Updated on 2025/04/23

写真a

 
MATSUBARA Yutaka
 
Organization
Graduate School of Informatics Department of Computing and Software Systems 2 Associate professor
Graduate School
Graduate School of Informatics
Undergraduate School
School of Informatics Department of Computer Science
Title
Associate professor
Contact information
メールアドレス

Degree 1

  1. Doctor (Information Science) ( 2011.3   Nagoya University ) 

Research Areas 1

  1. Informatics / Software

Professional Memberships 3

  1. Institute of Electrical and Electronics Engineers

  2. Information Processing Society of Japan

  3. 電子情報通信学会

Awards 4

  1. 優秀論文賞

    2023.7   マルチメディア、分散、協調とモバイルシンポジウム(DICOMO2022)   ブロックチェーンを活用した IoT機器のソフトウェア更新フレームワーク

    中西遼太, 松原豊, 高田広章

     More details

    Award type:Award from Japanese society, conference, symposium, etc. 

  2. 第19回ディペンダブルシステムワークショップ(DSW 2021) 最優秀論文発表賞

    2021.12   日本ソフトウェア科学会   MaaSの高信頼化を目的としたレジリエンスエンジニアリング手法

    周正書, 松原豊, 高田広章

     More details

    Award type:Award from Japanese society, conference, symposium, etc. 

  3. Specially Selected Paper

    2021.3  

     More details

    Award type:Honored in official journal of a scientific society, scientific journal 

  4. Best Software Paper Award

    2020.9   EV3RT: A Real-time Software Platform for LEGO Mindstorms EV3

    Yixiao Li,Yutaka Matsubara,Hiroaki Takada

     More details

    Award type:Honored in official journal of a scientific society, scientific journal 

 

Papers 40

  1. Transforming concurrent programs with semaphores into logically constrained term rewrite systems

    Kojima, M; Nishida, N; Matsubara, Y

    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING   Vol. 143   2025.2

     More details

    Publisher:Journal of Logical and Algebraic Methods in Programming  

    In this paper, as a first step of modeling concurrent programs by logically constrained term rewrite systems (LCTRSs, for short), we show transformations of concurrent programs with semaphore-based exclusive control into LCTRSs. To this end, we show how to encode configurations of concurrent programs with a fixed number of processes. Then, we show how to encode some well-known operations for semaphores by rewrite rules, showing two transformations of concurrent programs with semaphores into LCTRSs. We adopt list-using and list-free approaches to the encoding of waiting queues for semaphores in LCTRSs. While the former straightforwardly uses lists, the latter uses a so-called take-a-number system in order to avoid using any recursive data structures for waiting queues.

    DOI: 10.1016/j.jlamp.2024.101033

    Web of Science

    Scopus

  2. A Decision Support Scheme for Safe and Efficient Transportation of Hazardous Materials

    Zhou, ZS; Matsubara, Y; Takada, H

    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS   Vol. 26 ( 1 ) page: 309 - 322   2025.1

     More details

    Publisher:IEEE Transactions on Intelligent Transportation Systems  

    The demand for hazardous materials (HazMat) logistics is on the rise, and the importance of safety engineering of HazMat logistics is clear. Freight services based on intelligent transportation systems (ITS) offer a more secure, efficient, and environmentally-friendly method of HazMat logistics. At the same time, the voice of digital transformation (DX) in logistics continues to grow. However, there are currently some barriers to the digital transformation of the HazMat logistics industry, in which safety is always prioritized. One of the issues is how to promote the use of information technology in the logistics business process in a reasonable and orderly manner, given limited funds and technology, while also ensuring safety and improving the business process. Existing safety analysis methods, such as the Functional Resonance Analysis Method (FRAM) and its quantitative expansion, can be used to identify safety risks and make safety recommendations for business process improvement, but they cannot assist us with the rationale for DX decision making. To close the gap, we present in this article an optimization method of HazMat transportation safety engineering based on FRAM, which will assist HazMat logistics companies in making decisions regarding the implementation of ITS. We use the HazMat transportation of a Japanese logistics company as an example to verify and validate the proposed decision support scheme.

    DOI: 10.1109/TITS.2024.3490635

    Web of Science

    Scopus

  3. Consensus-Based Resilience Assurance for System of Systems Open Access

    Zhang, HJ; Matsubara, Y

    IEEE ACCESS   Vol. 13   page: 20203 - 20217   2025

     More details

    Publisher:IEEE Access  

    The complexity of a System of Systems makes resilience one of its key attributes. Numerous studies have focused on the quantitative assessment of resilience by trailing indicators, yet discussions on resilience assurance through monitoring leading indicators remain scarce. Resilience assurance in SoS faces two major challenges: lack of structured argumentation work related to resilience and conflicts among multiple independent stakeholders. To address these challenges, this paper first introduces a resilience argumentation approach based on STAMP (Systems-Theoretic Accident Model and Processes), then employs cooperative consensus process model to seek consensus on resilience assurance. Additionally, under the requirements of the international standard IEC 62853 for open systems dependability, a consensus based resilience assurance framework is proposed. Within the framework, the resilient team can discuss the specific implementation details of failure response, accountability, and change accommodation based on stakeholder consensus. Finally, two SoS case studies, Microgrid and Mobility as a Service, are used to demonstrate the application of the proposed approach.

