Homepage of Yutaka Oiwa @ AIST


About Me

Yutaka OIWA, Ph. D.

Deputy Director
and Team Leader for Continuum Computing Trustworthiness Research Team
Digital Architecture Research Center
National Institute of Advanced Industrial Science and Technology (AIST)

Specialty

  • Computer System Security
  • Software Science and Engineering
    • Programming Language (Theory, Design and Implementation)
  • Network Protocol and Architecture

Research History

News

Research Topics

(1) Software Quality Assurance for Artificial Intelligence and Cyber-Physical Systems

We work on quality assurance process and related software engineering technologies (testing, analysis, verification etc.) for the contemporary software technologies, especially those using a data-driven automatic code-generation (i.e. machine-learning / artificial intelligence) or probabilistic (randomized, non-deterministic) executions. We will find out how these kinds of software can be ensured a high level of reliability and fitted in the existing requirements and processes for software security and safety managements.

AIQA project

(2) Trustworthiness Architecture for near-future CPS Infrastructure

Evolution of “Internet of Things” (IoT) brings us much closer connection between the physical and the “cyber” world. Some expects more than one trillion sensors will be around the connected world in 2030. However, we concern that the current design of the Internet have not enough agility, flexibility, and strength on the aspect of security and management to accommodate such huge numbers of nodes.

We are designing a near-future architecture of the Internet, which will provide better security, privacy and flexibility to its users, still preserving open nature of the Internet.

Doormen Project [in preparation]

(3) Safe Execution of Computer Programs

These days, security holes caused by program bugs introduces critical situations such as information leakage (e.g. credit card numbers) or service interruptions. I am currently working on safe execution methods of programs.

Especially, I constructed the Fail-Safe ANSI C Compiler, which prevents all kinds of memory-corruption attacks (such as buffer overrun exploits) for full ANSI C90 language.

(4) Safety of Web application and network protocols

Protocols, implementations of the protocols, or the implementation of the application on the Internet often contain many bugs or defects, which sometimes cause security vulnerabilities. We analyze such vulnerabilities, report those to the developers, and tries to summarize the fundamental and effective approaches to prevent such vulnerabilities.

Misc

Links