Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
2008/3/27 1
Introduction of Institute of Systems & Introduction of Institute of Systems & Information Technologies/ KYUSHU (ISIT)Information Technologies/ KYUSHU (ISIT)
Kouichi Sakurai (ISIT, Kyushu University)
The name will be changed from this AprilThe name will be changed from this April九州先端技術研究所九州先端技術研究所(Institute of Systems & Information (Institute of Systems & Information Technologies & Technologies & nanonano--technologies)technologies)
2008/3/27 2
About ISITAbout ISIT
Establishment: Dec. 1995
Purpose: to be a hub of Research institutions for ITto be a hub of Research institutions for IT
Fund: 300million YEN – including 250million YEN from FUKUOKA CITY
Staffs: 40 (including assistant staffs)
Activities:– R&D(Technology Transfer/Use of Advances in Research
– Exchange meetings
– Consulting
– Information gathering and offering
– Development of human resources
2008/3/27 3
LocationLocation
Software Research Park,Momochi-hama
Institute of Systems & Information
Systems/ KYUSHU
TOKYO
FUKUOKA1000KM
2008/3/27 4
LocationLocation
Kyushu Univ.
Fukuoka InternationalAirport
ISITISITKyushu Univ
New Campus.
2008/3/27 5
ISIT in Fukuoka Software Research ParkISIT in Fukuoka Software Research Park
Yahoo DOME
Fukuoka Tower
Fukuoka Software Research Park
Fukuoka Software Research Park Area[63,000m2 ]
Fukuoka Software Research Park Center BuildingInstitute of Systems & Information
Technologies / KYUSHU
Central InstitutionCentral InstitutionISITISIT
2008/3/27 6
Budget of Balance 2005
Item AmountSubsidy from Fukuoka City
260
Balance Carried Forward
45
Business Income 66Supporting Membership Fee
12
Asset Maintenance Income
1
Total 384
INCOME EXPENSESItem AmountResearch Development Exps
81
Other Exps. (Fixed Assets)
7
Total 339
Personal Exps. 171Management Exps. 75
Exchange Program Exp.
5
Balance Carried Forward
453
Units=JPY;million
2008/3/27 7
3
Keiichi Ishikawa(A representative memberof Kyushu Keizai DoyukaiCommittee)(Adviser of Kyushu Electric Power Co.,Inc.)
Takaharu Nomura( Fukuoka City )
Kazuaki Murakami(Prof. Kyushu Univ.)
1Kouichi Sakurai
(Prof. Kyushu Univ.)2+1
Yoshihiko Kimuro(Dr.Eng.)2+1
4
Chairman
Vice Chairman
Lab 3
Research Planning
General Affairs
Project Promoting
Operating
Secretary General
Lab 2
Lab 1
Vice President
President
Managing Director
2+1
3
3+1
2
Red:regularBlack:from from the private companiesBlue:from Fukuoka City Office
OrganizationOrganization
Takenori Morimitsu
Kazuo Ushijima(Prof. Emeritus of Kyushu Univ.)
(Dean of Faculty of InformationScience,Kyushu Sangyo Univ.)
2008/3/27 8
LaboratoriesLaboratories
ISIT has three laboratories:
1st Laboratory – Research Director: Prof. Murakami (Kyushu University)
– Theme: Development of Key Technology for System-on-a-Chip and its Popularization
2nd Laboratory (Security Research Laboratory from April)– Research Director: Prof. Sakurai (Kyushu University)
– Theme: Information Security for Social Systems
3rd Laboratory– Research Director: Dr. Kimuro (Regular member of ISIT)
– Theme: Achievement of User-Friendly Interface Environments
※※ 44thth laboratory will be added in this Aprillaboratory will be added in this April-- NanotechnologiesNanotechnologies
2008/3/27 9
The 1The 1stst LaboratoryLaboratory
Development of Key Technology for System-on-a-Chip and its Popularization
– A Novel Architecture of Reconfigurable System LSI
Redefis, Systemorph
– Cost Reduction Techniques of Testing Large Scale System LSI
2008/3/27 10
Chu-ouPark
Zone for Elder
Town
Terminals of Distributed Vision System
Wireless LAN (5GHz)
Information Management Center
Robotic Facilities
海浜
The 3rd LaboratoryAchievement of User-Friendly Interface EnvironmentsThe 3The 3rdrd LaboratoryLaboratoryAchievement of User-Friendly Interface Environments
Intellectual Car for Elders
Robots
GPS Low Altitude Flying Object
Introducing User on Wheelchair to his/her destination
In Hospital
In Shops
・Goods with IC tags・IC Tags on the FloorRobots seek the goods which user want to buy.
IC Tags
IC Tags
Sensor
2008/3/27 11
Introduction of Introduction of The The 22ndnd LaboratoryLaboratory
2008/3/27 12
Members of 2Members of 2ndnd LaboratoryLaboratory
2nd Laboratory Director K. Sakurai2nd Laboratory
Director K. Sakurai
Extra-ResearcherY. Hori (Kyushu Univ.)
ExtraExtra--ResearcherResearcherY. Hori Y. Hori (Kyushu Univ.)(Kyushu Univ.)
ResearcherK. TakahashiResearcherResearcher
K. TakahashiK. Takahashi PrivacyPrivacy
Visualization Visualization forfor Network Traffic MonitoringNetwork Traffic Monitoring
ResearcherY. HashimotoResearcherResearcher
YY. . HashimotoHashimoto
ResearcherM.Fujii
ResearcherResearcherM.FujiiM.Fujii Intrusion DetectionIntrusion Detection
CryptographyCryptography
Extra-ResearcherY. Kasahara (Kyushu Univ.)
ExtraExtra--ResearcherResearcherY. Y. KasaharaKasahara (Kyushu Univ.)(Kyushu Univ.)
Extra-ResearcherT. Tabata (Okayama Univ.)
ExtraExtra--ResearcherResearcherT. T. TabataTabata (Okayama Univ.)(Okayama Univ.) Secure OS Secure OS ––SELinuxSELinux
Network Security Network Security ––Intrusion DetectionIntrusion Detection
Past-Researchers: Y. Ueshige (Associate Prof., Nagasaki Univ.)R. Nishi (Panasonic, Ph.D Candidate of Sakurai Lab.), K. Muto (Panasonic)PastPast--Researchers: YResearchers: Y. . UeshigeUeshige ((Associate Prof., NagasakiAssociate Prof., Nagasaki Univ.)Univ.)R. Nishi (Panasonic, R. Nishi (Panasonic, Ph.DPh.D Candidate of Sakurai Lab.), K. Muto (Panasonic)Candidate of Sakurai Lab.), K. Muto (Panasonic)
2008/3/27 13
Our ResearchOur Researcheses
Information ProtectionInformation Protection based onbased onUserUser’’s Schemes Scheme
Researcher: Ken-ichi TakahashiVarious services will require user’s information for confirming the user can receive the services.confirming the user can receive the services.
In communicating user withservice systems, thereis a risk of risk of compromiscompromis--inging privacyprivacy.
We propose users to protect their informationbased their protectionschemes
HOWEVER
THEREFORE
ServicesA User
nameright
money:
Only habitants can use it
Do you have the right of copying these papers?
Are you more than 20 years old?
2008/3/27 14
Our ResearchesOur Researches
On Public Key Cryptosystems with Multi-Variable Polynomials
Researcher: Yasufumi Hashimoto
The purpose is to establish/ improve some public key cryptosystems with multi-variable polynomials
A Study on Intrusion Detection with Third-parties Supports
Researcher: Masakazu Fujii
The main purpose of the research is to mitigate the spread of corrupted machines– It is difficult to completely defend machines from attackers
– We propose a new methodology to detect intrusions by the notifications from third-parties
2008/3/27 15
Competitive Fund from OutsideCompetitive Fund from Outside (2008)(2008)
Strategic International Cooperative Program (JST)“Information Protection based on Relationships of Trust among Agents in
Ubiquitous/Pervasive Computing Environments“
– Term: Dec., 2005 – Mar., 2009
Grant-in-Aid for Scientific Research (KAKENHI) (JSPS) “A Research on Privacy Protection with Trustable Programs”
– Term: Apr.,2006 – Mar., 2009
戦略的基盤技術高度化支援事業 (MIC)“Development of Secure SQL DB for Embedded System”
– Term: Dec. 2007 – Nov. 2010
Strategic Information and Communications R&D Promotion Program (METI)“Development of a Business Matching System for Small-and-medium
Companies based on Agent-based Community Network”
– Term: Apr. 2005- Mar. 2008
2008/3/27 16
TowardsTowards CollaboratCollaborationionss
We exchange MOU with following institutes and universities.
- Electronics and Telecommunications Research Institute (ETRI), Korea
- Security Engineering Research Center (SERC), Hannam University, Korea
- Cryptology Research Society of India (CRSIND)
- Information System Security Laboratory (ISSL), School of Software, Tsing-Hua University, China
- Taiwan Information Security Center (TWISC), Taiwan
- School of Management, National Taiwan University of Science and Technology (School of Management, NTUST)
We exchange RCA with following institutes.
- Institute for Infocomm Research (I2R), Singapore
2008/3/27 17
TowardsTowards CollaborationsCollaborations
To Collaborative Research Network of Information Security in ASIA
2008/3/27 18
TowardsTowards CollaborationCollaborationss
We held many joint meetings with various research institutes & universities– See: our Web site
2008/3/27 19
TowardsTowards CollaborationsCollaborations
Photos of the Workshops
– PKNU/NKNU/Kyushu Univ./ISIT Workshop
– POSTECH/Korea Univ./Kyushu Univ./ISIT Workshop
2008/3/27 20
Our Sponsored EventsOur Sponsored Events
We sponsor Kyushu IT-Office Security Workshop (since 2005)–– PPromotion of romotion of IIndustrialndustrial--AAdministrativedministrative--University CooperationUniversity Cooperation
The 1st Workshop: Security Application, and Countermeasure of Spam in Korea
The 2nd Workshop: Security Management
The 3rd Workshop: Power Line Communication in Korea and Japan
The 4th Workshop: End-user’s security management in Financial Circles
The 5th Workshop: Purpose of the new global standardization for information security and its practical application on ISMS
The 6th Workshop: Automatic analysis of security threats for Information Society
The 7th Workshop: Security on Web 2.0 and
Trusted Computing
2008/3/27 21
Thank you for your attention.Thank you for your attention.
Institute of Systems & Information Technologies/ KYUSHU
2008/3/27 22
2008/3/27 23
Our ResearchOur Researcheses
Biometric Authentication on the InternetBiometric Authentication on the InternetResearcher: Yoshifumi Ueshige(April 2004-March 2007)
Biometrics is available for identification of legitimate users.On-line Banking, other e-business
Biometrics on the Internet for On-line Services!
Biometric information
includes a significant
PRIVACY!!PRIVACY!!
We propose new
Technique of Biometric Technique of Biometric
Information Protection!Information Protection!
INTERNETINTERNET
ClientServer
Biometric Authentication
Threats
ServicesServices
HOWEVER
THEREFORE
2008/3/27 24
PortscanPortscanto SSHto SSH
(Secure Shell)(Secure Shell)
Network Traffic Monitoring withNetwork Traffic Monitoring withInformation VisualizationInformation VisualizationResearcher: Yoshiaki Hori
Network Traffic Monitoring is significant process on Network Security.– Information Visualization technique takes advantage of human visual
processing and pattern recognition for analysis of multi-dimensional large dataset.
We propose Network Traffic Monitoring Tool for Network Network Traffic Monitoring Tool for Network Security.Security.– Design and implementation visualization tool based on browsing IP
network address space interactively.
Our ResearchOur Researcheses
BotnetBotnetbehaviorbehavior