    DOI: 10.1109/ACCESS.2025.3535519

    Open Access

    Web of Science

    Scopus

  4. Reaching Consensus on System-of-Systems Resilience Assurance: A Case of Mobility as a Service

    Zhang, HJ; Matsubara, Y; Takada, H

    COMPUTER SAFETY, RELIABILITY, AND SECURITY. SAFECOMP 2024 WORKSHOPS   Vol. 14989   page: 200 - 212   2024

     More details

    Publisher:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)  

    Understanding and ensuring the resilience of the System of Systems (SoS) is a critical concern in SoS construction. This paper presents a framework to assure SoS resilience from a multi-stakeholder perspective. It begins by using System Theoretic Process Analysis (STPA) to identify properties within the SoS control structure that is related to resilience, starting from stakeholders’ potential losses. Subsequently, a consensus process model based on cooperative game is employed to facilitate stakeholder consensus on the requirements of these properties. The analysis process and consensus outcomes are organized and visualized using Goal Structuring Notation (GSN). To illustrate the proposed approach, Mobility as a Service (MaaS) is employed as a case study in this paper.

    DOI: 10.1007/978-3-031-68738-9_15

    Web of Science

    Scopus

  5. Monitor and Analyze Rare ROS2 Performance Issues with A Unified Tracing Framework

    Li, YX; Matsubara, Y; Takada, H; Funahashi, S; Kawashima, H

    6TH WORLD SYMPOSIUM ON SOFTWARE ENGINEERING, WSSE 2024     page: 95 - 104   2024

     More details

    Publisher:ACM International Conference Proceeding Series  

    This paper proposes an open-source unified tracing framework to deal with rare performance issues for ROS2 applications. It is able to monitor the running system and capture a system-wide trace file for each detected issue to enable detailed analysis. The required resource usage is greatly reduced compared to existing tracing solutions, which allows our framework to be used in production environment. Because the design has high extensibility and interoperability, popular visualization and analysis can effortlessly collaborate with our framework. A real-time ROS2 demo application is used to evaluate the efficiency and functionality, and the results show that the proposed method can successfully obtain helpful trace files to solve performance issues with a small overhead.

    DOI: 10.1145/3698062.3698075

    Web of Science

    Scopus

  6. Race Directed Fuzzing for More Effective Concurrency Testing

    Ito, H; Matsubara, Y; Takada, H

    6TH WORLD SYMPOSIUM ON SOFTWARE ENGINEERING, WSSE 2024     page: 1 - 6   2024

     More details

    Publisher:ACM International Conference Proceeding Series  

    Concurrency bugs can be tricky to identify and resolve because they rely on subtle timing or ordering issues that are hard to replicate. Schfuzz is a technique that helps to conduct concurrency tests by fuzzing and can detect concurrency bugs more efficiently and effectively than traditional feedback-guided fuzzing. However, Schfuzz may only sometimes be an effective method since it monitors access to all shared memories, even when they are not involved in such issues. To improve Schfuzz’s effectiveness, we propose a new approach focusing on shared memories with data races. Our method first uses data race detectors to identify potential data races and then instructs Schfuzz to explore concurrency bugs in shared memory regions where data races occur. We have implemented a prototype of our proposed method and conducted experiments to measure its improvement over Schfuzz. As a result, the proposed method has detected the potential concurrency bugs significantly faster than vanilla Schfuzz in 7 of 11 targets with data races.

    DOI: 10.1145/3698062.3698063

    Web of Science

    Scopus

  7. Multilingual Investigation of Cross-Project Code Clones in Open-Source Software for Internet of Things Systems Open Access

    Zhu, WQ; Yoshida, N; Matsubara, Y; Takada, H

    IEEE ACCESS   Vol. 12   page: 179104 - 179118   2024

     More details

    Publisher:IEEE Access  

    The prevalence and impact of code clones in software systems have been widely studied in the past few decades. However, the focus has primarily been on intra-project clones. Our work comprehensively investigates cross-project code clones in open-source software for Internet of Things (IoT) systems across multiple programming languages. This work addresses the prevalence of cross-project code clones in IoT systems and their impact on software maintainability. We collected 122 IoT system repositories in nine languages from GitHub and grouped them according to their primary functionality in IoT systems. We used MSCCD, a multilingual code clone detector to detect Type-3 code clones for each group. The results show that cross-project clones exist in more than 30% of the projects, particularly in communication-related functionalities. We tracked the historical evolution of these clones and classified them according to the revision history and changing trend of similarity. The results show that 95% cross-project clones are untouched. Moreover, clones with decreasing similarities were over 72%. Therefore, the same clone detector may no longer detect these clones. We also investigated whether these cross-project code clones lead to defect propagation by analyzing the commit message to determine the commits that fixed a defect. We identified nine defect propagation instances, of which seven remain unfixed. Our work contributes to understanding cross-project code clones, highlighting the importance of automated clone management tools for improving the quality and security of IoT system software to mitigate the risks associated with unresolved defects and inconsistencies in IoT software development.

