Kono, Kenji

写真a

Affiliation

Faculty of Science and Technology, Department of Information and Computer Science ( Yagami )

Position

Professor

Related Websites

Career 【 Display / hide

  • 1995.04
    -
    1997.10

    DC1, Japan Society of the Promotion of Science

  • 1997.11
    -
    1999.12

    University of Tokyo, 理学系研究科情報科学専攻, 助手

  • 1999.10
    -
    2002.09

    PRESTO, Japan Science and Technology Corporation

  • 2000.01
    -
    2003.03

    Assistant Professor of the University of Electro-Communications

  • 2003.04
    -
    2005.03

    Associate Professor of the University of Electro-Communications

display all >>

Academic Background 【 Display / hide

  • 1993.03

    The University of Tokyo, Faculty of Science, Department of Computer Science

    University, Graduated

  • 1995.03

    The University of Tokyo, Graduate School, Division of Science, Computer Science

    Graduate School, Completed, Master's course

  • 1997.10

    The University of Tokyo, Graduate School, Division of Science, Computer Science

    Graduate School, Withdrawal before completion, Doctoral course

Academic Degrees 【 Display / hide

  • Doctor of Science, The University of Tokyo, Dissertation, 2000.01

 

Research Areas 【 Display / hide

  • Informatics / Computer system (System Software)

  • Informatics / Software (ソフトウエア)

Research Keywords 【 Display / hide

  • operating systems

  • security

  • distributed systems

 

Books 【 Display / hide

  • Handbook of Software Aging and Rejuvenation

    Kenji Kono, Kenichi Kourai, Hiroshi Yamada, World Scientific Publishing, 2020

    Scope: Chap. 9

  • コンピュータ・システム プログラマの視点から

    五島 正裕,河野健二,南出靖彦, 丸善出版, 2019.02

  • Open Systems Dependability

    Kenji Kono, Hiroshi Yamada, CRC Press, 2015

    Scope: Chap. 7.4

  • Engineering the Computer Science and IT

    Manabu Hirano, Takeshi Okuda, Eiji Kawai, Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimoto, Shoichi Hasegawa, Takashi Horie, Seiji Mune, Kazumasa Omote, Kenichi Kourai, Yoshihiro Oyama, Kenji Kono, Shigeru Chiba, Yasushi Shinjo, Kazuhiko Kato, Suguru Yamaguchi, 2009.10

    Scope: 477-488

  • オペレーティングシステムの仕組み

    KONO KENJI, 2007.10

Papers 【 Display / hide

  • Achieving Low Serving Latency in DPDK-Applied Systems at Multi-Tenant Edge Clouds

    Tsujimoto Y., Sato Y., Yasukata K., Ishiguro K., Kono K.

    IEICE Transactions on Information and Systems E109.D ( 3 ) 404 - 418 2026.03

    ISSN  09168532

     View Summary

    This paper explores a practical means to employ Data Plane Development Kit (DPDK), a kernel-bypassing framework for packet processing, in resource-limited multi-tenant edge data centers. Traditional virtual CPU (vCPU) schedulers are not compatible with the event detection model of DPDK, because each DPDK-applied VM (virtual machine) monopolizes one physical CPU (pCPU) for NIC register polling. Toward edge data center providers, this paper presents a new vCPU scheduling policy named Polling vCPU Consolidation (PvCC). PvCC enables DPDK-applied VMs to be consolidated on dedicated pCPUs by adopting microsecond-scale time slices. Along with this, PvCC provides vCPU scaling API that enables to scale up/down vCPUs of VMs at runtime. Our experiments show that PvCC allows consolidated DPDK-applied VMs to achieve low serving latencies, and our vCPU scaling API allows us to adjust CPU resource assignment according to the incoming request rate. It also enables to assign spare pCPUs to VMs executing non-latency-sensitive tasks.

  • Scalable Static Analysis to Detect Memory Leak of Struct Members in Linux Kernel

    Suzuki K., Kono K.

    Computer Software 43 ( 1 ) 38 - 53 2026

    ISSN  02896540

     View Summary

    Despite many efforts made to detect memory leaks in large-scale software systems such as the Linux Kernel, state-of-the-art tools fail to find some common patterns of leaks due to the limitation incurred to achieve scalability. Memory leak of a struct member is one of the commonly found patterns neglected in these tools. This pattern occurs when a struct member remains allocated even when the struct is released. Detecting such patterns requires correlating the struct and its members, requiring complex inter-procedural, points-to analysis, known to be non-scalable. In this paper, we present a scalable approach that focuses on detecting these struct member-related leaks in the Linux Kernel. Unlike state-of-the-art tools that analyze the value flow using Value Flow Graph (VFG) or Sparse Value Flow Graph (SVFG), our approach conducts a field-based flow analysis using the Control Flow Graph (CFG). To reduce false positives, we also check two types of branch conditions (NULL condition check and error code condition check) to determine what to propagate to each basic block in the CFG. Using our approach, we found 12 previously unknown leaks in Linux, with a precision of 59.1% in approximately 1 hour of analysis time. Some of the bugs were found in the core component, affecting many other components as well. We further created 9 fix patches for the bugs, all of them were reviewed and confirmed by the developers.

