Masaki Hashimoto

J-GLOBAL         Last updated: Nov 6, 2018 at 18:45
Masaki Hashimoto
Institute of Information Security
Graduate School of Information Security
Job title
Associate Professor
Ph.D. in Informatics
Research funding number
Twitter ID


He received his BA degree in Literature from Ritsumeikan University in 2001. During his academic life he started a new company with his friends, and engaged in Unix/Linux server operation and maintenance support service. He then received his MS/PhD degrees in Informatics from the Institute of Information Security in 2007 and 2010. He was admitted to the Institute of Information Security as an assistant professor during 2010 and has been an associate professor since 2014. He was also an academic visitor at Royal Holloway, University of London, Information Security Group from April 2014 to March 2015. His fields of specialty are access controls and OS security. He is on the IEICE/ICSS, IPSJ/CSEC, IPSJ/JIP committee and a member of IPSJ, IEICE, JSSST and IEEE.


Apr 2005
Mar 2010
Graduate School of Information Security, Institute of Information Security
Apr 1996
Mar 2001
College of Letters, Ritsumeikan University

Research Areas


Academic & Professional Experience

Mar 2014
Associate Professor, Graduate School of Information Security, Institute of Information Security
Apr 2014
Mar 2015
Academic Visitor, Information Security Group, Royal Holloway, University of London
Apr 2010
Feb 2014
Assistant Professor, Graduate School of Information Security, Institute of Information Security

Teaching Experience


Published Papers

External Storage Mechanism for Preserving File Access Log with Virtualization Technology
Ruo Ando, Masaki Hashimoto, Toshihiro Yamauchi
IPSJ Journal   54(2) 585-595   Feb 2013   [Refereed]
Recently, it is more important to grasp and control the damage of attacks safely, so much research has been done to increase the security of the general-purpose OS by observing the behavior using virtualization technology. In this paper, we propos...
Mandatory Access Control Method Based on Application Execution State
Toshiharu Harada, Tetsuo Handa, Masaki Hashimoto, Hidehiko Tanaka
IPSJ Journal   53(9) 2130-2147   Sep 2012   [Refereed]
Existing access control methods grant access requests based on the combinations of applications as subject and files as objects. Therefore intents of applications and the possible effects caused by granting the access requests have not been taken ...
A Survey of Security Research for Operating Systems
Masaki Hashimoto, Ruo Ando, Toshiyuki Maeda, Hidehiko Tanaka
IPSJ Transactions on Advanced Computing Systems (ACS)   5(2) 51-62   Mar 2012   [Refereed]
In recent years, information systems have become the social infrastructure, so that their security must be improved urgently. In this paper, we introduce the results of the survey of virtualization, operating system verification and access control...
Policy Description Language for Authorization Using Logic-based Programming
Masaki Hashimoto, Mira Kim, Hidenori Tsuji, and Hidehiko Tanaka
IPSJ Journal   51(9) 1682-1691   Sep 2010   [Refereed]
Recently, with the impossibility of eradicating the vulnerabilities of information systems, we must prepare for the occurrence of the security incident by the multi-layer defense called Defense-in-Depth strategy. In the multi-layer defense, it is ...
Masaki Hashimoto, Mira Kim, Hidenori Tsuji, and Hidehiko Tanaka
In Proceedings of the 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC '09)   37-42   Dec 2009   [Refereed]
Recently, dynamic access control models are proposed to restrict access domain appropriately in Multi-Layered Defense. However, policy description languages proposed so far can not express the models effectively in proper granularity. In this pape...


the Bulletin of Institute of Information Security   5    Nov 2013

Conference Activities & Talks

Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes
Toshihiro Yamauchi, Yohei Akao, Ryota Yoshitani, Yuichi Nakamura, Masaki Hashimoto
The 2018 IEEE Conference on Dependable and Secure Computing   Dec 2018   
Masaki Hashimoto, Minetoshi Takizawa, Fumihiko Takayama, Hidenori Tsuji, Hidehiko Tanaka
Proceedings of the Computer Security Symposium 2014 (CSS2014)   15 Oct 2014   
Akira Urano, Masaki Hashimoto, Hidenori Tsuji, Hidehiko Tanaka
Computer Security Symposium 2013 (CSS2013)   14 Oct 2013   
情報処理学会研究報告(CD-ROM)   15 Apr 2013   
情報処理学会研究報告(CD-ROM)   15 Apr 2012   

Research Grants & Projects

Ministry of Education, Culture, Sports, Science and Technology: Grants-in-Aid for Scientific Research(基盤研究(B))
Project Year: 2009 - 2011    Investigator(s): Hidehiko TANAKA
In this research, we developed an architecture to realize a common access control mechanism protected by OS. This architecture is intended to provide a common mechanism to perform safely and strict access control by the coordination of application...

Committee Memberships

Apr 2013
Computer Security Group (CSEC): Information Processing Society of Japan (IPSJ)  Committee Member
Apr 2010
Special Interest Group on Information and Communication System Security (ICSS): Institute of Electronics, Information and Communication Engineers of Japan (IEICE)  Committee Member
Apr 2012
Mar 2013
Computer Security Symposium 2012 (CSS2012), Information Processing Society of Japan (IPSJ)  Committee Member