Masana Murase’s research while affiliated with Keio University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (6)


Dependable TCB Based on the Cell Broadband Engine Isolation Facility
  • Conference Paper

October 2011

·

20 Reads

Masana Murase

·

A Trusted Computing Base (TCB) such as a Trusted Platform Module (TPM) or a Mobile Trusted Module plays anessential role for security and privacy applications in embedded systems such as cell phones, smart sensors, and actuators. However, existing hardware-based TCBs lack flexibility for function updates, bug fixes, and feature updates. In this paper, we present a dependable TCB on a Cell Broadband Engine TM processor by providing a hardware and software hybrid TPM. Unlike prior approaches, we provide three new features: (1) TPM functions are implemented in software running in memory isolated by hardware, (2) our software TPM is launched and establishes a chain of trust from the hardware using a secure boot method, and (3) anew TPM command provides dynamic patching to the running software TPM and secure code overlays for the efficient use of the limited resources. We show the feasibility of this hybrid implementation of the TPM by assessing its performance and security properties.


A zero-stop authentication system for sensor-based embedded real-time applications

January 2005

·

6 Reads

·

3 Citations

Abstract, This paper proposes "Zero-stop Authentication" model and system, which realizes automatic, real-time authen-tication in the physical world. Applications in the physical environment such as those at library gates and supermarket counters could benefit from automatic authentication of users. These applications need to detect users using embedded sensors, and authenticate them, and bind objects to them, in real-time. To accomplish such real-time user authentication, model of user mobility, and methods to bind objects to users are required. This paper models and formulates the user mobility and time constraints, and proposes three techniques to correctly bind objects to users. A Zero-stop Authentication System built based on this model is also proposed, which automatically detects and authenticates users, and relates objects to them. The feasibility of real-time authentication is estimated using the model, and error is issued if the check fails. We also describe prototype implementation of the system, and two applications. Secure Library System uses ZSAS to authenticate users at library exits,


Active Authentication for Pervasive Computing Environments

January 2003

·

16 Reads

·

10 Citations

Lecture Notes in Computer Science

We propose a Zero-stop Authentication model, which models the process of actively authenticating users in an environment populated with various mobile and embedded devices. In such an environment, since users are mobile, an authentication mechanism that does not disturb the user movement, and that decreases the user burden is needed. The model determines the timing constraint needed to realize “zero-stop” property from the speed of the users, size of the sensing area, and the overhead of sensing and authentication process. We also present a Zerostop Authentication system to realize the model, and demonstrate the prototype implementation.


Fig. 3. State graph of users and objects  
Fig. 5. Hardware Composition  
Fig. 7. Serialization Scheme  
Fig. 4. Smart Furniture: (a) a testbed for uqibuitous applications; (b) Zero-stop Authentication system with a library application  
Fig. 6. Screen dump of authentication results: (a) waiting for authentication; (b) authentication is successfully done; (c) authentication failure occurs  
Zero-Stop Authentication: Sensor-Based Real-Time Authentication System
  • Conference Paper
  • Full-text available

January 2003

·

149 Reads

·

5 Citations

Lecture Notes in Computer Science

This paper proposes “Zero-stop Authentication” system, which requires no intentional interactions between users and authentication applications. Our Zero-stop Authentication model simplifies the current complicated authentication process by automating detection of users and objects. Our challenge is to eliminate the necessity for users to wait for a moment to be authenticated without reducing security level of authentication. To accomplish such real time user authentication in a physical environment, user mobility needs to be modelled. This paper models and formulates the user mobility and time constraints as “1/N × 1/M model”, considering user speed, sensor coverage areas, communication time between the sensors and the server, and processing time consumed by an authentication process. We also prototyped a library application based on 1/N × 1/M model, and installed it into Smart Furniture [1] which is an experimental platform to examine feasibility of our model.

Download

Implementation and evaluation of Wapplet framework

February 2002

·

15 Reads

·

12 Citations

M. Murase

·

·

T. Nagata

·

[...]

·

It is important for application programmers and users to easily control networked appliances and devices without the need to be aware of their locations. In particular, network transparent control is essential for the ubiquitous computing environment. This is because end-users accomplish their tasks by coordinating devices that they are wearing, such as wearable computers and cellular phones, with various networked appliances, such as display devices and loud speakers. This paper presents the Wapplet framework, a new application framework that addresses this issue for the ubiquitous computing environment. To show the efficiency of the proposed Wapplet framework, we have evaluated it in terms of processing time


Citations (4)


... Furthermore, once the user is authenticated, typical systems do not incorporate any mechanisms for verification of the active user post-login. The lack of post-login verification facility allows unauthorized individuals to access and use any portable device if a password or the initial authentication mechanism is somehow compromised [18]. In addition to this, the widespread use of portable devices like smart phones and tablets, which are more prone to snatching or theft etc., the problem of active user authentication have risen to an alarming state. ...

Reference:

Analysis of interaction trace maps for active authentication on smart devices
Active Authentication for Pervasive Computing Environments
  • Citing Chapter
  • January 2003

Lecture Notes in Computer Science

... In a similar vein, in the "Zero-Stop Authentication" paper by Matsumiya, et al (Matsumiya et al., 2005), the system designers aim to imbue the physical environment with Wi-Fi radios and RFID readers to automatically engage in a challenge-response protocol with the user's cellphone or PDA. "Context-Aware User Authentication" by Bardram, et al (Bardram et al., 2003) also aims to combine location data into an overall authentication decision. ...

A zero-stop authentication system for sensor-based embedded real-time applications
  • Citing Article
  • January 2005

... In the ubiquitous computing field, the main issue is to synthesize network services. Wapplet [4]and STONE [5] technologies have also focused on synthesizing network services. These proposed technologies are designed for functional integration in a ubiquitous network. ...

Implementation and evaluation of Wapplet framework
  • Citing Conference Paper
  • February 2002