  • Gangi: Preventing Memory Tampering Cheats in Online Games

    Hata T., Ishiguro K., Aublin P.L., Kono K.

    Journal of Information Processing 33   901 - 912 2025.10

     View Summary

    The global online video game industry has become a more than one hundred billion dollar market. Cheating is one of the major issues in multiplayer online video games. Cheat prevention is challenging because of the unique threat model of online games. Because the cheaters physically possess their own game computers, they can install cheat tools at the user level and OS and can access the physical DRAM bus to tamper with the game process. This paper aims to efficiently prevent memory tampering cheats by leveraging a trusted execution environment (TEE), Intel Client SGX. It provides strong integrity protection against memory tampering. Unfortunately, its strong protection comes with a severe size limitation of the available enclave memory. Running the entire game process inside the enclave exceeds the memory limit. This paper presents Gangi, a library that efficiently protects the integrity-sensitive game state that exceeds the available enclave memory. Gangi places the game state outside the enclave to reduce memory consumption inside the enclave while ensuring the integrity of the game state by hash-based validation. Our benchmarking results show that a Gangi-protected game outperforms the EPC swapping approach with the entire game state being inside the enclave.

  • Supporting the use of multiple packet I/O frameworks in a TCP/IP stack runnable in user space

    Yasukata K., Kono K.

    Computer Software 42 ( 3 )  2025.07

    ISSN  02896540

     View Summary

    Past studies have demonstrated that one can achieve high-performance TCP/IP communication by using a packet I/O framework that allows a user-space TCP/IP stack to bypass most kernel-space networking subsystems. However, most publicly available implementations only support one packet I/O framework. This paper points out the importance of supporting multiple packet I/O frameworks in a single TCP/IP stack implementation through our development experience for enabling a TCP/IP stack implementation called iip to support the use of the widely used packet I/O frameworks, DPDK, netmap, and AF XDP.

  • Revisiting Memory Swapping for Big-Memory Applications

    Kida S., Imamura S., Kono K.

    Proceedings of International Conference on High Performance Computing in Asia-Pacific Region, HPC Asia 2025    33 - 42 2025.03

     View Summary

    Big-memory applications which have huge memory footprints, such as machine learning and key-value store, are playing important roles in various real-world services. Compute Express Link-based memory (CXL memory) is nowadays attracting a lot of attention for such applications, because it can expand memory capacity on a single machine with fast memory semantic accesses to memory devices attached to PCIe slots. On the other hand, memory swapping is another traditional technique to expand memory capacity by using storage devices as a swap space. It is well known that memory swapping causes a large latency overhead to swap-in/out memory pages from/to storage devices, while it can efficiently utilize main memory when workloads have skewed memory access patterns.In this paper, we quantitatively compare the throughput of 14 macro-benchmarks between CXL memory emulated with a remote NUMA node and memory swapping with an NVMe SSD. Through this evaluation, the benchmarks are classified into three categories, where memory swapping achieves a comparable or higher throughput compared to emulated CXL memory for 9 benchmarks. This result reminds us that memory swapping with SSDs, which are much cheaper than CXL memory devices, is still a good option for memory capacity expansion. In addition, we conduct an in-depth analysis on the characteristics of emulated CXL memory and memory swapping using our synthetic benchmark. The analysis shows that memory swapping is not sensitive to the initial placement of hot data and achieves a comparable throughput to emulated CXL memory when hot data is accessed intensively.

display all >>

Papers, etc., Registered in KOARA 【 Display / hide

Reviews, Commentaries, etc. 【 Display / hide

  • Introduction to the Special Issue on Survey Papers from Doctoral Dissertaions

    Igarashi Y., Kawabata H., Kono K., Chiba S., Nakazawa J., Hayashi S.

    Computer Software 39 ( 3 )  2022

    ISSN  02896540

  • オペレーティングシステムのエージングと若化

    河野 健二,山田浩史

    日本信頼性学会誌「信頼性」 36 ( 1 ) 24 - 31 2014.01

    Article, review, commentary, editorial, etc. (scientific journal), Joint Work

  • Oops! What about a Million Kernel Oopses?

