Updated on 2022/04/05

写真a

 
KURACHI Ryo
 
Organization
Graduate School of Informatics Center for Embeded Computing Systems Designated associate professor
Graduate School
Graduate School of Informatics
Title
Designated associate professor

Degree 1

  1. Doctor (Information Science) ( 2012.9   Nagoya University ) 

Research Interests 3

  1. Real-Time System

  2. Embedded Computing System

  3. Information Security

Research Areas 5

  1. Others / Others  / Real-time system, Embedded System

  2. Informatics / Information network

  3. Informatics / Information security

  4. Informatics / Software

  5. Informatics / Computer system

Current Research Project and SDGs 2

  1. Security countermeasures for in-vehicle systems

  2. Scheduling method for in-vehicle networks

Research History 1

  1. AISIN AW CO., LTD.

    2000.4 - 2006.4

      More details

    Country:Japan

Education 1

  1. Nagoya University   Graduate School, Division of Information Science   Department of Information Engineering

    2011.4 - 2012.9

      More details

    Country: Japan

Professional Memberships 1

  1. Information Processing Society of Japan

 

Papers 58

  1. Optimizing Extensibility of CAN FD for Automotive Cyber-Physical Systems

    Xie Yong, Zeng Gang, Kurachi Ryo, Xiao Fu, Takada Hiroaki

    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS   Vol. 22 ( 12 ) page: 7875 - 7886   2021.12

     More details

    Language:Japanese   Publisher:IEEE Transactions on Intelligent Transportation Systems  

    Extensibility is an important optimization objective for the E/E architecture of automotive cyber-physical systems (ACPS), while little attention has paid to the extensibility-aware design of in-vehicle network. To address this problem, this paper formulates a trade-off problem that balances the bandwidth utilization and the extensibility from the initial design of CAN FD. We firstly propose a new extensibility model and the related evaluation metric, and then two optimization algorithms, namely, the mixed integer linear programming (MILP) approach and the simulated annealing (SA) based heuristic approach, are proposed to resolve the trade-off problem for mid-sized and industry sized signal sets, respectively. The experiment results show the efficiency of the proposed extensibility metric and the optimization algorithms. By comparing with state-of-the-art algorithm, the MILP reduces the increase range of the bandwidth utilization of the extended signal set by 18.17% to 57.64% averagely, and 49.22% to 89.40% maximally, with only 0.06% to 0.79% bandwidth utilization overhead; the SA approach can reduces the increase range of the bandwidth utilization of the extended signal set by 12.71% to 58.33% averagely, and 40.08% to 89.40% maximally, with only 0.06% to 0.8% bandwidth utilization overhead.

    DOI: 10.1109/TITS.2021.3059769

    Web of Science

    Scopus

  2. Secure Implementation of Authenticated Encryption in SROS2 for Embedded Systems and Its Evaluation

    Takemoto Shu, Nishida Kanata, Nozaki Yusuke, Honda Shinya, Kurachi Ryo, Yoshikawa Masaya

    IEEJ Transactions on Electronics, Information and Systems   Vol. 140 ( 8 ) page: 939 - 948   2020.8

     More details

    Language:Japanese   Publisher:The Institute of Electrical Engineers of Japan  

    <p>With the expansion of Society 5.0, the realization of a short-term development and secure implementation for a smart factory system is required. SROS2, an open-source platform applicable to industrial robots, realizes short-term development and implements secure communication using AES-GCM. On the other hand, AES-GCM is reported to be vulnerable in computational security. Therefore, a secure encryption alternative to AES-GCM and its evaluation are needed. For these reasons, this research incorporates SROS2 with a secure certified encryption alternative to AES-GCM. The evaluation experiments in this study performed on a computer and Raspberry Pi 3 Model B, and the results revealed the effectiveness of dedicated hardware implementation.</p>

    DOI: 10.1541/ieejeiss.140.939

    Scopus

    CiNii Research

  3. Balancing Bandwidth Utilization and Interrupts: Two Heuristic Algorithms for the Optimized Design of Automotive CPS.

    Yong Xie, Gang Zeng, Ryo Kurachi, Xin Peng, Guoqi Xie, Hiroaki Takada

    IEEE Trans. Ind. Informatics   Vol. 16 ( 4 ) page: 2382 - 2392   2020.4

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/TII.2019.2936240

    Web of Science

    Scopus

  4. A Simultaneous Attack Scenario Generation Method Using the Parallel Behavior Model.

    Toshiyuki Fujikura, Ryo Kurachi

    91st IEEE Vehicular Technology Conference   Vol. 2020-May   page: 1 - 7   2020

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/VTC2020-Spring48590.2020.9129076

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/vtc/vtc2020s.html#FujikuraK20

  5. Threat Analysis Framework for Safety Architectures in SCDL.

    Kenji Taguchi 0001, Ryo Kurachi, Kiyoshi Sasaki, Nobuhiko Nakamura, Kazuki Tomonaga, Shuhei Yamashita

    Computer Safety, Reliability, and Security - 39th International Conference(SAFECOMP)   Vol. 12234 LNCS   page: 341 - 354   2020

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:Springer  

    DOI: 10.1007/978-3-030-54549-9_23

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/safecomp/safecomp2020.html#0001KSNTY20

  6. Towards Minimizing MAC Utilization for Controller Area Network.

    Ryo Kurachi, Hiroaki Takada, Hiroshi Ueda, Shuhei Takimoto

    AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security(AutoSec@CODASPY)     page: 45 - 50   2020

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:ACM  

    DOI: 10.1145/3375706.3380557

    Web of Science

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/codaspy/autosec2020.html#KurachiTUT20

  7. Performance Evaluation of CAESAR Authenticated Encryption on SROS2

    Takemoto S., Nishida K., Nozaki Y., Yoshikawa M., Honda S., Kurachi R.

    ACM International Conference Proceeding Series     page: 168 - 172   2019.12

     More details

    Language:Japanese   Publisher:ACM International Conference Proceeding Series  

    With the expansion of Industry 4.0, the factory automation (FA) system has become more complex due to wireless communication between multiple devices. Therefore, short-term development and secure communication are required for development cost and cyber-security issues. For this reason, a secure robot operating system 2 (SROS2) was developed. SROS2 is an open-source platform applicable to industrial robots. SROS2 achieves short-term development with various libraries and implements encryption and authentication by embedding advanced encryption standard - Galois/counter mode (AES-GCM). On the other hand, AES-GCM has been reported to be vulnerable to spoofing. Therefore, a secure encryption algorithm to replace AES-GCM is required. In addition, the system must be able to operate without problems after replacement. For these reasons, this study embeds secure authenticated encryption instead of AES-GCM in SROS2. The results of an evaluation experiment on the latency of the encryption algorithm showed that Ascon is more effective than AES-GCM.

    DOI: 10.1145/3375959.3375976

    Scopus

  8. Execution-variance-aware task allocation for energy minimization on the big.LITTLE architecture. Reviewed

    Yang Qin, Gang Zeng, Ryo Kurachi, Yutaka Matsubara, Array

    SUSCOM   Vol. 22   page: 155 - 166   2019.6

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.suscom.2018.10.001

    Web of Science

    Scopus

  9. A proposal of the device disabler for controller area network

    Ueda H., Kurachi R., Honda S., Takada H., Adachi N., Miyashita Y.

    SEI Technical Review   ( 88 ) page: 82 - 86   2019.4

     More details

    Language:Japanese   Publisher:SEI Technical Review  

    Recently, quite a number of security attacks against Controller Area Network (CAN) have been reported. Many automotive companies are planning to adopt security countermeasures to strengthen security of their in-vehicle systems while saving the costs. This paper proposes a method to block unauthorized CAN-bus access using our enhanced CAN controller that prevents the transmission of messages from a malicious electronic control unit. We demonstrate the effectiveness of our device disabler on a CAN with Flexible Date rate buses.

    Scopus

  10. Security/Timing-Aware Design Space Exploration of CAN FD for Automotive Cyber-Physical Systems.

    Yong Xie, Gang Zeng, Ryo Kurachi, Hiroaki Takada, Guoqi Xie

    IEEE Trans. Ind. Informatics   Vol. 15 ( 2 ) page: 1094 - 1104   2019.2

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/TII.2018.2851939

    Web of Science

    Scopus

  11. WCRT Analysis and Evaluation for Sporadic Message-Processing Tasks in Multicore Automotive Gateways.

    Guoqi Xie, Gang Zeng, Ryo Kurachi, Hiroaki Takada, Zhetao Li, Renfa Li, Keqin Li 0001

    IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.   Vol. 38 ( 2 ) page: 281 - 294   2019.2

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/TCAD.2018.2812119

    Web of Science

    Scopus

  12. Exact WCRT Analysis for Message-Processing Tasks on Gateway-Integrated In-Vehicle CAN Clusters.

    Guoqi Xie, Gang Zeng, Ryo Kurachi, Hiroaki Takada, Renfa Li, Keqin Li 0001

    ACM Trans. Embed. Comput. Syst.   Vol. 17 ( 6 ) page: 95 - 29   2019.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    DOI: 10.1145/3284178

    Web of Science

    Scopus

  13. Energy-Aware Task Allocation for Heterogeneous Multiprocessor Systems by Using Integer Linear Programming

    Qin Yang, Zeng Gang, Kurachi Ryo, Matsubara Yutaka, Takada Hiroaki

    Journal of Information Processing   Vol. 27 ( 0 ) page: 136 - 148   2019

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Information Processing Society of Japan  

