Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Masahiro Kinugawa is active.

Publication


Featured researches published by Masahiro Kinugawa.


society of instrument and control engineers of japan | 2008

Integration of sensor networks with information systems using the messaging network architecture

Hideyuki Fukuhara; Kensaku Kawauchi; Isamu Koseda; Ryutaroh Fujita; Yuichi Takahashi; Masahiro Kinugawa; Toshiaki Miyazaki; Senro Saito; Atsushi Kara; Takafumi Hayashi

This paper describes an approach to integrate sensor networks with information systems using the so-called messaging network architecture. A messaging network is an overlay network with a rich set of message handling capabilities. The use of messaging network reduces the complexity and the maintenance burden of the integrated sensor information systems. Message mediation enables not only interoperation of various applications but also integration of a diversity of data set to produce useful information. The proposed approach naturally leads to an SOA-based sensor network design. The decomposition of a system into services has many advantages in developing secure scalable multi-tenant information systems. The requirements on a messaging network for sensor network systems are presented.


computer and communications security | 2017

POSTER: Is Active Electromagnetic Side-channel Attack Practical?

Satohiro Wakabayashi; Seita Maruyama; Tatsuya Mori; Shigeki Goto; Masahiro Kinugawa; Yu-ichi Hayashi

Radio-frequency (RF) retroreflector attack (RFRA) is an {\em active} electromagnetic side-channel attack that aims to leak the targets internal signals by irradiating the targeted device with a radio wave, where an attacker has embedded a malicious circuit (RF retroreflector) in the device in advance. As the retroreflector consists of small and cheap electrical elements such as a field-effect transistor (FET) chip and a wire that can work as a dipole antenna, the reflector can be embedded into various kinds of electric devices that carry unencrypted, sensitive information; e.g., keyboard, display monitor, microphone, speaker, USB, and so on. Only a few studies have addressed the basic mechanism of RFRA and demonstrated the success of the attack. The conditions for a successful attack have not been adequately explored before, and therefore, assessing the feasibility of the attack remains an open issue. In the present study, we aim to investigate empirically the conditions for a successful RFRA through field experiments. Understanding attack limitations should help to develop effective countermeasures against it. In particular, with regard to the conditions for a successful attack, we studied the distance between the attacker and the target, and the target signal frequencies. Through the extensive experiments using off-the-shelf hardware including software-defined radio (SDR) equipment, we revealed that the required conditions for a successful attack are (1) up to a 10-Mbps of target signal and (2) up to a distance of 10 meters. These results demonstrate the importance of the RFRA threat in the real world.


2011 8th Workshop on Electromagnetic Compatibility of Integrated Circuits | 2011

Information leakage from the unintentional emissions of an integrated RC oscillator

Masahiro Kinugawa; Yu-ichi Hayashi; Takaaki Mizuki; Hideaki Sone


usenix security symposium | 2018

A Feasibility Study of Radio-frequency Retroreflector Attack.

Satohiro Wakabayashi; Seita Maruyama; Tatsuya Mori; Shigeki Goto; Masahiro Kinugawa; Yu-ichi Hayashi


asia pacific symposium on electromagnetic compatibility | 2018

Range of information leakage from IoT devices with hardware Trojans

Masahiro Kinugawa; Yu-ichi Hayashi


IEEE Transactions on Electromagnetic Compatibility | 2018

Data Injection Attack Against Electronic Devices With Locally Weakened Immunity Using a Hardware Trojan

Shugo Kaji; Masahiro Kinugawa; Daisuke Fujimoto; Yu-ichi Hayashi


Ieej Transactions on Fundamentals and Materials | 2017

Evaluation of EM information leakage caused by IEMI with hardware Trojan

Masahiro Kinugawa; Yu-ichi Hayashi; Tatsuya Mori


IEICE Transactions on Communications | 2013

Study on Information Leakage of Input Key due to Frequency Fluctuation of RC Oscillator in Keyboard

Masahiro Kinugawa; Yu-ichi Hayashi; Takaaki Mizuki; Hideaki Sone


society of instrument and control engineers of japan | 2012

The effects of PS/2 keyboard setup on a conductive table on electromagnetic information leakages

Masahiro Kinugawa; Yu-ichi Hayashi; Takaaki Mizuki; Hideaki Sone


Proceedings of the Society Conference of IEICE | 2011

B-4-59 Analysis of Information Leakage from Frequency Shifts of On-chip RC Oscillator

Masahiro Kinugawa; Yu-ichi Hayashi; Takaaki Mizuki; Hideaki Sone

Collaboration


Dive into the Masahiro Kinugawa's collaboration.

Top Co-Authors

Avatar

Yu-ichi Hayashi

Nara Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge