Updated on 2026/03/13

写真a

 
MATSUBARA Yutaka
 
Organization
Graduate School of Informatics Department of Computing and Software Systems 2 Associate Professor
Graduate School
Graduate School of Informatics
Undergraduate School
School of Informatics Department of Computer Science
Title
Associate Professor
Contact information
メールアドレス

Degree 1

  1. Doctor (Information Science) ( 2011.3   Nagoya University ) 

Research Areas 1

  1. Informatics / Software

Professional Memberships 3

  1. Institute of Electrical and Electronics Engineers

  2. Information Processing Society of Japan

  3. 電子情報通信学会

Awards 4

  1. 優秀論文賞

    2023.7   マルチメディア、分散、協調とモバイルシンポジウム(DICOMO2022)   ブロックチェーンを活用した IoT機器のソフトウェア更新フレームワーク

    中西遼太, 松原豊, 高田広章

     More details

    Award type:Award from Japanese society, conference, symposium, etc. 

  2. 第19回ディペンダブルシステムワークショップ(DSW 2021) 最優秀論文発表賞

    2021.12   日本ソフトウェア科学会   MaaSの高信頼化を目的としたレジリエンスエンジニアリング手法

    周正書, 松原豊, 高田広章

     More details

    Award type:Award from Japanese society, conference, symposium, etc. 

  3. Specially Selected Paper

    2021.3  

     More details

    Award type:Honored in official journal of a scientific society, scientific journal 

  4. Best Software Paper Award

    2020.9   EV3RT: A Real-time Software Platform for LEGO Mindstorms EV3

    Yixiao Li,Yutaka Matsubara,Hiroaki Takada

     More details

    Award type:Honored in official journal of a scientific society, scientific journal 

 

Papers 53

  1. Enhancing Account Information Anonymity in Blockchain-Based IoT Access Control Using Zero-Knowledge Proofs

    Wu, YX; Matsubara, Y; Kasahara, S

    ELECTRONICS   Vol. 14 ( 14 )   2025.7

     More details

    Publisher:Electronics Switzerland  

    Blockchain and smart contracts are widely used in IoT access control to create decentralized, trustworthy environments for secure access and record management. However, their application introduces a dual challenge: The transparency of blockchain and the use of addresses as identifiers can expose account privacy. To tackle this issue, this paper proposes a blockchain-based IoT access control system that enhances account anonymity and preserves privacy, particularly regarding user behavior, habits, and access records through the use of zero-knowledge proofs. The system incorporates an access control mechanism that combines access control lists with capability-based access control, enabling ownership verification of access rights without disclosing identity information. To evaluate the system’s feasibility, we conduct experiments in a smart building scenario, including both qualitative comparisons with existing methods and quantitative analyses of performance in terms of time, space, and gas consumption. The results indicate that our scheme achieves the best time efficiency in the proof generation and authorization phases, completing them in just 7 and 10 s, respectively—representing half the time required by the second-best approach. These findings underscore the system’s superior cost efficiency and enhanced security compared to existing solutions.

    DOI: 10.3390/electronics14142772

    Web of Science

    Scopus

  2. A COTS-based Lightweight, Low-power and Versatile Companion Computer for Nano UAVs Open Access

    Okudera R., Li Y., Matsubara Y., Takada H.

    Sensors and Transducers   Vol. 268 ( 1 ) page: 37 - 44   2025.4

     More details

    Publisher:Sensors and Transducers  

    Recent advances in Unmanned Aerial Vehicles (UAVs) have driven a rapid expansion in their application domains, ranging from logistics and surveillance to disaster relief and entertainment. In particular, Nano UAVs (weight: under 100 g) offer significant advantages in cost, safety, and regulatory compliance. However, their limited payload capacity and the high-power consumption of conventional control systems severely constrain flight time. Traditional companion computers designed for computationally intensive tasks, such as image processing, often require 2-5 times more power and nearly double the weight of the onboard flight controller, further exacerbating these limitations. In this study, we present a novel companion computer based on Sony’s Spresense platform that is lightweight, low-power, and highly versatile. Weighing only 7 grams and featuring a POSIX-compliant RTOS alongside a multi-core architecture, the proposed solution is optimally tailored for Nano UAV applications. Extensive Hardware-in-the-Loop (HITL) evaluations demonstrate that our Spresense-based system consumes only 1/18 the power of the Raspberry Pi 4 Model B while delivering comparable functionality. Moreover, real Nano UAV tests using the Nano Mind 110 (weight: 36 g) confirm that integrating our companion computer results in only a modest increase in overall power consumption, thus preserving flight time. Compared to current state-of-the-art approaches, our design effectively addresses challenges in availability, extensibility, and ease of development, offering a cost-effective and practical alternative for Nano UAV systems. Future work will extend these findings through further real-world validations, including advanced navigation, obstacle avoidance, and ROS-based applications, to confirm the robustness and scalability of our approach.

    Open Access

    Scopus

  3. I/O Scheduler using splitting mechanism for improving Real-Time performance in eMMC

    Koshiba Shinnosuke, Matsubara Yutaka, Takada Hiroaki

        2025.1

     More details

    Language:English   Publisher:Jxiv, JST Preprint Server  

    <div class="page" title="Page 1">
    <div class="layoutArea">
    <div class="column">
    <p>Embedded MultiMedia Card (eMMC) is widely used in many real-time systems, such as in automotive applications. In embedded systems, it is common for applications to share storage resources, which creates a demand for protecting real-time processes from interference by other processes. Since eMMC lacks internal command queu- ing, the I/O scheduler becomes a critical component in ensuring performance. Under these conditions, priority-based schedulers for real-time systems have been developed, successfully protecting real-time processes. However, our ex- periments revealed that while these schedulers can handle the bandwidth load caused by a large number of small-sized I/O requests, they fail to manage the load caused by a small number of large-sized I/O requests. In such cases, tail latency of real-time process significantly worsens to levels comparable to systems without a scheduler. In this research, we propose an I/O scheduler equipped with an I/O splitting mechanism that converts a small number of large-sized I/O operations into a large number of small-sized I/O operations. Experiments demonstrated that, compared to ex- isting priority-based schedulers, this approach successfully reduced 99th percentile latency, achieving up to a 5-fold reduction in read latency and up to a 3-fold reduction in write latency.</p>
    </div>
    </div>
    </div>

    DOI: 10.51094/jxiv.1062

    CiNii Research

  4. Software-Defined Vehicles: Challenges and Orchestrating Mixed-Criticality Services Using Lingua Franca

    Huang W.K., Terazawa Y., Matsubara Y., Iwai A.

    IEEE Embedded Systems Letters     2025

     More details

    Publisher:IEEE Embedded Systems Letters  

    Software-Defined Vehicles (SDVs) consolidate safety-and non-safety-critical functions onto centralized platforms, forming mixed-criticality systems (MCSes) where applications like ADAS and infotainment coexist. While this reduces cost and complexity, it also introduces challenges in isolation, timing determinism, and safety certification. Lingua Franca (LF) offers deterministic coordination but lacks mechanisms for per-application monitoring and recovery. To address this, we (1) derive orchestration requirements from the “Safety First for Automated Driving” white paper, and (2) propose an LF-compatible framework with external monitors that detect faults and enable selective restarts of faulty applications without disrupting others. This work presents the first practical per-application failover solution for LF, improving the reliability of SDV mixed-criticality orchestration.

    DOI: 10.1109/LES.2025.3596675

    Scopus

  5. Flexible Edge Processing in Blockchain-based Secure IoT Data Distribution Framework Reviewed

    松原 豊

    Proceedings of 6th Workshop on Blockchain theoRy and ApplicatIoNs (BRAIN 2025)   Vol. -   2025

     More details

  6. SSI-Enabled Authentication and Enhanced Metadata Search in Blockchain-based Decentralized IoT Data Platforms

    Li L., Yasue Y., Matsubara Y.

    2025 7th International Conference on Blockchain Computing and Applications Bcca 2025     page: 829 - 837   2025

     More details

    Publisher:2025 7th International Conference on Blockchain Computing and Applications Bcca 2025  

    The rapid expansion of the Internet of Things (IoT) has intensified the demand for secure, interoperable, and userfriendly data sharing platforms. While blockchain-based decentralized architectures have been proposed to address privacy and transparency issues, most existing solutions lack a standardized authentication mechanism for both data providers and consumers, as well as flexible search capabilities for efficient data retrieval. This paper presents a blockchain-based decentralized IoT data distribution system that integrates Self-Sovereign Identity (SSI) for trustless authentication and an enhanced metadata search mechanism for condition-based data discovery. In the proposed architecture, raw IoT data remains on the originating devices to preserve privacy, while metadata is managed using PostgreSQL and stored on IPFS, with blockchain smart contracts ensuring transparency and traceability. SSI enables secure, decentralized verification of stakeholders without relying on a central authority, and the search framework allows data consumers to locate and acquire datasets matching specific requirements.

    DOI: 10.1109/BCCA66705.2025.11229590

    Scopus

  7. Automotive Control System as Distributed Real-time System Open Access

    Takada Hiroaki, Matsubara Yutaka

    SYSTEMS, CONTROL AND INFORMATION   Vol. 67 ( 12 ) page: 482 - 487   2023.12

     More details

    Language:Japanese   Publisher:THE INSTITUTE OF SYSTEMS, CONTROL AND INFORMATION ENGINEERS  

    DOI: 10.11509/isciesci.67.12_482

    Open Access

    CiNii Research

  8. Design and Implementation of RTOS-Aware Control-Flow Integrity Mechanism for Microcontroller-Based Systems Open Access

    KAWADA Tomoaki, HONDA Shinya, MATSUBARA Yutaka, TAKADA Hiroaki

    Computer Software   Vol. 39 ( 2 ) page: 2_39 - 2_68   2022.4

     More details

    Language:Japanese   Publisher:Japan Society for Software Science and Technology  

    <p>CFI (Control-Flow Integrity) is a class of defensive techniques against control-flow attacks such as Return-Oriented Programming. We propose a lightweight CFI scheme for RTOS-based applications, <I>TZmCFI</I>, which utilizes TrustZone for Armv8-M, a hardware-assisted security feature for embedded systems with tight resource constraints. TZmCFI embodies several existing CFI techniques to provide a self-contained toolset for building an instrumented application. The toolset is comprised of a modified LLVM-based compiler and a runtime library called <I>Monitor</I>. The modified LLVM code generator implements the traditional shadow stack technique by inserting calls to Monitor. To protect exception handlers, Monitor replaces an application's exception vector table and wrap interrupt handlers with <I>exception trampolines</I>, which implement variations of the <I>shadow exception stack</I> technique we proposed in our previous work. The performance evaluation on NXP Semiconductors LPC55S69 indicated a <I>-</I>7–35% increase in the execution times of FreeRTOS+MPU system calls and a 9.36% runtime overhead on CoreMark.</p>

