Yusuke KAWAMOTO

I am a research scientist at AIST (National Institute of Advanced Industrial Science and Technology) in Japan.

From 2012 to 2013 I was a research fellow at School of Computer Science, the University of Birmingham in United Kingdom.

Research

My research topic is the foundation of information security, especially the design, analyses and verification of probabilistic programs and protocols by:

  1. the symbolic approach (based on mathematical logic);
  2. the information theoretical approach (based on information theory and statistics);
  3. the computational approach (based on computational complexity theory).

In particular, I recently study

  • the formal verification of quantitative properties in probabilistic programs
    (e.g. a hybrid approach that combines the symbolic approach with the statistical one to quantify information leakage);
  • the design of quantitative privacy mechanisms
    (e.g. extended differential privacy mechanisms, and game-based defender mechanisms).

More details can be found in the following page: http://researchmap.jp/y_kawamoto/?lang=english

B

Publications

  1. Differentially Private Obfuscation Mechanisms for Hiding Probability Distributions.
    Yusuke Kawamoto and Takao Murakami.
    Submitted to a conference, 2019.
  2. Utility-Optimized Local Differential Privacy Mechanisms for Distribution Estimation.
    Takao Murakami and Yusuke Kawamoto.
    Proc. of the 28th USENIX Security Symposium (USENIX Security 2019) , 2019.
  3. User Manual for leakiEst v.1.4 — a Tool for Estimating Information Leakage.
    Tom Chothia, Yusuke Kawamoto, and Chris Novakovic.
    February 2019.
  4. On the Anonymization of Differentially Private Location Obfuscation.
    Yusuke Kawamoto and Takao Murakami.
    Proc. of the 2018 International Symposium on Information Theory and Its Applications (ISITA 2018), October 2018.
  5. Hybrid Statistical Estimation of Mutual Information and its Application to Information Flow.
    Fabrizio Biondi, Yusuke Kawamoto, Axel Legay, and Louis-Marie Traonouez.
    Formal Aspects of Computing, October, 2018. [alphabetical authorship]
  6. A Game-Theoretic Approach to Information-Flow Control via Protocol Composition.
    Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, and Catuscia Palamidessi.
    Entropy, 20(5:382), pp.1-43, May 2018. [alphabetical authorship]
  7. Leakage and Protocol Composition in a Game-Theoretic Perspective.
    Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, and Catuscia Palamidessi.
    Proc. of the 7th International Conference on Principles of Security and Trust (POST 2018), Lecture Notes in Computer Science, Vol. 10804, pp. 134-159, April 2018. [alphabetical authorship]
  8. Information Leakage Games.
    Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, and Catuscia Palamidessi.
    Proc. of the 8th International Conference on Decision and Game Theory for Security (GameSec 2017), Lecture Notes in Computer Science, Vol. 10575, pp.437-457, October 2017. [alphabetical authorship]
  9. User Manual for HyLeak v.1.0: Hybrid Analysis Tool for Information Leakage.
    Fabrizio Biondi, Yusuke Kawamoto, Axel Legay, and Louis-Marie Traonouez.
    October 2017. [alphabetical authorship]
  10. HyLeak: Hybrid Analysis Tool for Information Leakage.
    Fabrizio Biondi, Yusuke Kawamoto, Axel Legay, and Louis-Marie Traonouez.
    Proc. of the 15th International Symposium on Automated Technology for Verification and Analysis (ATVA 2017), Lecture Notes in Computer Science, Vol. 10482, pp.156-163, October 2017. [alphabetical authorship]
  11. On the Compositionality of Quantitative Information Flow.
    Yusuke Kawamoto, Konstantinos Chatzikokolakis, and Catuscia Palamidessi.
    Logical Methods in Computer Science, Vol.13, No.3:11, pp.1-31, August 2017.
  12. プライバシの定量的モデルと保護メカニズム.
    川本 裕輔.
    日本応用数理学会2017年度年会 「数理的技法による情報セキュリティ」研究部会 特別講演, September 2017. (In Japanese)
  13. 暗号系の安全性検証 — 入門から計算機による証明まで.
    川本 裕輔.
    コンピュータソフトウェア, Vol.33 No.4, pp.67-83, November 2016. (In Japanese)
  14. Hybrid Statistical Estimation of Mutual Information for Quantifying Information Flow.
    Yusuke Kawamoto, Fabrizio Biondi, and Axel Legay.
    In Proc. of 21st International Symposium on Formal Methods (FM 2016), Lecture Notes in Computer Science, Vol.9995, pp.406-425, November 2016.
  15. Quantitative Information Flow for Scheduler-Dependent Systems.
    Yusuke Kawamoto and Thomas Given-Wilson.
    In Proc. of 13th International Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL 2015), Electronic Proceedings in Theoretical Computer Science, Vol.194, pp.48-62, September 2015.
  16. LeakWatch: Estimating Information Leakage from Java Programs.
    Tom Chothia, Yusuke Kawamoto, and Chris Novakovic.
    In Proc. of 19th European Symposium on Research in Computer Security (ESORICS 2014) Part II, Lecture Notes in Computer Science, Vol.8713, pp.219-236, September 2014. [alphabetical authorship]
  17. Compositionality Results for Quantitative Information Flow.
    Yusuke Kawamoto, Konstantinos Chatzikokolakis, and Catuscia Palamidessi.
    In Proc. of 11th International Conference on Quantitative Evaluation of SysTems (QEST 2014), Lecture Notes in Computer Science, Vol.8657, pp.368-383, September 2014.
  18. 形式手法の計算論的健全性. 川本 裕輔.
    応用数理ハンドブック, 朝倉書店, pp.262-263, November 2013.(In Japanese)
  19. A Tool for Estimating Information Leakage.
    Tom Chothia, Yusuke Kawamoto, and Chris Novakovic.
    In Proc. of 25th International Conference on Computer Aided Verification (CAV 2013), Lecture Notes in Computer Science, Vol.8044, pp.690-695, July 2013. [alphabetical authorship]
  20. Probabilistic Point-to-Point Information Leakage.
    Tom Chothia, Yusuke Kawamoto, Chris Novakovic, and David Parker.
    In Proc. of 26th IEEE Computer Security Foundations Symposium (CSF 2013), pp.193-205, June 2013. [alphabetical authorship]
  21. Efficient padding oracle attacks on cryptographic hardware.
    Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato, Graham Steel, and Joe-Kai Tsay.
    In Advances in Cryptology - 32nd International Cryptology Conference (CRYPTO 2012), Lecture Notes in Computer Science, Vol.7417, pp.608-625, August 2012. [alphabetical authorship]
  22. Computational soundness of indistinguishability properties without computable parsing.
    Hubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto, and Hideki Sakurada.
    In Proc. of the 8th International Conference on Information Security Practice and Experience (ISPEC 2012), Lecture Notes in Computer Science, Vol.7232, pp.63-79, April 2012. [alphabetical authorship]
  23. Applied Pi-Calculusの計算論的健全性のパーズを用いない証明.
    ウベール・コモン-ルンド, 萩谷 昌己, 川本 裕輔, 櫻田 英樹.
    第12回プログラミングおよびプログラミング言語ワークショップ(PPL2010)論文集, pp.131-145, March 2010. (In Japanese) [alphabetical authorship]
  24. Computationally sound formalization of rerandomizable RCCA secure encryption.
    Yusuke Kawamoto, Hideki Sakurada, and Masami Hagiya.
    Formal to Practical Security, Lecture Notes in Computer Science, Vol.5458, pp.158-180, May 2009.
  25. Computational and Symbolic Anonymity in an Unbounded Network.
    Hubert Comon-Lundh, Yusuke Kawamoto, and Hideki Sakurada.
    JSIAM Letters, The Japan Society for Industrial and Applied Mathematics, Vol.1 (2009), pp.28-31, May 2009. [alphabetical authorship]
  26. Computationally sound symbolic anonymity of a ring signature.
    Yusuke Kawamoto, Hideki Sakurada, and Masami Hagiya.
    In Proc. of Joint Workshop on Foundations of Computer Security, Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (FCS-ARSPA-WITS 2008), pp.161-175, Pittsburgh, USA, June 2008.
  27. 関数部分知識と匿名性検証(理論,数理的技法による情報セキュリティ,<特集>平成19年研究部会連合発表会).
    川本 裕輔, 真野 健, 櫻田 英樹, 萩谷 昌己.
    日本応用数理学会論文誌, Vol.17, No.4(20071225), pp.559-576, December 2007. (In Japanese)

Lectures

Contact

Dr Yusuke Kawamoto
AIST Tsukuba Central 1,
1-1-1 Umezono, Tsukuba, Ibaraki 305-8568 JAPAN.