Affiliation
Faculty of Electronics and Information Systems Engineering,
National Institute of Technology, Kumamoto College
Associate Professor
Research Interest
Evaluation of software protection mechanisms
Education
-
Doctor of Engineering,
Nara Institute of Science and Technology, March 2006.
-
Master of Engineering,
Nara Institute of Science and Technology, March 2003.
-
Bachelor of Engineering, Kobe University, March 2001.
Academic Positions Held
- Apr. 2010 - present : Associate Professor, National Institute of Technology, Kumamoto College
- Apr. 2015 - Mar. 2016 : Honorary Academic at the Department of Computer Science, University of Auckland
- Apr. 2007 - Mar. 2010 : Assistant Professor, Kumamoto National College of Technology
- Apr. 2007 - Sep. 2007, Apr. 2008 - Sep. 2008 : Part-Time Lecturer, Prefectural University of Kumamoto
- Apr. 2006 - Mar. 2007 : Assistant, Kumamoto National College of Technology
- Apr. 2005 - Sep. 2005 : Part-Time Lecturer, Osaka Prefectural College of Technology
List of Major Publications
-
Tetsuya Kitaoka, Yuichiro Kanzaki, Takashi Ishio, Kazumasa Shimari, Kenichi Matsumoto,
“Reliability Evaluation Framework for Obfuscating Transformations in Program Code,” Computer Software, vol. 40, no. 4, pp. 37-46, October 2023.
[Paper]
-
Tetsuya Kitaoka, Yuichiro Kanzaki, Takashi Ishio, Kazumasa Shimari, Kenichi Matsumoto,
“ObfusEval: Evaluating Reliability of Obfuscating Transformations, ” Annual Computer Security Applications Conference 2022 (ACSAC2022), Poster Presentation, December 2022. [Poster]
-
Toshiki Seto, Akito Monden, Zeynep Yücel, Yuichiro Kanzaki,
"On Preventing Symbolic Execution Attacks by Low Cost Obfuscation,"
Proc. 20th IEEE/ACIS International Conference on Software Engineering,
Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2019), July 2019.
-
Yuichiro Kanzaki, Clark Thomborson, Akito Monden, and Christian Collberg, “Pinpointing and Hiding Surprising Fragments in an Obfuscated Program,” In Proc. of the 5th Program Protection and Reverse Engineering Workshop (PPREW-5), pp.8:1-8:9, December 2015.
[PDF]
-
Yuichiro Kanzaki, Akito Monden, and Christian Collberg,
“Code Artificiality: A Metric for the Code Stealth Based on an N-gram Model,”
Proc. of 1st International Workshop on Software Protection (SPRO2015), pp. 31-37, May 2015.
[PDF]
-
Hiroki Yamauchi, Yuichiro Kanzaki, Akito Monden, Masahide Nakamura,
and Ken-ichi Matsumoto, “Software Obfuscation from Crackers' Viewpoint,”
In Proc. IASTED International Conference on Advances in Computer Science
and Technology (IASTED ACST 2006), pp.286-291,
January 2006. (Puerto Vallarta, Mexico)
-
Yuichiro Kanzaki, Hiroshi Igaki, Masahide Nakamura, Akito Monden, and Ken-ichi Matsumoto, “Quantitative Analysis of Information Leakage in Security-Sensitive Software Processes,” IPSJ Journal, Special Issue on Research on Computer Security Characterized in the Context of Social Responsibilities, volume 46, number 8, pages 2129-2141, August 2005.
-
Yuichiro Kanzaki, Hiroshi Igaki, Masahide Nakamura, Akito Monden,
and Ken-ichi Matsumoto,
“Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process,”
Third Australasian Information Security Workshop (AISW2005),
Conferences in Research and Practice in Information Technology,
vol. 44, pp. 145-151, Australian Computer Society, Jan. 2005.
-
Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, and Ken-ichi
Matsumoto, “Exploiting self-modification mechanism for program
protection,” 27th Computer Software and Applications Conference
(compsac2003), pp.170-179, Dallas, USA, Nov. 2003.
-
Masahide Nakamura, Akito Monden, Tomoaki Itoh, Ken-ichi Matsumoto, Yuichiro Kanzaki,
and Hirotsugu Satoh, “Queue-based cost evaluation of mental simulation
process in program comprehension,” 9th IEEE International Software
Metrics Symposium (METRICS2003), pp.351-360, Sydney, Australia,
September 3-5, 2003.
Doctoral Dissertation
Yuichiro Kanzaki, “Protecting Secret Information in Software Processes and Products,”
Doctoral Dissertation, Nara Institute of Science and Technology, 2006.
[PDF]