    DOI: 10.1109/ACCESS.2024.3506013

    Open Access

    Web of Science

    Scopus

  8. Automotive Control System as Distributed Real-time System

    Takada Hiroaki, Matsubara Yutaka

    SYSTEMS, CONTROL AND INFORMATION   Vol. 67 ( 12 ) page: 482 - 487   2023.12

     More details

    Language:Japanese   Publisher:THE INSTITUTE OF SYSTEMS, CONTROL AND INFORMATION ENGINEERS  

    DOI: 10.11509/isciesci.67.12_482

    CiNii Research

  9. Resilience analysis and design for mobility-as-a-service based on enterprise architecture modeling Open Access

    Zhou, ZS; Matsubara, Y; Takada, H

    RELIABILITY ENGINEERING & SYSTEM SAFETY   Vol. 229   2023.1

     More details

    Language:Japanese   Publisher:Reliability Engineering and System Safety  

    The development of a service that integrates multiple systems, platforms, and businesses, such as Mobility as a Service (MaaS), has attracted the attention of engineers and scholars. However, because of the complexity of the interactions of its subsystems, it is difficult to ensure the reliability of an integrated service, and the analysis approach of the individual subsystems that influence each other is insufficient. Even though many studies on functional safety for road vehicles have been conducted, there are currently no theoretical or experimental reports on MaaS reliability issues at the service level. To fill the void, we propose in this paper a resilience analysis method to facilitate the development of reliable mobility services. As a result, we proposed a novel MaaS resilience analysis and design method. We contend that a connection with enterprise architecture modeling helps to address resilience concerns for MaaS reliability. The claim is based on the close connection between resilience and reliability. Furthermore, we conduct a controlled experiment to demonstrate the efficacy of the proposed method and compare it quantitatively to a referenced method.

    DOI: 10.1016/j.ress.2022.108812

    Web of Science

    Scopus

  10. Schfuzz: Detecting Concurrency Bugs with Feedback-Guided Fuzzing Open Access

    Ito, H; Matsubara, Y; Takada, H

    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, ENASE 2023   Vol. 2023-April   page: 273 - 282   2023

     More details

    Publisher:International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE - Proceedings  

    It is challenging to detect concurrency bugs with fuzzing. There are two main reasons for this. First, manifesting them by exploring input space is inefficient because they only occur under specific interleavings. Second, re-giving an input detected a bug in a fuzzing campaign does not necessarily reproduce the bug because typical runtimes do not schedule threads deterministically. This research proposes Schfuzz, a novel approach for detecting concurrency bugs with feedback-guided fuzzing. This approach executes programs under test deterministically based on test cases generated by fuzzers. In addition, it feeds back dynamic memory-access orders to aid fuzzers in detecting concurrency bugs more efficiently and effectively. We evaluate Schfuzz with a hand-made motivating example and four benchmark programs from SCTBench (Thomson et al., 2016). The result shows that it can detect concurrency bugs more efficiently and effectively than traditional feedback-guided fuzzing.

    DOI: 10.5220/0011722100003464

    Open Access

    Web of Science

    Scopus

  11. Developing Reliable Digital Healthcare Service Using Semi-Quantitative Functional Resonance Analysis Open Access

    Zhou, ZS; Matsubara, Y; Takada, H

    COMPUTER SYSTEMS SCIENCE AND ENGINEERING   Vol. 45 ( 1 ) page: 35 - 50   2023

     More details

    Language:Japanese   Publisher:Computer Systems Science and Engineering  

    Since entering the era of Industry 4.0, the concept of Healthcare 4.0 has also been put forward and explored by researchers. How to use Information Technology (IT) to better serve people’s healthcare is one of the most featured emerging directions in the academic circle. An important field of Healthcare 4.0 research is the reliability engineering of healthcare service. Because healthcare systems often affect the health and even life of their users, developers must be very cautious in the design, development, and operation of these healthcare systems and services. The problems to be solved include the reliability of business process, system functions, and personal healthcare data. The Functional Resonance Analysis Method (FRAM) has been applied in reliability engineering for safety-critical systems in available studies, using both qualitative and quantitative approaches. However, the method has not been applied in the field of digital healthcare services development. Therefore, to narrow the gap, we present in this paper a semi-quantitative functional resonance analysis method to develop reliable healthcare services for diabetics. Moreover, this paper has tried to improve the reliability design of the service-oriented architecture (SOA) of traditional insulin pump therapy by system thinking.

    DOI: 10.32604/csse.2023.030848

    Open Access

    Web of Science

    Scopus

  12. A Quantitative Approach for System of Systems' Resilience Analyzing Based on ArchiMate

    Zhang, HJ; Matsubara, Y; Takada, H

    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2023 WORKSHOPS   Vol. 14182   page: 47 - 60   2023

     More details

    Publisher:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)  

    With the development of IT technology and the increasing demand for service integration, the widespread application of System of Systems (SoS) is inevitable in the era to come. Among numerous key issues related to SoS, analyzing the resilience of SoS is a challenging problem. Although many studies and discussions for system engineering have provided solutions for this problem, two significant characteristics of SoS, which are the independence of Constituent systems (CSs) and the involvement of multiple stakeholders, are ignored. Based on these two characteristics, this paper proposed a quantitative method for analyzing the resilience of SoS. The method includes visual modeling of the SoS using the EA tool ArchiMate, quantitatively simulating the model based on defining the value of service capacities of the CSs and evaluating and designing resilience from multiple stakeholders’ perspectives. Finally, a case study based on Mobility as a Service (MaaS) is presented. By analyzing resilience of MaaS, the critical node is identified, and by resilience redesign, the resilience of the SoS is improved after enhancement.

    DOI: 10.1007/978-3-031-40953-0_5

    Web of Science

    Scopus

  13. Design and Implementation of RTOS-Aware Control-Flow Integrity Mechanism for Microcontroller-Based Systems

    KAWADA Tomoaki, HONDA Shinya, MATSUBARA Yutaka, TAKADA Hiroaki

    Computer Software   Vol. 39 ( 2 ) page: 2_39 - 2_68   2022.4

     More details

    Language:Japanese   Publisher:Japan Society for Software Science and Technology  

    <p>CFI (Control-Flow Integrity) is a class of defensive techniques against control-flow attacks such as Return-Oriented Programming. We propose a lightweight CFI scheme for RTOS-based applications, <I>TZmCFI</I>, which utilizes TrustZone for Armv8-M, a hardware-assisted security feature for embedded systems with tight resource constraints. TZmCFI embodies several existing CFI techniques to provide a self-contained toolset for building an instrumented application. The toolset is comprised of a modified LLVM-based compiler and a runtime library called <I>Monitor</I>. The modified LLVM code generator implements the traditional shadow stack technique by inserting calls to Monitor. To protect exception handlers, Monitor replaces an application's exception vector table and wrap interrupt handlers with <I>exception trampolines</I>, which implement variations of the <I>shadow exception stack</I> technique we proposed in our previous work. The performance evaluation on NXP Semiconductors LPC55S69 indicated a <I>-</I>7–35% increase in the execution times of FreeRTOS+MPU system calls and a 9.36% runtime overhead on CoreMark.</p>

    DOI: 10.11309/jssst.39.2_39

    Scopus

    CiNii Research

  14. Quantitative Security Assurance Case for In-vehicle Embedded Systems

    Zhou, ZS; Matsubara, Y; Takada, H

    2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021     page: 43 - 50   2021

     More details

    Language:Japanese   Publisher:Proceedings - 2021 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing and International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2021  

    Technological advances are transforming the automotive industry by increasing the number of computer-controlled auto components that provide information to remote systems through various means of communication. The changes have created new opportunities for cyber-attacks. To enable the engineering of in-vehicle embedded systems within road vehicles to keep up with changing technology and attack methods, in this year, ISO and SAE will jointly release the international standard ISO/SAE 21434. However, to date there are few studies about how to apply the standard to academia and industry. To fill this gap, the paper proposes an approach to develop assurance cases for cybersecurity argument of road vehicle in compliance with ISO/SAE 21434. We analyze the standard, and then propose a model-based approach to automotive cybersecurity assurance. After that, case studies are carried out to verify the effectiveness of the proposed method. Finally, the paper is concluded by discussing the limitations and future directions of the study.

    DOI: 10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00022

    Web of Science

    Scopus

  15. A Performance Evaluation of Embedded Multi-core Mixed-criticality System Based on PREEMPT_RT Linux Open Access

    Li Yixiao, Matsubara Yutaka, Takada Hiroaki, Suzuki Kenji, Murata Hideaki

    Journal of Information Processing   Vol. 31 ( 0 ) page: 78 - 87   2023

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Information Processing Society of Japan  

    <p>The use of Linux in the domain of embedded systems is growing very fast. Due to the complexity of hardware and software on Linux-based platforms, it is challenging to meet the performance requirements, especially for the mixed-criticality system with both real-time and best-effort tasks. We propose a reference design of Linux-based mixed-criticality system using PREEMPT_RT patch to improve real-time performance and QEMU/KVM virtual machine to reduce interferences. An evaluation environment of the proposed design is built with recent software and hardware to investigate the performance characteristics via experimental measurements. We measure and analyze the baseline kernel latency, the system throughput and the real-time performance under multiple conditions. In detailed analysis, we reveal novel insights on the real-time capabilities and limitations of Linux-based embedded systems. The results show that our design can meet the 100<i>µ</i>s deadline goal of 1kHz real-time task with high probability under various extreme interferences, and can deliver high throughput for best-effort workload.</p>

    DOI: 10.2197/ipsjjip.31.78

    Open Access

    Scopus

    CiNii Research

  16. 柔軟なCPUリソースアカウントのためのcgroupの拡張手法

    松下瑛佑,松原豊,高田広章

    第59回EMB合同研究発表会(ETNET2022)     2022.3

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

  17. BFQスケジューラにおけるストレージ I/O帯域保証による応答性向上

    長谷川博紀,松原豊,加藤寿和,山本整,水口武尚,高田広章

    第59回EMB合同研究発表会(ETNET2022)     2022.3

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

  18. MaaSの高信頼化を目的としたレジリエンスエンジニアリング手法

    周 正書,松原 豊,高田 広章

    第19回ディペンダブルシステムワークショップ (DSW 2021)     2021.12

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

  19. コンテナ型仮想化における低レベルランタイムの性能評価

    西村惇,李奕驍,松下瑛佑 ,松原豊,高田広章

    第58回組込みシステム研究発表会     2021.11

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

  20. Quantitative Security Assurance Case for In-vehicle Embedded Systems Reviewed

    Zhengshu Zhou, Yutaka Matsubara and Hiroaki Takada

    IEEE CyberSciTech/PICom/DASC/CDBCom 2021     2021.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  21. TZmCFI: RTOS-Aware Control-Flow Integrity Using TrustZone for Armv8-M Reviewed Open Access

    Tomoaki Kawada, Shinya Honda, Yutaka Matsubara, Hiroaki Takada

    International Journal of Parallel Programming   Vol. 49 ( 2 ) page: 216 - 236   2021.4

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:Springer Science and Business Media LLC  

    <title>Abstract</title>Control-Flow Integrity (CFI) is a class of defensive techniques against control-flow attacks such as Return-Oriented Programming. We propose a light-weight CFI scheme for RTOS-based applications, TZmCFI, which utilizes TrustZone for Armv8-M, a hardware-assisted security feature for embedded systems with tight resource constraints. TZmCFI embodies several existing CFI techniques to provide a comprehensive protection. The traditional shadow stack technique is used to ensure stack integrity and validate function returns. To protect exception handlers, TZmCFI extends <italic>shadow exception stacks</italic>, which are a variant of the traditional shadow stack technique we proposed in our previous work, for RTOS integration and performance improvement. We conducted an experiment on Arm Versatile Express Cortex-M Prototyping System (V2M-MPS2+) to evaluate the run-time overhead of the proposed system.

    DOI: 10.1007/s10766-020-00673-z

    Open Access

    Web of Science

    Scopus

    Other Link: http://link.springer.com/article/10.1007/s10766-020-00673-z/fulltext.html

  22. アプリケーションからのストレージアクセス分析手法

    長谷川博紀, 松原豊, 加藤寿和, 山本整, 高田広章

    第56回EMB合同研究発表会(ETNET2021)     2021.3

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

  23. ハイパーバイザにおけるハードウェアの共有分析手法

    鈴木 健太, 松原 豊, 守谷 友和, 本谷 謙治, 岩切 英之, 高田 広章

    第56回組込みシステム合同研究発表会(ETNET2021)     2021.3

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

  24. ミドルウェアに対するCoverage-based Greybox Fuzzingの適用 Reviewed

    伊藤 弘将, 松原 豊, 高田 広章

    情報処理学会論文誌   Vol. 62 ( 3 ) page: 877 - 890   2021.3

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

  25. Agile Software Design Verification and Validation (V&V) for Automated Driving Reviewed

    Yixiao Li, Yutaka Matsubara, Daniel Olbrys, Kazuhiro Kajio, Hiroaki Takada

    Proceedings of FISITA 2020     2020.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  26. Safety design concepts for statistical machine learning components toward accordance with functional safety standards

    Akihisa Morikawa, Yutaka Matsubara

    CoRR   Vol. abs/2008.01263   2020.8

     More details

    Authorship:Last author   Language:English   Publishing type:Research paper (other academic)  

    In recent years, curial incidents and accidents have been reported due to
    un-intended control caused by misjudgment of statistical machine learning
    (SML), which include deep learning. The international functional safety
    standards for Electric/Electronic/Programmable (E/E/P) systems have been widely
    spread to improve safety. However, most of them do not recom-mended to use SML
    in safety critical systems so far. In practical the new concepts and methods
    are urgently required to enable SML to be safely used in safety critical
    systems. In this paper, we organize five kinds of technical safety concepts
    (TSCs) for SML components toward accordance with functional safety standards.
    We discuss not only quantitative evaluation criteria, but also development
    process based on XAI (eXplainable Artificial Intelligence) and Automotive SPICE
    to improve explainability and reliability in development phase. Fi-nally, we
    briefly compare the TSCs in cost and difficulty, and expect to en-courage
    further discussion in many communities and domain.

    arXiv

    Other Link: http://arxiv.org/pdf/2008.01263v1

  27. Transforming Concurrent Programs with Semaphores into Logically Constrained Term Rewrite Systems Reviewed

    Misaki Kojima, Naoki Nishida, Yutaka Matsubara

    Informal Proceedings of WPTE 2020     page: 12   2020.6

     More details

    Authorship:Last author   Language:English   Publishing type:Research paper (international conference proceedings)  

  28. Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS -- a collection of Technical Notes Part 1 International coauthorship

    Robin Bloomfield, Gareth Fletcher, Heidy Khlaaf, Philippa Ryan, Shuji Kinoshita, Yoshiki Kinoshit, Makoto Takeyama, Yutaka Matsubara, Peter Popov, Kazuki Imai, Yoshinori Tsutake

    CoRR   Vol. abs/2003.00789   2020.2

     More details

    Language:English   Publishing type:Research paper (other academic)  

    This report provides an introduction and overview of the Technical Topic
    Notes (TTNs) produced in the Towards Identifying and closing Gaps in Assurance
    of autonomous Road vehicleS (Tigars) project. These notes aim to support the
    development and evaluation of autonomous vehicles. Part 1 addresses:
    Assurance-overview and issues, Resilience and Safety Requirements, Open Systems
    Perspective and Formal Verification and Static Analysis of ML Systems. Part 2:
    Simulation and Dynamic Testing, Defence in Depth and Diversity,
    Security-Informed Safety Analysis, Standards and Guidelines.

    arXiv

    Other Link: http://arxiv.org/pdf/2003.00789v1

  29. Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS -- a collection of Technical Notes Part 2 International coauthorship

    Robin Bloomfield, Gareth Fletcher, Heidy Khlaaf, Philippa Ryan, Shuji Kinoshita, Yoshiki Kinoshit, Makoto Takeyama, Yutaka Matsubara, Peter Popov, Kazuki Imai, Yoshinori Tsutake

    CoRR   Vol. abs/2003.00790   2020.2

     More details

    Language:English   Publishing type:Research paper (other academic)  

    This report provides an introduction and overview of the Technical Topic
    Notes (TTNs) produced in the Towards Identifying and closing Gaps in Assurance
    of autonomous Road vehicleS (Tigars) project. These notes aim to support the
    development and evaluation of autonomous vehicles. Part 1 addresses:
    Assurance-overview and issues, Resilience and Safety Requirements, Open Systems
    Perspective and Formal Verification and Static Analysis of ML Systems. This
    report is Part 2 and discusses: Simulation and Dynamic Testing, Defence in
    Depth and Diversity, Security-Informed Safety Analysis, Standards and
    Guidelines.

    arXiv

    Other Link: http://arxiv.org/pdf/2003.00790v1

  30. esprof: A Generic Profiling Infrastructure for Multi/Many-Core Embedded Systems Reviewed

    LI Yixiao, MATSUBARA Yutaka, TAKADA Hiroaki

    Computer Software   Vol. 37 ( 1 ) page: 1_54 - 1_67   2020.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:Japan Society for Software Science and Technology  

    <p>Embedded systems are moving to multi-core and many-core platforms to satisfy the ever-growing demand for computing power. Complex task like autonomous driving will include both real-time applications and high-performance applications. Research has shown that traditional RTOS can be optimized to provide good scalability for parallel computing. The lack of performance analysis tools, however, is one of the major obstacles for identifying bottlenecks.<br/>In this paper, we first discuss the characteristics and challenges of existing tools used in high-performance computing. To meet the requirements of embedded systems, a generic infrastructure for creating customized profilers flexibly and effortlessly is then presented. As an example, a scalable and optimized call graph profiler has been developed. At last, we evaluate our profiler and existing profiler by measuring benchmark application on a 36-core platform. The results show that our profiler can provide much higher accuracy with very low overhead.</p>

    DOI: 10.11309/jssst.37.1_54

    Scopus

    CiNii Research

  31. Energy-Aware Task Allocation for Heterogeneous Multiprocessor Systems by Using Integer Linear Programming Reviewed

    Yang Qin, Gang Zeng, Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada,

    Journal of Information Processing   Vol. 60 ( 2 ) page: 136-148   2019.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: https://doi.org/10.2197/ipsjjip.27.136

  32. IDH-CAN: A Hardware-Based ID Hopping CAN Mechanism With Enhanced Security for Automotive Real-Time Applications Reviewed

    Wufei Wu, Ryo Kurachi, Gang Zeng, Yutaka Matsubara, Hiroaki Takada, Renfa Li, Keqin Li

      Vol. 6 ( 1 ) page: 54607-54623   2018.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/ACCESS.2018.2870695

  33. Execution-variance-aware task allocation for energy minimization on the big.LITTLE architecture Reviewed

    Yang Qin, Gang Zeng, Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada

    ELSEVIER Sustainable Computing: Informatics and Systems     2018.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: https://doi.org/doi:10.1016/j.suscom.2018.10.001

  34. IoT機器への適用に向けたTLS1.3の性能評価

    小松大河, 松原豊, 高田広章

    コンピュータセキュリティシンポジウム2018論文集   Vol. 2018 ( 2 ) page: 569 - 576   2018.10

     More details

    Language:Japanese  

  35. Energy-Aware Task Allocation for Large Task Sets on Heterogeneous Multiprocessor Systems Reviewed

    Yang Qin, Gang Zeng, Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada

    Proceedings of 16th International Conference on Embedded and Ubiquitous Computing (EUC)     page: 158-165   2018.10

     More details

    Language:English  

  36. ブロックチェーン技術を用いたIoT機器向けセキュアアップデートフレームワーク Reviewed

    長柄啓悟, 松原豊, 高田広章

    組込みシステムシンポジウム2018論文集   Vol. 2018   page: 36-39   2018.8

     More details

    Language:Japanese  

  37. Arm TrustZone for Armv8-M を利用したマルチタスク対応 CFI の検討 Reviewed

    河田智明, 本田晋也, 松原豊, 高田 広章

    組込みシステムシンポジウム2018論文集   Vol. 2018   page: 71 - 74   2018.8

     More details

    Language:Japanese  

  38. ROS2と軽量DDSの組込みシステムに対する適用性評価

    小澤慶祐, 本田晋也, 松原豊, 高田広章, 加藤 寿和, 山本 整

    研究報告組込みシステム(EMB)   Vol. 2018-EMB-48 ( 2 ) page: 1-8   2018.6

     More details

    Language:Japanese  

  39. FRAM/STPA: Hazard Analysis Method for FRAM Model Reviewed

    Yoshinari Toda, Yutaka Matsubara, Hiroaki Takada

    Proceedings of FRAMily 2018     page: 1-7   2018.5

     More details

    Language:English  

  40. つながる社会とクルマのセーフティ&セキュリティの動向と展望

    松原豊, 倉地亮, 高田広章

    自動車技術   Vol. 72 ( 5 ) page: 87-93   2018.5

     More details

    Authorship:Lead author   Language:Japanese  

▼display all

MISC 2

  1. MBSEツールを用いたAUTOSARプラットフォームのビジュアルモデリングと設計手法

    高田光隆, 松原豊

    情報処理学会研究報告(Web)   Vol. 2022 ( ARC-248 )   2022

     More details

  2. Cybersecurity in a New Era of Mobility - Toward Enhancement of Japan Brand -:2. CASE Evolution and Cybersecurity in Automotive Domain