    DOI: 10.11309/jssst.39.2_39

    Open Access

    Scopus

    CiNii Research

  9. A Multi-Agent Reinforcement Learning-Based Resilience Engineering Method for Mobility-as-a-Service.

    Zhengshu Zhou, Weijie Yu, Tingting Zhao 0001, Qian Long, Yutaka Matsubara, Hiroaki Takada

    IEEE Trans. Netw. Serv. Manag.   Vol. 23   page: 2135 - 2148   2026

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/TNSM.2025.3617534

    Web of Science

    Scopus

  10. Outlier-Ratio Feature Augmentation for Graph-based Intrusion Detection in CAN Networks.

    Akari Sasaki, Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada

    CCNC     page: 1 - 7   2026

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/CCNC65079.2026.11366528

    Other Link: https://dblp.org/db/conf/ccnc/ccnc2026.html#SasakiKMT26

  11. An Empirical Study of LLM-Based Code Clone Detection.

    Wenqing Zhu, Norihiro Yoshida, Eunjong Choi, Yutaka Matsubara, Hiroaki Takada

    CoRR   Vol. abs/2511.01176   2025.11

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.48550/arXiv.2511.01176

  12. PPDS: A Practical and Privacy-Preserving Data Sharing Model for Blockchain-Based IoT e-Health Systems Using ECC, Zero-Knowledge Proof, and Access Control

    Yuxiao Wu, Kenta Kawai, Yutaka Matsubara

    2025 7th International Conference on Blockchain Computing and Applications (BCCA)     page: 370 - 377   2025.10

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/bcca66705.2025.11229822

    Scopus

  13. ArchiMate-Based System of Systems Resilience Evaluation Approach. Open Access

    Huanjun Zhang, Yutaka Matsubara

    Systems(Syst.)   Vol. 13 ( 5 ) page: 327 - 327   2025.4

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.3390/systems13050327

    Open Access

    Web of Science

    Scopus

  14. Enhancing Human-Robot Collaboration through Existing Guidelines: A Case Study Approach.

    Yutaka Matsubara, Akihisa Morikawa, Daichi Mizuguchi, Kiyoshi Fujiwara

    CoRR   Vol. abs/2503.16436   2025.3

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.48550/arXiv.2503.16436

  15. Transforming concurrent programs with semaphores into logically constrained term rewrite systems.

    Misaki Kojima, Naoki Nishida 0001, Yutaka Matsubara

    Journal of Logical and Algebraic Methods in Programming   Vol. 143   page: 101033 - 101033   2025.2

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.jlamp.2024.101033

    Web of Science

    Scopus

  16. A Decision Support Scheme for Safe and Efficient Transportation of Hazardous Materials.

    Zhengshu Zhou, Yutaka Matsubara, Hiroaki Takada

    IEEE Transactions on Intelligent Transportation Systems   Vol. 26 ( 1 ) page: 309 - 322   2025.1

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/TITS.2024.3490635

    Web of Science

    Scopus

  17. Consensus-Based Resilience Assurance for System of Systems. Open Access

    Huanjun Zhang, Yutaka Matsubara

    IEEE Access   Vol. 13   page: 20203 - 20217   2025

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/ACCESS.2025.3535519

    Open Access

    Web of Science

    Scopus

  18. Flexible Edge Processing in Blockchain-based Secure IoT Data Distribution Framework.

    Kenta Kawai, Yuxiao Wu, Yutaka Matsubara, Hiroaki Takada

    IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events   ( 2025 ) page: 38 - 43   2025

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/PerComWorkshops65533.2025.00038

    Web of Science

    Scopus

    Other Link: https://dblp.org/db/conf/percom/percomw2025.html#KawaiWMT25

  19. Reaching Consensus on System-of-Systems Resilience Assurance: A Case of Mobility as a Service.

    Huanjun Zhang, Yutaka Matsubara, Hiroaki Takada

    Computer Safety, Reliability, and Security. SAFECOMP 2024 Workshops - DECSoS, SASSUR, TOASTS, and WAISE   Vol. 14989   page: 200 - 212   2024

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:Springer  

    DOI: 10.1007/978-3-031-68738-9_15

    Web of Science

    Scopus

    Other Link: https://dblp.org/db/conf/safecomp/safecomp2024w.html#ZhangMT24

  20. Race Directed Fuzzing for More Effective Concurrency Testing. Open Access

    Hiromasa Ito, Yutaka Matsubara, Hiroaki Takada

    Proceedings of the 2024 The 6th World Symposium on Software Engineering (WSSE)(WSSE)     page: 1 - 6   2024

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:ACM  

    DOI: 10.1145/3698062.3698063

    Open Access

    Web of Science

    Scopus

    Other Link: https://dblp.org/db/conf/wsse/wsse2024.html#ItoMT24

  21. Multilingual Investigation of Cross-Project Code Clones in Open-Source Software for Internet of Things Systems. Open Access