    Lisong Guo, Peter Senna Tschudin, Kenji Kono, Gilles Muller, Julia Lawall

    Research Report, No. 436 (INRIA)   2013.06

    Internal/External technical report, pre-print, etc., Joint Work

Presentations 【 Display / hide

  • データセンタ間通信による性能低下を抑えたキーバリューストア構築手法

    堀江 光、浅原 理人、山田 浩史、河野 健二

    [Domestic presentation]  情報処理学会 OS 研究会, 

    2014.03

    Oral presentation (general)

  • 仮想化環境におけるメモリ情報に着目したページシェアリング効率化手法

    井上 宗士、山田 浩史、河野 健二

    [Domestic presentation]  情報処理学会 OS 研究会, 

    2014.03

    Oral presentation (general)

  • 仮想マシン移送における移送コストの定量的調査

    古藤 明音、山田 浩史、河野 健二

    [Domestic presentation]  情報処理学会 OS 研究会, 

    2014.03

    Oral presentation (general)

  • 需要の集中を考慮した分散 Key-Value Store におけるレプリカの動的配置手法

    白松 幸起、河野 健二、堀江 光

    [Domestic presentation]  情報処理学会 OS 研究会, 

    2014.03

    Oral presentation (general)

  • データセンタ間通信による性能低下を抑えたキーバリューストア構築手法

    堀江光,浅原理人,山田浩史,河野健二

    [Domestic presentation]  日本ソフトウェア科学会 DSW ワークショップ, 

    2013.12

    Poster presentation

display all >>

Research Projects of Competitive Funds, etc. 【 Display / hide

  • 超分散コンピューティング基盤の研究開発

    2023.04
    -
    2028.03

    NEDO, Coinvestigator(s)

  • Persistent TEE: データ・プライバシ保護のための堅牢な実行基盤

    2023.04
    -
    2026.03

    科研費 基盤 (B), Principal investigator

  • デジタルツインを用いた自動運転AIの検証と妥当性確認

    2022.04
    -
    2024.03

    AIP加速, Coinvestigator(s)

  • レガシーコードの実行回避によるハイパーバイザの安全性向上

    2019.04
    -
    2022.03

    MEXT,JSPS, Grant-in-Aid for Scientific Research, Grant-in-Aid for Scientific Research (C), Principal investigator

  • 完全自動運転における危険と異常の予測

    2016.10
    -
    2022.03

    CREST, Coinvestigator(s)

display all >>

Awards 【 Display / hide

  • 日本ソフトウェア科学会基礎研究賞

    2016

    Type of Award: Award from Japanese society, conference, symposium, etc.

  • IBM Faculty Award

    2015

    Type of Award: International academic award (Japan or overseas)

  • 日本ソフトウェア科学会ソフトウェア論文賞

    2014.09

    Type of Award: Award from Japanese society, conference, symposium, etc.

  • 情報処理学会論文賞

    2013.05

    Type of Award: Award from Japanese society, conference, symposium, etc.

  • 情報処理学会論文賞

    KONO KENJI, 2010.05

    Type of Award: Award from Japanese society, conference, symposium, etc.

display all >>

 

Courses Taught 【 Display / hide

  • GRADUATE RESEARCH ON SCIENCE FOR OPEN AND ENVIRONMENTAL SYSTEMS 1

    2026

  • INTERNATIONAL INITIATIVE IN JAPAN 1

    2026

  • HANGAKU-HANKYO PROJECT 4

    2026

  • INTRODUCTION TO INFORMATICS

    2026

  • DOCTORAL RESEARCH ON INFORMATICS, MANAGEMENT, AND HUMAN SCIENCES

    2026

display all >>

 

Social Activities 【 Display / hide

  • 内閣官房OS機能調査委員会

    2005
    -
    2006
  • 内閣官房情報セキュリティ対策推進室委託調査

    2005
  • 財団法人 防衛技術協会 電子政府におけるセキュリティに配慮したOS等に関する調査研究委員会

    2004
    -
    Present
  • 国立情報学研究所

    2003
    -
    Present
  • 社団法人 電子情報技術産業協会(JEITA) 情報システム技術委員会

    2003
    -
    Present

display all >>

Memberships in Academic Societies 【 Display / hide

  • IEEE International Conference on Distributed Computing Systems, 

    2011
    -
    Present
  • 日本ソフトウェア科学会, 

    2010
    -
    2012
  • IEEE Pacific Rim Int'l Symp. on Dependable Computing, 

    2010
  • 日本ソフトウェア科学会 ディペンダブルシステム研究会, 

    2009
    -
    2012.03
  • Int'l Conf. on Frontier of Computer Science and Technology, 

    2009
    -
    2010

display all >>

Committee Experiences 【 Display / hide

  • 2011.04
    -
    2015.03

    主査, 情報処理学会システムソフトウェアとオペレーティングシステム研究会

  • 2011
    -
    2012

    Program Committee Member, IEEE International Conference on Distributed Computing Systems

  • 2010
    -
    2012

    Director, 日本ソフトウェア科学会

  • 2010

    PC Member, IEEE Pacific Rim Int'l Symp. on Dependable Computing

  • 2009
    -
    2012.03

    Program Chair, 日本ソフトウェア科学会 ディペンダブルシステム研究会

display all >>