Formalizing Statistical Causality via Modal Logic.
Yusuke Kawamoto, Tetsuya Sato, and Kohei Suenaga. Proc. of the 18th European Conference on Logics in Artificial Intelligence (JELIA 2023), Lecture Notes in Computer Science, Vol. 14281, pp.681-696,
September 2023.
Locality Sensitive Hashing with Extended Differential Privacy.
Natasha Fernandes, Yusuke Kawamoto, Takao Murakami.
[alphabetical authorship] Proc. of the 26th European Symposium on Research in Computer Security (ESORICS 2021), Part II, Lecture Notes in Computer Science Vol. 12973, pp.563-583,
October 2021.
Statistical Epistemic Logic.
Yusuke Kawamoto. The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy, Lecture Notes in Computer Science, Vol.11760, pp.344-362,
November 2019.
.
Local Distribution Obfuscation via Probability Coupling.
Yusuke Kawamoto and Takao Murakami. Proc. of the 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton 2019), pp.718-725,
September, 2019.
Local Obfuscation Mechanisms for Hiding Probability Distributions.
Yusuke Kawamoto and Takao Murakami. Proc. of the 24th European Symposium on Research in Computer Security (ESORICS 2019), Part I, Lecture Notes in Computer Science, Vol.11735, pp.128-148,
September 2019.
Leakage and Protocol Composition in a Game-Theoretic Perspective.
Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, and Catuscia Palamidessi.
[alphabetical authorship] Proc. of the 7th International Conference on Principles of Security and Trust (POST 2018), Lecture Notes in Computer Science, Vol.10804, pp. 134-159,
April 2018.
▷ Extended version published in Entropy.
Information Leakage Games.
Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, and Catuscia Palamidessi.
[alphabetical authorship] Proc. of the 8th International Conference on Decision and Game Theory for Security (GameSec 2017), Lecture Notes in Computer Science, Vol.10575, pp.437-457,
October 2017.
▷ Extended version published in ACM TOPS.
HyLeak: Hybrid Analysis Tool for Information Leakage.
Fabrizio Biondi, Yusuke Kawamoto, Axel Legay, and Louis-Marie Traonouez.
[alphabetical authorship] Proc. of the 15th International Symposium on Automated Technology for Verification and Analysis (ATVA 2017), Lecture Notes in Computer Science, Vol.10482, pp.156-163,
October 2017.
▷ Extended version published in Formal Aspects of Computing.
▷ Software HyLeak.
Quantitative Information Flow for Scheduler-Dependent Systems.
Yusuke Kawamoto and Thomas Given-Wilson.
In Proc. of 13th International Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL 2015),
Electronic Proceedings in Theoretical Computer Science, Vol.194, pp.48-62,
September 2015.
LeakWatch: Estimating Information Leakage from Java Programs.
Tom Chothia, Yusuke Kawamoto, and Chris Novakovic.
[alphabetical authorship]
In Proc. of 19th European Symposium on Research in Computer Security (ESORICS 2014) Part II,
Lecture Notes in Computer Science, Vol.8713, pp.219-236,
September 2014.
▷ Software LeakWatch.
形式手法の計算論的健全性.
川本 裕輔. 応用数理ハンドブック, 朝倉書店, pp.262-263,
November 2013.(In Japanese)
A Tool for Estimating Information Leakage.
Tom Chothia, Yusuke Kawamoto, and Chris Novakovic.
[alphabetical authorship]
In Proc. of 25th International Conference on Computer Aided Verification (CAV 2013),
Lecture Notes in Computer Science, Vol.8044, pp.690-695,
July 2013.
▷ Software leakiEst [user manual].
Probabilistic Point-to-Point Information Leakage.
Tom Chothia, Yusuke Kawamoto, Chris Novakovic, and David Parker.
[alphabetical authorship]
In Proc. of 26th IEEE Computer Security Foundations Symposium (CSF 2013), pp.193-205,
June 2013.
▷ Software CH-IMP.
Efficient padding oracle attacks on cryptographic hardware.
Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato, Graham Steel, and Joe-Kai Tsay.
[alphabetical authorship]
In Advances in Cryptology - 32nd International Cryptology Conference (CRYPTO 2012), Lecture Notes in Computer Science, Vol.7417, pp.608-625,
August 2012.
Computational soundness of indistinguishability properties without computable parsing.
Hubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto, and Hideki Sakurada.
[alphabetical authorship]
In Proc. of the 8th International Conference on Information Security Practice and Experience (ISPEC 2012), Lecture Notes in Computer Science, Vol.7232, pp.63-79,
April 2012.
Computational and Symbolic Anonymity in an Unbounded Network.
Hubert Comon-Lundh, Yusuke Kawamoto, and Hideki Sakurada.
[alphabetical authorship] JSIAM Letters,
The Japan Society for Industrial and Applied Mathematics, Vol.1 (2009), pp.28-31,
May 2009.
Computationally sound symbolic anonymity of a ring signature.
Yusuke Kawamoto, Hideki Sakurada, and Masami Hagiya.
In Proc. of Joint Workshop on Foundations of Computer Security, Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (FCS-ARSPA-WITS 2008), pp.161-175, Pittsburgh, USA,
June 2008.
関数部分知識と匿名性検証.
川本 裕輔, 真野 健, 櫻田 英樹, 萩谷 昌己.
<特集>平成19年研究部会連合発表会 数理的技法による情報セキュリティ,
日本応用数理学会論文誌, Vol.17, No.4(20071225), pp.559-576,
December 2007. (In Japanese)