    <p>Energy-aware task allocation of embedded systems is one of the most important issues in recent decades. A classical solution to solve the issue is Integer Linear Programming (ILP). However, given the considerable time consumption, it is effective only to the extent that the scale of the problem is small. How to use ILP to solve large allocation problems on heterogeneous multiprocessor systems to minimize energy consumption is still a challenge. This paper proposes two ILP formulations to deal with it. One complete ILP(1) is used to derive a feasible allocation, and the other simplified ILP(2) is for calculating the desired minimum energy. Then the desired minimum energy can be used as a reference to evaluate the intermediate solution of ILP(1) and decide its timeout. Besides, to find out the best-suited platform for a given workload, a flexible design which presents flexibilities and choices in core assignment, is considered for further energy saving. For example, the optimal core number design and core type design are generated as two independent ILP formulations, denoted as ILP(3) and ILP(4). The experimental results on randomly generated task sets demonstrate that, compared with the fixed platform, automatically synthesizing a flexible core assignment saves more energy.</p>

    DOI: 10.2197/ipsjjip.27.136

    Scopus

    CiNii Research

  14. DDCAN: Delay-Time Deliverable CAN Network.

    Ryo Kurachi, Hiroaki Takada, Naoki Adachi, Hiroshi Ueda, Yukihiro Miyashita

    19th IEEE International Conference on Software Quality, Reliability and Security Companion     page: 36 - 41   2019

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/QRS-C.2019.00020

    Web of Science

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/qrs/qrs2019c.html#KurachiTAUM19

  15. Asymmetric Key-Based Secure ECU Replacement Without PKI.

    Ryo Kurachi, Hiroaki Takada, Naoki Adachi, Hiroshi Ueda, Yukihiro Miyashita

    19th IEEE International Symposium on High Assurance Systems Engineering(HASE)     page: 234 - 240   2019

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/HASE.2019.00043

    Web of Science

    Other Link: https://dblp.uni-trier.de/db/conf/hase/hase2019.html#KurachiTAUM19

  16. An Attack Scenario Generation Method Using the Behavior Model.

    Toshiyuki Fujikura, Ryo Kurachi

    24th IEEE Pacific Rim International Symposium on Dependable Computing(PRDC)   Vol. 2019-December   page: 59 - 60   2019

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/PRDC47002.2019.00025

    Web of Science

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/prdc/prdc2019.html#FujikuraK19

  17. A Test Scenario Generation Method for High Requirement Coverage by using KAOS Method.

    Toshiyuki Fujikura, Ryo Kurachi

    19th IEEE International Conference on Software Quality, Reliability and Security Companion     page: 542 - 543   2019

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/QRS-C.2019.00115

    Web of Science

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/qrs/qrs2019c.html#FujikuraK19

  18. Energy-Efficient Intra-Task DVFS Scheduling Using Linear Programming Formulation.

    Yang Qin, Gang Zeng, Ryo Kurachi, Yixiao Li, Yutaka Matsubara, Hiroaki Takada

    IEEE Access   Vol. 7   page: 30536 - 30547   2019

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/ACCESS.2019.2902353

    Web of Science

    Scopus

  19. Evaluation of Security Access Service in Automotive Diagnostic Communication.

    Ryo Kurachi, Hiroaki Takada, Kentaro Takei, Takaaki Iinuma, Yuki Satoh, Manabu Nakano, Hideki Matsushima, Jun Anzai, Toshihisa Nakano

    89th IEEE Vehicular Technology Conference   Vol. 2019-April   page: 1 - 7   2019

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/VTCSpring.2019.8746714

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/vtc/vtc2019s.html#KurachiTTISNMAN19

  20. Evaluation of Security Access Service in Automotive Diagnostic Communication

    Kurachi Ryo, Takada Hiroaki, Takei Kentaro, Iinuma Takaaki, Satoh Yuki, Nakano Manabu, Matsushima Hideki, Anzai Jun, Nakano Toshihisa

    2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING)     2019

     More details

    Language:Japanese  

    Web of Science

  21. Threat to Control Systems

    Kurachi Ryo

    SYSTEMS, CONTROL AND INFORMATION   Vol. 62 ( 4 ) page: 124 - 129   2018.4

     More details

    Language:Japanese   Publisher:THE INSTITUTE OF SYSTEMS, CONTROL AND INFORMATION ENGINEERS  

    DOI: 10.11509/isciesci.62.4_124

    CiNii Research

  22. Energy-Aware Task Allocation for Large Task Sets on Heterogeneous Multiprocessor Systems.

    Yang Qin, Gang Zeng, Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada

    16th IEEE International Conference on Embedded and Ubiquitous Computing(EUC)     page: 158 - 165   2018

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE Computer Society  

    DOI: 10.1109/EUC.2018.00031

    Web of Science

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/euc/euc2018.html#QinZKMT18

  23. Problem and solution for automotive cybersecurity: Focused on autonomous driving and V2X

    KURACHI Ryo

    Journal of Information Processing and Management   Vol. 60 ( 10 ) page: 690 - 700   2018

     More details

    Language:Japanese   Publisher:Japan Science and Technology Agency  

    <p>In recent years, automobiles are expected to create new value by connecting with various devices. In the future, it is expected that a communication function called V2X will be installed for automatic operation, and it will become an important position as IoT more and more. On the other hand, it is pointed out that many of the current vehicles are not sufficiently security measures. For this reason, security enhancement is required in the future. Moreover, automobile security has various problems and is expected to become more and more important in the future. This paper focuses on the overview of IoT and information security issues in automotive industry.</p>

    DOI: 10.1241/johokanri.60.690

    CiNii Research

  24. Sliding Window Optimized Information Entropy Analysis Method for Intrusion Detection on In-Vehicle Networks.

    Wufei Wu, Yizhi Huang, Ryo Kurachi, Gang Zeng, Guoqi Xie, Renfa Li, Keqin Li 0001

    IEEE Access   Vol. 6   page: 45233 - 45245   2018

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/ACCESS.2018.2865169

    Web of Science

    Scopus

  25. Proposal of HILS-Based In-Vehicle Network Security Verification Environment

    Kurachi R., Fujikura T.

    SAE Technical Papers   Vol. 2018-April   2018

     More details

    Language:Japanese   Publisher:SAE Technical Papers  

    We propose a security-testing framework to analyze attack feasibilities for automotive control software by integrating model-based development with model checking techniques. Many studies have pointed out the vulnerabilities in the Controller Area Network (CAN) protocol, which is widely used in in-vehicle network systems. However, many security attacks on automobiles did not explicitly consider the transmission timing of CAN packets to realize vulnerabilities. Additionally, in terms of security testing for automobiles, most existing studies have only focused on the generation of the testing packets to realize vulnerabilities, but they did not consider the timing of invoking a security testing. Therefore, we focus on the transmit timing of CAN packets to realize vulnerabilities. In our experiments, we have demonstrated the classification of feasible attacks at the early development phase by integrating the model checking techniques into a virtualized environment.

    DOI: 10.4271/2018-01-0013

    Scopus

  26. Improving secure coding rules for automotive software by using a vulnerability database.

    Ryo Kurachi, Hiroaki Takada, Masato Tanabe, Jun Anzai, Kentaro Takei, Takaaki Iinuma, Manabu Maeda, Hideki Matsushima

    2018 IEEE International Conference on Vehicular Electronics and Safety(ICVES)     page: 1 - 8   2018

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/ICVES.2018.8519496

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/icves/icves2018.html#KurachiTTATIMM18

  27. Improving secure coding rules for automotive software by using a vulnerability database

    Kurachi Ryo, Takada Hiroaki, Tanabe Masato, Anzai Jun, Takei Kentaro, Iinuma Takaaki, Maeda Manabu, Matsushima Hideki

    2018 IEEE INTERNATIONAL CONFERENCE ON VEHICULAR ELECTRONICS AND SAFETY (ICVES 2018)     2018

     More details

    Language:Japanese  

    Web of Science

  28. IDH-CAN: A Hardware-Based ID Hopping CAN Mechanism With Enhanced Security for Automotive Real-Time Applications. Reviewed

    Wufei Wu, Ryo Kurachi, Gang Zeng, Yutaka Matsubara, Hiroaki Takada, Renfa Li, Keqin L

    IEEE Access   Vol. 6   page: 54607 - 54623   2018

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/ACCESS.2018.2870695

    Web of Science

    Scopus

  29. ID Hopping CAN Controller Design with Obfuscated Priority Assignment.

    Shan Ding, Tong Zhao, Ryo Kurachi, Gang Zeng

    2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)     page: 94 - 99   2018

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE Computer Society  

    DOI: 10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00029

    Web of Science

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/dasc/dasc2018.html#DingZKZ18

  30. Further Analysis with Linear Programming on Blocking Time Bounds for Partitioned Fixed Priority Multiprocessor Scheduling

    Ma Zhongqi, Kurachi Ryo, Zeng Gang, Takada Hiroaki

    Journal of Information Processing   Vol. 26 ( 0 ) page: 540 - 548   2018

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Information Processing Society of Japan  

    <p>The recently developed FMLP<sup>+</sup> provides significant advantages for partitioned fixed priority scheduling, since it ensures asymptotically optimal <i>O</i>(<i>n</i>) maximum priority-inversion blocking. The constraints under the FMLP<sup>+</sup> can be exploited to determine bounds on the blocking time. However, these bounds may be pessimistic since shared resources local to a processor do not incur priority-inversion blocking in some cases. Consequently, a schedulable task set may be erroneously judged as unschedulable because of these pessimistic values. Based on our analysis, additional constraints were added to compute the maximum blocking time bound of each task with linear programming and the corresponding worst-case response time. The results of experiments show our proposed strategy is less pessimistic than existing strategies. Meanwhile, we also demonstrate that local resource sharing should be used instead of global resource sharing where possible.</p>

    DOI: 10.2197/ipsjjip.26.540

    Scopus

    CiNii Research

  31. An optimized design of CAN FD for automotive cyber-physical systems Reviewed

    Xie Yong, Zeng Gang, Ryo Kurachi, Xie Guoqi, Dou Yong, Zhou Zhili

    JOURNAL OF SYSTEMS ARCHITECTURE   Vol. 81   page: 101 - 111   2017.11

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:ELSEVIER SCIENCE BV  

    CAN with flexible data rate (CAN FD) is considered the next generation in-vehicle network standard for automotive cyber-physical systems. CAN FD supports a data phase bit-rate of up to 10 Mbps and message payload of up to 64 bytes. However, the substantial differences regarding the allowed message payloads and the heterogeneity of the signal periods indicate the need for a systematic design method to fully utilize its large transmission bandwidth. We propose an optimized design method for CAN FD to minimize bandwidth utilization while meeting the signal timing constraint. First, two slack evaluation metrics are defined for the quantitative analysis of the potential packing choices. Based on these metrics, we propose a clustering-based signal packing algorithm, and the schedulability of the signals and the packed messages are both verified. The proposed method is compared with other design methods proposed for both CAN and CAN FD. The experimental results demonstrated that our method is the most bandwidth efficient and can meet the timing constraint simultaneously.

