore, we have proposed a new high-speed protocol &quot;Scalable CAN&quot; to improve upper bound speed of CAN. In this paper, we propose the worst-case response time analysis for &quot;Scalable CAN&quot;. According to our analysis, the Scalable CAN has achieved much higher throughput performance than CAN, and it has the ability to transfer a sufficient amount of message.

    CiNii Books

  40. Technology of In-vehicle Network and Its Future Direction

    TAKADA Hiroaki, KURACHI Ryo, NISHIMURA Masanobu

    The Journal of the Institute of Electronics, Information, and Communication Engineers   Vol. 95 ( 8 ) page: 724 - 729   2012.8

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    車載制御システム向けのネットワークは,厳しいコスト制約や重量制約,高い信頼性やリアルタイム性などの要求から,一般の情報ネットワーク技術とは大きく異なる技術が用いられている.本稿では,まず,車載制御ネットワークの主な使途について述べた後,ネットワーク技術に課されている制約事項や要求事項について整理する.次に,現状の車載制御ネットワーク規格として,CANの概要について解説する.また,LINやFlexRayなど,その他のネットワーク規格についても概説する.最後に,車載制御ネットワーク技術の今後の発展性として,CANの高速化やイーサネットの導入の動き,光ファイバ化などの研究開発動向について紹介する.

    CiNii Books

    J-GLOBAL

  41. Design and Evaluation of Scalable CAN Protocol for In-vehicle Networks

    倉地 亮, 高田 広章, 西村 政信

    自動車技術会論文集   Vol. 43 ( 2 ) page: 509 - 514   2012.3

     More details

    Language:Japanese   Publisher:自動車技術会  

    DOI: 10.11351/jsaeronbun.43.509

  42. Design and Evaluation of Scalable CAN Protocol for In-vehicle Networks

    倉地 亮, 高田 広章, 西村 政信, 堀端 啓史

    JSAE Transactions   Vol. 43 ( 2 ) page: 509 - 514   2012

     More details

    Language:Japanese   Publisher:Society of Automotive Engineers of Japan  

    In this paper, a new high-speed bus topology LAN protocol for automobiles is proposed and its compatibility with the traditional CAN protocol is discussed. The transfer rate of traditional CAN cannot be increased due to its bitwise arbitration using message priority and acknowledgment mechanisms. Our proposed protocol avoids collisions by assigning one or more time slots to each ECU within a communication cycle. ACK is informed through the ACK bits included in the header of each frame. Based on this protocol, we implemented a 5 Mbit/s LAN system on which the existing software for CAN is used with small modifications. According to our evaluation, the proposed protocol achieves a short synchronization time during system start-up.

    DOI: 10.11351/jsaeronbun.43.509

  43. Performance analysis of Scalable CAN with worst-case response time analysis

    倉地 亮, 高田 広章, 西村 政信, 堀端 啓史

    組込みシステムシンポジウム2011論文集   Vol. 2011 ( 8 ) page: 18 - 1-18-9   2011.10

     More details

    Language:Japanese  

    J-GLOBAL

  44. Exact Schedulability Analysis for CAN Messages with Offsets

    倉地 亮, 陳暘, 高田 広章

    情報処理学会論文誌   Vol. 52 ( 8 ) page: 2431 - 2440   2011.8

     More details

    Language:Japanese   Publisher:情報処理学会  

    これまでにオフセット付きCANメッセージの最大遅れ時間の解析手法が提案されている.しかしながら,従来の手法では計算量を抑え速く効率的に計算できる一方,悲観的に解析される場合がある.このため,本論では従来手法の問題点を指摘し,正確な最大遅れ時間を求めるための手法を提案する.提案する手法は,最大遅れ時間となりうるメッセージ送信シーケンスに着目し,限定した範囲に限り網羅的に解析を行うことで,正確な最大遅れ時間を導出する方法である.本提案手法の評価として自動車メーカから提供されるメッセージセットに適用した結果,十分に少ない組合せで正確な最大遅れ時間が得られた.The existing analysis for CAN messages with offsets can compute fast and efficient by reducing the amount of computation. However, it is pessimistic in some cases. The causes of the pessimism is that the cumulative accounting of maximum interference functions is overestimated much greater than a realistic situation. In this paper, we show the cause of this situation that existing analysis takes into account unrealistic interference in the cumulative accounting. Then, we propose the exact schedulability analysis which involves the partially exhaustive analysis. According to our experiments by using actually-used message sets, we can conclude that our approach can significantly reduce the combination of the critical interference function, and its can achieve an exact schedulability analysis.

