Profile

Hiroki KUZUNO, Ph.D.
Associate Professor
Information and Communication Laboratory
Graduate School of Engineering / Department of Electrical and Electronic Engineering, Kobe University
researchmap: khiro / twitter: khiro / github: khiro

Employment:
2024.10—present: Graduate School of Engineering, Kobe University, Associate Professor
2022.01—2024.09: Graduate School of Engineering, Kobe University, Assistant Professor
2007.04—2021.12: Intelligent Systems Laboratory, SECOM Co., Ltd., Japan, Research Engineer, Specialist (2014—)
2014.11—2017.10: SECOM (SINGAPORE) PTE LTD, Singapore

Education:
2018.04—2020.03: Doctor of Philosophy in Engineering, Division of Industrial Innovation Sciences, Graduate School of Natural Science and Technology, Okayama University
2005.04—2007.03: Master of Engineering, Graduate School of Information Science, Nara Institute of Science and Technology
2001.04—2005.03: Bachelor of Software and Information Science, Faculty of Software and Information Science, Iwate Prefectural University

Academic Activities

Membership

Program Committees and Others

Journal Publications

  1. Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii
    Man-in-the-Portal: Breaking SSL/TLS Silently Abusing Captive Portal,
    Journal of Information Processing, (2024).
  2. Hiroki Kuzuno, Tomohiko Yano, Kazuki Omo, Jeroen van der Ham, Toshihiro Yamauchi,
    Proposal of Open Source Software Security Risk Indicator based on Vulnerability Management Interview,
    Journal of Information Processing, (2024).
  3. Tomohiko Yano, Hiroki Kuzuno,
    Visualization Method for Open Source Software Risk Related to Vulnerability and Developmental Status Considering Dependencies,
    Journal of Information Processing, Vol.32, pp. 767-778 (2024).
  4. Shuhei Enomoto, Hiroki Kuzuno, Hiroshi Yamada, Yoshiaki Shiraishi, Masakatu Morii,
    Early mitigation of CPU-optimized ransomware using monitoring encryption instructions,
    International Journal of Information Security, Springer Nature, Vol.23, pp. 3393-3413 (2024).
  5. Hiroki Kuzuno, Toshihiro Yamauchi,
    Mitigation of privilege escalation attack using kernel data relocation mechanism,
    International Journal of Information Security, Springer Nature, Vol.23, pp. 3351-3367 (2024).
  6. Hiroki Kuzuno, Toshihiro Yamauchi,
    Identification of Vulnerable Kernel Code Using Kernel Tracing Mechanism,
    Journal of Information Processing, Vol.31, pp.788-801 (2023).
  7. Tomohiko Yano, Hiroki Kuzuno, Kenichi Magata,
    File Tracking and Visualization Methods Using a Network Graph to Prevent Information Leakage,
    IEICE Transactions on Information and Systems, Vol.E106-D, No.9, pp.1339-1353, (2023).
  8. Hiroki Kuzuno, Toshihiro Yamauchi,
    Protection Mechanism of Kernel Data Using Memory Protection Key,
    IEICE Transactions on Information and Systems, Vol.E106-D, No.9, pp.1326-1338, (2023).
  9. Hiroki Kuzuno, Toshihiro Yamauchi,
    Mitigating Foreshadow Side-channel Attack Using Dedicated Kernel Memory Mechanism,
    Journal of Information Processing, Vol.30, pp.796-806, (2022).
  10. Shuhei Enomoto, Hiroki Kuzuno, Hiroshi Yamada,
    Efficient Protection Mechanism for CPU Cache Flush Instruction Based Attacks,
    IEICE Transactions on Information and Systems, Vol.E105-D, No.11, pp.1890-1899, (2022).
  11. Hiroki Kuzuno, Toshihiro Yamauchi,
    Prevention of Kernel Memory Corruption Using Kernel Page Restriction Mechanism,
    Journal of Information Processing, Vol.30, pp.563-576, (2022).
  12. Naoto Yoshimura, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii,
    DOC-IDS: A Deep Learning-based Method for Feature Extraction and Anomaly Detection in Network Traffic,
    Sensors, Vol.22, No.12, pp.1-19, (2022).
  13. Hiroki Kuzuno, Toshihiro Yamauchi,
    Mitigation of Kernel Memory Corruption Using Multiple Kernel Memory Mechanism,
    IEEE Access, Vol.9, pp.111651-111665, (2021).
  14. Hiroki Kuzuno, Toshihiro Yamauchi,
    Identification of Kernel Memory Corruption Using Kernel Memory Secret Observation Mechanism,
    IEICE Transactions on Information and Systems, Vol.E103-D, No.7, pp.1462-1475, (2020).
  15. Hiroki Kuzuno, Giannis Tziakouris,
    Ad-hoc Analytical Framework of Bitcoin Investigations for Law Enforcement,
    IEICE Transactions on Information and Systems, Vol.E101-D, No.11, pp.2644-2657, (2018).
  16. Hiroki Kuzuno, Kenichi Magata,
    Detecting and Characterising of Mobile Advertisement Network Traffic using Graph Modeling,
    International Journal of Space-Based and Situated Computing (IJSSC), 2016, Vol. 6, No.2, pp.90 - 101.
  17. Hiroki Kuzuno, Satoshi Tonami,
    Detection of Sensitive Information Leakage in Android Applications using Signature Generation,
    International Journal of Space-Based and Situated Computing (IJSSC), 2015, Vol.5, No.1, pp.53 - 62.