    DOI: 10.1016/j.sysarc.2017.10.008

    Web of Science

  32. WCRT Analysis of CAN Messages in Gateway-Integrated In-Vehicle Networks Reviewed

    Guoqi Xie, Gang Zeng, Ryo Kurachi, Hiroaki Takada, Zhetao Li, Renfa Li, Keqin Li

    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY   Vol. 66 ( 11 ) page: 9623 - 9637   2017.11

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC  

    In modern automobiles, gateways are commonly used to connect several subsystems of controller area networks (CANs) to achieve integrated architecture and distributed cross-bus functionalities. To analyze the real-time property of such in-vehicle networks, worst-case response time (WCRT) analysis for gateway-integrated CAN messages has been studied recently. However, the WCRTs obtained are quite pessimistic. In this study, we examine in detail the various actual arriving orders of gateway messages and then propose an explorative WCRT computation method. It is proved that the obtained WCRT results are safe WCRT bounds. Experimental results for real message set demonstrate as much as 24% reduction of WCRT compared with those obtained using the state-of-the-art methods.

    DOI: 10.1109/TVT.2017.2737035

    Web of Science

    Scopus

  33. A Genetic Algorithm for Packing CAN FD Frame with Real-Time Constraints

    DING Shan, ZENG Gang, KURACHI Ryo, HUANG Ruifeng

    IEICE Transactions on Information and Systems   Vol. E100.D ( 10 ) page: 2505 - 2514   2017

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    <p>As a next-generation CAN (Controller Area Network), CAN FD (CAN with flexible data rate) has attracted much attention recently. However, how to use the improved bus bandwidth efficiently in CAN FD is still an issue. Contrasting with existing methods using greedy approximate algorithms, this paper proposes a genetic algorithm for CAN FD frame packing. It tries to minimize the bandwidth utilization by considering the different periods of signals when packing them in the same frame. Moreover, it also checks the schedulability of packed frames to guarantee the real-time constraints of each frame and proposed a merging algorithm to improve the schedulability for signal set with high bus load. Experimental results validate that the proposed algorithm can achieve significantly less bandwidth utilization and improved schedulability than existing methods for a given set of signals.</p>

    DOI: 10.1587/transinf.2017edp7073

    Web of Science

    Scopus

    CiNii Research

    Other Link: http://dblp.uni-trier.de/db/journals/ieicet/ieicet100d.html#journals/ieicet/DingZKH17

  34. Problems and Challenges of Automotive Cybersecurity

    KURACHI Ryo

    The Journal of Reliability Engineering Association of Japan   Vol. 39 ( 2 ) page: 68 - 76   2017

     More details

    Language:Japanese   Publisher:Reliability Engineering Association of Japan  

    DOI: 10.11348/reajshinrai.39.2_68

    CiNii Research

  35. A genetic algorithm for minimizing bandwidth utilization by packing CAN-FD frame Reviewed

    Shan Ding, Ruifeng Huang, Ryo Kurachi, Gang Zeng

    Proceedings - 2016 13th International Conference on Embedded Software and System, ICESS 2016     page: 119 - 124   2016

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:Institute of Electrical and Electronics Engineers Inc.  

    As a next-generation CAN (Controller Area Network), CAN-FD (CAN with flexible data rate) has attracted much attention recently. However, how to use the improved bus bandwidth efficiently in CAN-FD is still an issue. Contrasting with existing methods using greedy approximate algorithms, this paper proposes a genetic algorithm for CAN-FD frame packing. It tries to minimize the bandwidth utilization by considering the different periods of signals when packing them in the same frame. Experimental results validate that the proposed algorithm can achieve significantly less bandwidth utilization than existing methods for a given set of signals.

    DOI: 10.1109/ICESS.2016.12

    Web of Science

    Scopus

  36. Further Analysis on Blocking Time Bounds for Partitioned Fixed Priority Multiprocessor Scheduling

    Ma Zhongqi, Kurachi Ryo, Zeng Gang, Takada Hiroaki

    2016 11TH IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL EMBEDDED SYSTEMS (SIES)     2016

     More details

    Language:Japanese  

    Web of Science

  37. Implementation of the CAN-FD Protocol in the Fuzzing Tool beSTORM Reviewed

    Ryosuke Nishimura, Ryo Kurachi, Kazumasa Ito, Takashi Miyasaka, Masaki Yamamoto, Miwako Mishima

    2016 IEEE INTERNATIONAL CONFERENCE ON VEHICULAR ELECTRONICS AND SAFETY (ICVES)     page: 1 - 6   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    With the growth of ECUs that are mounted in automobiles, the transmission capacity of Controller Area Network (CAN), which is currently used by most on-vehicle networks, is becoming insufficient, and therefore CAN With Flexible Data Rate (CAN-FD), presented by Bosch GmbH, is viewed as a nextgeneration standard. Recently, the number of attacks on ECUs connected to CAN has been increasing, and from the viewpoint of CAN security there has been much discussion of safety. However, with regard to CAN-FD, which is an expansion of CAN, although a discussion of safety is needed, that has hardly happened. This paper reports on an implementation that uses the generic fuzzing tool beSTORM to investigate the vulnerability of the CAN-FD protocol. We also aim at practical application by measuring the transmission time for beSTORM test data and by estimating the time required for CAN-FD fuzzing tests.

    DOI: 10.1109/ICVES.2016.7548161

    Web of Science

  38. Implementation of the CAN-FD Protocol in the Fuzzing Tool beSTORM

    Nishimura Ryosuke, Kurachi Ryo, Ito Kazumasa, Miyasaka Takashi, Yamamoto Masaki, Mishima Miwako

    2016 IEEE INTERNATIONAL CONFERENCE ON VEHICULAR ELECTRONICS AND SAFETY (ICVES)     page: 1 - 6   2016

     More details

    Language:Japanese  

    Web of Science

  39. Further Analysis on Blocking Time Bounds for Partitioned Fixed Priority Multiprocessor Scheduling Reviewed

    Zhongqi Ma, Ryo Kurachi, Gang Zeng, Hiroaki Takada

    2016 11TH IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL EMBEDDED SYSTEMS (SIES)     page: 226 - 231   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Partitioned fixed priority scheduling is one of the most comprehensively chosen predictable scheduling in practice. The FMLP+ developed in recent years is a better protocol, which ensures asymptotically optimal O(n) maximum priority-inversion blocking. The constraints under several protocols besides the FMLP+ can be exploited to gain the bound on maximum blocking time. However, the blocking time bounds may be pessimistic under the FMLP+ on the ground that shared resources local to a processor do not incur priority-inversion blocking in some cases. It is possible that a schedulable task set is judged as unschedulable because of the pessimistic values. Based on our analysis, a few constraints was added to compute the maximum blocking time of each task, and then its worst-case response time. The results of our experiments show less pessimism than the existing ones. Meanwhile, we also demonstrate the usefulness of the conclusion that global resource sharing should be transformed into local one where possible.

    DOI: 10.1109/SIES.2016.7509435

    Web of Science

    Scopus

  40. Security authentication system for in-vehicle network

    Ueda H., Kurachi R., Takada H., Mizutani T., Inoue M., Horihata S.

    SEI Technical Review   ( 81 ) page: 5 - 9   2015.10

     More details

    Language:Japanese   Publisher:SEI Technical Review  

    One of the main concerns for the security of in-vehicle data is spoofing messages on the in-vehicle network. Controller Area Network (CAN) is the most extensively embedded network protocol in vehicles. In the last decade, security attacks in vehicles have been increasing and have been reported in several papers. Therefore, security measures are expected that meet the requirements of real time and cost constraint for in-vehicle control network. In this paper, we propose centralized authentication system in CAN with improved CAN controller. Our experimental results demonstrate that our proposal method is effective on real in-vehicle network environments.

    Scopus

  41. An Integrated Framework for Topology Design of CAN Networks under Real-Time Constraints

    Kurachi Ryo, Chen Yang, Takada Hiroaki, Zeng Gang

    2015 IEEE 82ND VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL)     2015

     More details

    Language:Japanese  

    Web of Science

  42. An Integrated Framework for Topology Design of CAN Networks under Real-Time Constraints Reviewed

    Ryo Kurachi, Yang Chen, Hiroaki Takada, Gang Zeng

    2015 IEEE 82ND VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL)     page: 1 - 5   2015

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Nowadays, in-vehicle network design has become a difficult challenge due to increased complexity and strict real-time constraints. In this work, we propose an integrated framework for CAN network topology design under real-time constraints. The framework integrates topology design with real-time analysis. It firstly allocates electronic control units (ECU) automatically to one of the CAN buses via integer linear programming (ILP) optimization. Then, the worst case response rate (WCRR) results of real-time analysis are fed back to a weighted ILP optimization to further improve the topology design with respect to a real-time property. A case study using a real message set from automaker validated the effectiveness and scalability of the proposed framework.