      Vol. 61 ( 4 ) page: 338 - 343   2020.3

     More details

    Language:Japanese  

    CiNii Books

    Other Link: http://id.nii.ac.jp/1001/00203921/

Presentations 19

  1. 組込みシステム開発におけるリスクマネジメントの現状と今後の方向性 Invited

    松原豊

    Jasa 中部セミナー  2021.12  JASA

     More details

    Event date: 2021.12

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

  2. IEC 62853の4観点を活用した,車載ソフトウェア開発における現場課題の分析 Invited

    松原豊

    ET&IoT展2021 スペシャルセッション  2021.11  一般社団法人 組込みシステム技術協会

     More details

    Event date: 2021.11

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

  3. Society 5.0におけるセーフティ&セキュリティの課題とDXによる解決支援 Invited

    松原豊

    DXイノベーションチャレンジ2021  2021.8  DXイノベーションチャレンジ 実行委員会

     More details

    Event date: 2021.8

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

  4. 組込み/IoTセキュリティ Invited

    松原豊

    NANO OPT Media Online  2021.7 

     More details

    Event date: 2021.7

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

  5. 未知なるリスクに適応する社会的ガバナンスの構築に向けて 〜自動車分野を例に〜 Invited

    松原豊

    JSAE オンラインフォーラム  2021.7  JSAE

     More details

    Event date: 2021.7

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

  6. Society 5.0の安全,信頼性確保に向けた課題と解決アプローチ Invited

    松原豊

    第7回DEOS協会オープンシンポジウム  2021.6  DEOS協会

     More details

    Event date: 2021.6

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

  7. 組込み機器のセキュリティ入門 Invited

    松原豊

    組込み機器のセキュリティ入門講座  2021.2.15  しまね産業振興財団/島根県産業技術センター

     More details

    Event date: 2021.2

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:オンライン  

  8. 自動車を取り巻く セーフティとセキュリティの現状と課題 Invited

    松原豊

    電子情報通信学会情報ネットワーク(IN)研究会  2021.1.18  電子情報通信学会情報ネットワーク研究会

     More details

    Event date: 2021.1

    Language:Japanese   Presentation type:Oral presentation (invited, special)  

    Venue:オンライン  

  9. 車載システムの安全規格動向と電子デバイスへの期待 Invited

    松原豊

    第7回電子デバイスフォーラム京都  2020.10.30  日本電子デバイス産業協会

     More details

    Event date: 2020.10

    Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:京都  

  10. 組込みソフトウェアプラットフォームを理解する Invited

    松原豊

    セキュリティ・ネクストキャンプ2020  2020.10.25  情報処理推進機構

     More details

    Event date: 2020.10 - 2020.12

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:オンライン  

  11. 自動運転システムの総合信頼性と社会アーキテクチャ構築に向けて Invited

    松原豊

    JSAE オンラインフォーラム  2020.7.30  自動車技術会

     More details

    Event date: 2020.7

    Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:オンライン  

  12. 開発が進むAUTOSAR Adaptive Platformの現状と課題 Invited

    松原豊

    2019年度第3回スキルアップセミナー 

     More details

    Event date: 2019.12

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:名古屋   Country:Japan  

  13. 車載制御システムの変遷とディペンダビリティ Invited

    松原豊

    第17回ディペンダブルシステムワークショップ 

     More details

    Event date: 2019.12

    Language:Japanese   Presentation type:Oral presentation (invited, special)  

    Venue:東京   Country:Japan  

  14. 自動運転を安心して運営・利用するには? 〜 IEC 62853を活用したアプローチ 〜 Invited

    松原豊

    Embedded Technology&IoT Technology 2019 

     More details

    Event date: 2019.11

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:横浜   Country:Japan  

  15. SEAMS & TIGARS プロジェクトの紹介 Invited

    松原豊

    MaaS DIY Day 

     More details

    Event date: 2019.11

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:札幌   Country:Japan  

  16. IEC 62853を活用したMaaSのディペンダビリティ解析 Invited

    松原豊

    ソフトウェア品質シンポジウム2019 

     More details

    Event date: 2019.9

    Language:Japanese   Presentation type:Oral presentation (invited, special)  

    Venue:東京   Country:Japan  

  17. 組込みリアルタイムOSとIoTシステム演習 Invited

    松原豊

    セキュリティキャンプ全国大会2019 

     More details

    Event date: 2019.8

    Language:Japanese   Presentation type:Public lecture, seminar, tutorial, course, or other speech  

    Venue:東京   Country:Japan  

  18. 自動運転サービスの継続的な安全性論証と標準化動向 Invited

    松原豊

    Embedded System Technology and Innovation Conference 2019 

     More details

    Event date: 2019.7

    Language:Japanese   Presentation type:Oral presentation (invited, special)  

    Venue:東京   Country:Japan  

  19. 自動運転の安全性論証における IEC 62853の活用 Invited

    松原豊

    第6回DEOS協会オープンシンポジウム 

     More details

    Event date: 2019.6

    Language:Japanese   Presentation type:Oral presentation (invited, special)  

    Venue:東京   Country:Japan  

▼display all

KAKENHI (Grants-in-Aid for Scientific Research) 3

  1. Development of Program Verification Techniques Based on Coinduction on Logically Constrained Rewriting

    Grant number:24K02900  2024.4 - 2029.3

    Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (B)

      More details

    Authorship:Coinvestigator(s) 

  2. Society5.0を支えるシステムオブシステムズの総合信頼性論証フレームワーク

    Grant number:22K04618  2022.4 - 2026.3

    日本学術振興会  科学研究費助成事業  基盤研究(C)