    CiNii Books

  45. An Offset Assignment Method for Messages of CAN

    陳暘, 倉地 亮, 曾剛, 高田 広章

    情報処理学会論文誌   Vol. 52 ( 7 ) page: 2245 - 2255   2011.7

     More details

    Language:Japanese   Publisher:情報処理学会  

    CAN(Controller Area Network)は,自動車の制御系ネットワークとして広く使われているネットワーク規格である.近年,自動車の制御系ネットワークを流れるデータ量が急増しており,CANの帯域を効率的に使用するために,CAN上でのメッセージのスケジューリング手法が重要となっている.CAN上でのメッセージ送信タイミングに適切なオフセットを付けることで,メッセージのスケジュール可能性を高くできることが知られている.本論文では,CAN上のメッセージに対して適切なオフセットを付けるための手法を提案する.また,提案した手法の有効性を確認するために,実際の車載システムで使用されているメッセージセットなどを用いた評価を行い,従来のオフセット決定手法よりも優れていることを示す.The Controller Area Network (CAN) as a network standard is widely employed in control network of vehicle. ln the last few years, the amount of data has been increasing rapidly in automotive control system network. With the purpose of improving CAN broadband efficiency, scheduling is considered to be particularly important. As we know, an appropriate offset assignment method for CAN messages could enhance schedulability. In this study, we propose a new method that provide a suitable offset for every message in CAN system. And we demonstrated its effects by using message sets of real vehicle network, etc. Compare with previous methods, the new method reveals its remarkable priority.

    CiNii Books

  46. A New High-Speed Bus Topology LAN Protocol Compatible with CAN Reviewed

    R. Kurachi, H. Takada, M. Nishimura, S. Horihata

    SAE 2011 World Congress     page: -   2011.4

     More details

    Language:English   Publishing type:Research paper, summary (national, other academic conference)  

    In this paper, a new high-speed bus topology LAN protocol for automobiles is proposed and its compatibility with the traditional CAN protocol is discussed. The transfer rate of traditional CAN cannot be increased due to its bitwise arbitration using message priority and Acknowledgment mechanisms. Our proposed protocol avoids collisions by assigning one or more time slots to each ECU within a communication cycle. ACK is informed through the ACK bits included in the header of each frame. Based on this protocol, we implemented a 5 Mbit/s LAN system on which the existing software for CAN is used with small modifications. This paper describes the proposed protocol, named "Scalable CAN," and its implementation on FPGA, and demonstrates that existing software can be easily ported to this new protocol. © 2011 SAE International.

    DOI: 10.4271/2011-01-1043

    Scopus

  47. An Offset Assignment Method for Messages of CAN

    CHEN Yang, 倉地亮, ZENG Gang, 高田広章

    情報処理学会論文誌ジャーナル(CD-ROM)   Vol. 52 ( 7 )   2011

     More details

  48. Exact Schedulability Analysis for CAN Messages with Offsets

    倉地亮, CHEN Yang, 高田広章

    情報処理学会論文誌ジャーナル(CD-ROM)   Vol. 52 ( 8 )   2011

     More details

  49. Exact Schedulability Analysis for CAN Messages with offsets

    倉地亮, CHEN Yang, 高田広章, 高田広章

    情報処理学会研究報告(CD-ROM)   Vol. 2010 ( 5 )   2011

     More details

  50. Exact Schedulability Analysis for CAN Messages with offsets

    倉地 亮, 陳 暘, 高田 広章

    研究報告組込みシステム(EMB)   Vol. 2010 ( 4 ) page: 1 - 7   2010.11

     More details

    Language:Japanese   Publisher:情報処理学会  

    これまでにオフセット付き CAN メッセージの最大遅れ時間の解析手法が提案されている.しかしながら,従来の手法では計算量を抑え速く効率的に計算出来る一方,悲観的に解析される場合がある.このため,本論では従来手法の問題点を指摘し,より正確な最大遅れ時間を求めるための手法について提案する.提案する手法は,クリティカルフレームに着目し限定した範囲に限り網羅的に解析を行うことで,厳密な最大遅れ時間を導出する方法である.本提案手法の評価として自動車メーカーから提供されるメッセージセットに適用した結果,十分に少ない組み合わせでより正確な解析結果がえられた.The existing analysis for CAN messages with offsets can compute fast and efficient by reducing the amount of computation. However, it is pessimisctic in some cases. The causes of the pessimism is that the cumulative accounting of maximum interference functions is overestimated much greater than a realistic situation. In this paper, we show the cause of this situation that existing analysis takes into account unrealistic interference in the cumulative accounting. Then, we propose the exact schedulability analysis which involves the partially exhaustive analysis. According to our experiments by using a actually-used messege sets, we can conclude that our approach can significantly reduce the conbination of the critical frames, and its can achieve an exact schedulability analysis.