    DOI: 10.1109/VTCFall.2015.7390840

    Web of Science

    Scopus

  43. Gateway Modeling and Response Time Analysis on CAN Clusters of Automobiles Reviewed

    Guoqi Xie, Gang Zeng, Ryo Kurachi, Hiroaki Takada, Renfa Li

    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS)     page: 1147 - 1153   2015

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    A central gateway is a very important node for connecting the buses to pass messages from one bus to the other bus(es) in current in-vehicle networks. However, transmitting message through gateway causes additional delay to the end-to end delay of messages. Existing methods for analysis of gateway processing delay usually employed experimental measurements which are inefficient and cannot obtain a safe delay bound. Meanwhile, the increased complexity of in-vehicle networks require theoretical analysis (if gateway processing delay to obtain a safe upper bound delay. In this paper, we first construct a central gateway model with CAN clusters, then we propose a novel response time analysis method with rigorous proof to compute the upper bound delay of gateway tasks. Experimental results demonstrated that the proposed approach can obtain the upper bound delay in reasonable time even for a large-scale network workload, and the calculated upper bound is close to the exact worst case delay.

    DOI: 10.1109/HPCC-CSS-ICESS.2015.324

    Web of Science

    Scopus

  44. Schedulability Comparisons between Priority Queue and FIFO Queue for CAN Messages with Offsets Reviewed

    Yang Chen, Ryo Kurachi, Gang Zeng, Hiroaki Takada

    International Journal of Automotive Engineering   Vol. 4 ( 4 ) page: 75-82   2013

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  45. Worst Case Response Time Analysis for Messages in Controller Area Network with Gateway

    Yong Xie, Gang Zeng, Yang Chen, Ryo Kurachi, Hiroaki Takada, Renfa Li

    IEICE Transactions   Vol. 96-D ( 7 ) page: 1467-1477   2013

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  46. Schedulability Comparisons between Priority Queue and FIFO Queue for CAN Messages with Offsets

    Yang Chen, Kurachi Ryo, Gang Zeng, Takada Hiroaki

    International Journal of Automotive Engineering   Vol. 4 ( 4 ) page: 75 - 82   2013

     More details

    Language:English   Publisher:Society of Automotive Engineers of Japan, INC  

    The Controller Area Network (CAN) is a widely used in-vehicle network and its schedulability is particularly
    important. In a CAN system, implementing the priority queues is better than FIFO queues with respect to the schedulability, which is widely recognized by users. In this paper, we investigate whether and how much implementing the priority queues is better than FIFO queues when the offset assignment for CAN messages is conducted. Our results show that usually the priority queues are better, whereas the FIFO queues are better in some specific situations. Furthermore, we propose a new scheduling method for obtaining the advantages of both queues, which improves the schedulability effectively.

    DOI: 10.20485/jsaeijae.4.4_75

    CiNii Research

  47. Worst Case Response Time Analysis for Messages in Controller Area Network with Gateway

    XIE Yong, ZENG Gang, CHEN Yang, KURACHI Ryo, TAKADA Hiroaki, LI Renfa

    IEICE Transactions on Information and Systems   Vol. E96.D ( 7 ) page: 1467 - 1477   2013

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In modern automobiles, Controller Area Network (CAN) has been widely used in different sub systems that are connected by using gateway. While a gateway is necessary to integrate different electronic sub systems, it brings challenges for the analysis of Worst Case Response Time (WCRT) for CAN messages, which is critical from the safety point of view. In this paper, we first analyzed the challenges for WCRT analysis of messages in gateway-interconnected CANs. Then, based on the existing WCRT analysis method proposed for one single CAN, a new WCRT analysis method that uses two new definitions to analyze the interfering delay of sporadically arriving gateway messages is proposed for non-gateway messages. Furthermore, a division approach, where the end-to-end WCRT analysis of gateway messages is transformed into the similar situation with that of non-gateway messages, is adopted for gateway messages. Finally, the proposed method is extended to include CANs with different bandwidths. The proposed method is proved to be safe, and experimental results demonstrated its effectiveness by comparing it with a full space searching based simulator and applying it to a real message set.

    DOI: 10.1587/transinf.e96.d.1467

    Web of Science

    Scopus

    CiNii Research

    Other Link: http://dblp.uni-trier.de/db/journals/ieicet/ieicet96d.html#journals/ieicet/XieZCKTL13

  48. Schedulability Analysis for Messages in Gateway-Interconnected Controller Area Network Reviewed

    Yong Xie, Gang Zeng, Yang Chen, Ryo Kurachi, Hiroaki Takada, Renfa Li

    2012 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE)     page: 83 - 90   2012

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Controller Area Network (CAN) is widely used inside the automobiles. To decrease design complexity and cost, several CAN are utilized in different sub systems and gateway is employed to realize the communication between them. But the employment of gateway brings many challenges for schedulability analysis of CAN messages. We first analyzed the key challenges for schedulability analysis of messages. And then, based on existing method proposed for one single CAN, a new analysis method that is based on interference analysis for dynamically arriving gateway messages is proposed for non-gateway messages. Furthermore, a division approach that transforms the end-to-end schedulability analysis of gateway messages into the similar situation with that of non-gateway messages is proposed for gateway messages. The proposed method is proved to be safe, and by comparing it with a full space searching based simulator and applying to a real message set, its effectiveness is demonstrated as well.

    DOI: 10.1109/ICCVE.2012.23

    Web of Science

    Scopus

    Other Link: https://dblp.uni-trier.de/db/conf/iccve/iccve2012.html#XieZCKTL12

  49. Design and Evaluation of Scalable CAN Protocol for In-vehicle Networks

    Transactions of Society of Automotive Engineers of Japan   Vol. 43 ( 2 ) page: 509 - 514   2012

     More details

    Language:Japanese   Publisher:Society of Automotive Engineers of Japan  

    In this paper, a new high-speed bus topology LAN protocol for automobiles is proposed and its compatibility with the traditional CAN protocol is discussed. The transfer rate of traditional CAN cannot be increased due to its bitwise arbitration using message priority and acknowledgment mechanisms. Our proposed protocol avoids collisions by assigning one or more time slots to each ECU within a communication cycle. ACK is informed through the ACK bits included in the header of each frame. Based on this protocol, we implemented a 5 Mbit/s LAN system on which the existing software for CAN is used with small modifications. According to our evaluation, the proposed protocol achieves a short synchronization time during system start-up.

    DOI: 10.11351/jsaeronbun.43.509

    CiNii Research

  50. The Worst-Case Response Time Analysis for FIFO-based Offset Assigned CAN Messages

    Chen Yang, Kurachi Ryo, Zeng Gang, Takada Hiroaki

    Journal of Information Processing   Vol. 20 ( 2 ) page: 451 - 462   2012

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Information Processing Society of Japan  

    The Controller Area Network (CAN) is widely employed in automotive control system networks. In the last few years, the amount of data has been increasing rapidly in these networks. With the purpose of improving CAN bandwidth efficiency, scheduling and analysis are considered to be particularly important. As an effective method, it has been known that assigning offsets to the CAN messages can reduce their worst case response time (WCRT). Meanwhile, the fact is that many commercial CAN controllers have been equipped with a priority or first-in-first-out (FIFO) queue to transmit messages to the CAN bus. However, previous researches for WCRT analysis of CAN messages either assumed a priority queue or did not consider the offset. For this reason, in this paper we propose a WCRT analysis method for CAN messages with assigned offset in the FIFO queue. We first present a critical instant theorem, then we propose two algorithms for WCRT calculation based on the given theorem. Experimental results on generated message sets and a real message set have validated the effectiveness of the proposed algorithms.

    DOI: 10.2197/ipsjjip.20.451

    Scopus

    CiNii Research

  51. The Worst-Case Response Time Analysis for FIFO-based Offset Assigned CAN Messages

    Chen Yang, Kurachi Ryo, Zeng Gang, Takada Hiroaki

    Information and Media Technologies   Vol. 7 ( 2 ) page: 841 - 852   2012

     More details

    Language:English   Publisher:Information and Media Technologies Editorial Board  

    The Controller Area Network (CAN) is widely employed in automotive control system networks. In the last few years, the amount of data has been increasing rapidly in these networks. With the purpose of improving CAN bandwidth efficiency, scheduling and analysis are considered to be particularly important. As an effective method, it has been known that assigning offsets to the CAN messages can reduce their worst case response time (WCRT). Meanwhile, the fact is that many commercial CAN controllers have been equipped with a priority or first-in-first-out (FIFO) queue to transmit messages to the CAN bus. However, previous researches for WCRT analysis of CAN messages either assumed a priority queue or did not consider the offset. For this reason, in this paper we propose a WCRT analysis method for CAN messages with assigned offset in the FIFO queue. We first present a critical instant theorem, then we propose two algorithms for WCRT calculation based on the given theorem. Experimental results on generated message sets and a real message set have validated the effectiveness of the proposed algorithms.

    DOI: 10.11185/imt.7.841

    CiNii Research

  52. A new high-speed bus topology lan protocol compatible with can

    Kurachi R., Takada H., Nishimura M., Horihata S.

    SAE 2011 World Congress and Exhibition     2011.7

     More details

    Language:Japanese   Publisher:SAE 2011 World Congress and Exhibition  

    In this paper, a new high-speed bus topology LAN protocol for automobiles is proposed and its compatibility with the traditional CAN protocol is discussed. The transfer rate of traditional CAN cannot be increased due to its bitwise arbitration using message priority and Acknowledgment mechanisms. Our proposed protocol avoids collisions by assigning one or more time slots to each ECU within a communication cycle. ACK is informed through the ACK bits included in the header of each frame. Based on this protocol, we implemented a 5 Mbit/s LAN system on which the existing software for CAN is used with small modifications. This paper describes the proposed protocol, named "Scalable CAN," and its implementation on FPGA, and demonstrates that existing software can be easily ported to this new protocol. © 2011 SAE International.

    DOI: 10.4271/2011-01-1043

    Scopus

  53. A new high-speed bus topology lan protocol compatible with can

    Kurachi R., Takada H., Nishimura M., Horihata S.

    SAE Technical Papers     2011

     More details

    Language:Japanese   Publisher:SAE Technical Papers  

    In this paper, a new high-speed bus topology LAN protocol for automobiles is proposed and its compatibility with the traditional CAN protocol is discussed. The transfer rate of traditional CAN cannot be increased due to its bitwise arbitration using message priority and Acknowledgment mechanisms. Our proposed protocol avoids collisions by assigning one or more time slots to each ECU within a communication cycle. ACK is informed through the ACK bits included in the header of each frame. Based on this protocol, we implemented a 5 Mbit/s LAN system on which the existing software for CAN is used with small modifications. This paper describes the proposed protocol, named "Scalable CAN," and its implementation on FPGA, and demonstrates that existing software can be easily ported to this new protocol. Copyright © 2011 SAE International.

    Scopus

  54. Schedulability Comparison for CAN Message with Offset: Priority Queue Versus FIFO Queue. Reviewed

    Yang Chen, Ryo Kurachi, Hiroaki Takada, Gang Zeng

    19th International Conference on Real-Time and Network Systems, RTNS '11, Nantes, France, September 29-30, 2011. Proceedings     page: 181 - 192   2011

     More details

    Publishing type:Research paper (international conference proceedings)  

    Other Link: http://dblp.uni-trier.de/db/conf/rtns/rtns2011.html#conf/rtns/ChenKTZ11

  55. Development of scalable CAN protocol

    Kurachi R., Nishimura M., Takada H., Teshima S., Miyashita Y., Horihata S., Yamamoto H., Natsume A.

    SEI Technical Review   ( 71 ) page: 31 - 36   2010.10

     More details

    Language:Japanese   Publisher:SEI Technical Review  

    In today's automotive industry, FlexRay and other next generation protocols for automotive network communications are gaining attention. However, these protocols are unlikely to replace existing applications in the immediate future due to the cost and reliability problems caused by the replacement. In this paper we propose Scalable CAN, a new automotive network protocol based on the existing CAN (controller area network). Having a new ACK (Acknowledgement) information field, instead of an ACK slot, the Scalable CAN features a transmission speed of 10 Mbps and a new collision resolution algorithm which guarantees the delivery of a message within a given time period. Our simulation analysis indicates that the Scalable CAN protocol is superior to the conventional CAN in throughput performance such as a maximum data transmission speed, scalability, and priority inversion. This paper also includes considerations given for the implementation of the Scalable CAN.

    Scopus

  56. Design and performance analysis of 10 Mbit/s CAN

    Kurachi R., Takada H., Teshima S., Miyashita Y.

    SAE International Journal of Passenger Cars - Electronic and Electrical Systems   Vol. 2 ( 1 ) page: 18 - 26   2009.12

     More details

    Language:Japanese   Publisher:SAE International Journal of Passenger Cars - Electronic and Electrical Systems  

    In this paper, we propose a new automotive network protocol which can transmit data at a speed of 10 Mbit/s. The new automotive protocol "10 Mbit/s CAN" is based on two changes to CAN; a star topology, in which nodes are physically connected using a multi-port gateway, and a new collision resolution algorithm which guarantees delivery of a message within a finite period of time. According to our analysis using a simulator, the "10 Mbit/s CAN" protocol demonstrated several advantages over throughput performance of a conventional CAN, including a maximum possible data transmission speed, high scalability, and reduction of priority inversion. The implementation considerations of "10 Mbit/s CAN" are also reviewed briefly. © 2009 SAE International.

    DOI: 10.4271/2009-01-0126

    Scopus

  57. Design and performance analysis of 10 Mbit/s CAN

    Kurachi R., Takada H., Teshima S., Miyashita Y.

    SAE Technical Papers     page: 18 - 26   2009

     More details

    Language:Japanese   Publisher:SAE Technical Papers  

    In this paper, we propose a new automotive network protocol which can transmit data at a speed of 10 Mbit/s. The new automotive protocol "10 Mbit/s CAN" is based on two changes to CAN; a star topology, in which nodes are physically connected using a multi-port gateway, and a new collision resolution algorithm which guarantees delivery of a message within a finite period of time. According to our analysis using a simulator, the "10 Mbit/s CAN" protocol demonstrated several advantages over throughput performance of a conventional CAN, including a maximum possible data transmission speed, high scalability, and reduction of priority inversion. The implementation considerations of "10 Mbit/s CAN" are also reviewed briefly. Copyright © 2009 SAE International.

    DOI: 10.4271/2009-01-0126

    Scopus

  58. Design and performance analysis of 10 Mbit/s CAN Reviewed

    Ryo Kurachi, Hiroaki Takada, Shigeharu Teshima, Yukihiro Miyashita

    SAE International Journal of Passenger Cars - Electronic and Electrical Systems   Vol. 2 ( 1 ) page: 18 - 26   2009

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    In this paper, we propose a new automotive network protocol which can transmit data at a speed of 10 Mbit/s. The new automotive protocol "10 Mbit/s CAN" is based on two changes to CAN
    a star topology, in which nodes are physically connected using a multi-port gateway, and a new collision resolution algorithm which guarantees delivery of a message within a finite period of time. According to our analysis using a simulator, the "10 Mbit/s CAN" protocol demonstrated several advantages over throughput performance of a conventional CAN, including a maximum possible data transmission speed, high scalability, and reduction of priority inversion. The implementation considerations of "10 Mbit/s CAN" are also reviewed briefly. © 2009 SAE International.

    DOI: 10.4271/2009-01-0126

    Scopus

▼display all

Books 1

  1. CANの高速化と最大遅れ時間解析手法の研究

    倉地 亮

    [出版者不明]  2012 

     More details

    Language:Japanese

    CiNii Books

MISC 36

  1. Cybersecurity in a New Era of Mobility - Toward Enhancement of Japan Brand -:2. CASE Evolution and Cybersecurity in Automotive Domain

      Vol. 61 ( 4 ) page: 338 - 343   2020.3

     More details

    Language:Japanese  

    CiNii Books

    Other Link: http://id.nii.ac.jp/1001/00203921/

  2. A Proposal of the Device Disabler for Controller Area Network

      ( 194 ) page: 80 - 85   2019.1

     More details

    Language:Japanese  

    CiNii Books

  3. Safety and Security toward Connected Society and Vehicles

    松原 豊, 倉地 亮, 高田 広章

    自動車技術 = Journal of Society of Automotive Engineers of Japan   Vol. 72 ( 5 ) page: 87 - 93   2018.5

     More details

    Language:Japanese   Publisher:自動車技術会  

    CiNii Books

    J-GLOBAL

  4. IDHCC: A Security-Enhanced ID Hopping CAN Controller Design to Guarantee Real-Time Reviewed

    W. Wu, R. Kurachi, G. Zeng, Y. Matsubara, H. Takada, R. Li

    2nd Workshop on Security and Dependability of Critical Embedded Real-Time Systems     page: -   2017.12

     More details

    Language:English   Publishing type:Research paper, summary (national, other academic conference)  

  5. Proposal of Spoofing Detection Based on Keep Alive Messages for Controller Area Network

      Vol. 2017 ( 2 )   2017.10

     More details

    Language:Japanese  

  6. Safety and Security Issues in the Age of IoT - Toward Strengthening Japanese Industrial Competitiveness -:3. Trend of Safety and Security for Automotive Domain - Toward Autonomous Driving -

    松原 豊, 倉地 亮, 高田 広章

    情報処理   Vol. 58 ( 11 ) page: 972 - 977   2017.10

     More details

    Language:Japanese   Publisher:情報処理学会 ; 1960-  

    本稿では,自動車制御システムを中心にその発展経緯を踏まえて,セーフティとセキュリティに関する現状を整理する.特に,情報処理の観点から,先進運転支援システムや自律走行システムの実用化に向けて,今後取り組むべき課題やその方向性について概説する.

    CiNii Books

  7. Current Status and Activities of Strengthening Automotive Cybersecurity

    倉地 亮

    自動車技術 = Journal of Society of Automotive Engineers of Japan   Vol. 71 ( 5 ) page: 58 - 65   2017.5

     More details

    Language:Japanese   Publisher:自動車技術会  

    CiNii Books

  8. Problems and Challenges of Automotive Cybersecurity

    倉地 亮

    信頼性 = The journal of Reliability Engineering Association of Japan : 日本信頼性学会誌   Vol. 39 ( 2 ) page: 68 - 76   2017.3

     More details

    Language:Japanese   Publisher:日本信頼性学会  

  9. 自動車のハッキング事例と自動運転へ向けたセキュリティ対策 (特集 自動運転の実用化へ向けたキーテクノロジー : 技術開発の方向性と課題)

    倉地 亮

    車載テクノロジー = Automotive technology   Vol. 4 ( 1 ) page: 21 - 25   2016.10

     More details

    Language:Japanese   Publisher:技術情報協会  

  10. Information Security and Safety of Vehicles:3. Safety and Security for In-vehicle Electronic Systems

    倉地 亮, 松原 豊, 高田 広章

    情報処理   Vol. 57 ( 7 ) page: 632 - 637   2016.6

     More details

    Language:Japanese   Publisher:情報処理学会 ; 1960-  

    近年,自動車に対する脆弱性事例が多数報告されており,自動車のセキュリティが注目されている.これまでに販売されている自動車の多くは機能安全規格に対応されつつあり故障などに対して安全ではあるものの,攻撃者からの意図的なサイバー攻撃に対しては対策されておらず,脆弱であることが指摘されている.また,リアルタイム性やコスト制約が厳しい車載制御システムでは情報セキュリティの対策技術をそのまま適用することができない場合があり,車載制御システムの特徴を生かしたセキュリティ対策技術が必要とされている.本解説記事では,車載制御システムに求められる安全性とセキュリティを概説する.