    Wenqing Zhu, Norihiro Yoshida, Yutaka Matsubara, Hiroaki Takada

    IEEE Access   Vol. 12   page: 179104 - 179118   2024

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/ACCESS.2024.3506013

    Open Access

    Web of Science

    Scopus

  22. Monitor and Analyze Rare ROS2 Performance Issues with A Unified Tracing Framework. Open Access

    Yixiao Li, Yutaka Matsubara, Hiroaki Takada, Satoru Funahashi, Hiroki Kawashima

    Proceedings of the 2024 The 6th World Symposium on Software Engineering (WSSE)(WSSE)     page: 95 - 104   2024

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:ACM  

    DOI: 10.1145/3698062.3698075

    Open Access

    Web of Science

    Scopus

    Other Link: https://dblp.org/db/conf/wsse/wsse2024.html#LiMTFK24

  23. Resilience analysis and design for mobility-as-a-service based on enterprise architecture modeling. Open Access

    Zhengshu Zhou, Yutaka Matsubara, Hiroaki Takada

    Reliability Engineering & System Safety   Vol. 229   page: 108812 - 108812   2023.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.ress.2022.108812

    Web of Science

    Scopus

  24. Schfuzz: Detecting Concurrency Bugs with Feedback-Guided Fuzzing. Open Access

    Hiromasa Ito, Yutaka Matsubara, Hiroaki Takada

    Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering(ENASE)   Vol. 2023-April   page: 273 - 282   2023

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:SCITEPRESS  

    DOI: 10.5220/0011722100003464

    Open Access

    Web of Science

    Scopus

    Other Link: https://dblp.org/db/conf/enase/enase2023.html#ItoMT23

  25. Developing Reliable Digital Healthcare Service Using Semi-Quantitative Functional Resonance Analysis. Open Access

    Zhengshu Zhou, Yutaka Matsubara, Hiroaki Takada

    Computer Systems: Science & Engineering   Vol. 45 ( 1 ) page: 35 - 50   2023

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    DOI: 10.32604/csse.2023.030848

    Open Access

    Web of Science

    Scopus

  26. A Performance Evaluation of Embedded Multi-core Mixed-criticality System Based on PREEMPT_RT Linux Open Access

    Li Yixiao, Matsubara Yutaka, Takada Hiroaki, Suzuki Kenji, Murata Hideaki

    Journal of Information Processing   Vol. 31 ( 0 ) page: 78 - 87   2023

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Information Processing Society of Japan  

    <p>The use of Linux in the domain of embedded systems is growing very fast. Due to the complexity of hardware and software on Linux-based platforms, it is challenging to meet the performance requirements, especially for the mixed-criticality system with both real-time and best-effort tasks. We propose a reference design of Linux-based mixed-criticality system using PREEMPT_RT patch to improve real-time performance and QEMU/KVM virtual machine to reduce interferences. An evaluation environment of the proposed design is built with recent software and hardware to investigate the performance characteristics via experimental measurements. We measure and analyze the baseline kernel latency, the system throughput and the real-time performance under multiple conditions. In detailed analysis, we reveal novel insights on the real-time capabilities and limitations of Linux-based embedded systems. The results show that our design can meet the 100<i>µ</i>s deadline goal of 1kHz real-time task with high probability under various extreme interferences, and can deliver high throughput for best-effort workload.</p>

    DOI: 10.2197/ipsjjip.31.78

    Open Access

    Scopus

    CiNii Research

  27. A Quantitative Approach for System of Systems' Resilience Analyzing Based on ArchiMate.

    Huanjun Zhang, Yutaka Matsubara, Hiroaki Takada

    Computer Safety, Reliability, and Security. SAFECOMP 2023 Workshops - ASSURE, DECSoS, SASSUR, SENSEI, SRToITS, and WAISE   Vol. 14182   page: 47 - 60   2023

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:Springer  

    DOI: 10.1007/978-3-031-40953-0_5

    Web of Science

    Scopus

    Other Link: https://dblp.org/db/conf/safecomp/safecomp2023w.html#ZhangMT23

  28. 柔軟なCPUリソースアカウントのためのcgroupの拡張手法

    松下瑛佑,松原豊,高田広章

    第59回EMB合同研究発表会(ETNET2022)     2022.3

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

  29. BFQスケジューラにおけるストレージ I/O帯域保証による応答性向上

    長谷川博紀,松原豊,加藤寿和,山本整,水口武尚,高田広章

    第59回EMB合同研究発表会(ETNET2022)     2022.3

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

  30. MaaSの高信頼化を目的としたレジリエンスエンジニアリング手法

    周 正書,松原 豊,高田 広章

    第19回ディペンダブルシステムワークショップ (DSW 2021)     2021.12

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

  31. コンテナ型仮想化における低レベルランタイムの性能評価

    西村惇,李奕驍,松下瑛佑 ,松原豊,高田広章

    第58回組込みシステム研究発表会     2021.11

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

  32. Quantitative Security Assurance Case for In-vehicle Embedded Systems Reviewed

    Zhengshu Zhou, Yutaka Matsubara and Hiroaki Takada

    IEEE CyberSciTech/PICom/DASC/CDBCom 2021     2021.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00022

  33. TZmCFI: RTOS-Aware Control-Flow Integrity Using TrustZone for Armv8-M Reviewed Open Access

    Tomoaki Kawada, Shinya Honda, Yutaka Matsubara, Hiroaki Takada

    International Journal of Parallel Programming   Vol. 49 ( 2 ) page: 216 - 236   2021.4