    CiNii Books

  51. Development of scalable CAN protocol

    倉地 亮, 西村 政信, 高田 広章

    SEI technical review   ( 177 ) page: 30 - 35   2010.7

     More details

    Language:Japanese   Publisher:住友電気工業  

    CiNii Books

    J-GLOBAL

  52. Design and Performance Analysis of 10MbpsCAN

    倉地 亮, 高田 広章, 手嶋 茂晴, 宮下 之宏

    情報処理学会論文誌   Vol. 50 ( 11 ) page: 2643 - 2653   2009.11

     More details

    Language:Japanese  

    今日までに提案されている次世代車載プロトコルの多くは既存システムの再構成を強く要求しており,高い安全性が求められる自動車の制御ネットワークへ適用するには高いコストとリスクがともなう.そこで本論文では,自動車内の制御系ネットワークに広く使われるCANをベースとした新しい次世代車載プロトコル10 MbpsCANを提案する.10 MbpsCANプロトコルはスタートポロジへの変更と新しい衝突解決アルゴリズムにより高速化を実現した.さらにシミュレーション結果によれば,10 MbpsCANは従来CANに比べ十分なメッセージ量を送信できる能力を示した.最後に,10 MbpsCANコントローラの実装について説明する.Recently, automotive industry has atracted next genaration automotive protocols such as FlexRay. However, these solutions which shift to new applications will not meet the cost and risk requirements. In this paper, we propose a new automotive network protocol which can transmit data at a speed of 10 Mbps. The new automotive protocol &quot;10 MbpsCAN&quot; is based on several changes to CAN; a star topology, in which nodes are physically connected using a multiport gateway, and a new collision resolution algorithm which guarantees delivery of a message within a finite period of time. According to our analysis using a simulator, the &quot;10 MbpsCAN&quot; protocol demonstrated several advantages over throughput performance of a conventional CAN, including a maximum possible data transmission speed, high scalability, and reduction of priority inversion. The implementation considerations of &quot;10 MbpsCAN&quot; are also reviewed briefly.

    CiNii Books

  53. Design and Performance Analysis of 10 MbpsCAN

    倉地 亮, 高田 広章, 手嶋 茂晴

    情報処理学会論文誌 論文誌ジャーナル   Vol. 50 ( 11 ) page: 2643 - 2653   2009.11

     More details

    Language:Japanese   Publisher:情報処理学会  

    CiNii Books

    J-GLOBAL

  54. An Extension of AUTOSAR Communication Layers for Multicore Systems

    ICHIBA TOSHIYUKI, TAKADA HIROAKI, HONDA SHINYA, KURACHI RYO

    研究報告組込みシステム(EMB)   Vol. 2009 ( 6 ) page: 1 - 7   2009.7

     More details

    Language:Japanese   Publisher:情報処理学会  

    車載システム向けソフトウェアプラットフォームである AUTOSAR はシングルコアのみを想定しており,マルチコア環境を考慮していない.車載システムは相互に通信を行うことで協調制御するため,通信処理を実現するミドルウェアのマルチコア対応が必須である.本研究では,マルチコア環境での AUTOSAR 通信ミドルウェアの実現方法と評価を行う.まず,通信をコア内通信,コア間通信,チップ外通信の 3 つに分類し,それぞれの実現方法を検討する.チップ外通信については,ロック方式,通信サーバ方式の 2 方式を提案する.既存の通信ミドルウェアを 2 方式で拡張し,それぞれの送信処理時間の比較を行った.シングルコア環境に比べ,ロック方式は 41%,通信サーバ方式は 29% のオーバヘッドで実現可能であることがわかった.AUTOSAR, a software platform for automotive systems, assumes only an ECU with a single core processor, and does not consider an ECU with a multicore processor. It is necessary that a communication on a multicore processor because ECUs communicate each other for cooperative control. There are three communication types: a inside core, a inter core, and a outside chip communications. This paper proposes two methods for outside chip communication: a lock method and a server method. An existing communication middleware is extended as the two methods. Compared to a single core processor, the results of extended middleware show that transmission time overheads of the lock method and the server method are 41% and 29%, respectively.