    CiNii Books

  11. CAN Disabler: Hardware-based Prevention Method of Unauthorized Transmission in CAN and CAN-FD Networks Reviewed

    R. Kurachi, D. Pyun, S. Honda, H. Takada, H. Ueda, S. Horihata

    escar (Embedded Security in Cars Conference) US 2016     page: -   2016.6

     More details

    Language:English   Publishing type:Research paper, summary (national, other academic conference)  

  12. 日本の自動車における情報セキュリティの現状と今後 (特集 ネットと繋がるクルマ)

    倉地 亮

    自動車工業     page: 8 - 15   2016.4

     More details

    Language:Japanese   Publisher:日本自動車工業会  

    CiNii Books

  13. メッセージ認証を用いたCANの集中監視システム Reviewed

    倉地亮, 松原豊, 高田広章, 上田浩史, 堀端啓史

    電子情報通信学会論文誌   Vol. J99-A ( 2 ) page: 118-130   2016.2

     More details

    Language:Japanese   Publishing type:Rapid communication, short report, research note, etc. (scientific journal)  

  14. 車載電子制御技術と車載制御ネットワークの進展 (特集 自動車,メカから電気へ)

    倉地 亮

    電気評論   Vol. 100 ( 12 ) page: 17 - 22   2015.12

     More details

    Language:Japanese   Publisher:電気評論社  

    CiNii Books

  15. SecGW - Secure Gateway for In-Vehicle Networks Reviewed

    R. Kurachi, H. Takada, T. Mizutani, H. Ueda, S. Horihata

    escar (Embedded Security in Cars Conference) Europe 2015     page: -   2015.11

     More details

    Language:English   Publishing type:Research paper, summary (national, other academic conference)  

  16. Proposal of the Error Frame Monitoring System with Improved Controller Area Network (CAN) Controller

      Vol. 2015 ( 3 ) page: 110 - 115   2015.10

     More details

    Language:Japanese  

  17. Security Authentication System for In-Vehicle Network

    上田 浩史, 倉地 亮, 高田 広章

    SEIテクニカルレビュー   ( 187 ) page: 1 - 5   2015.7

     More details

    Language:Japanese   Publisher:住友電気工業  

    CiNii Books

  18. CaCAN - Centralized Authentication System in CAN Reviewed

    R. Kurachi, Y. Matsubara, H. Takada, N. Adachi, Y. Miyashita, S. Horihata

    escar (Embedded Security in Cars Conference) Europe 2014     page: -   2014.11

     More details

    Language:English   Publishing type:Research paper, summary (national, other academic conference)  

  19. A Scheduling Method of RMAP Packets for SpaceWire-D Invited Reviewed

    Y. Chen, M. Takada, R. Kurachi, H. Takada

    Int'l SpaceWire Conference 2013     page: 205-208   2013.6

     More details

    Language:English   Publishing type:Research paper, summary (national, other academic conference)  

  20. Performance Evaluation of the Scalable-CAN Integrated In-Vehicle Network Invited Reviewed

    R. Kurachi, Y. Chen, H. Takada, M. Nishimura, S. Horihata, T. Nakajima

    SAE 2013 World Congress & Exhibition   Vol. 2   page: SAE Technical Paper 2013-01-11   2013.4

     More details

    Language:English   Publishing type:Research paper, summary (national, other academic conference)  

    DOI: 10.4271/2013-01-1182

    Scopus

  21. Performance Analysis of Scalable CAN with Worst-case Response Time Analysis

    倉地 亮, 高田 広章, 西村 政信, 堀端 啓史

    情報処理学会論文誌   Vol. 53 ( 8 ) page: 1962 - 1975   2012.8

     More details

    Language:Japanese   Publisher:情報処理学会  

    現在,様々な機能を実現するために,車載ネットワークに流れるデータ量は急激に増加しており,広く採用されているController Area Network(CAN)では回線容量が不足している.しかしながら,CANの最大伝送速度はバス上での送信権の調停やACK応答メカニズムにより制約されており,最大伝送速度を向上させるためにはプロトコルの改良が必要となる.そこで,我々はCANを改良したスケーラブルCANプロトコルを提案している.本論では,スケーラブルCANプロトコルの最大遅れ時間解析手法を提案し,スケーラブルCANプロトコルがCANよりスループットを向上させたことにより,十分なメッセージ量を転送できる能力があることを示す.The Controller Area Network (CAN) is widely employed in in-vehicle networks to install new functions. However, CAN has significant restrictions on upper bound of maximum speed due to its bitwise arbitration and acknowledgement sequences. Therefore, we have proposed a new high-speed protocol &quot;Scalable CAN&quot; to improve upper bound speed of CAN. In this paper, we propose the worst-case response time analysis for &quot;Scalable CAN&quot;. According to our analysis, the Scalable CAN has achieved much higher throughput performance than CAN, and it has the ability to transfer a sufficient amount of message.

  22. Technology of In-vehicle Network and Its Future Direction

    TAKADA Hiroaki, KURACHI Ryo, NISHIMURA Masanobu

    The Journal of the Institute of Electronics, Information, and Communication Engineers   Vol. 95 ( 8 ) page: 724 - 729   2012.8

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    車載制御システム向けのネットワークは,厳しいコスト制約や重量制約,高い信頼性やリアルタイム性などの要求から,一般の情報ネットワーク技術とは大きく異なる技術が用いられている.本稿では,まず,車載制御ネットワークの主な使途について述べた後,ネットワーク技術に課されている制約事項や要求事項について整理する.次に,現状の車載制御ネットワーク規格として,CANの概要について解説する.また,LINやFlexRayなど,その他のネットワーク規格についても概説する.最後に,車載制御ネットワーク技術の今後の発展性として,CANの高速化やイーサネットの導入の動き,光ファイバ化などの研究開発動向について紹介する.

    CiNii Books

  23. Design and Evaluation of Scalable CAN Protocol for In-vehicle Networks

    倉地 亮, 高田 広章, 西村 政信

    自動車技術会論文集   Vol. 43 ( 2 ) page: 509 - 514   2012.3

     More details

    Language:Japanese   Publisher:自動車技術会  

    DOI: 10.11351/jsaeronbun.43.509

  24. Design and Evaluation of Scalable CAN Protocol for In-vehicle Networks

    倉地 亮, 高田 広章, 西村 政信, 堀端 啓史

    JSAE Transactions   Vol. 43 ( 2 ) page: 509 - 514   2012

     More details

    Language:Japanese   Publisher:Society of Automotive Engineers of Japan  

    In this paper, a new high-speed bus topology LAN protocol for automobiles is proposed and its compatibility with the traditional CAN protocol is discussed. The transfer rate of traditional CAN cannot be increased due to its bitwise arbitration using message priority and acknowledgment mechanisms. Our proposed protocol avoids collisions by assigning one or more time slots to each ECU within a communication cycle. ACK is informed through the ACK bits included in the header of each frame. Based on this protocol, we implemented a 5 Mbit/s LAN system on which the existing software for CAN is used with small modifications. According to our evaluation, the proposed protocol achieves a short synchronization time during system start-up.

    DOI: 10.11351/jsaeronbun.43.509

  25. Performance analysis of Scalable CAN with worst-case response time analysis

    倉地 亮, 高田 広章, 西村 政信, 堀端 啓史

    組込みシステムシンポジウム2011論文集   Vol. 2011   page: 18 - 1-18-9   2011.10

     More details

    Language:Japanese  

  26. Exact Schedulability Analysis for CAN Messages with Offsets

    倉地 亮, 陳暘, 高田 広章

    情報処理学会論文誌   Vol. 52 ( 8 ) page: 2431 - 2440   2011.8

     More details

    Language:Japanese   Publisher:情報処理学会  

    これまでにオフセット付きCANメッセージの最大遅れ時間の解析手法が提案されている.しかしながら,従来の手法では計算量を抑え速く効率的に計算できる一方,悲観的に解析される場合がある.このため,本論では従来手法の問題点を指摘し,正確な最大遅れ時間を求めるための手法を提案する.提案する手法は,最大遅れ時間となりうるメッセージ送信シーケンスに着目し,限定した範囲に限り網羅的に解析を行うことで,正確な最大遅れ時間を導出する方法である.本提案手法の評価として自動車メーカから提供されるメッセージセットに適用した結果,十分に少ない組合せで正確な最大遅れ時間が得られた.The existing analysis for CAN messages with offsets can compute fast and efficient by reducing the amount of computation. However, it is pessimistic in some cases. The causes of the pessimism is that the cumulative accounting of maximum interference functions is overestimated much greater than a realistic situation. In this paper, we show the cause of this situation that existing analysis takes into account unrealistic interference in the cumulative accounting. Then, we propose the exact schedulability analysis which involves the partially exhaustive analysis. According to our experiments by using actually-used message sets, we can conclude that our approach can significantly reduce the combination of the critical interference function, and its can achieve an exact schedulability analysis.

  27. An Offset Assignment Method for Messages of CAN

    陳暘, 倉地 亮, 曾剛, 高田 広章

    情報処理学会論文誌   Vol. 52 ( 7 ) page: 2245 - 2255   2011.7

     More details

    Language:Japanese   Publisher:情報処理学会  

    CAN(Controller Area Network)は,自動車の制御系ネットワークとして広く使われているネットワーク規格である.近年,自動車の制御系ネットワークを流れるデータ量が急増しており,CANの帯域を効率的に使用するために,CAN上でのメッセージのスケジューリング手法が重要となっている.CAN上でのメッセージ送信タイミングに適切なオフセットを付けることで,メッセージのスケジュール可能性を高くできることが知られている.本論文では,CAN上のメッセージに対して適切なオフセットを付けるための手法を提案する.また,提案した手法の有効性を確認するために,実際の車載システムで使用されているメッセージセットなどを用いた評価を行い,従来のオフセット決定手法よりも優れていることを示す.The Controller Area Network (CAN) as a network standard is widely employed in control network of vehicle. ln the last few years, the amount of data has been increasing rapidly in automotive control system network. With the purpose of improving CAN broadband efficiency, scheduling is considered to be particularly important. As we know, an appropriate offset assignment method for CAN messages could enhance schedulability. In this study, we propose a new method that provide a suitable offset for every message in CAN system. And we demonstrated its effects by using message sets of real vehicle network, etc. Compare with previous methods, the new method reveals its remarkable priority.

  28. A New High-Speed Bus Topology LAN Protocol Compatible with CAN Reviewed

    R. Kurachi, H. Takada, M. Nishimura, S. Horihata

    SAE 2011 World Congress     page: -   2011.4

     More details

    Language:English   Publishing type:Research paper, summary (national, other academic conference)  

  29. Exact Schedulability Analysis for CAN Messages with offsets

    倉地 亮, 陳 暘, 高田 広章

    研究報告組込みシステム(EMB)   Vol. 2010 ( 4 ) page: 1 - 7   2010.11

     More details

    Language:Japanese   Publisher:情報処理学会  

    これまでにオフセット付き CAN メッセージの最大遅れ時間の解析手法が提案されている.しかしながら,従来の手法では計算量を抑え速く効率的に計算出来る一方,悲観的に解析される場合がある.このため,本論では従来手法の問題点を指摘し,より正確な最大遅れ時間を求めるための手法について提案する.提案する手法は,クリティカルフレームに着目し限定した範囲に限り網羅的に解析を行うことで,厳密な最大遅れ時間を導出する方法である.本提案手法の評価として自動車メーカーから提供されるメッセージセットに適用した結果,十分に少ない組み合わせでより正確な解析結果がえられた.The existing analysis for CAN messages with offsets can compute fast and efficient by reducing the amount of computation. However, it is pessimisctic in some cases. The causes of the pessimism is that the cumulative accounting of maximum interference functions is overestimated much greater than a realistic situation. In this paper, we show the cause of this situation that existing analysis takes into account unrealistic interference in the cumulative accounting. Then, we propose the exact schedulability analysis which involves the partially exhaustive analysis. According to our experiments by using a actually-used messege sets, we can conclude that our approach can significantly reduce the conbination of the critical frames, and its can achieve an exact schedulability analysis.

    CiNii Books

  30. Development of scalable CAN protocol

    倉地 亮, 西村 政信, 高田 広章

    SEI technical review   ( 177 ) page: 30 - 35   2010.7

     More details

    Language:Japanese   Publisher:住友電気工業  

    CiNii Books

  31. Design and Performance Analysis of 10MbpsCAN

    倉地 亮, 高田 広章, 手嶋 茂晴, 宮下 之宏

    情報処理学会論文誌   Vol. 50 ( 11 ) page: 2643 - 2653   2009.11

     More details

    Language:Japanese  

    今日までに提案されている次世代車載プロトコルの多くは既存システムの再構成を強く要求しており,高い安全性が求められる自動車の制御ネットワークへ適用するには高いコストとリスクがともなう.そこで本論文では,自動車内の制御系ネットワークに広く使われるCANをベースとした新しい次世代車載プロトコル10 MbpsCANを提案する.10 MbpsCANプロトコルはスタートポロジへの変更と新しい衝突解決アルゴリズムにより高速化を実現した.さらにシミュレーション結果によれば,10 MbpsCANは従来CANに比べ十分なメッセージ量を送信できる能力を示した.最後に,10 MbpsCANコントローラの実装について説明する.Recently, automotive industry has atracted next genaration automotive protocols such as FlexRay. However, these solutions which shift to new applications will not meet the cost and risk requirements. In this paper, we propose a new automotive network protocol which can transmit data at a speed of 10 Mbps. The new automotive protocol &quot;10 MbpsCAN&quot; is based on several changes to CAN; a star topology, in which nodes are physically connected using a multiport gateway, and a new collision resolution algorithm which guarantees delivery of a message within a finite period of time. According to our analysis using a simulator, the &quot;10 MbpsCAN&quot; protocol demonstrated several advantages over throughput performance of a conventional CAN, including a maximum possible data transmission speed, high scalability, and reduction of priority inversion. The implementation considerations of &quot;10 MbpsCAN&quot; are also reviewed briefly.

  32. Design and Performance Analysis of 10 MbpsCAN

    倉地 亮, 高田 広章, 手嶋 茂晴

    情報処理学会論文誌 論文誌ジャーナル   Vol. 50 ( 11 ) page: 2643 - 2653   2009.11

     More details

    Language:Japanese   Publisher:情報処理学会  

  33. An Extension of AUTOSAR Communication Layers for Multicore Systems

    ICHIBA TOSHIYUKI, TAKADA HIROAKI, HONDA SHINYA, KURACHI RYO

    研究報告組込みシステム(EMB)   Vol. 2009 ( 6 ) page: 1 - 7   2009.7

     More details

    Language:Japanese   Publisher:情報処理学会  

    車載システム向けソフトウェアプラットフォームである AUTOSAR はシングルコアのみを想定しており,マルチコア環境を考慮していない.車載システムは相互に通信を行うことで協調制御するため,通信処理を実現するミドルウェアのマルチコア対応が必須である.本研究では,マルチコア環境での AUTOSAR 通信ミドルウェアの実現方法と評価を行う.まず,通信をコア内通信,コア間通信,チップ外通信の 3 つに分類し,それぞれの実現方法を検討する.チップ外通信については,ロック方式,通信サーバ方式の 2 方式を提案する.既存の通信ミドルウェアを 2 方式で拡張し,それぞれの送信処理時間の比較を行った.シングルコア環境に比べ,ロック方式は 41%,通信サーバ方式は 29% のオーバヘッドで実現可能であることがわかった.AUTOSAR, a software platform for automotive systems, assumes only an ECU with a single core processor, and does not consider an ECU with a multicore processor. It is necessary that a communication on a multicore processor because ECUs communicate each other for cooperative control. There are three communication types: a inside core, a inter core, and a outside chip communications. This paper proposes two methods for outside chip communication: a lock method and a server method. An existing communication middleware is extended as the two methods. Compared to a single core processor, the results of extended middleware show that transmission time overheads of the lock method and the server method are 41% and 29%, respectively.

    CiNii Books

  34. Behavior Analysis of Scalable CAN Protocol on a Bit-Error Channel

    UKAI Kenji, SAKABE Toshiki, TAKADA Hiroaki, KURACHI Ryo, SAKAI Masahiko, KUSAKARI Keiichirou, NISHIDA Naoki

    IEICE technical report   Vol. 108 ( 242 ) page: 61 - 66   2008.10

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Scalable CAN protocol is an improvement of the original CAN (Controller Area Network) protocol so that more than ten times higher speed communication is available. In this paper, we analyze behavior of Scalable CAN on a bit-error channel by using a model checking tool, NuSMV. We first describe in the SMV language a model of Scalable CAN on an error free channel and specifications which express desired properties of Scalable CAN. We verify by using NuSMV that this model satisfies the specifications. We next modify the model by replacing the error free channel with a bit-error channel. Model checking of the modified model for the specifications produces a counter example. We analyze the counter example and give suggestions for correcting Scalable CAN on a bit-error channel.

    CiNii Books

  35. A Preliminary Study on Behavior Analysis of Scalable CAN Protocol

    Kenji Ukai, Toshiki Sakabe, Hiroaki Takada, Ryo Kurachi, Masahiko Sakai, Keiichirou Kusakari, Naoki Nishida

    Record of 2008 Tokai-section Joint Conference of the Eight Institutes of Electrical and Related Engineers   ( O-262 ) page: 1   2008.9

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

  36. Research on high-speed CAN (Control Area Network) for improved bandwidth

    KURACHI RYO, MIYASHITA YUKIHIRO, TAKADA HIROAKI

    情報処理学会研究報告組込みシステム(EMB)   Vol. 2007 ( 121 ) page: 21 - 25   2007.12

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    Today, the data capacity in automotive control network has reached the limits of CAN (maximum data rates for 1 megabits per second). Speed of CAN is affected by the propagation delay, because of using bit synchronous transmission. For increasing data transmission speed, we must change arbitration process and ACK process. We propose the 10 megabits per second CAN architecture for improved bandwidth by using a new collision detection algorithm and topology change.

    CiNii Books

▼display all

Presentations 1

  1. CaCAN - Centralized Authentication System in CAN International conference

    Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada, Naoki Adachi, Yukihiro Miyashita, Satoshi Horihata

    Embedded Security in Cars Conference (escar EU 2014) 

     More details

    Event date: 2014.11

    Language:English   Presentation type:Oral presentation (general)  

    Country:Germany  

KAKENHI (Grants-in-Aid for Scientific Research) 3

  1. Security-aware optimization design for in-vehicle network with guaranteed real-time requirement

    Grant number:19K11920  2019.4 - 2022.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (C)  Grant-in-Aid for Scientific Research (C)

      More details

    Authorship:Coinvestigator(s) 

  2. Security measure and evaluation method for automobile control model

    Grant number:18K11212  2018.4 - 2021.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (C)  Grant-in-Aid for Scientific Research (C)

      More details

    Authorship:Principal investigator 

    Grant amount:\4420000 ( Direct Cost: \3400000 、 Indirect Cost:\1020000 )

  3. Study on vulnerability finding methods for in-vehicle systems

    Grant number:16K16025  2016.4 - 2019.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Young Scientists (B)  Grant-in-Aid for Young Scientists (B)

    KURACHI RYO

      More details

    Authorship:Principal investigator 

    Grant amount:\1560000 ( Direct Cost: \1200000 、 Indirect Cost:\360000 )

    This research focuses on establishing verification methods for in-vehicle systems. Especially, we researched methods to inspect security vulnerabilities of Electronic Control Units (ECUs) where installed in in-vehicle systems. This research is divided into two sub-themes: (1) finding vulnerabilities methods for in-vehicle networks, and (2) attack and evaluation methods for in-vehicle networks. According to our experimental results, our proposed methods are effective in real automobiles. Then, we studied and proposed more effective evaluation methods for in-vehicle systems which includes fuzzing and penetration tests.

