- JST Home
- /
- Strategic Basic Research Programs
- /
CREST
- /
- Research Director/
- Creation of System Software for Society 5.0 by Integrating Fundamental Theories and System Platform/
- [Society 5.0 System Software] Year Started : 2023
Professor
Graduate School of Advanced Science and Technology
Japan Advanced Institute of Science and Technology
Daisuke Ishii | Associate Professor Graduate School of Advanced Science and Technology Japan Advanced Institute of Science and Technology |
Takashi Tomita | Associate Professor Research Center for Advanced Computing Infrastructure Japan Advanced Institute of Science and Technology |
In this research, we propose formal methods and verification tools to ensure the safety and reliability of next-generation automotive system platforms. The formal methods consist of a formal specification language, a control specification language, and formal verification methods using these languages. We propose the verification tools to support them as well. Such formal methods and verification tools cover the recognition to control functions of the next-generation automotive system platforms, and we stick in their practical application to real systems. The results of this research are expected to drastically improve the safety and reliability of automotive systems, and that will contribute to realizing our safe and reliable mobility society with next-generation cars including autonomous cars.
Associate Professor
School of Engineering
Institute of Science Tokyo
Mitsugu Iwamoto | Professor Graduate School of Informatics and Engineering The University of Electro-Communications |
Kazuo Sakiyama | Professor Graduate School of Informatics and Engineering The University of Electro-Communications |
Nowadays various third parties (e.g., foundries) are involved in the IC fabrication process, leading to serious issues such as IC design (IP) theft and counterfeit. This project addresses a novel, fundamental mechanism to comprehensively achieve IP protection and authenticity check of legitimate ICs, which is built on top of advanced cryptography along with extraction and modelling of safety requirements in the entire IC supply chain. This project also aims to realize IC design technologies and their design environments to integrate the developed scheme into individual ICs at design time.
Associate professor
The Institute of Scientific and Industrial Research
Osaka University
Masayuki Endo | Professor Graduate School of Medicine Osaka University |
Yasushi Sakurai | Professor Sanken Osaka University |
Noriyuki Miura | Professor Graduate School of Information Science and Technology Osaka University |
Takeshi Yamakami | General Manager Central Research Center TOPPAN Edge Inc. |
The aim of this study is to develop a self-evolving secure edge AI technology platform that simultaneously realizes highly accurate analysis, self-learning, prediction, and optimization for various “personal IoT big data” generated by individuals and autonomous high-speed and secure compact edge processing. In particular, we focus on data utilization in the medical and healthcare fields, where privacy and security are essential, and will promote applications to systems in the fields of obstetrics, IoT, healthcare, etc., as a PoC.
Professor
Faculty of Science and Engineering
Waseda University
Jun Sakuma | Professor School of Computing Institute of Science Tokyo |
Kenji Sawada | Associate professor Info-Powered Energy System Research Center The University of Electro-Communications |
Takeshi Sugawara | Associate professor Graduate School of Informatics and Engineering, School of Informatics and Engineering The University of Electro-Communications |
Kentaro Yoshioka | Assistant Professor Faculty of Science and Technology Keio University |
With the advancements in AI technology and robotics, AI-driven Cyber-Physical Systems (AI-CPS) have gained significant attention, with autonomous vehicles being a prime example. This research project focuses on the threats posed by adversarial inputs to AI-CPS, aiming to systematize security evaluation methods and establish foundational software for countermeasure techniques. The primary objectives are the security assessment of technological components, evaluation of the entire system, and the development of foundational software.