    CiNii Books

  55. An Extension of AUTOSAR Communication Layers for Multicore Systems

    一場利幸, 高田広章, 高田広章, 本田晋也, 倉地亮

    情報処理学会研究報告(CD-ROM)   Vol. 2009 ( 2 )   2009

     More details

  56. Behavior Analysis of Scalable CAN Protocol on a Bit-Error Channel

    UKAI Kenji, SAKABE Toshiki, TAKADA Hiroaki, KURACHI Ryo, SAKAI Masahiko, KUSAKARI Keiichirou, NISHIDA Naoki

    IEICE technical report   Vol. 108 ( 242 ) page: 61 - 66   2008.10

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Scalable CAN protocol is an improvement of the original CAN (Controller Area Network) protocol so that more than ten times higher speed communication is available. In this paper, we analyze behavior of Scalable CAN on a bit-error channel by using a model checking tool, NuSMV. We first describe in the SMV language a model of Scalable CAN on an error free channel and specifications which express desired properties of Scalable CAN. We verify by using NuSMV that this model satisfies the specifications. We next modify the model by replacing the error free channel with a bit-error channel. Model checking of the modified model for the specifications produces a counter example. We analyze the counter example and give suggestions for correcting Scalable CAN on a bit-error channel.

    CiNii Books

    J-GLOBAL

  57. A Preliminary Study on Behavior Analysis of Scalable CAN Protocol

    Kenji Ukai, Toshiki Sakabe, Hiroaki Takada, Ryo Kurachi, Masahiko Sakai, Keiichirou Kusakari, Naoki Nishida

    Record of 2008 Tokai-section Joint Conference of the Eight Institutes of Electrical and Related Engineers   Vol. 2008 ( O-262 ) page: 1   2008.9

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    J-GLOBAL

  58. Research on high-speed CAN (Control Area Network) for improved bandwidth

    KURACHI RYO, MIYASHITA YUKIHIRO, TAKADA HIROAKI

    情報処理学会研究報告組込みシステム(EMB)   Vol. 2007 ( 121 ) page: 21 - 25   2007.12

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    Today, the data capacity in automotive control network has reached the limits of CAN (maximum data rates for 1 megabits per second). Speed of CAN is affected by the propagation delay, because of using bit synchronous transmission. For increasing data transmission speed, we must change arbitration process and ACK process. We propose the 10 megabits per second CAN architecture for improved bandwidth by using a new collision detection algorithm and topology change.

    CiNii Books

    J-GLOBAL

▼display all

Presentations 1

  1. CaCAN - Centralized Authentication System in CAN International conference

    Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada, Naoki Adachi, Yukihiro Miyashita, Satoshi Horihata

    Embedded Security in Cars Conference (escar EU 2014) 

     More details

    Event date: 2014.11

    Language:English   Presentation type:Oral presentation (general)  

    Country:Germany  

KAKENHI (Grants-in-Aid for Scientific Research) 4

  1. Research on flexible and secure data communication methods for autonomous driving system

    Grant number:22K11952  2022.4 - 2025.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

      More details

    Authorship:Principal investigator 

    Grant amount:\3900000 ( Direct Cost: \3000000 、 Indirect Cost:\900000 )

  2. Security-aware optimization design for in-vehicle network with guaranteed real-time requirement

    Grant number:19K11920  2019.4 - 2023.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    ZENG GANG

      More details

    Authorship:Coinvestigator(s) 

    In recent years, numerous security threat cases have been identified in the field of In-Vehicle control Network (IVN). The challenge in implementing security enhancements in IVN lies in the simultaneous achievement of low-cost implementation on ECU and real-time guarantees. This study focuses on complex IVN systems and aims to design an IVN that ensures both security reinforcement and real-time guarantees through the following three research achievements: (1)security requirement analysis of IVN and development of corresponding security enhancement techniques, (2)proposal of design methods for IVN optimization considering security aspects, and (3) investigation of the impact of security enhancements on real-time performance in IVN and proposal of countermeasures. The research considers practical security models and the characteristics of real-world IVN. The obtained results are expected to contribute to academic research and have significant implications for the automotive industry.

  3. Security measure and evaluation method for automobile control model

    Grant number:18K11212  2018.4 - 2022.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    Kurachi Ryo

      More details

    Authorship:Principal investigator 

    Grant amount:\4420000 ( Direct Cost: \3400000 、 Indirect Cost:\1020000 )

    This research focuses on establishing design, countermeasure, and verification methods to ensure cybersecurity for automobiles. An in-vehicle system is a distributed control system with many control computers called ECUs (Electronic Control Units), which are required to realize safe driving. Moreover, the proliferation of technologies for connected and autonomous vehicles increases the potential of cyber-attacks. Therefore, this study comprehensively researched threat analysis methods, countermeasures, and evaluation methods for next-generation in-vehicle systems.