    松原 豊

      More details

    Authorship:Principal investigator 

    Grant amount:\4160000 ( Direct Cost: \3200000 、 Indirect Cost:\960000 )

    本研究では,Society5.0社会に向けて普及が期待されるシステムオブシステムズを対象にその安全性,信頼性,セキュリティなどを包含する総合信頼性(ディペンダビリティ)の維持,向上を支援する論証フレームワークを構築する。この論証フレームワークを共通基盤として,専門知識が乏しい,ないしは専門分野の異なるステークホルダが一緒に総合信頼性について議論する場を提供する。
    複数の独立したシステムが連携しながらサービスを提供するシステムオブシステムについて,その総合信頼性を論証するためのフレームワークを構築することを目標に掲げている。研究2年目として予定していた研究を進め,研究成果を3本の研究論文にまとめることができた(1本目は国際会議に採録されて国際論文誌に投稿準備中である。2本目は国際会議に投稿済みである。3本目は国内研究会で発表済みである)。具体的な研究内容としては,論文の執筆を通じて,ArchiMateの課題と改善点について議論を進め,課題A3 評価結果に基づき,ArchiMateの課題と改善方法を明らかにする,という課題を実施した。さらに,2つの問い(問いB 特定のシステムに依存せず,抽象的な総合信頼性要件を,具体的なサービスに適用する際,どのように具体化できるのか?と,問いC SoSによるサービスの総合信頼性要件の判定結果を,多様なステークホルダが理解して合意を形成し,説明責任を果たすための論証をどのように生成できるか?)に対する3つの研究課題(課題B2 各要件の具体化項目を明確にし,GSNのコンテキストで表現する。このGSNを,総合信頼性要件のテンプレートとして構築する。課題C1 具体化した総合信頼性要件をもとに,対象SoSのサービスの総合信頼性を評価する。評価結果をGSNで表現し,要件,要件分割戦略,要件を満たす根拠を可視化する)を実施することができた。予定を前倒しして,課題C2 GSNをベースに,SoSによるサービスのライフサイクル(特に,開発段階と運用段階)で,総合信頼性分析を試行し,GSNを使った論証手法の妥当性を評価するという課題にも一部であるが取り組むことができた。
    研究計画の2年目として予定していた研究を進めることができた。具体的な研究内容としては,論文の執筆を通じて,ArchiMateの課題と改善点について議論を進め,課題A3 評価結果に基づき,ArchiMateの課題と改善方法を明らかにする,という課題を実施した。さらに,2つの問い(問いB 特定のシステムに依存せず,抽象的な総合信頼性要件を,具体的なサービスに適用する際,どのように具体化できるのか?と,問いC SoSによるサービスの総合信頼性要件の判定結果を,多様なステークホルダが理解して合意を形成し,説明責任を果たすための論証をどのように生成できるか?)に対する3つの研究課題(課題B2 各要件の具体化項目を明確にし,GSNのコンテキストで表現する。このGSNを,総合信頼性要件のテンプレートとして構築する。課題C1 具体化した総合信頼性要件をもとに,対象SoSのサービスの総合信頼性を評価する。評価結果をGSNで表現し,要件,要件分割戦略,要件を満たす根拠を可視化する)を実施することができた。予定を前倒しして,課題C2 GSNをベースに,SoSによるサービスのライフサイクル(特に,開発段階と運用段階)で,総合信頼性分析を試行し,GSNを使った論証手法の妥当性を評価するという課題にも一部であるが取り組むことができた。これらの研究成果は,3本の研究論文にまとめることができた(1本目は国際会議に採録されて国際論文誌に投稿準備中である。2本目は国際会議に投稿済みである。3本目は国内研究会で発表済みである)。
    引き続き,研究計画に従って研究を進めていく。研究課題B:総合信頼性要件の具体化手法の確立と適用について,課題B3(課題B3 複数のSoSに総合信頼性要件テンプレートを適用し,総合信頼性要件を導出する。)と,研究課題C:総合信頼性分析の試行と論証手法の確立課題について,課題C1 具体化した総合信頼性要件をもとに,対象SoSのサービスの総合信頼性を評価する。評価結果をGSNで表現し,要件,要件分割戦略,要件を満たす根拠を可視化すると,課題C2 GSNをベースに,SoSによるサービスのライフサイクル(特に,開発段階と運用段階)で,総合信頼性分析を試行し,GSNを使った論証手法の妥当性を評価する,という課題を実施する。研究協力者として当初2名の大学院生を予定していたが,現時点でも1名のみとなってしまっている。引き続き,次年度から1名の追加を試みる。

  3. Security threat analysis system for highly reliable embedded / IoT systems

    Grant number:16K21097  2016.4 - 2020.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Young Scientists (B)

    Yutaka Matsubara

      More details

    The purpose of this study is to establish a threat analysis method, to construct a computer system to support it, and to prototype a security countermeasure method in order to achieve both safety and security of the highly reliable embedded system. As a system that supports the analysis of security threats, a keyword derived from a list of threats found in the past is compiled into a database, and the keywords can be semi-automatically applied to the design of the system to be analyzed. In order to incorporate countermeasures at the system design stage, existing countermeasure technology including fuzzing testing was included into the database.

 

Teaching Experience (On-campus) 2

  1. 情報リテラシー

    2019

  2. 情報リテラシー

    2019