Researcher Directory System

SUZUKI Tsunehiko
School of Engineering
Professor
Last Updated :2025/06/03

Researcher Profile and Settings

Profile and Settings

Name

  • Name

    SUZUKI Tsunehiko

Profile & Settings

Affiliations

Affiliation (Master)

  • School of Engineering, Professor
  • Department of Information Engineering, Professor
  • Graduate School of Engineering, Professor
  • Institute for Advanced Studies in Artificial Intelligence, Researcher

Research Activities

Book, papers, etc

Published Papers

  • 539, 542, 2023, Not refereed, Single Work
  • Tsunehiko Suzuki
    2023-IOT-62, 11, 1, 6, 2023, Not refereed, Single Work
  • 1, 5, 2023, Not refereed, Single Work
  • Undiminished vulnerabilities - hidden open resolvers -
    Tsunehiko Suzuki
    1, 4, 2022, Not refereed, Single Work
  • Blockchain and DHT Based Lookup System Aiming for Alternative DNS
    Matsuoka Kazuma, Suzuki Tsunehiko
    IEEE Conference Proceedings (IEEE Conf Proc), IEEE, 2020, 98, 105, 2020, refereed, Joint Work
  • A survey on the status of measures against IP fragmentation attacks on DNS
    Kenya Ota Tsunehiko Suzuki
    CSEC SIG Technical Reports, IPSJ, 2019-CSEC-87, 11, 1, 7, 2019, Not refereed, Joint Work, The risk of DNS cache poisoning attacks using IP fragmentation was presented by Herzberg and Shulman in 2012 and 2013. And we showed that the attacks are feasible, and several open-source implementations were still affected by the attacks. In the wake of our proposal, measures to major open-source implementations for ignoring NS records in Authority or Additional sections of negative response at DNS cache server, and for ignoring Path MTU Discovery at DNS authoritative server were taken. Also, DNS flag day 2020 is planned to take measures against fragmentation attacks such as reducing default EDNS buffer size. If the authoritative servers that manage TLDs or multiple zones have not been taken measures, this attack increases the risk of massive hijacking at once. In this research, we survey whether authoritative servers that manage TLDs can be affected by the attacks.
  • 119, 297, 31, 35, 2019, Not refereed, Joint Work, We re-implemented a Ruby library "VITOCHA", which can be used for programming virtual networks, using Python. The library named "Fika" has a library corresponding to conventional functions of VITOCHA and a library for developing blockchain applications. Using this, we have created an application that can simulate the effects of network routing attacks against a blockchain. Fika provides an environment for developing blockchain applications.
  • 2019-CSEC-87, 10, 1, 8, 2019, Not refereed, Single Work, Shared DNS authoritative servers used by many users may cause various vulnerabilities by being shared. This paper shows, consider, and alert about each vulnerability - DDoS, cache poisoning, zone hijack - with several risky situations - cache combined, mixed parent / child, lame delegation, public suffix zone, orphaned cname, sibling domain - in each chapter.
  • 2018-CE-145, 9, 1, 5, 2018, Not refereed, Single Work
  • Vol.J96-D, 3, 552, 561, 2013, refereed, Joint Work
  • An anti-spam method via real-time retransmission detection
    Naoya Kitagawa, Hiroki Takakura, Tsunehiko Suzuki
    The 18th IEEE International Conference on Networks (ICON2012), 0, 0, 2012, refereed, Joint Work
  • 2012-IOT-16, 8, 1, 4, 2012, Not refereed, Single Work
  • 96(3), 552, 561, 2011, refereed, Joint Work
  • 9, 4, 231, 234, 2010, refereed, Joint Work
  • 617, 618, 2010, Not refereed, Joint Work
  • Status of Open Resolvers
    Tsunehiko Suzuki
    Vol.108, No.24, 89, 91, 2008, Not refereed, Single Work, DNS cache servers (DNS open resolvers) without access controll could be misused for DDoS attack. This paper introduces the orginal tool 'DNS Amp Checker' for finding open resolvers. And using the tool, it's made clear that about 80% of DNS authoritative servers are open resolvers. So anyone can find many open resolvers. And the state is not improved in these years.
  • 2008
  • DNS Security: Now and The Future
    Rikitake, K., Suzuki, T. and Nakao, K.
    EICE Technical Report ICSS2007-01, 3-8, 3-8, 2007, refereed, Joint Work
  • 2007
  • 2005
  • 2004
  • 2003
  • 2002
  • 2002
  • 2002
  • 2002
  • 1994
  • 1993
  • 1991
  • 1991
  • 1990

Books etc

  • 2018
  • 2005

Conference Activities & Talks

  • Single Work
  • 2025, Single Work
  • 2024, Single Work, Not refereed
  • 2025, Single Work
  • 2024, Single Work, Not refereed, Nagoya
  • 2023, Single Work, Not refereed, AXIES, Nagoya
  • 2023, Single Work, Not refereed
  • 2023, Single Work, Not refereed
  • 2023, Single Work, Not refereed
  • 2023, Single Work, Not refereed
  • 2023, Single Work, Not refereed
  • 2023, Single Work, Not refereed
  • Development of a scanner for hidden open resolvers and the investigation
    2023, Single Work, Not refereed
  • Undiminished vulnerabilities - hidden open resolvers -
    Tsunehiko Suzuki
    2022, Single Work, Not refereed, I found many hidden openresolvers which are caused by reachablity of source IP address spoofing packets. This means that those networks are vulnerable for many kind of spoofing attacks. Measures to address those vulnerable sites are not very not much progress has been made. Of the 100,000 IP addresses surveyed, about 7% overall, and about 24% of those whose PTR is JP, remain vulnerable. We hope that this paper will lead to further discussion, awareness-raising, and countermeasures.
  • 2020, Single Work, Not refereed
  • 2020, Single Work, Not refereed
  • Single Work
  • 2018, Single Work
  • 2017, Single Work, Not refereed
  • 2015, Single Work, Not refereed
  • 2015, Single Work, Not refereed
  • 2014, Single Work, Not refereed
  • 2014, Single Work
  • 2014, Single Work, Not refereed
  • 2014, Single Work
  • 2012, Single Work, Not refereed
  • 2008, Single Work, refereed
  • 2008
  • 1993
  • 1991

Misc

  • Forged Delegation Injection into Empty Non-Terminal with NSEC3
    Tsunehiko Suzuki
    2017, I found a vulnerability of NSEC3 of DNSSEC
  • 2008/8
  • 2008/5
  • 2008/1
  • 2006/3

Other Research Activities

Awards & Honors

  • 2019

Research Grants & Projects

  • 2004

社会貢献活動情報

社会貢献活動

Social Contribution

  • http://www.e-ontap.com/dns/onsen4/rfc5155.html


Copyright © MEDIA FUSION Co.,Ltd. All rights reserved.