  4. Study on vulnerability finding methods for in-vehicle systems

    Grant number:16K16025  2016.4 - 2019.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Young Scientists (B)

    KURACHI RYO

      More details

    Authorship:Principal investigator 

    Grant amount:\1560000 ( Direct Cost: \1200000 、 Indirect Cost:\360000 )

    This research focuses on establishing verification methods for in-vehicle systems. Especially, we researched methods to inspect security vulnerabilities of Electronic Control Units (ECUs) where installed in in-vehicle systems. This research is divided into two sub-themes: (1) finding vulnerabilities methods for in-vehicle networks, and (2) attack and evaluation methods for in-vehicle networks. According to our experimental results, our proposed methods are effective in real automobiles. Then, we studied and proposed more effective evaluation methods for in-vehicle systems which includes fuzzing and penetration tests.

Industrial property rights 58

  1. 車載通信システム、車載通信装置、コンピュータプログラム及び通信方法

    倉地 亮, 高田 広章, 足立 直樹, 上田 浩史

     More details

    Applicant:国立大学法人東海国立大学機構

    Application no:特願2022-134013  Date applied:2022.8

    Announcement no:特開2022-172215  Date announced:2022.11

    J-GLOBAL

  2. 通信システム

    倉地 亮, 曾 剛, 高田 広章, 上田 浩史

     More details

    Applicant:国立大学法人東海国立大学機構

    Application no:特願2022-119747  Date applied:2022.7

    Announcement no:特開2022-163093  Date announced:2022.10

    J-GLOBAL

  3. 車載装置、プログラム及び、情報処理方法

    倉地 亮, 高田 広章, 上田 浩史

     More details

    Applicant:国立大学法人東海国立大学機構

    Application no:特願2021-212667  Date applied:2021.12

    Announcement no:特開2023-096727  Date announced:2023.7

    J-GLOBAL

  4. 車載通信装置、車載中継装置、車載通信システム及び通信方法

    倉地 亮, 高田 広章, 上田 浩史

     More details

    Applicant:国立大学法人東海国立大学機構

    Application no:特願2021-094335  Date applied:2021.6

    Announcement no:特開2022-186222  Date announced:2022.12

    J-GLOBAL

  5. 中継装置、中継方法及びコンピュータプログラム

    倉地 亮, 高田 広章, 上田 浩史

     More details

    Applicant:国立大学法人東海国立大学機構

    Application no:特願2020-006964  Date applied:2020.1

    Announcement no:特開2021-114715  Date announced:2021.8

    J-GLOBAL

  6. 車載通信システム、車載通信装置及び送信周期算出方法

    倉地 亮, 高田 広章, 上田 浩史

     More details

    Applicant:国立大学法人東海国立大学機構

    Application no:特願2019-115712  Date applied:2019.6

    Announcement no:特開2021-002768  Date announced:2021.1

    J-GLOBAL

  7. 車載通信システム、車載通信装置及び送信周期算出方法

    倉地 亮, 高田 広章, 上田 浩史

     More details

    Applicant:国立大学法人東海国立大学機構

    Application no:特願2019-115712  Date applied:2019.6

    Announcement no:特開2021-002768  Date announced:2021.1

    Patent/Registration no:特許第7138083号  Date registered:2022.9 

    J-GLOBAL

  8. 通信システム

    倉地 亮, 曾 剛, 高田 広章, 上田 浩史

     More details

    Applicant:国立大学法人東海国立大学機構

    Application no:特願2019-047478  Date applied:2019.3

    Announcement no:特開2022-163093  Date announced:2022.10

    Patent/Registration no:特許第7394185号  Date registered:2023.11 

    J-GLOBAL

  9. 通信装置、通信システム及びメッセージ調停方法

    倉地 亮, 曾 剛, 高田 広章, 上田 浩史

     More details

    Applicant:国立大学法人東海国立大学機構

    Application no:特願2019-047478  Date applied:2019.3

    Announcement no:特開2020-150456  Date announced:2020.9

    J-GLOBAL

  10. 通信装置、通信システム及びメッセージ調停方法

    倉地 亮, 曾 剛, 高田 広章, 上田 浩史

     More details

    Applicant:国立大学法人東海国立大学機構

    Application no:特願2019-047478  Date applied:2019.3

    Announcement no:特開2020-150456  Date announced:2020.9

