Masaki Hashimoto

J-GLOBAL         Last updated: Nov 6, 2018 at 18:45
 
Avatar
Name
Masaki Hashimoto
E-mail
hashimotoiisec.ac.jp
URL
http://lab.iisec.ac.jp/~hashimoto_lab/en/
Affiliation
Institute of Information Security
Section
Graduate School of Information Security
Job title
Associate Professor
Degree
Ph.D. in Informatics
Research funding number
10582158
Twitter ID
hashijan

Profile

He received his BA degree in Literature from Ritsumeikan University in 2001. During his academic life he started a new company with his friends, and engaged in Unix/Linux server operation and maintenance support service. He then received his MS/PhD degrees in Informatics from the Institute of Information Security in 2007 and 2010. He was admitted to the Institute of Information Security as an assistant professor during 2010 and has been an associate professor since 2014. He was also an academic visitor at Royal Holloway, University of London, Information Security Group from April 2014 to March 2015. His fields of specialty are access controls and OS security. He is on the IEICE/ICSS, IPSJ/CSEC, IPSJ/JIP committee and a member of IPSJ, IEICE, JSSST and IEEE.

Education

 
Apr 2005
 - 
Mar 2010
Graduate School of Information Security, Institute of Information Security
 
Apr 1996
 - 
Mar 2001
College of Letters, Ritsumeikan University
 

Research Areas

 
 

Academic & Professional Experience

 
Mar 2014
 - 
Today
Associate Professor, Graduate School of Information Security, Institute of Information Security
 
Apr 2014
 - 
Mar 2015
Academic Visitor, Information Security Group, Royal Holloway, University of London
 
Apr 2010
 - 
Feb 2014
Assistant Professor, Graduate School of Information Security, Institute of Information Security
 

Teaching Experience

 

Published Papers

 
External Storage Mechanism for Preserving File Access Log with Virtualization Technology
Ruo Ando, Masaki Hashimoto, Toshihiro Yamauchi
IPSJ Journal   54(2) 585-595   Feb 2013   [Refereed]
Recently, it is more important to grasp and control the damage of attacks safely, so much research has been done to increase the security of the general-purpose OS by observing the behavior using virtualization technology. In this paper, we propos...
Mandatory Access Control Method Based on Application Execution State
Toshiharu Harada, Tetsuo Handa, Masaki Hashimoto, Hidehiko Tanaka
IPSJ Journal   53(9) 2130-2147   Sep 2012   [Refereed]
Existing access control methods grant access requests based on the combinations of applications as subject and files as objects. Therefore intents of applications and the possible effects caused by granting the access requests have not been taken ...
A Survey of Security Research for Operating Systems
Masaki Hashimoto, Ruo Ando, Toshiyuki Maeda, Hidehiko Tanaka
IPSJ Transactions on Advanced Computing Systems (ACS)   5(2) 51-62   Mar 2012   [Refereed]
In recent years, information systems have become the social infrastructure, so that their security must be improved urgently. In this paper, we introduce the results of the survey of virtualization, operating system verification and access control...
Policy Description Language for Authorization Using Logic-based Programming
Masaki Hashimoto, Mira Kim, Hidenori Tsuji, and Hidehiko Tanaka
IPSJ Journal   51(9) 1682-1691   Sep 2010   [Refereed]
Recently, with the impossibility of eradicating the vulnerabilities of information systems, we must prepare for the occurrence of the security incident by the multi-layer defense called Defense-in-Depth strategy. In the multi-layer defense, it is ...
Masaki Hashimoto, Mira Kim, Hidenori Tsuji, and Hidehiko Tanaka
In Proceedings of the 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC '09)   37-42   Dec 2009   [Refereed]
Recently, dynamic access control models are proposed to restrict access domain appropriately in Multi-Layered Defense. However, policy description languages proposed so far can not express the models effectively in proper granularity. In this pape...

Misc

 
Masaki HASHIMOTO
the Bulletin of Institute of Information Security   5    Nov 2013

Conference Activities & Talks

 
Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes
Toshihiro Yamauchi, Yohei Akao, Ryota Yoshitani, Yuichi Nakamura, Masaki Hashimoto
The 2018 IEEE Conference on Dependable and Secure Computing   Dec 2018   
Masaki Hashimoto, Minetoshi Takizawa, Fumihiko Takayama, Hidenori Tsuji, Hidehiko Tanaka
Proceedings of the Computer Security Symposium 2014 (CSS2014)   15 Oct 2014   
Akira Urano, Masaki Hashimoto, Hidenori Tsuji, Hidehiko Tanaka
Computer Security Symposium 2013 (CSS2013)   14 Oct 2013   
HOTTA TOMOHIRO, HASHIMOTO MASAKI, TSUJI HIDENORI, TANAKA HIDEHIKO
情報処理学会研究報告(CD-ROM)   15 Apr 2013   
MATSUFUJI TATSUHIKO, HASHIMOTO MASAKI, HORIAI KEIICHI, TANAKA HIDEHIKO
情報処理学会研究報告(CD-ROM)   15 Apr 2012   

Research Grants & Projects

 
Ministry of Education, Culture, Sports, Science and Technology: Grants-in-Aid for Scientific Research(基盤研究(B))
Project Year: 2009 - 2011    Investigator(s): Hidehiko TANAKA
In this research, we developed an architecture to realize a common access control mechanism protected by OS. This architecture is intended to provide a common mechanism to perform safely and strict access control by the coordination of application...

Committee Memberships

 
Apr 2013
 - 
Today
Computer Security Group (CSEC): Information Processing Society of Japan (IPSJ)  Committee Member
 
Apr 2010
 - 
Today
Special Interest Group on Information and Communication System Security (ICSS): Institute of Electronics, Information and Communication Engineers of Japan (IEICE)  Committee Member
 
Apr 2012
 - 
Mar 2013
Computer Security Symposium 2012 (CSS2012), Information Processing Society of Japan (IPSJ)  Committee Member