Refereed Conference Publications

  1. Shunsuke Nakatani, Hiroki Kuzuno, Makoto Takita, Masami Mohri, Yoshiaki Shiraishi
    Can We Determine Whether a Set of Ethereum Transaction Data Contains Fraudulent Transactions or Not?,
    The 2024 7th IEEE Conference on Dependable and Secure Computing (DSC 2024), (12, 2024)
  2. Hiroki Kuzuno, Toshihiro Yamauchi,
    kdMonitor: Kernel Data Monitor for Detecting Kernel Memory Corruption,
    The 2024 7th IEEE Conference on Dependable and Secure Computing (DSC 2024), (12, 2024)
  3. Hiroki Kuzuno, Toshihiro Yamauchi,
    RKPM: Restricted Kernel Page Mechanism to Mitigate Privilege Escalation Attacks,
    The 18th International Conference on Network and System Security (NSS 2024). (11, 2024).
  4. Tomohiko Yano, Hiroki Kuzuno,
    Security Risk Visualization for Open-Source Software based on Vulnerabilities, Repositories, and Dependencies,
    The Eleventh International Symposium on Computing and Networking (CANDAR 2023), (12, 2023).
  5. Kaito Shiba, Hiroki Kuzuno, Toshihiro Yamauchi,
    Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE,
    10th International Workshop on Information and Communication Security (WICS 2023), The 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW 2023), (12, 2023).
  6. Hiroki Kuzuno, Tomohiko Yano, Kazuki Omo, Jeroen van der Ham, Toshihiro Yamauchi,
    Security Risk Indicator for Open Source Software to Measure Software Development Status,
    The 24th World Conference on Information Security Applications (WISA 2023), Lecture Notes in Computer Science (LNCS), vol.14402, pp.143-156, (1, 2024).
  7. Hiroki Kuzuno, Toshihiro Yamauchi,
    KDRM: Kernel Data Relocation Mechanism to Mitigate Privilege Escalation Attack,
    The 17th International Conference on Network and System Security (NSS 2023), Lecture Notes in Computer Science (LNCS), vol.13983, pp.61-76, (8, 2023).
  8. Hiroki Kuzuno, Toshihiro Yamauchi,
    vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel Vulnerability,
    The 23rd World Conference on Information Security Applications (WISA 2022), Lecture Notes in Computer Science (LNCS), vol.13720, pp.222-234, (2, 2023).
  9. Tomohiko Yano, Hiroki Kuzuno, Kenichi Magata,
    Constructing a Network Graph of File Tracking Results Against Information Leakage,
    The 17th Asia Joint Conference on Information Security (AsiaJCIS 2022), (8, 2022).
  10. Hiroki Kuzuno, Toshihiro Yamauchi,
    KDPM: Kernel Data Protection Mechanism Using a Memory Protection Key,
    The 17th International Workshop on Security (IWSEC 2022), Lecture Notes in Computer Science (LNCS), vol.13504, pp.66-84, (8, 2022).
  11. Shuhei Enomoto, Hiroki Kuzuno,
    FlushBlocker: Lightweight mitigating mechanism for CPU cache flush instruction based attacks,
    The 6th IEEE European Symposium on Security and Privacy Workshop (EuroSPW 2021), The 3rd edition of our workshop on the Security of Software / Hardware Interfaces (SILM 2021), pp.74-79 (9, 2021).
  12. Hiroki Kuzuno, Toshihiro Yamauchi,
    KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption,
    The 16th International Workshop on Security (IWSEC 2021), Lecture Notes in Computer Science (LNCS), vol.12835, pp.45-63, (9, 2021), Best Paper Award.
  13. Hiroki Kuzuno, Toshihiro Yamauchi,
    MKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption,
    The 15th International Workshop on Security (IWSEC 2020), Lecture Notes in Computer Science (LNCS), vol.12231, pp.97-116, (9, 2020).
  14. Hiroki Kuzuno, Toshihiro Yamauchi,
    KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism,
    The 15th International Conference on Information Security Practice and Experience (ISPEC 2019), Lecture Notes in Computer Science (LNCS), vol.11879, pp.75-94, (11, 2019).
  15. Hiroki Kuzuno, Shun Inagaki, Kenichi Magata,
    Constructing a Complete Timeline of a Security Incident by Aggregating Reports,
    The 13th Asia Joint Conference on Information Security (AsiaJCIS 2018), Aug, 2018.
  16. Hiroki Kuzuno, Shintaro Otsuka
    Early Detection of Network Incident using Open Security Information,
    Workshop of the 32-nd IEEE International Conference on Advanced Information Networking and Applications (WAINA 2018), May, 2018.
  17. Gongxian Zeng, Siu Ming Yiu, Jun Zhang, Hiroki Kuzuno, Man Ho Au,
    A Nonoutsourceable Puzzle under GHOST Rule,
    The fifteenth International Conference on Privacy, Security and Trust (PST 2017), Aug, 2017.
  18. Hiroki Kuzuno, Christian Karam,
    Blockchain Explorer: An Analytical Process and Investigation Environment for Bitcoin,
    The 12th Symposium on Electronic Crime Research (eCrime 2017), Apr, 2017.
  19. Hiroki Kuzuno, Kenichi Magata,
    Detecting Advertisement Module Network Behavior with Graph Modeling,
    The 9th Asia Joint Conference on Information Security (AsiaJCIS 2014), Sep, 2014, Best Paper Award.
  20. Hiroki Kuzuno, Satoshi Tonami,
    Signature Generation for Sensitive Information Leakage in Android Applications,
    The 1st International Workshop on Mobile Data Analytics (MoDA 2013),
    In Conjunction with IEEE International Conference on Data Engineering (ICDE 2013), Apr, 2013.
  21. Takashi Katoh, Hiroki Kuzuno, Takuya Kawahara, Atsumu Watanabe, Yushi Nakai, Bhed Bahadur Bista, Toyoo Takata,
    A Wide Area Log Analyzing System Based on Mobile Agents,
    International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), Dec, 2006.

