| Memory deduplication as a threat to the guest OS K Suzaki, K Iijima, T Yagi, C Artho Proceedings of the Fourth European Workshop on System Security, 1-6, 2011 | 201 | 2011 |
| Why do software packages conflict? C Artho, K Suzaki, R Di Cosmo, R Treinen, S Zacchiroli 2012 9th IEEE Working Conference on Mining Software Repositories (MSR), 141-150, 2012 | 69 | 2012 |
| Ts-perf: General performance measurement of trusted execution environment and rich execution environment on intel sgx, arm trustzone, and risc-v keystone K Suzaki, K Nakajima, T Oi, A Tsukamoto IEEE Access 9, 133520-133530, 2021 | 44 | 2021 |
| Software side channel attack on memory deduplication K Suzaki, K Iijima, T Yagi, C Artho ACM Symposium on Operating Systems Principles (SOSP 2011), Poster session, 2011 | 44 | 2011 |
| Xenprobes, a lightweight user-space probing framework for xen virtual machine NA Quynh, K Suzaki USENIX annual technical conference proceedings, 2007 | 42 | 2007 |
| Input and output control means for computer system storage and a software execution method using same K Suzaki US Patent 7,240,239, 2007 | 37 | 2007 |
| A fully digital true random number generator with entropy source based in frequency collapse R Serrano, C Duran, TT Hoang, M Sarmiento, KD Nguyen, A Tsukamoto, ... IEEE Access 9, 105748-105755, 2021 | 33 | 2021 |
| Multi-tasking method on parallel computers which combines a contiguous and a non-contiguous processor partitioning algorithm K Suzaki, H Tanuma, S Hirano, Y Ichisugi, C Connelly, M Tsukamoto International Workshop on Applied Parallel Computing, 641-650, 1996 | 30 | 1996 |
| Trusted execution environment hardware by isolated heterogeneous architecture for key scheduling TT Hoang, C Duran, R Serrano, M Sarmiento, KD Nguyen, A Tsukamoto, ... IEEE Access 10, 46014-46027, 2022 | 26 | 2022 |
| Correlation power analysis attack resisted cryptographic RISC-V SoC with random dynamic frequency scaling countermeasure BA Dao, TT Hoang, AT Le, A Tsukamoto, K Suzaki, CK Pham IEEE Access 9, 151993-152014, 2021 | 26 | 2021 |
| Exploiting the back-gate biasing technique as a countermeasure against power analysis attacks BA Dao, TT Hoang, AT Le, A Tsukamoto, K Suzaki, CK Pham IEEE Access 9, 24768-24786, 2021 | 25 | 2021 |
| Implementation of a memory disclosure attack on memory deduplication of virtual machines K Suzaki, K Iijima, T Yagi, C Artho IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2013 | 24 | 2013 |
| A real-time cache side-channel attack detection system on RISC-V out-of-order processor AT Le, TT Hoang, BA Dao, A Tsukamoto, K Suzaki, CK Pham IEEE Access 9, 164597-164612, 2021 | 23 | 2021 |
| Reboot-oriented IoT: Life cycle management in trusted execution environment for disposable IoT devices K Suzaki, A Tsukamoto, A Green, M Mannan Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 23 | 2020 |
| Job scheduling strategies for networks of workstations BB Zhou, RP Brent, D Walsh, K Suzaki Workshop on Job Scheduling Strategies for Parallel Processing, 143-157, 1998 | 23 | 1998 |
| Quick boot of trusted execution environment with hardware accelerators TT Hoang, C Duran, DT Nguyen-Hoang, DH Le, A Tsukamoto, K Suzaki, ... IEEE Access 8, 74015-74023, 2020 | 22 | 2020 |
| Virt-ICE: Next-generation debugger for malware analysis NA Quynh, K Suzaki Black Hat USA, 2010 | 21 | 2010 |
| Implementing the Combination of Time Sharing and Space Sharing on AP/Linux K Suzaki, D Walsh Workshop on Job Scheduling Strategies for Parallel Processing, 83-97, 1998 | 21 | 1998 |
| Library implementation and performance analysis of GlobalPlatform TEE Internal API for Intel SGX and RISC-V Keystone K Suzaki, K Nakajima, T Oi, A Tsukamoto 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 20 | 2020 |
| Experiment on replication of side channel attack via cache of RISC-V berkeley out-of-order machine (BOOM) implemented on FPGA AT Le, BA Dao, K Suzaki, CK Pham Fourth Workshop on Computer Architecture Research with RISC-V (CARRV 2020), 2020 | 19 | 2020 |