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:Springer Science and Business Media LLC  

    <title>Abstract</title>Control-Flow Integrity (CFI) is a class of defensive techniques against control-flow attacks such as Return-Oriented Programming. We propose a light-weight CFI scheme for RTOS-based applications, TZmCFI, which utilizes TrustZone for Armv8-M, a hardware-assisted security feature for embedded systems with tight resource constraints. TZmCFI embodies several existing CFI techniques to provide a comprehensive protection. The traditional shadow stack technique is used to ensure stack integrity and validate function returns. To protect exception handlers, TZmCFI extends <italic>shadow exception stacks</italic>, which are a variant of the traditional shadow stack technique we proposed in our previous work, for RTOS integration and performance improvement. We conducted an experiment on Arm Versatile Express Cortex-M Prototyping System (V2M-MPS2+) to evaluate the run-time overhead of the proposed system.

    DOI: 10.1007/s10766-020-00673-z

    Open Access

    Web of Science

    Scopus

    Other Link: http://link.springer.com/article/10.1007/s10766-020-00673-z/fulltext.html

  34. アプリケーションからのストレージアクセス分析手法

    長谷川博紀, 松原豊, 加藤寿和, 山本整, 高田広章

    第56回EMB合同研究発表会(ETNET2021)     2021.3

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

  35. ハイパーバイザにおけるハードウェアの共有分析手法

    鈴木 健太, 松原 豊, 守谷 友和, 本谷 謙治, 岩切 英之, 高田 広章

    第56回組込みシステム合同研究発表会(ETNET2021)     2021.3

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

  36. ミドルウェアに対するCoverage-based Greybox Fuzzingの適用 Reviewed Open Access

    伊藤 弘将, 松原 豊, 高田 広章

    情報処理学会論文誌   Vol. 62 ( 3 ) page: 877 - 890   2021.3

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    DOI: 10.20729/00210252

    Open Access

  37. Quantitative Security Assurance Case for In-vehicle Embedded Systems.

    Zhengshu Zhou, Yutaka Matsubara, Hiroaki Takada

    IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress(DASC/PiCom/CBDCom/CyberSciTech)     page: 43 - 50   2021

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00022

    Web of Science

    Scopus

    Other Link: https://dblp.org/db/conf/dasc/dasc2021.html#ZhouMT21

  38. Agile Software Design Verification and Validation (V&V) for Automated Driving Reviewed

    Yixiao Li, Yutaka Matsubara, Daniel Olbrys, Kazuhiro Kajio, Hiroaki Takada

    Proceedings of FISITA 2020     2020.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  39. Safety design concepts for statistical machine learning components toward accordance with functional safety standards

    Akihisa Morikawa, Yutaka Matsubara

    CoRR   Vol. abs/2008.01263   2020.8

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    In recent years, curial incidents and accidents have been reported due to
    un-intended control caused by misjudgment of statistical machine learning
    (SML), which include deep learning. The international functional safety
    standards for Electric/Electronic/Programmable (E/E/P) systems have been widely
    spread to improve safety. However, most of them do not recom-mended to use SML
    in safety critical systems so far. In practical the new concepts and methods
    are urgently required to enable SML to be safely used in safety critical
    systems. In this paper, we organize five kinds of technical safety concepts
    (TSCs) for SML components toward accordance with functional safety standards.
    We discuss not only quantitative evaluation criteria, but also development
    process based on XAI (eXplainable Artificial Intelligence) and Automotive SPICE
    to improve explainability and reliability in development phase. Fi-nally, we
    briefly compare the TSCs in cost and difficulty, and expect to en-courage
    further discussion in many communities and domain.

    arXiv

    Other Link: http://arxiv.org/pdf/2008.01263v1

  40. Transforming Concurrent Programs with Semaphores into Logically Constrained Term Rewrite Systems Reviewed

    Misaki Kojima, Naoki Nishida, Yutaka Matsubara

    Informal Proceedings of WPTE 2020     page: 12   2020.6

     More details

    Authorship:Last author   Language:English   Publishing type:Research paper (international conference proceedings)  

  41. Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS -- a collection of Technical Notes Part 1 International coauthorship

    Robin Bloomfield, Gareth Fletcher, Heidy Khlaaf, Philippa Ryan, Shuji Kinoshita, Yoshiki Kinoshit, Makoto Takeyama, Yutaka Matsubara, Peter Popov, Kazuki Imai, Yoshinori Tsutake

    CoRR   Vol. abs/2003.00789   2020.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    This report provides an introduction and overview of the Technical Topic
    Notes (TTNs) produced in the Towards Identifying and closing Gaps in Assurance
    of autonomous Road vehicleS (Tigars) project. These notes aim to support the
    development and evaluation of autonomous vehicles. Part 1 addresses:
    Assurance-overview and issues, Resilience and Safety Requirements, Open Systems
    Perspective and Formal Verification and Static Analysis of ML Systems. Part 2:
    Simulation and Dynamic Testing, Defence in Depth and Diversity,
    Security-Informed Safety Analysis, Standards and Guidelines.

    arXiv

    Other Link: http://arxiv.org/pdf/2003.00789v1

  42. Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS -- a collection of Technical Notes Part 2 International coauthorship

    Robin Bloomfield, Gareth Fletcher, Heidy Khlaaf, Philippa Ryan, Shuji Kinoshita, Yoshiki Kinoshit, Makoto Takeyama, Yutaka Matsubara, Peter Popov, Kazuki Imai, Yoshinori Tsutake