Refereed Conference Posters and Presentations

  1. Shuhei Enomoto, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii,
    Effective Mitigation for XMRig-based Cryptojacking on Web Servers,
    15th ACM SIGOPS Asia-Pacific Workshop on Systems (APSys 2024), Sep, 2024, Poster.
  2. Soohyun Jung, Yoshiaki Shiraishi, Takashi Ozu, Takashi Matsunaka, Masami Mohri, Hiroki Kuzuno, Masakatu Morii,
    Re-learning Techniques for Continuous Operation of Automated Vulnerability Assessment System,
    The International Symposium on Information Theory and Its Applications (ISITA 2022), Oct, 2022, Poster.
  3. Hiroki Kuzuno, Shintaro Otsuka,
    A Practical Finding Method of Network Incident with Open Security Information,
    The 12th International Workshop on Security (IWSEC 2017), Aug, 2017, Poster.
  4. Hiroki Kuzuno, Christian Karam,
    Practical Analyzing the Relation of Wallet Addresses in Bitcoin,
    The 16th Annual DFRWS USA 2016, Aug, 2016, Presentation.
  5. Hiroki Kuzuno, Christian Karam,
    BlockChain Explorer 2.0 : A Practical Analysis for Wallet Address Relation in Bitcoin,
    The Third Annual DFRWS 2016 EUROPE (DFRWS EU 2016), Mar, 2016, Poster.

Invited Presentations

  1. Hiroki Kuzuno, Toshihiro Yamauchi,
    Kernel Memory Inspection Capability for Malicious Kernel Module Detection (from CSS 2018),
    The 14th International Workshop on Security (IWSEC 2019), Aug, 2019, Presentation.