HOME > Organization / Research > Homma Laboratory

Organization / Research

Homma Laboratory


photo Naofumi HOMMA, Professor

The emerging information and communication infrastructure such as Internet of Things is expected to generate a new value and bring us a more fruitful society. On the other hand, it also brings a new type of security risks that we have never met and solved before. The new risks include the nullification of applications by data forgery and the falsification of critical control information in factories. To address such problems and enjoy the new values, we are studying advanced design, verification, and evaluation technologies for constructing future information communication systems from theories to implementation technologies. In particular, we are studying design methodologies for secure information and communication systems to ensure security and reliability from the level of vast and diverse information sources (i.e., embedded devices such as sensor terminals), not only to ensure the network and software security. The study includes a design of ultra-high speed/ultra-low power LSI computing for security functions such as cryptography and error-correction codes, and secure implementation technologies for cryptographic modules against physical attacks that directly access the systems. We are also studying the security analysis and evaluation technologies for embedded systems whose security level is heavily dependent on their information and electromagnetic environments. In addition, we are challenging the social implementations of the above research results together with our academic, industrial and governmental partners. Through the above research activities, we are aiming at establishing a comprehensive system security design and evaluation technologies from information source level to surrounding environment level.

Research topics:

  1. Design, evaluation, and verification technologies for cyber-physical systems security
  2. Hardware algorithms for high-functionality and light-weight cryptography
  3. Attacks and countermeasures on embedded AI systems
  4. Theory and application of EM information security
  5. Environmentally conscious information processing
  6. Security technologies with emerging devices
Group of Electrical Engineering, Communication Engineering,
Electronic Engineering, and Information Engineering, Tohoku University
6-6-05, Aramaki Aza Aoba, Aoba-ku, Sendai, Miyagi 980-8579, Japan
TEL : 022-795-7186 (Japanese Only)
Email :