Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kengo Iijima is active.

Publication


Featured researches published by Kengo Iijima.


european workshop on system security | 2011

Memory deduplication as a threat to the guest OS

Kuniyasu Suzaki; Kengo Iijima; Toshiki Yagi; Cyrille Artho

Memory deduplication shares same-content memory pages and reduces the consumption of physical memory. It is effective on environments that run many virtual machines with the same operating system. Memory deduplication, however, is vulnerable to memory disclosure attacks, which reveal the existence of an application or file on another virtual machine. Such an attack takes advantage of a difference in write access times on deduplicated memory pages that are re-created by Copy-On-Write. In our experience on KSM (kernel samepage merging) with the KVM virtual machine, the attack could detect the existence of sshd and apache2 on Linux, and IE6 and Firefox on WindowsXP. It also could detect a downloaded file on the Firefox browser. We describe the attack mechanism in this paper, and also mention countermeasures against this attack.


international congress on mathematical software | 2006

KNOPPIX/Math: portable and distributable collection of mathematical software and free documents

Tatsuyoshi Hamada; Kuniyasu Suzaki; Kengo Iijima; Arimitsu Shikoda

We propose a new computer environment for mathematicians that can be set up easily and quickly.


Archive | 2012

Impact on Chunk Size on Deduplication and Disk Prefetch

Kuniyasu Suzaki; Toshiki Yagi; Kengo Iijima; Cyrille Artho; Yoshihito Watanabe

CAS (Content Addressable Storage) systems reduce total volume of vir- tual disk with deduplication technique. The effects of deduplication has been eva- luated and confirmed in some papers. Most evaluations, however, were achieved by small chunk size (4KB-8KB) and did not care about I/O optimization (disk pre- fetch) on a real usage. Effective disk prefetch is larger than the chunk size and causes many CAS operations. Furthermore, previous evaluations did not care about ratio of effective data in a chunk. The ratio is improved by block realloca- tion of file system, which considers access profile. Chunk size should be decided by considering these effects on a real usage. This paper evaluates effectiveness of deduplication on a large chunk of CAS system which considers the optimization for disk prefetch and effective data in a chunk. The optimization was achieved for boot procedure, because it was a mandatory operation on any operating systems. The results showed large chunk (256KB) was effective on booting Linux and could maintain the effect of deduplication.


network computing and applications | 2005

SFS-KNOPPIX

Kuniyasu Suzak; Kengo Iijima; Toshiki Yagi; Hideyuki Tan; Kazuhiro Goto

KNOPPIX is a bootable CD with a collection of GNU/Linux software. KNOPPIX is very convenient but it requires downloading 700 MB iso image and burning a CD-ROM when it is renewed. In order to solve this problem we made SFS-KNOPPIX which boots from Internet with SFS (self-certifying file system), SFS-KNOPPIX requires 20 MB boot-loader with Linux-kernel and miniroot. Root file system is obtained from Internet with SFS at boot time. It enables to change root file system and makes easy to try new version of KNOPPIX. In this paper we describe the detail of SFS-KNOPPIX and its performance


symposium on operating systems principles | 2011

Software Side Channel Attack on Memory Deduplication

Kuniyasu Suzaki; Kengo Iijima; Toshiki Yagi; Cyrille Artho


usenix conference on hot topics in security | 2010

Moving from logical sharing of guest OS to physical sharing of deduplication on virtual machine

Kuniyasu Suzaki; Toshiki Yagi; Kengo Iijima; Nguyen Anh Quynh; Cyrille Artho; Yoshihito Watanebe


usenix large installation systems administration conference | 2007

OS circular: internet client for reference

Kuniyasu Suzaki; Toshiki Yagi; Kengo Iijima; Nguyen Anh Quynh


IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | 2013

Implementation of a Memory Disclosure Attack on Memory Deduplication of Virtual Machines

Kuniyasu Suzaki; Kengo Iijima; Toshiki Yagi; Cyrille Artho


european workshop on system security | 2012

Effects of Memory Randomization, Sanitization and Page Cache on Memory Deduplication

Kuniyasu Suzaki; Kengo Iijima; Toshiki Yagi; Cyrille Artho


2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference | 2008

Trusted Boot and Platform Trust Services on 1CD Linux

Kuniyasu Suzaki; Kengo Iijima; Toshiki Yagi; Nguyen Anh Quynh

Collaboration


Dive into the Kengo Iijima's collaboration.

Top Co-Authors

Avatar

Kuniyasu Suzaki

National Institute of Advanced Industrial Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Toshiki Yagi

National Institute of Advanced Industrial Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Cyrille Artho

National Institute of Advanced Industrial Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Nguyen Anh Quynh

National Institute of Advanced Industrial Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Kazuhiro Goto

Industrial Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge