Yusuke Kawamoto


Yusuke Kawamoto

J-GLOBAL         Last updated: Nov 11, 2017 at 18:26
 
Avatar
Name
Yusuke Kawamoto
Affiliation
National Institute of Advanced Industrial Science and Technology
Section
Information Technology Research Institute
Job title
Research Scientist
Degree
PhD in Computer Science(University of Tokyo)
ORCID ID
0000-0002-2151-9560

Profile

I am a research scientist working on the foundation of information security, especially the design, analysis and verification of probabilistic programs and protocols by:
(1) the symbolic approach (based on mathematical logic),
(2) the information theoretical approach (based on information theory and statistics),
(3) the computational approach (based on computational complexity theory).

In particular, I recently study (A) the formal verification of quantitative properties in probabilistic programs (e.g. a hybrid approach that combines the symbolic approach with the statistical one to quantify information leakage), and (B) the design of quantitative privacy mechanisms (e.g. extended differential privacy mechanisms, and game-theoretic defender mechanisms).

E-mail:
yusuke000kawamoto AT aist000go000jp (Please replace 000 with . and at with @)

Research Areas

 
 

Academic & Professional Experience

 
2015
 - 
Today
Research Scientist, AIST, Japan
 
2013
 - 
2015
Post-doctoral Researcher, LIX, École Polytechnique & Inria Saclay, France
 
2012
 - 
2013
Research Fellow, School of Computer Science, University of Birmingham, UK
 
2011
 - 
2012
Post-doctoral Researcher, LSV, ENS Cachan & Inria Saclay, France
 
2010
 - 
2011
Post-doctoral Research Fellow, LSV, ENS Cachan, France & JSPS, Japan
 
2009
 - 
2010
Research Fellow, JSPS, Japan
 

Education

 
 
 - 
Mar 2010
Ph.D., Department of Computer Science, University of Tokyo
 
 
 - 
Mar 2007
M.Sc., Department of Computer Science, University of Tokyo
 
 
 - 
Mar 2005
B.Sc., Department of Information Science, University of Tokyo
 

Awards & Honors

 
Sep 2008
2008年度論文賞(理論部門), 日本応用数理学会
 

Published Papers

 
Fabrizio Biondi, Yusuke Kawamoto, Axel Legay, and Louis-Marie Traonouez
submitted to a journal      Dec 2017
[alphabetical authorship]
Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, and Catuscia Palamidessi
Proc. of the 8th International Conference on Decision and Game Theory for Security (GameSec 2017), Lecture Notes in Computer Science   10575 437-457   Oct 2017   [Refereed]
DOI: 10.1007/978-3-319-68711-7 23
[alphabetical authorship]
Fabrizio Biondi, Yusuke Kawamoto, Axel Legay, and Louis-Marie Traonouez
Proc. of the 15th International Symposium on Automated Technology for Verification and Analysis (ATVA 2017), Lecture Notes in Computer Science   10482 156-163   Oct 2017   [Refereed]
DOI:10.1007/978-3-319-68167-2_11
[alphabetical authorship]
Yusuke Kawamoto, Konstantinos Chatzikokolakis, and Catuscia Palamidessi
Logical Methods in Computer Science   13(3:11) 1-31   Aug 2017   [Refereed]
DOI: 10.23638/LMCS-13(3:11)2017
Yusuke Kawamoto, Fabrizio Biondi and Axel Legay
Proc. of the 21st International Symposium on Formal Methods (FM 2016), Lecture Notes in Computer Science   9995 406-425   Nov 2016   [Refereed]
DOI: 10.1007/978-3-319-48989-6_25
Yusuke Kawamoto
Computer Software   33(4) 67-83   Nov 2016   [Refereed][Invited]
DOI: 10.11309/jssst.33.4_67
Yusuke Kawamoto and Thomas Given-Wilson
Proc. of the 13th International Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL 2015), Electronic Proceedings in Theoretical Computer Science   194 48-62   Sep 2015   [Refereed]
DOI: 10.4204/EPTCS.194.4
Tom Chothia, Yusuke Kawamoto and Chris Novakovic
Proc. of the 19th European Symposium on Research in Computer Security (ESORICS 2014), Part II, Lecture Notes in Computer Science   8713 219-236   Sep 2014   [Refereed]
DOI: 10.1007/978-3-319-11212-1_13
[alphabetical authorship]
Yusuke Kawamoto, Konstantinos Chatzikokolakis, and Catuscia Palamidessi
Proc. of 11th International Conference on Quantitative Evaluation of SysTems (QEST'2014), Lecture Notes in Computer Science   8657 368-383   Sep 2014   [Refereed]
DOI: 10.1007/978-3-319-10696-0_28
Tom Chothia, Yusuke Kawamoto and Chris Novakovic
Proc. of 25th International Conference on Computer Aided Verification (CAV 2013), Lecture Notes in Computer Science   8044 690-695   Jul 2013   [Refereed]
DOI: 10.1007/978-3-642-39799-8_47
[alphabetical authorship]
Tom Chothia, Yusuke Kawamoto, Chris Novakovic and David Parker
Proc. of 26th IEEE Computer Security Foundations Symposium (CSF 2013)   193-205   Jun 2013   [Refereed]
DOI: 10.1109/CSF.2013.20
[alphabetical authorship]
Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato, Graham Steel and Joe-Kai Tsay
Advances in Cryptology - 32nd International Cryptology Conference (CRYPTO 2012), Lecture Notes in Computer Science   7417 608-625   Aug 2012   [Refereed]
DOI: 10.1007/978-3-642-32009-5_36
[alphabetical authorship]
Hubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto, and Hideki Sakurada
Proc. of the 8th International Conference on Information Security Practice and Experience (ISPEC 2012), Lecture Notes in Computer Science   7232 63-79   Apr 2012   [Refereed]
DOI: 10.1007/978-3-642-29101-2_5
[alphabetical authorship]
Yusuke Kawamoto, Hideki Sakurada, and Masami Hagiya
Formal to Practical Security, Lecture Notes in Computer Science   5458 158-180   May 2009   [Refereed]
DOI: 10.1007/978-3-642-02002-5_9
Hubert Comon-Lundh, Yusuke Kawamoto, and Hideki Sakurada
JSIAM Letters   1 28-31   May 2009   [Refereed]
DOI: 10.14495/jsiaml.1.28
[alphabetical authorship]
Yusuke Kawamoto, Hideki Sakurada, and Masami Hagiya
Proc. of Joint Workshop on Foundations of Computer Security, Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (FCS-ARSPA-WITS'08)   161-175   Jun 2008   [Refereed]
川本 裕輔, 真野 健, 櫻田 英樹, 萩谷 昌己
日本応用数理学会論文誌   17(4) 559-576   Dec 2007   [Refereed]
DOI: 10.11540/jsiamt.17.4_559

Books etc

 
Handbook of Applied Mathematics (In Japanese)
Yusuke Kawamoto (Part:Contributor, Computational soundness of formal methods)
Asakura Publishing   Nov 2013   

Misc

 
Chothia Tom, Kawamoto Yusuke
Manuscript available at http://www.cs.bham.ac.uk/research/projects/infotools/leakiest      Apr 2014
[alphabetical authorship]
Formal Verification of Cryptography (II)
Yusuke Kawamoto
東京大学大学院情報理工学系研究科「計算システム検証論」      Jan 2014   [Invited]
Yusuke Kawamoto
東京大学大学院情報理工学系研究科「計算システム検証論」      Jan 2014   [Invited]
川本 裕輔
応用数理ハンドブック, 朝倉書店   262-263   Nov 2013   [Invited]

Conference Activities & Talks

 
Yusuke Kawamoto
JSIAM 2017 Annual Meeting   6 Sep 2017   The Japan Society for Industrial and Applied Mathematics
Hybrid method for program analysis ー combining statistical analyses with symbolic techniques [Invited]
Yusuke Kawamoto
ERATO MMSD Project Colloquium   25 Aug 2017   ERATO MMSD
Yusuke Kawamoto
Second Joint Workshop between France and Japan on Cybersecurity   22 Sep 2016   
Combining Static and Statistical Approaches to Quantitative Information Flow [Invited]
Yusuke Kawamoto
NII Shonan Meeting Seminar 069   26 Oct 2015   
The "Million Message Attack" in 15,000 Messages -- Efficient Padding Oracle Attacks on Estonian Electronic ID Card, Security Tokens and Smart Cards [Invited]
Yusuke Kawamoto, Joe-Kai Tsay
Cryptography Seminar, University of Tartu, Estonia   Sep 2012   
[alphabetical authorship]
Computational semantics for epistemic logic
Rohit Chadha, Yusuke Kawamoto and Steve Kremer
Proc. of 8th Workshop on Formal and Computational Cryptography   Jun 2012   
[alphabetical authorship]
Computational soundness without symbolic length function
Hubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto, and Hideki Sakurada
Proc. of 7th Workshop on Formal and Computational Cryptography   Jun 2011   
[alphabetical authorship]
Proving computational soundness of the applied pi-calculus without using computable parsing
Hubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto, and Hideki Sakurada
37th Spring School on Theoretical Computer Science and French-Japanese Collaboration Workshop   Apr 2010   
[alphabetical authorship]
Computational soundness of symbolic XOR in the presence of active adversaries
Hideki Sakurada, Yusuke Kawamoto, and Masami Hagiya
37th Spring School on Theoretical Computer Science and French-Japanese Collaboration Workshop   Apr 2010   
Applied Pi-Calculusの計算論的健全性のパーズを用いない証明
ウベール・コモン-ルンド, 萩谷 昌己, 川本 裕輔, 櫻田 英樹
第12回プログラミングおよびプログラミング言語ワークショップ(PPL2010)論文集   Mar 2010   
[alphabetical authorship]

Research Grants & Projects

 
JSPS: Grant-in-Aid for Young Scientists (B) (KAKENHI Grant Number JP17K12667)
Project Year: 2017 - 2019    Investigator(s): Yusuke Kawamoto
JSPS and Inria: Japan - France AYAME Program
Project Year: 2016 - 2019    Investigator(s): Mitsuhiro Okada
JSPS: Grant-in-Aid for Research Activity Start-up (KAKENHI Grant Number JP15H06886)
Project Year: 2015 - 2016    Investigator(s): Yusuke Kawamoto
Studies on the Computational Soundness of Formal Verification of Security Protocols
JSPS: Excellent Young Researchers Overseas Visit Program
Project Year: Apr 2010 - Jan 2011    Investigator(s): Yusuke Kawamoto

Social Contribution

 
WG1 (Formal Methods) in Joint collaboration between France and Japan on Cybersecurity Research
[Others]  Jul 2015 - Today

Others

 
Jun 2012
Our CRYPTO 2012 paper was reported in Boston Globe, a newspaper in USA. Also in New York Times' blog. It was reported in many newspapers and magazines in the world.