Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yuki Ashino is active.

Publication


Featured researches published by Yuki Ashino.


advanced information networking and applications | 2012

Virtual Machine Migration Method between Different Hypervisor Implementations and Its Evaluation

Yuki Ashino; Masayuki Nakae

Virtualization technologies are an important building block for cloud services. Each service will run on virtual machines (VMs) deployed over different hyper visors in the future. Therefore, a VM migration method between different hyper visor implementations will be required. Existing methods, such as VM image conversion, generate dead copies of VM images during migration. This causes an operating system running on a VM to fail to boot up after migration and to identify virtual devices provided by destination hyper visors because the dead copied image does not contain requisite files for booting up the copied VM environment. To solve these problems, we propose a VM migration method that generates a destination-dependent VM image before migration. The destination dependency is a set of requisite files enabling a guest OS to boot up from the image, and is determined from the device configurations of destination physical machines and virtual ones. The proposed method extracts the dependency from the file structure that enables the guest OS to run on the destination hyper visor. Our evaluation confirms that the proposed method succeeds in VM migration between hyper visors such as VMWare, Virtual Box, and VirtualPC. As for performance efficiency, our method can reduce the size of a transferred VM image to approximately 20% that of a source VM image.


international conference on digital forensics | 2008

Using Boot Control to Preserve the Integrity of Evidence

Keisuke Fujita; Yuki Ashino; Tetsutaro Uehara; Ryoichi Sasaki

This paper describes Dig-Force2, a system that securely logs and stores evidentiary data about the operation of a personal computer. The integrity of the logged data is guaranteed by using chained hysteresis signatures and a trusted platform module (TPM) that prevents unauthorized programs or tampered programs from executing. Experiments indicate that the Dig-Force2 system is both efficient and reliable.


international conference on digital forensics | 2009

Implementing Boot Control for Windows Vista

Yuki Ashino; Keisuke Fujita; Maiko Furusawa; Tetsutaro Uehara; Ryoichi Sasaki

A digital forensic logging system must prevent the booting of unauthorized programs and the modification of evidence. Our previous research developed Dig-Force2, a boot control system for Windows XP platforms that employs API hooking and a trusted platform module. However, Dig-Force2 cannot be used for Windows Vista systems because the hooked API cannot monitor booting programs in user accounts. This paper describes an enhanced version of Dig-Force2, which uses a TPM and a white list to provide boot control functionality for Windows Vista systems. In addition, the paper presents the results of security and performance evaluations of the boot control system.


The Journal of Digital Forensics, Security and Law | 2010

HiGate (High Grade Anti-Tamper Equipment) Prototype and Application to e-Discovery

Yui Sakurai; Yuki Ashino; Tetsutaro Uehara; Hiroshi Yoshiura; Ryoichi Sasaki

These days, most data is digitized and processed in various ways by computers. In the past, computer owners were free to process data as desired and to observe the inputted data as well as the interim results. However, the unrestricted processing of data and accessing of interim results even by computer users is associated with an increasing number of adverse events. These adverse events often occur when sensitive data such as personal or confidential business information must be handled by two or more parties, such as in the case of e-Discovery, used in legal proceedings, or epidemiologic studies. To solve this problem, providers encrypt data, and the owner of the computer performs decoding in the memory for encrypted data. The computer owner can be limited to performing only certain processing of data and to observing only the final results. As an implementation that uses existing technology to realize this solution, the processing of data contained in a smart card was considered, but such an implementation would not be practical due to issues related to computer capacity and processing speed. Accordingly, the authors present the concept of PC-based High Grade Anti-Tamper Equipment (HiGATE), which allows data to be handled without revealing the data content to administrators or users. To verify this concept, an e-Discovery application on a prototype was executed and the results are reported here.


intelligent information hiding and multimedia signal processing | 2007

Proposal of Digital Forensic System Using Security Device and Hysteresis Signature

Yuki Ashino; Ryoichi Sasaki


Archive | 2013

Communication system, control apparatus, communication apparatus, communication control method, and program

Kentaro Sonoda; Hideyuki Shimonishi; Toshio Koide; Yoichi Hatano; Masayuki Nakae; Masaya Yamagata; Yoichiro Morita; Takayuki Sasaki; Yuki Ashino; Takeo Ohno


Archive | 2011

FILE SET CONSISTENCY VERIFICATION SYSTEM, FILE SET CONSISTENCY VERIFICATION METHOD, AND FILE SET CONSISTENCY VERIFICATION PROGRAM

Masayuki Nakae; Yuki Ashino


Archive | 2011

OPERATION VERIFICATION SUPPORT DEVICE, OPERATION VERIFICATION SUPPORT METHOD AND OPERATION VERIFICATION SUPPORT PROGRAM

Yuki Ashino; Masayuki Nakae


Archive | 2011

File group matching verification system, file group matching verification method, and program for file group matching verification

Masayuki Nakae; 中江 政行; Yuki Ashino; 佑樹 芦野


Archive | 2016

Category information generating device, category information generating method, search device, search method, and recording medium

匡人 山根; Masato Yamane; 佑樹 芦野; Yuki Ashino

Collaboration


Dive into the Yuki Ashino's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hiroshi Yoshiura

University of Electro-Communications

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge