Cybersecurity Research Institute TOP日本語
  1. Cybersecurity Laboratory
  2. People
  3. RYOICHI ISAWA

RYOICHI ISAWA

RYOICHI ISAWA

Senior Researcher
Cybersecurity Laboratory, Cybersecurity Research Institute

Ryoichi Isawa is a senior researcher at Cybersecurity Laboratory, Cybersecurity Research Institute, NICT in Japan. He received his B.E. and M.E. degrees from the University of Tokushima, Japan, in 2004 and 2006, respectively. He then started working for a startup (company) related to cybersecurity, while doing a Ph.D in Kobe University. He received his Ph.D. degree from Kobe University, Japan, and started working for NICT in 2012. His current research interests include cybsersecurity including IoT security and malware analysis.

Research interests
Cybersecurity
Keyword
FPGA verification, Malware analysis

Selected papers

  • Rui Tanabe, Tsuyufumi Watanabe, Akira Fujita, Ryoichi Isawa, Carlos Ganan, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto, "Disposable Botnets: Long-term Analysis of IoT Botnet Infrastructure," Journal of Information Processing, Vol.30, pp. 577-590, Sep. 2022.
  • Muhamad Erza Aminanto, Tao Ban, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue, "Threat Alert Prioritization Using Isolation Forest and Stacked Auto Encoder with Day-Forward-Chaining Analysis," IEEE Access, Vol. 8, pp. 217977-217986, Dec. 2020.
  • Tzu-Ling Wan, Tao Ban, Shin-Ming Cheng, Yen-Ting Lee, Bo Sun, Ryoichi Isawa, Takeshi Takahashi, and Daisuke Inoue, "An Efficient Approach to Detect and Classify IoT Malware Based On Byte Sequences from Executable Files," IEEE Open Journal of the Computer Society, Vol. 1, pp. 262-275, Oct. 2020.
  • Tao Ban, Ryoichi Isawa, Shin-Ying Huang, Katsunari Yoshioka, and Daisuke Inoue, "A Cross-Platform Study on Emerging Malicious Programs Targeting IoT Devices," IEICE Transactions on Information and Systems, Vol.ED-102, No.9, pp.1683-1685, Sep. 2019.
  • Ryoya Furukawa, Ryoichi Isawa, Masakatu Morii, Daisuke Inoue, and Koji Nakao, "FCReducer: Locating Symmetric Cryptographic Functions on the Memory," IEICE Transactions on Information and Systems, Vol.E101-D, No.3, pp.685-697, Mar. 2018.

Awards

  • Best Paper Award (The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications)
  • Best Paper Award (The 13th Asia Joint Conference on Information Security)
back to page top