Photo
  • Position: Associate Professor
  • Ph.D in Engineering (Okayama University)
  • Affiliate: Okayama Prefectural University, Faculty of Computer Science and Systems Engineering, Department of Information and Communication Engineering, System Software Engineering Laboratory
  • mailto: masaya _at_ c.oka-pu.ac.jp
  • Address: 111 Kuboki, Soja, Okayama, Japan.

Biography

  • 2013-2014: JSPS research fellow
  • Sep. 2014: Received Ph.D degree from Okayama University
  • Dec. 2014-Mar.2021 : Assistant professor of Okayama University
  • Apr. 2021- : Associate professor of Okayama Prefectural University (Present)

Research Topics

  • Computer System Security (Operating Systems and Virtual Machine Monitors)
  • Secure logging
  • Complication of Process Identification

Publications

Refereed Journals

  1. Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi,
    “Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM,”
    Journal of Internet Services and Information Security, Vol. 12, No. 1, pp. 26–43 (02, 2022).
  2. Yuta Imamura, Rintaro Orito, Hiroyuki Uekawa, Kritsana Chaikaew, Pattara Leelaprute, Masaya Sato, Toshihiro Yamauchi,
    “Web access monitoring mechanism via Android WebView for threat analysis,”
    International Journal of Information Security (01, 2021).
    [10.1007/s10207-020-00534-3]
  3. Yuuki Okuda, Masaya Sato, Hideo Taniguchi,
    “Implementation and Evaluation of Communication-Hiding Method by System Call Proxy,”
    International Journal of Networking and Computing, Vol. 9, No. 2, pp. 217–238 (2019). (Open Access)
  4. Masaya Sato, Hideo Taniguchi,
    “OFF2F: A New Object File Format for Virtual Memory Systems to Support Volatile/Non-volatile Memory-Mixed Environment,”
    International Journal of Machine Learning and Computing, Vol. 9, No. 4, pp. 387–392 (2019).
    [10.18178/ijmlc.2019.9.4.815](Open Access)
  5. Masaya Sato, Hideo Taniguchi, Toshihiro Yamauchi,
    “Design and Implementation of Hiding Method for File Manipulation of Essential Services by System Call Proxy using Virtual Machine Monitor,”
    International Journal of Space-Based and Situated Computing, Vol. 9, No. 1, pp. 1–10 (05, 2019).
    [DOI: 10.1504/IJSSC.2019.100007]
  6. Shota Fujii, Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi,
    “Design of Function for Tracing Diffusion of Classified Information for IPC on KVM,”
    Journal of Information Processing, Vol. 24, No. 5, pp. 781–792 (09, 2016).
    [DOI: 10.2197/ipsjjip24.781] (Open Access)
  7. Shota Fujii, Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi,
    “Evaluation and Design of Function for Tracing Diffusion of Classified Information for File Operations with KVM,”
    Journal of Supercomputing (SUPE), Vol. 72, Issue 5, pp. 1841–1861 (02, 2016).
    [DOI: 10.1007/s11227-016-1671-5]
  8. Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi,
    “Process Hiding by Virtual Machine Monitor for Attack Avoidance,”
    Journal of Information Processing, Vol. 23, No. 5, pp. 673–682 (09, 2015).
    [DOI: 10.2197/ipsjjip23.673] (Open Access)
    Specially Selected Paper
  9. Masaya Sato, Toshihiro Yamauchi,
    “Secure and Fast Log Transfer Mechanism for Virtual Machine,”
    Journal of Information Processing, Vol. 22, No. 4, pp. 597–608 (10, 2014).
    [DOI: 10.2197/ipsjjip22.597] (Open Access)
  10. Masaya Sato and Toshihiro Yamauchi,
    “VMM-Based Log-Tampering and Loss Detection Scheme,”
    Journal of Internet Technology, Vol.13, No.4, pp.655–666 (07, 2012). [draft]
    [DOI: 10.6138/JIT.2012.13.4.13]

Refereed Conferences

  1. Masaya Sato, Ryosuke Nakamura, Toshihiro Yamauchi, Hideo Taniguchi
    “Improving Transparency of Hardware Breakpoints with Virtual Machine Introspection,”
    14th International Conference on E-Service and Knowledge Management (ESKM2022),
    2022 International Congress on Advanced Applied Informatics (IIAI-AAI), pp. 113–117 (07, 2022).
  2. Kohei Otani, Toshiki Okazaki, Toshihiro Yamauchi, Hideaki Moriyama, Masaya Sato, Hideo Taniguchi,
    “Function for Tracing Diffusion of Classified Information to Support Multiple VMs with KVM,”
    8th International Workshop on Information and Communication Security (WICS2021), pp. 352–358 (11, 2021).
    [DOI: 10.1109/CANDARW53999.2021.00066]
  3. Takashi Ishihara, Masaya Sato, Toshihiro Yamauchi,
    “Method of Generating a Blacklist for Mobile Devices by Searching Malicious Websites,”
    7th International Workshop on Information and Communication Security (WICS 2020) (11,2020).
    [DOI: 10.1109/CANDARW51189.2020.00070]
  4. Masaya Sato, Hideo Taniguchi, Ryosuke Nakamura,
    “Virtual Machine Monitor-based Hiding Method for Access to Debug Registers,”
    The Eighth International Symposium on Computing and Networking (CANDAR'20)(11,2020).
    [DOI: 10.1109/CANDAR51075.2020.00036]
  5. Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi,
    “Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM,”
    Advances in Intelligent Systems and Computing, Vol. 1264 (2021).
    Advances in Networked-Based Information Systems (NBiS)
    [DOI: 10.1007/978-3-030-57811-4_32]
  6. Yuya Kobayashi, Masaya Sato, Hideo Taniguchi,
    “Evaluation of Processing Distribution for Application Program and OS in Microkernel OS,”
    Proceedings of 2019 Seventh International Symposium on Computing and Networking Workshops (CANDARW), pp.440–444 (11, 2019).
    10th International Workshop on Advances in Networking and Computing (WANC).
    [DOI: 10.1109/CANDARW.2019.00083]
  7. Yuta Imamura, Rintaro Orito, Kritsana Chaikaew, Celia Manardo, Pattara Leelaprute, Masaya Sato, Toshihiro Yamauchi,
    “Threat Analysis of Fake Virus Alerts Using WebView Monitor,”
    Proceedings of 2019 Seventh International Symposium on Computing and Networking (CANDAR), pp.28–36 (11, 2019).
    The Seventh International Symposium on Computing and Networking (CANDAR'19)
    [DOI: 10.1109/CANDAR.2019.00012]
  8. Masaya Sato, Yuta Imamura, Rintaro Orito, Toshihiro Yamauchi,
    “(Short Paper) Method for Preventing Suspicious Web Access in Android WebView,”
    Lecture Notes in Computer Science, Vol.11689, pp.241–250 (08, 2019).
    The 14th International Workshop on Security (IWSEC2019)
    [DOI: 10.1007/978-3-030-26834-3_14]
  9. Yuuki Okuda, Masaya Sato, Hideo Taniguchi,
    “Hiding Communication of Essential Services by System Call Proxy,”
    The Sixth International Symposium on Computing and Networking (CANDAR'18), pp.47–56 (11, 2018).
    CANDAR 2018 Best Paper Award.
    [DOI: 10.1109/CANDAR.2018.00014]
  10. Masaya Sato, Hideo Taniguchi, Toshihiro Yamauchi,
    “Hiding File Manipulation of Essential Services by System Call Proxy,”
    Lecture Notes on Data Engineering and Communications Technologies, Vol. 22, pp.853–863 (09, 2018).
    The 7-th International Workshop on Advances in Data Engineering and Mobile Computing (DEMoC-2018).
    [DOI: 10.1007/978-3-319-98530-5_76]
  11. Yuta Imamura, Hiroyuki Uekawa, Yasuhiro Ishihara, Masaya Sato, Toshihiro Yamauchi,
    “Web Access Monitoring Mechanism for Android WebView,”
    Proceedings of the Australasian Computer Science Week Multiconference, pp.1:1–1:8 (01, 2018).
    Australasian Information Security Conference 2018 (AISC 2018).
    (AISC 2018 Best Paper Award)
    [DOI: 10.1145/3167918.3167942]
  12. Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi,
    “Performance Improvement and Evaluation of Function for Tracing Diffusion of Classified Information on KVM,”
    4th International Workshop on Information and Communication Security (WICS2017),
    2017 Fifth International Symposium on Computing and Networking, pp.463–468 (11, 2017).
    [DOI: 10.1109/CANDAR.2017.91]
  13. Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi,
    “Memory Access Monitoring and Disguising of Process Information to Avoid Attacks to Essential Services,”
    3rd International Workshop on Information and Communication Security (WICS2016),
    2016 Fourth International Symposium on Computing and Networking, pp.635–641 (11, 2016).
    [DOI: 10.1109/CANDAR.2016.0114]
  14. Masaya Sato, Toshihiro Yamauchi,
    “Complicating Process Identification by Replacing Process Information for Attack Avoidance,”
    The 9th International Workshop on Security (IWSEC2014),
    Lecture Notes in Computer Science (LNCS), vol.8639, pp.33–47 (08, 2014).
    [DOI: 10.1007/978-3-319-09843-2_3]
  15. Masaya Sato, Toshihiro Yamauchi,
    “Secure Log Transfer by Replacing a Library in a Virtual Machine,”
    The 8th International Workshop on Security (IWSEC2013),
    Lecture Notes in Computer Science (LNCS), Vol.8231, pp.1–18, (11, 2013).
    [DOI: 10.1007/978-3-642-41383-4_1]
  16. Masaya Sato and Toshihiro Yamauchi,
    “VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss,”
    2011 International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD'11) (In conjunction with ARES 2011),
    Lecture Notes in Computer Science (LNCS), Vol.6908, pp.176–190, (08, 2011).
    [DOI: 10.1007/978-3-642-23300-5_14]

Posters and Non-Refereed Oral Presentations

  1. Sho Takasugi, Masaya Sato, Hideo Taniguchi,
    “OFF2F Program Execution Using Pseudo Non-Volatile Memory,”
    Advances in Networked-based Information Systems, vol.9, no.1, pp.12–18 (01, 2020).
    International Workshop on Networking, Computing, Systems, and Software (NCSS) (11, 2019). (Open Access)
  2. Rintaro Orito, Koki Riho, Yuta Imamura, Masaya Sato and Toshihiro Yamauchi,
    “Threat Analysis of Fake Virus Alerts by Using Web Access Monitoring Mechanism for Android WebView,”
    The 14th International Workshop on Security (IWSEC2019), (8, 2019). (Poster)
  3. Masaya Sato and Toshihiro Yamauchi,
    “Mitigating Attacks Based on Process Identification by Disguising Process Information,”
    9th ACM Symposium on Information, Computer and Communications Security (ASIACCS2014), (06, 2014). (Poster)
  4. Masaya Sato and Toshihiro Yamauchi,
    “Secure log transfer in virtual machine with minimal modification to library,”
    The 7th International Workshop on Security (IWSEC2012), (11, 2012). (Poster)

Invited Sessions

  1. Masaya Sato,
    “Attack Avoiding Method Obscuring Process Identification by Making Process Information Invisible,”
    The 9th International Workshop on Security (IWSEC2014), (08, 2004).

Security Contest

  1. IWSEC Cup 2015 the Bronze Prize of the malware-analysis competition,Team “Security SANKA”, Oct. 2015.

Society

Affiliated to

  • Information Processing Society of Japan (IPSJ)
  • The Institute of Electronics, Information and Communication Engineers (IEICE)
  • Association for Computing Machinery (ACM)

Committees and editors

  • IEICE Transactions on Information and Systems, special section on Forefront Computing, associate editor
  • CANDAR2022 and WICS2022, PC member

Awards

  • 2012 IPSJ Outstanding Paper Award (5/Jun/2013)
  • AISC 2018 Best Paper Award (31/Jan/2018)
  • CANDAR2018 Best Paper Award (29/Nov/2018)
Last update: Apr. 2022