    CoRR   Vol. abs/2003.00790   2020.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    This report provides an introduction and overview of the Technical Topic
    Notes (TTNs) produced in the Towards Identifying and closing Gaps in Assurance
    of autonomous Road vehicleS (Tigars) project. These notes aim to support the
    development and evaluation of autonomous vehicles. Part 1 addresses:
    Assurance-overview and issues, Resilience and Safety Requirements, Open Systems
    Perspective and Formal Verification and Static Analysis of ML Systems. This
    report is Part 2 and discusses: Simulation and Dynamic Testing, Defence in
    Depth and Diversity, Security-Informed Safety Analysis, Standards and
    Guidelines.

    arXiv

    Other Link: http://arxiv.org/pdf/2003.00790v1

  43. esprof: A Generic Profiling Infrastructure for Multi/Many-Core Embedded Systems Reviewed Open Access

    LI Yixiao, MATSUBARA Yutaka, TAKADA Hiroaki

    Computer Software   Vol. 37 ( 1 ) page: 1_54 - 1_67   2020.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:Japan Society for Software Science and Technology  

    <p>Embedded systems are moving to multi-core and many-core platforms to satisfy the ever-growing demand for computing power. Complex task like autonomous driving will include both real-time applications and high-performance applications. Research has shown that traditional RTOS can be optimized to provide good scalability for parallel computing. The lack of performance analysis tools, however, is one of the major obstacles for identifying bottlenecks.<br/>In this paper, we first discuss the characteristics and challenges of existing tools used in high-performance computing. To meet the requirements of embedded systems, a generic infrastructure for creating customized profilers flexibly and effortlessly is then presented. As an example, a scalable and optimized call graph profiler has been developed. At last, we evaluate our profiler and existing profiler by measuring benchmark application on a 36-core platform. The results show that our profiler can provide much higher accuracy with very low overhead.</p>

    DOI: 10.11309/jssst.37.1_54

    Open Access

    Scopus

    CiNii Research

  44. Energy-Aware Task Allocation for Heterogeneous Multiprocessor Systems by Using Integer Linear Programming Reviewed

    Yang Qin, Gang Zeng, Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada,

    Journal of Information Processing   Vol. 60 ( 2 ) page: 136-148   2019.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: https://doi.org/10.2197/ipsjjip.27.136

  45. IDH-CAN: A Hardware-Based ID Hopping CAN Mechanism With Enhanced Security for Automotive Real-Time Applications Reviewed Open Access

    Wufei Wu, Ryo Kurachi, Gang Zeng, Yutaka Matsubara, Hiroaki Takada, Renfa Li, Keqin Li

      Vol. 6 ( 1 ) page: 54607-54623   2018.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/ACCESS.2018.2870695

    Open Access

  46. Execution-variance-aware task allocation for energy minimization on the big.LITTLE architecture Reviewed

    Yang Qin, Gang Zeng, Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada

    ELSEVIER Sustainable Computing: Informatics and Systems     2018.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: https://doi.org/doi:10.1016/j.suscom.2018.10.001

  47. IoT機器への適用に向けたTLS1.3の性能評価 Open Access

    小松大河, 松原豊, 高田広章

    コンピュータセキュリティシンポジウム2018論文集   Vol. 2018 ( 2 ) page: 569 - 576   2018.10

     More details

    Language:Japanese  

    Open Access

  48. Energy-Aware Task Allocation for Large Task Sets on Heterogeneous Multiprocessor Systems Reviewed

    Yang Qin, Gang Zeng, Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada

    Proceedings of 16th International Conference on Embedded and Ubiquitous Computing (EUC)     page: 158-165   2018.10

     More details

    Language:English  

    DOI: 10.1109/EUC.2018.00031

  49. ブロックチェーン技術を用いたIoT機器向けセキュアアップデートフレームワーク Reviewed Open Access

    長柄啓悟, 松原豊, 高田広章

    組込みシステムシンポジウム2018論文集   Vol. 2018   page: 36-39   2018.8

     More details

    Language:Japanese  

    Open Access

  50. Arm TrustZone for Armv8-M を利用したマルチタスク対応 CFI の検討 Reviewed Open Access

    河田智明, 本田晋也, 松原豊, 高田 広章

    組込みシステムシンポジウム2018論文集   Vol. 2018   page: 71 - 74   2018.8

     More details

    Language:Japanese  

    Open Access

  51. ROS2と軽量DDSの組込みシステムに対する適用性評価

    小澤慶祐, 本田晋也, 松原豊, 高田広章, 加藤 寿和, 山本 整

    研究報告組込みシステム(EMB)   Vol. 2018-EMB-48 ( 2 ) page: 1-8   2018.6

     More details

    Language:Japanese  

  52. FRAM/STPA: Hazard Analysis Method for FRAM Model Reviewed

    Yoshinari Toda, Yutaka Matsubara, Hiroaki Takada

    Proceedings of FRAMily 2018     page: 1-7   2018.5

     More details

    Language:English  

  53. つながる社会とクルマのセーフティ&セキュリティの動向と展望

    松原豊, 倉地亮, 高田広章

    自動車技術   Vol. 72 ( 5 ) page: 87-93   2018.5

     More details

    Authorship:Lead author   Language:Japanese  

▼display all

MISC 3

  1. CAN侵入検知アルゴリズムの性能評価

    佐々木あかり, 倉地亮, 松原豊, 高田広章

    情報処理学会シンポジウムシリーズ(CD-ROM)   Vol. 2024 ( 1 )   2024

     More details

  2. MBSEツールを用いたAUTOSARプラットフォームのビジュアルモデリングと設計手法

    高田光隆, 松原豊

    情報処理学会研究報告(Web)   Vol. 2022 ( ARC-248 )   2022

     More details

  3. Cybersecurity in a New Era of Mobility - Toward Enhancement of Japan Brand -:2. CASE Evolution and Cybersecurity in Automotive Domain

