Information Security Engineering

Research Staff

  • Prof. Yuichi Hayashi

    Prof.
    Yuichi HAYASHI

  • Assist.Prof. Daisuke Fujimotoi

    Assist.Prof.
    Daisuke FUJIMOTO

  • Assist.Prof. Youngwoo KIM

    Assist.Prof.
    Youngwoo KIM

E-mail { yu-ichi, fujimoto, youngwoo } [at] is.naist.jp

Research Areas

Electromagnetic(EM) information leakage

Research on the risk assessment of security degradation due to information leakage (Fig. 1) using electromagnetic (EM) signals generated from information terminals; we are also conducting researches on methodologies and techniques for countering this phenomenon (Fig. 2).

Intentional electromagnetic interference (IEMI)

Research on the risk assessment of security degradation associated with intentional electromagnetic disturbance in hardware and also on technologies for countering this phenomenon.

Intentional modification of internal circuits (Hardware Trojan)

Research on risk assessment of security degradation due to malware implemented by intentionally changing the internal circuits of information equipment, and also on technologies for countering this occurrence.

Implementation and evaluation of next generation cryptographic algorithm

Research on an efficient hardware implementation of next generation cryptographic algorithm such as functional cryptography and post-quantum cryptography. This research topic includes not only performance evaluation, but also physical security evaluation (Fig. 3).

Large-scale electromagnetic field simulation

Research on large-scale electromagnetic field simulation necessary for clarifying information security degradation mechanisms due to leakages or interfering electromagnetic waves, and for risk assessment at the early design stages of equipment (Fig. 4).

Reliability of information communication systems

Research on approaches for designing information communication system equipment, which has little electromagnetic signal leakage from the viewpoints of environmental electromagnetic engineering (EMC) and electromechanical devices (EMD), and which is even tolerant against electromagnetic disturbance (Figs. 5, 6).

Key Features

In the Information Security Engineering Laboratory, we conduct research on methods to ensure hardware safety, which is the bedrock of system information security. We also conduct research to ensure the security of the entire system, including the upper layers.

Fig.1 Remote Visualization of Screen Images Using EM Emanation

Fig.1 Remote visualization of screen images using EM Emanation

Fig.2  Development of countermeasure to prevent EM display stealing from tablet PCs

Fig.2 Development of countermeasure to prevent EM display stealing from tablet PCs

Fig.3 Evaluation board for physical security evaluation including post-quantum cryptography.

Fig.3 Evaluation board for physical security evaluation including post-quantum cryptography.

Fig.4 Visualization of information leakage path based on large-scale EM field simulation

Fig.4 Visualization of information leakage paths based on large-scale EM field simulation techniques

Fig.5 Anechoic chamber for hardware security evaluation

Fig.5 Anechoic chamber for hardware security evaluation

Fig.6 Development of cost-effective countermeasures based on information leakage map

Fig.6 Development of cost-effective countermeasures based on information leakage map