    Patent/Registration no:特許第7114515号  Date registered:2022.7 

    J-GLOBAL

  11. 車載通信システム、車載通信装置、コンピュータプログラム及び通信方法

    倉地 亮, 高田 広章, 足立 直樹, 上田 浩史

     More details

    Applicant:国立大学法人東海国立大学機構

    Application no:特願2019-002124  Date applied:2019.1

    Announcement no:特開2022-172215  Date announced:2022.11

    Patent/Registration no:特許第7328419号  Date registered:2023.8 

    J-GLOBAL

  12. 車載通信システム、車載通信制御装置、車載通信装置、コンピュータプログラム、通信制御方法及び通信方法

    倉地 亮, 高田 広章, 足立 直樹, 上田 浩史

     More details

    Applicant:国立大学法人東海国立大学機構

    Application no:特願2019-002124  Date applied:2019.1

    Announcement no:特開2020-113852  Date announced:2020.7

    J-GLOBAL

  13. 車載通信システム、車載通信制御装置、車載通信装置、コンピュータプログラム、通信制御方法及び通信方法

    倉地 亮, 高田 広章, 足立 直樹, 上田 浩史

     More details

    Applicant:国立大学法人東海国立大学機構

    Application no:特願2019-002124  Date applied:2019.1

    Announcement no:特開2020-113852  Date announced:2020.7

    Patent/Registration no:特許第7132132号  Date registered:2022.8 

    J-GLOBAL

  14. 車載通信装置、車載通信システム及び車載通信方法

    高田 広章, 倉地 亮, 上田 浩史

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2017-204025  Date applied:2017.10

    Announcement no:特開2019-080119  Date announced:2019.5

    J-GLOBAL

  15. 車載認証システム、車載認証装置、コンピュータプログラム及び通信装置の認証方法

    高田 広章, 倉地 亮, 上田 浩史

     More details

    Applicant:国立大学法人東海国立大学機構

    Application no:特願2017-120830  Date applied:2017.6

    Announcement no:特開2019-009509  Date announced:2019.1

    Patent/Registration no:特許第6754325号  Date registered:2020.8 

    J-GLOBAL

  16. 車載認証システム、通信装置、車載認証装置、コンピュータプログラム、通信装置の認証方法及び通信装置の製造方法

    高田 広章, 倉地 亮, 上田 浩史

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2017-120830  Date applied:2017.6

    Announcement no:特開2019-009509  Date announced:2019.1

    J-GLOBAL

  17. 通信装置及び通信コントローラ

    高田 広章, 倉地 亮, 本田 晋也, 上田 浩史

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2017-009633  Date applied:2017.1

    Announcement no:特開2018-121120  Date announced:2018.8

    J-GLOBAL

  18. 通信システム、通信制御装置及び不正情報送信防止方法

    高田 広章, 倉地 亮, 足立 直樹

     More details

    Applicant:国立大学法人名古屋大学, 株式会社オートネットワーク技術研究所, 住友電装株式会社, 住友電気工業株式会社

    Application no:特願2016-146714  Date applied:2016.7

    Announcement no:特開2016-208536  Date announced:2016.12

    Patent/Registration no:特許第6267596号  Date registered:2018.1 

    J-GLOBAL

  19. 通信システム、通信制御装置及び不正情報送信防止方法

    高田 広章, 倉地 亮, 足立 直樹

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2016-146714  Date applied:2016.7

    Announcement no:特開2016-208536  Date announced:2016.12

    J-GLOBAL

  20. 通信制御装置及び通信システム

    高田 広章, 倉地 亮, 足立 直樹

     More details

    Applicant:国立大学法人名古屋大学, 株式会社オートネットワーク技術研究所, 住友電装株式会社, 住友電気工業株式会社

    Application no:JP2015082349  Date applied:2015.11

    Announcement no:WO2016-080422  Date announced:2016.5

    Publication no:WO2016-080422  Date published:2016.5

    Patent/Registration no:特許第6306206号  Date registered:2018.3 

    J-GLOBAL

  21. 通信制御装置及び通信システム

    高田 広章, 倉地 亮, 足立 直樹

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2016-560252  Date applied:2015.11

    Patent/Registration no:特許第6306206号  Date registered:2018.3 

    J-GLOBAL

  22. 通信制御装置及び通信システム

    高田 広章, 倉地 亮, 足立 直樹

     More details

    Applicant:国立大学法人名古屋大学

    Application no:JP2015082349  Date applied:2015.11

    Publication no:WO2016-080422  Date published:2016.5

    J-GLOBAL

  23. 中継装置

    高田 広章, 倉地 亮, 上田 浩史

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2015-171190  Date applied:2015.8

    Announcement no:特開2017-050643  Date announced:2017.3

    Patent/Registration no:特許第6525824号  Date registered:2019.5 

    J-GLOBAL

  24. 通信装置

    高田 広章, 倉地 亮, 上田 浩史, 堀端 啓史

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2015-171191  Date applied:2015.8

    Announcement no:特開2017-050644  Date announced:2017.3

    Patent/Registration no:特許第6525825号  Date registered:2019.5 

    J-GLOBAL

  25. 中継装置

    高田 広章, 倉地 亮, 上田 浩史

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2015-171190  Date applied:2015.8

    Announcement no:特開2017-050643  Date announced:2017.3

    J-GLOBAL

  26. 通信装置

    高田 広章, 倉地 亮, 上田 浩史, 堀端 啓史

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2015-171191  Date applied:2015.8

    Announcement no:特開2017-050644  Date announced:2017.3

    J-GLOBAL

  27. 通信装置及び通信制限プログラム

    本田 晋也, 高田 広章, 倉地 亮, 上田 浩史

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2015-100994  Date applied:2015.5

    Announcement no:特開2016-219944  Date announced:2016.12

    J-GLOBAL

  28. 通信装置及び通信制限プログラム

    本田 晋也, 高田 広章, 倉地 亮, 上田 浩史

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2015-100994  Date applied:2015.5

    Announcement no:特開2016-219944  Date announced:2016.12

    Patent/Registration no:特許第6284903号  Date registered:2018.2  Date issued:2018.2

    J-GLOBAL

  29. 通信システム、異常検出装置及び異常検出方法

    高田 広章, 倉地 亮, 上田 浩史

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2015-005260  Date applied:2015.1

    Announcement no:特開2016-131325  Date announced:2016.7

    J-GLOBAL

  30. CAN(Controller Area Network)通信システム及びエラー情報記録装置

    高田 広章, 倉地 亮, 足立 直樹

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2014-235781  Date applied:2014.11

    Announcement no:特開2016-100725  Date announced:2016.5

    J-GLOBAL

  31. 通信システム及び通信装置

    高田 広章, 倉地 亮, 足立 直樹

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2014-235783  Date applied:2014.11

    Announcement no:特開2016-100726  Date announced:2016.5

    Patent/Registration no:特許第6282216号  Date registered:2018.2  Date issued:2018.2

    J-GLOBAL

  32. 通信システム及び通信装置

    高田 広章, 倉地 亮, 足立 直樹

     More details

    Applicant:国立大学法人名古屋大学, 株式会社オートネットワーク技術研究所, 住友電装株式会社, 住友電気工業株式会社

    Application no:特願2014-235783  Date applied:2014.11

    Announcement no:特開2016-100726  Date announced:2016.5

    Patent/Registration no:特許第5717240号  Date registered:2015.3 

    J-GLOBAL

  33. 通信システム及び通信装置

    高田 広章, 倉地 亮, 足立 直樹

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2014-235783  Date applied:2014.11

    Announcement no:特開2016-100726  Date announced:2016.5

    J-GLOBAL

  34. 通信システム、通信制御装置及び不正情報送信防止方法

    高田 広章, 倉地 亮, 足立 直樹

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2014-144038  Date applied:2014.7

    Announcement no:特開2016-021623  Date announced:2016.2

    Patent/Registration no:特許第6267596号  Date registered:2018.1 

    J-GLOBAL

  35. 通信システム、通信制御装置及び不正情報送信防止方法

    高田 広章, 倉地 亮, 足立 直樹

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2014-144038  Date applied:2014.7

    Announcement no:特開2016-021623  Date announced:2016.2

    J-GLOBAL

  36. 通信システム及び鍵情報共有方法

    高田 広章, 倉地 亮, 足立 直樹

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2014-139074  Date applied:2014.7

    Announcement no:特開2016-019054  Date announced:2016.2

    J-GLOBAL

  37. 通信装置、通信システム及び通信方法

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2011-025240  Date applied:2011.2

    Announcement no:特開2011-130486  Date announced:2011.6

    Patent/Registration no:特許第5190901号  Date registered:2013.2 

    J-GLOBAL

  38. 通信装置、通信システム及び通信方法

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2011-025240  Date applied:2011.2

    Announcement no:特開2011-130486  Date announced:2011.6

    J-GLOBAL

  39. 通信システム及び通信装置

    高田 広章, 倉地 亮, 西村 政信, 堀端 啓史

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2010-178681  Date applied:2010.8

    Announcement no:特開2012-039446  Date announced:2012.2

    Patent/Registration no:特許第5717240号  Date registered:2015.3 

    J-GLOBAL

  40. 通信システム及び通信装置

    高田 広章, 倉地 亮, 西村 政信, 堀端 啓史

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2010-178681  Date applied:2010.8

    Announcement no:特開2012-039446  Date announced:2012.2

    J-GLOBAL

  41. 制御システム及び制御プログラム書換方法

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2009-121152  Date applied:2009.5

    Announcement no:特開2010-272971  Date announced:2010.12

    J-GLOBAL

  42. 通信装置、通信システム及び通信方法

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2008-266695  Date applied:2008.10

    Announcement no:特開2010-098467  Date announced:2010.4

    Patent/Registration no:特許第5158600号  Date registered:2012.12 

    J-GLOBAL

  43. 通信装置、通信システム及び通信方法

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2008-266695  Date applied:2008.10

    Announcement no:特開2010-098467  Date announced:2010.4

    J-GLOBAL

  44. 中継装置、通信システム及び通信方法

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2008-180685  Date applied:2008.7

    Announcement no:特開2010-021805  Date announced:2010.1

    Patent/Registration no:特許第4581037号  Date registered:2010.9 

    J-GLOBAL

  45. 中継装置、通信システム及び通信方法

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2008-180686  Date applied:2008.7

    Announcement no:特開2010-021806  Date announced:2010.1

    Patent/Registration no:特許第4621837号  Date registered:2010.11 

    J-GLOBAL

  46. 通信装置、通信システム及び通信方法

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2008-180684  Date applied:2008.7

    Announcement no:特開2010-021804  Date announced:2010.1

    J-GLOBAL

  47. 中継装置、通信システム及び通信方法

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2008-180686  Date applied:2008.7

    Announcement no:特開2010-021806  Date announced:2010.1

    J-GLOBAL

  48. 中継装置、通信システム及び通信方法

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2008-180685  Date applied:2008.7

    Announcement no:特開2010-021805  Date announced:2010.1

    J-GLOBAL

  49. 通信システム、通信装置及び通信方法

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2007-232734  Date applied:2007.9

    Announcement no:特開2009-065518  Date announced:2009.3

    Patent/Registration no:特許第5219120号  Date registered:2013.3 

    J-GLOBAL

  50. 通信システム、通信装置及び通信方法

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2007-232734  Date applied:2007.9

    Announcement no:特開2009-065518  Date announced:2009.3

    J-GLOBAL

  51. 分配装置、通信システム及び通信方法

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2007-216392  Date applied:2007.8

    Announcement no:特開2009-049929  Date announced:2009.3

    Patent/Registration no:特許第4784838号  Date registered:2011.7 

    J-GLOBAL

  52. 通信システム及び通信方法

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2007-216433  Date applied:2007.8

    Announcement no:特開2009-049933  Date announced:2009.3

    Patent/Registration no:特許第5007904号  Date registered:2012.6 

    J-GLOBAL

  53. 送信装置、送信方法及び通信システム

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2007-216393  Date applied:2007.8

    Announcement no:特開2009-049930  Date announced:2009.3

    Patent/Registration no:特許第4919192号  Date registered:2012.2 

    J-GLOBAL

  54. 分配装置、通信システム及び通信方法

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2007-216392  Date applied:2007.8

    Announcement no:特開2009-049929  Date announced:2009.3

    J-GLOBAL

  55. 通信システム及び通信方法

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2007-216433  Date applied:2007.8

    Announcement no:特開2009-049933  Date announced:2009.3

    J-GLOBAL

  56. 送信装置、送信方法及び通信システム

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2007-216393  Date applied:2007.8

    Announcement no:特開2009-049930  Date announced:2009.3

    J-GLOBAL

  57. 車載通信システム及び車載通信方法

    高田 広章, 倉地 亮, 山本 秀樹

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2007-153298  Date applied:2007.6

    Announcement no:特開2008-306592  Date announced:2008.12

    Patent/Registration no:特許第5057304号  Date registered:2012.8 

    J-GLOBAL

  58. 車載通信システム、車載通信装置及び車載通信方法

    高田 広章, 倉地 亮, 山本 秀樹

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2007-153298  Date applied:2007.6

    Announcement no:特開2008-306592  Date announced:2008.12

    J-GLOBAL

▼display all