Masahiro Kinugawa
Tohoku University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Masahiro Kinugawa.
society of instrument and control engineers of japan | 2008
Hideyuki Fukuhara; Kensaku Kawauchi; Isamu Koseda; Ryutaroh Fujita; Yuichi Takahashi; Masahiro Kinugawa; Toshiaki Miyazaki; Senro Saito; Atsushi Kara; Takafumi Hayashi
This paper describes an approach to integrate sensor networks with information systems using the so-called messaging network architecture. A messaging network is an overlay network with a rich set of message handling capabilities. The use of messaging network reduces the complexity and the maintenance burden of the integrated sensor information systems. Message mediation enables not only interoperation of various applications but also integration of a diversity of data set to produce useful information. The proposed approach naturally leads to an SOA-based sensor network design. The decomposition of a system into services has many advantages in developing secure scalable multi-tenant information systems. The requirements on a messaging network for sensor network systems are presented.
computer and communications security | 2017
Satohiro Wakabayashi; Seita Maruyama; Tatsuya Mori; Shigeki Goto; Masahiro Kinugawa; Yu-ichi Hayashi
Radio-frequency (RF) retroreflector attack (RFRA) is an {\em active} electromagnetic side-channel attack that aims to leak the targets internal signals by irradiating the targeted device with a radio wave, where an attacker has embedded a malicious circuit (RF retroreflector) in the device in advance. As the retroreflector consists of small and cheap electrical elements such as a field-effect transistor (FET) chip and a wire that can work as a dipole antenna, the reflector can be embedded into various kinds of electric devices that carry unencrypted, sensitive information; e.g., keyboard, display monitor, microphone, speaker, USB, and so on. Only a few studies have addressed the basic mechanism of RFRA and demonstrated the success of the attack. The conditions for a successful attack have not been adequately explored before, and therefore, assessing the feasibility of the attack remains an open issue. In the present study, we aim to investigate empirically the conditions for a successful RFRA through field experiments. Understanding attack limitations should help to develop effective countermeasures against it. In particular, with regard to the conditions for a successful attack, we studied the distance between the attacker and the target, and the target signal frequencies. Through the extensive experiments using off-the-shelf hardware including software-defined radio (SDR) equipment, we revealed that the required conditions for a successful attack are (1) up to a 10-Mbps of target signal and (2) up to a distance of 10 meters. These results demonstrate the importance of the RFRA threat in the real world.
2011 8th Workshop on Electromagnetic Compatibility of Integrated Circuits | 2011
Masahiro Kinugawa; Yu-ichi Hayashi; Takaaki Mizuki; Hideaki Sone
usenix security symposium | 2018
Satohiro Wakabayashi; Seita Maruyama; Tatsuya Mori; Shigeki Goto; Masahiro Kinugawa; Yu-ichi Hayashi
asia pacific symposium on electromagnetic compatibility | 2018
Masahiro Kinugawa; Yu-ichi Hayashi
IEEE Transactions on Electromagnetic Compatibility | 2018
Shugo Kaji; Masahiro Kinugawa; Daisuke Fujimoto; Yu-ichi Hayashi
Ieej Transactions on Fundamentals and Materials | 2017
Masahiro Kinugawa; Yu-ichi Hayashi; Tatsuya Mori
IEICE Transactions on Communications | 2013
Masahiro Kinugawa; Yu-ichi Hayashi; Takaaki Mizuki; Hideaki Sone
society of instrument and control engineers of japan | 2012
Masahiro Kinugawa; Yu-ichi Hayashi; Takaaki Mizuki; Hideaki Sone
Proceedings of the Society Conference of IEICE | 2011
Masahiro Kinugawa; Yu-ichi Hayashi; Takaaki Mizuki; Hideaki Sone