The research fields of this laboratory are information security and information theory. Information security is a field related to a wide range of fields, including mathematics, information theory, cryptography, computer science, and network theory. In principle, fourth-year students begin their graduation research by finding their own theme through meetings within the laboratory. In order to actually proceed with their research, they need to acquire skills in programming, networks, computer science, mathematics, etc. In terms of education, I am in charge of logic mathematics for first-year students, programming language theory, information theory, automata and computation theory, information science programming 1 for second-year students, and network security for third-year students.
Basic Information
Faculty name/Affiliation
Takuo Mori / Department of Integrated Science and Engineering Computer Science Course
Specialized Fields
Information theory, coding theory, information security
Research theme
Software protection, digital content protection, personal authentication method, visual cryptography and its applications, application of virtualization technology
In current software development, the ratio of those that use intermediate languages such as Java and C #, or scripting languages such as Perl, Python, and Ruby is increasing. For intermediate languages, decompiling makes it easy to get the source code, and for scripting languages, the source code is formally executed as is. It is difficult to protect the intellectual property rights of software in such a situation. In our laboratory, we are researching a method of embedding a digital watermark in an intermediate language executable file or a method of obfuscating the source code of a script language.
Research on personal authentication methods that do not burden humans
Currently, the leakage of personal information due to unauthorized access is a social problem. Personal authentication technology represented by password authentication is one of the countermeasures against unauthorized access. It is recommended to use a random string of sufficient length for the password, and to use different passwords for different services, but due to the limited memory of human beings, it is not possible to satisfy all. It's a difficult situation. Sheng Lab proposes a method using QR code, a method using AR technology, etc. as a highly secure authentication that does not place an excessive burden on human memory.
Conference presentation
Title
Society name
Laboratory
Contents
Introducing flipped classroom and rubric self-assessment in university programming education
Education System Information Society National convention