      Vol. 61 ( 4 ) page: 338 - 343   2020.3

     More details

    Language:Japanese  

    CiNii Research

    Other Link: http://id.nii.ac.jp/1001/00203921/

Presentations 19

  1. 組込みシステム開発におけるリスクマネジメントの現状と今後の方向性 Invited

    松原豊

    Jasa 中部セミナー  2021.12  JASA

     More details

    Event date: 2021.12

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

  2. IEC 62853の4観点を活用した,車載ソフトウェア開発における現場課題の分析 Invited

    松原豊

    ET&IoT展2021 スペシャルセッション  2021.11  一般社団法人 組込みシステム技術協会

     More details

    Event date: 2021.11

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

  3. Society 5.0におけるセーフティ&セキュリティの課題とDXによる解決支援 Invited

    松原豊

    DXイノベーションチャレンジ2021  2021.8  DXイノベーションチャレンジ 実行委員会

     More details

    Event date: 2021.8

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

  4. 組込み/IoTセキュリティ Invited

    松原豊

    NANO OPT Media Online  2021.7 

     More details

    Event date: 2021.7

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

  5. 未知なるリスクに適応する社会的ガバナンスの構築に向けて 〜自動車分野を例に〜 Invited

    松原豊

    JSAE オンラインフォーラム  2021.7  JSAE

     More details

    Event date: 2021.7

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

  6. Society 5.0の安全,信頼性確保に向けた課題と解決アプローチ Invited

    松原豊

    第7回DEOS協会オープンシンポジウム  2021.6  DEOS協会

     More details

    Event date: 2021.6

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

  7. 組込み機器のセキュリティ入門 Invited

    松原豊

    組込み機器のセキュリティ入門講座  2021.2.15  しまね産業振興財団/島根県産業技術センター

     More details

    Event date: 2021.2

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:オンライン  

  8. 自動車を取り巻く セーフティとセキュリティの現状と課題 Invited

    松原豊

    電子情報通信学会情報ネットワーク(IN)研究会  2021.1.18  電子情報通信学会情報ネットワーク研究会

     More details

    Event date: 2021.1

    Language:Japanese   Presentation type:Oral presentation (invited, special)  

    Venue:オンライン  

  9. 車載システムの安全規格動向と電子デバイスへの期待 Invited

    松原豊

    第7回電子デバイスフォーラム京都  2020.10.30  日本電子デバイス産業協会

     More details

    Event date: 2020.10

    Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:京都  

  10. 組込みソフトウェアプラットフォームを理解する Invited

    松原豊

    セキュリティ・ネクストキャンプ2020  2020.10.25  情報処理推進機構

     More details

    Event date: 2020.10 - 2020.12

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:オンライン  

  11. 自動運転システムの総合信頼性と社会アーキテクチャ構築に向けて Invited

    松原豊

    JSAE オンラインフォーラム  2020.7.30  自動車技術会

     More details

    Event date: 2020.7

    Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:オンライン  

  12. 開発が進むAUTOSAR Adaptive Platformの現状と課題 Invited

    松原豊

    2019年度第3回スキルアップセミナー 

     More details

    Event date: 2019.12

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:名古屋   Country:Japan  

  13. 車載制御システムの変遷とディペンダビリティ Invited

    松原豊

    第17回ディペンダブルシステムワークショップ 

     More details

    Event date: 2019.12

    Language:Japanese   Presentation type:Oral presentation (invited, special)  

    Venue:東京   Country:Japan  

  14. 自動運転を安心して運営・利用するには? 〜 IEC 62853を活用したアプローチ 〜 Invited

    松原豊

    Embedded Technology&IoT Technology 2019 

     More details

    Event date: 2019.11

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:横浜   Country:Japan  

  15. SEAMS & TIGARS プロジェクトの紹介 Invited

    松原豊

    MaaS DIY Day 

     More details

    Event date: 2019.11

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:札幌   Country:Japan  

  16. IEC 62853を活用したMaaSのディペンダビリティ解析 Invited

    松原豊

    ソフトウェア品質シンポジウム2019 

     More details

    Event date: 2019.9

    Language:Japanese   Presentation type:Oral presentation (invited, special)  

    Venue:東京   Country:Japan  

  17. 組込みリアルタイムOSとIoTシステム演習 Invited

    松原豊

    セキュリティキャンプ全国大会2019 

     More details

    Event date: 2019.8

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:東京   Country:Japan  

  18. 自動運転サービスの継続的な安全性論証と標準化動向 Invited

    松原豊

    Embedded System Technology and Innovation Conference 2019 

     More details

    Event date: 2019.7

    Language:Japanese   Presentation type:Oral presentation (invited, special)  

    Venue:東京   Country:Japan  

  19. 自動運転の安全性論証における IEC 62853の活用 Invited

    松原豊

    第6回DEOS協会オープンシンポジウム 

     More details

    Event date: 2019.6

    Language:Japanese   Presentation type:Oral presentation (invited, special)  

    Venue:東京   Country:Japan  

▼display all

KAKENHI (Grants-in-Aid for Scientific Research) 3

  1. Development of Program Verification Techniques Based on Coinduction on Logically Constrained Rewriting

    Grant number:24K02900  2024.4 - 2029.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (B)

      More details

    Authorship:Coinvestigator(s) 

  2. Society5.0を支えるシステムオブシステムズの総合信頼性論証フレームワーク

    Grant number:22K04618  2022.4 - 2026.3

    日本学術振興会  科学研究費助成事業  基盤研究(C)

    松原 豊

      More details

    Authorship:Principal investigator 

    Grant amount:\4160000 ( Direct Cost: \3200000 、 Indirect Cost:\960000 )

    本研究では,Society5.0社会に向けて普及が期待されるシステムオブシステムズを対象にその安全性,信頼性,セキュリティなどを包含する総合信頼性(ディペンダビリティ)の維持,向上を支援する論証フレームワークを構築する。この論証フレームワークを共通基盤として,専門知識が乏しい,ないしは専門分野の異なるステークホルダが一緒に総合信頼性について議論する場を提供する。
    複数の独立したシステムが連携しながらサービスを提供するシステムオブシステムについて,その総合信頼性を論証するためのフレームワークを構築することを目標に掲げている。研究3年目に予定していた研究を進めることができ,研究成果を3本の研究論文にまとめることができた(国際会議2本と国際論文誌1本,他に国際論文誌1本に投稿中である)。
    <BR>
    具体的な研究内容として3項目を実施した。1つ目の課題A3では,ビジネルモデリング言語ArchiMateの課題と改善点について議論をさらに進め,ハザード分析で使用されるSTAMPとの比較を実施した。STAMPによるモデリングの可能性も認められ,研究CではSTAMPを用いる試行を進めた。2つ目の課題B3では,MaaSに加えて,サプライチェーンを対象に,複数のSoSに対して,総合信頼性を確立するための要件を検討して,テンプレート化を進めた。3つ目の課題として,課題Cの総合信頼性分析の試行と論証手法を確立を進めた。MaaS事例を取り上げ,複数のステークホルダが登場する状況において,合意を形成する過程をゲーム理論を使ってモデル化し,その結果をGSN(Goal Structual Notation)を用いて可視化する試行を実施することができた。今後は,これらの研究成果の完成度をさらに高め,成果を論文としてまとめていく予定である。
    研究計画の3年目として,順調に研究を進めることができた。論文化が遅れていた課題Aについては,成果を国際論文誌に投稿して採録され,まとめることができた。それ以外の課題についても,論文を投稿中であり,順調に成果をまとめることができている。具体的な研究内容としては,研究3年目に予定していた研究を進めることができ,研究成果を3本の研究論文にまとめることができた(国際会議2本と国際論文誌1本,他に国際論文誌1本に投稿中である)。
    具体的な研究内容として3項目を実施した。1つ目の課題A3では,ビジネルモデリング言語ArchiMateの課題と改善点について議論をさらに進め,ハザード分析で使用されるSTAMPとの比較を実施した。STAMPによるモデリングの可能性も認められ,研究CではSTAMPを用いる試行を進めた。2つ目の課題B3では,MaaSに加えて,サプライチェーンを対象に,複数のSoSに対して,総合信頼性を確立するための要件を検討して,テンプレート化を進めた。3つ目の課題として,課題Cの総合信頼性分析の試行と論証手法を確立を進めた。MaaS事例を取り上げ,複数のステークホルダが登場する状況において,合意を形成する過程をゲーム理論を使ってモデル化し,その結果をGSN(Goal Structual Notation)を用いて可視化する試行を実施することができた。
    引き続き,研究計画に従って研究を進めていく。最終年度であるため,予定通り,研究課題B:総合信頼性要件の具体化手法の確立と適用について,課題B3(課題B3 複数のSoSに総合信頼性要件テンプレートを適用し,総合信頼性要件を導出する。)と,研究課題C:総合信頼性分析の試行と論証手法の確立課題について,課題C1 具体化した総合信頼性要件を
    もとに,対象SoSのサービスの総合信頼性を評価する,という課題について研究を進める。すでに検討結果や実験が進んでおり,国際会議への論文投稿を検討している段階にある。これらの研究成果をまとめ,論文化を進めるとともに,次の研究プロジェクトの立案を目指す。

  3. Security threat analysis system for highly reliable embedded / IoT systems

    Grant number:16K21097  2016.4 - 2020.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Young Scientists (B)

    Yutaka Matsubara

      More details

    The purpose of this study is to establish a threat analysis method, to construct a computer system to support it, and to prototype a security countermeasure method in order to achieve both safety and security of the highly reliable embedded system. As a system that supports the analysis of security threats, a keyword derived from a list of threats found in the past is compiled into a database, and the keywords can be semi-automatically applied to the design of the system to be analyzed. In order to incorporate countermeasures at the system design stage, existing countermeasure technology including fuzzing testing was included into the database.

 

Teaching Experience (On-campus) 2

  1. 情報リテラシー

    2019

  2. 情報リテラシー

    2019