Industrial property rights 26

  1. 中継装置、中継方法及びコンピュータプログラム

    倉地 亮, 高田 広章, 上田 浩史

     More details

    Applicant:国立大学法人東海国立大学機構

    Application no:特願2020-006964  Date applied:2020.1

    Announcement no:特開2021-114715  Date announced:2021.8

    J-GLOBAL

  2. 車載通信システム、車載通信装置及び送信周期算出方法

    倉地 亮, 高田 広章, 上田 浩史

     More details

    Applicant:国立大学法人東海国立大学機構

    Application no:特願2019-115712  Date applied:2019.6

    Announcement no:特開2021-002768  Date announced:2021.1

    J-GLOBAL

  3. 通信装置、通信システム及びメッセージ調停方法

    倉地 亮, 曾 剛, 高田 広章, 上田 浩史

     More details

    Applicant:国立大学法人東海国立大学機構

    Application no:特願2019-047478  Date applied:2019.3

    Announcement no:特開2020-150456  Date announced:2020.9

    J-GLOBAL

  4. 車載通信システム、車載通信制御装置、車載通信装置、コンピュータプログラム、通信制御方法及び通信方法

    倉地 亮, 高田 広章, 足立 直樹, 上田 浩史

     More details

    Applicant:国立大学法人東海国立大学機構

    Application no:特願2019-002124  Date applied:2019.1

    Announcement no:特開2020-113852  Date announced:2020.7

    J-GLOBAL

  5. 車載通信装置、車載通信システム及び車載通信方法

    高田 広章, 倉地 亮, 上田 浩史

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2017-204025  Date applied:2017.10

    Announcement no:特開2019-080119  Date announced:2019.5

    J-GLOBAL

  6. 車載認証システム、車載認証装置、コンピュータプログラム及び通信装置の認証方法

    高田 広章, 倉地 亮, 上田 浩史

     More details

    Applicant:国立大学法人東海国立大学機構

    Application no:特願2017-120830  Date applied:2017.6

    Announcement no:特開2019-009509  Date announced:2019.1

    Patent/Registration no:特許第6754325号  Date registered:2020.8 

    J-GLOBAL

  7. 通信装置及び通信コントローラ

    高田 広章, 倉地 亮, 本田 晋也, 上田 浩史

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2017-009633  Date applied:2017.1

    Announcement no:特開2018-121120  Date announced:2018.8

    J-GLOBAL

  8. 通信システム、通信制御装置及び不正情報送信防止方法

    高田 広章, 倉地 亮, 足立 直樹

     More details

    Applicant:国立大学法人名古屋大学, 株式会社オートネットワーク技術研究所, 住友電装株式会社, 住友電気工業株式会社

    Application no:特願2016-146714  Date applied:2016.7

    Announcement no:特開2016-208536  Date announced:2016.12

    Patent/Registration no:特許第6267596号  Date registered:2018.1 

    J-GLOBAL

  9. 通信制御装置及び通信システム

    高田 広章, 倉地 亮, 足立 直樹

     More details

    Applicant:国立大学法人名古屋大学, 株式会社オートネットワーク技術研究所, 住友電装株式会社, 住友電気工業株式会社

    Application no:JP2015082349  Date applied:2015.11

    Announcement no:WO2016-080422  Date announced:2016.5

    Publication no:WO2016-080422  Date published:2016.5

    Patent/Registration no:特許第6306206号  Date registered:2018.3 

    J-GLOBAL

  10. 中継装置

    高田 広章, 倉地 亮, 上田 浩史

     More details

    Applicant:国立大学法人名古屋大学, 株式会社オートネットワーク技術研究所, 住友電装株式会社, 住友電気工業株式会社

    Application no:特願2015-171190  Date applied:2015.8

    Announcement no:特開2017-050643  Date announced:2017.3

    Patent/Registration no:特許第6525824号  Date registered:2019.5 

    J-GLOBAL

  11. 通信装置

    高田 広章, 倉地 亮, 上田 浩史, 堀端 啓史

     More details

    Applicant:国立大学法人名古屋大学, 株式会社オートネットワーク技術研究所, 住友電装株式会社, 住友電気工業株式会社

    Application no:特願2015-171191  Date applied:2015.8

    Announcement no:特開2017-050644  Date announced:2017.3

    Patent/Registration no:特許第6525825号  Date registered:2019.5 

    J-GLOBAL

  12. 通信装置及び通信制限プログラム

    本田 晋也, 高田 広章, 倉地 亮, 上田 浩史

     More details

    Applicant:国立大学法人名古屋大学, 株式会社オートネットワーク技術研究所, 住友電装株式会社, 住友電気工業株式会社

    Application no:特願2015-100994  Date applied:2015.5

    Announcement no:特開2016-219944  Date announced:2016.12

    J-GLOBAL

  13. 通信装置及び通信制限プログラム

    本田 晋也, 高田 広章, 倉地 亮, 上田 浩史

     More details

    Applicant:国立大学法人名古屋大学, 株式会社オートネットワーク技術研究所, 住友電装株式会社, 住友電気工業株式会社

    Application no:特願2015-100994  Date applied:2015.5

    Announcement no:特開2016-219944  Date announced:2016.12

    Patent/Registration no:特許第6284903号  Date registered:2018.2  Date issued:2018.2

    J-GLOBAL

  14. 通信システム、異常検出装置及び異常検出方法

    高田 広章, 倉地 亮, 上田 浩史

     More details

    Applicant:国立大学法人名古屋大学, 株式会社オートネットワーク技術研究所, 住友電装株式会社, 住友電気工業株式会社

    Application no:特願2015-005260  Date applied:2015.1

    Announcement no:特開2016-131325  Date announced:2016.7

    J-GLOBAL

  15. CAN(Controller Area Network)通信システム及びエラー情報記録装置

    高田 広章, 倉地 亮, 足立 直樹

     More details

    Applicant:国立大学法人名古屋大学, 株式会社オートネットワーク技術研究所, 住友電装株式会社, 住友電気工業株式会社

    Application no:特願2014-235781  Date applied:2014.11

    Announcement no:特開2016-100725  Date announced:2016.5

    J-GLOBAL

  16. 通信システム及び通信装置

    高田 広章, 倉地 亮, 足立 直樹

     More details

    Applicant:国立大学法人名古屋大学, 株式会社オートネットワーク技術研究所, 住友電装株式会社, 住友電気工業株式会社

    Application no:特願2014-235783  Date applied:2014.11

    Announcement no:特開2016-100726  Date announced:2016.5

    Patent/Registration no:特許第5717240号  Date registered:2015.3 

    J-GLOBAL

  17. 通信システム及び通信装置

    高田 広章, 倉地 亮, 足立 直樹

     More details

    Applicant:国立大学法人名古屋大学, 株式会社オートネットワーク技術研究所, 住友電装株式会社, 住友電気工業株式会社

    Application no:特願2014-235783  Date applied:2014.11

    Announcement no:特開2016-100726  Date announced:2016.5

    Patent/Registration no:特許第6282216号  Date registered:2018.2  Date issued:2018.2

    J-GLOBAL

  18. 通信システム及び鍵情報共有方法

    高田 広章, 倉地 亮, 足立 直樹

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2014-139074  Date applied:2014.7

    Announcement no:特開2016-019054  Date announced:2016.2

    J-GLOBAL

  19. 通信装置、通信システム及び通信方法

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2011-025240  Date applied:2011.2

    Announcement no:特開2011-130486  Date announced:2011.6

    Patent/Registration no:特許第5190901号  Date registered:2013.2 

    J-GLOBAL

  20. 制御システム及び制御プログラム書換方法

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2009-121152  Date applied:2009.5

    Announcement no:特開2010-272971  Date announced:2010.12

    J-GLOBAL

  21. 中継装置、通信システム及び通信方法

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2008-180685  Date applied:2008.7

    Announcement no:特開2010-021805  Date announced:2010.1

    Patent/Registration no:特許第4581037号  Date registered:2010.9 

    J-GLOBAL

  22. 通信システム、通信装置及び通信方法

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2007-232734  Date applied:2007.9

    Announcement no:特開2009-065518  Date announced:2009.3

    Patent/Registration no:特許第5219120号  Date registered:2013.3 

    J-GLOBAL

  23. 分配装置、通信システム及び通信方法

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2007-216392  Date applied:2007.8

    Announcement no:特開2009-049929  Date announced:2009.3

    Patent/Registration no:特許第4784838号  Date registered:2011.7 

    J-GLOBAL

  24. 通信システム及び通信方法

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2007-216433  Date applied:2007.8

    Announcement no:特開2009-049933  Date announced:2009.3

    Patent/Registration no:特許第5007904号  Date registered:2012.6 

    J-GLOBAL

  25. 送信装置、送信方法及び通信システム

    高田 広章, 倉地 亮, 宮下 之宏

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2007-216393  Date applied:2007.8

    Announcement no:特開2009-049930  Date announced:2009.3

    Patent/Registration no:特許第4919192号  Date registered:2012.2 

    J-GLOBAL

  26. 車載通信システム及び車載通信方法

    高田 広章, 倉地 亮, 山本 秀樹

     More details

    Applicant:国立大学法人名古屋大学

    Application no:特願2007-153298  Date applied:2007.6

    Announcement no:特開2008-306592  Date announced:2008.12

    Patent/Registration no:特許第5057304号  Date registered:2012.8 

    J-GLOBAL

▼display all