Find Research Outputs

Search concepts
Selected filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016

Author

  • Tatsuya Mori
2019

Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?

Mori, K., Watanabe, T., Zhou, Y., Akiyama Hasegawa, A., Akiyama, M. & Mori, T., 2019 Jun 1, Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019. Institute of Electrical and Electronics Engineers Inc., p. 159-171 13 p. 8802462. (Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Tap 'n ghost: A compilation of novel attack techniques against smartphone touchscreens

Maruyama, S., Wakabayashi, S. & Mori, T., 2019 May, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 620-637 18 p. 8835251. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Understanding the responsiveness of mobile app developers to software library updates

Yasumatsu, T., Watanabe, T., Kanei, F., Shioji, E., Akiyama, M. & Mori, T., 2019 Mar 13, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 13-24 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
1 Citation (Scopus)
2018

Automatically generating malware analysis reports using sandbox logs

Sun, B., Fujino, A., Mori, T., Ban, T., Takahashi, T. & Inoue, D., 2018 Nov 1, In : IEICE Transactions on Information and Systems. E101D, 11, p. 2622-2632 11 p.

Research output: Contribution to journalArticle

Detecting malware-infected devices using the HTTP header patterns

Mizuno, S., Hatada, M., Mori, T. & Goto, S., 2018 May 1, In : IEICE Transactions on Information and Systems. E101D, 5, p. 1370-1379 10 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

DomainChroma: Building actionable threat intelligence from malicious domain names

Chiba, D., Akiyama, M., Yagi, T., Hato, K., Mori, T. & Goto, S., 2018 Aug, In : Computers and Security. 77, p. 138-161 24 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

DomainProfiler: toward accurate and early discovery of domain names abused in future

Chiba, D., Yagi, T., Akiyama, M., Shibahara, T., Mori, T. & Goto, S., 2018 Nov 1, In : International Journal of Information Security. 17, 6, p. 661-680 20 p.

Research output: Contribution to journalArticle

Don't throw me away: Threats caused by the abandoned internet resources used by android apps

Pariwono, E., Akiyama, M., Chiba, D. & Mori, T., 2018 May 29, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 147-158 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

PADetective: A systematic approach to automate detection of promotional attackers in mobile app store

Sun, B., Luo, X., Akiyama, M., Watanabe, T. & Mori, T., 2018 Jan 1, In : Journal of Information Processing. 26, p. 212-223 12 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Stay on-topic: Generating context-specific fake restaurant reviews

Juuti, M., Sun, B., Mori, T. & Asokan, N., 2018 Jan 1, Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Proceedings. Lopez, J., Zhou, J. & Soriano, M. (eds.). Springer-Verlag, p. 132-151 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11098 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Understanding the inconsistency between behaviors and descriptions of mobile apps

Watanabe, T., Akiyama, M., Sakai, T., Washizaki, H. & Mori, T., 2018 Nov 1, In : IEICE Transactions on Information and Systems. E101D, 11, p. 2584-2599 16 p.

Research output: Contribution to journalArticle

Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps

Yoshida, K., Imai, H., Serizawa, N., Mori, T. & Kanaoka, A., 2018 Jun 8, Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018. Demartini, C., Reisman, S., Liu, L., Tovar, E., Takakura, H., Yang, J-J., Lung, C-H., Ahamed, S. I., Hasan, K., Conte, T., Nakamura, M., Zhang, Z., Akiyama, T., Claycomb, W. & Cimato, S. (eds.). IEEE Computer Society, Vol. 2. p. 713-718 6 p. 8377952

Research output: Chapter in Book/Report/Conference proceedingConference contribution

User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts

Watanabe, T., Shioji, E., Akiyama, M., Sasaoka, K., Yagi, T. & Mori, T., 2018 Jul 6, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. Institute of Electrical and Electronics Engineers Inc., p. 323-337 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)
2017

Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots

Akiyama, M., Yagi, T., Yada, T., Mori, T. & Kadobayashi, Y., 2017, (Accepted/In press) In : Computers and Security.

Research output: Contribution to journalArticle

6 Citations (Scopus)

APPraiser: A large scale analysis of android clone apps

Ishii, Y., Watanabe, T., Akiyama, M. & Mori, T., 2017 Aug 1, In : IEICE Transactions on Information and Systems. E100D, 8, p. 1703-1713 11 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

BotDetector: A robust and scalable approach toward detecting malware-infected devices

Mizuno, S., Hatada, M., Mori, T. & Goto, S., 2017 Jul 28, 2017 IEEE International Conference on Communications, ICC 2017. Institute of Electrical and Electronics Engineers Inc., 7997372

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Building a scalable web tracking detection system: Implementation and the empirical study

Haga, Y., Takata, Y., Akiyama, M. & Mori, T., 2017 Aug, In : IEICE Transactions on Information and Systems. E100D, 8, p. 1663-1670 8 p.

Research output: Contribution to journalArticle

Characterizing promotional attacks in mobile app store

Sun, B., Luo, X., Akiyama, M., Watanabe, T. & Mori, T., 2017 Jan 1, Applications and Techniques in Information Security - 8th International Conference, ATIS 2017, Proceedings. Kim, D. S., Li, G., Zhang, X. & Batten, L. (eds.). Springer Verlag, p. 113-127 15 p. (Communications in Computer and Information Science; vol. 719).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Detecting and Classifying Android PUAs by Similarity of DNS queries

Hatada, M. & Mori, T., 2017 Sep 7, Proceedings - 2017 IEEE 41st Annual Computer Software and Applications Conference Workshops, COMPSAC 2017. Demartini, C., Yang, J-J., Ahamed, S. I., Conte, T., Akiyama, T., Reisman, S., Takakura, H., Hasan, K., Claycomb, W., Nakamura, M., Tovar, E., Zhang, Z., Liu, L., Lung, C-H. & Cimato, S. (eds.). IEEE Computer Society, p. 590-595 6 p. 8029995. (Proceedings - International Computer Software and Applications Conference; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names

Chiba, D., Akiyama, M., Yagi, T., Yada, T., Mori, T. & Goto, S., 2017 Sep 7, Proceedings - 2017 IEEE 41st Annual Computer Software and Applications Conference, COMPSAC 2017. IEEE Computer Society, Vol. 1. p. 643-648 6 p. 8029671

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Evaluation of EM information leakage caused by IEMI with hardware Trojan

Kinugawa, M., Hayashi, Y. I. & Mori, T., 2017, In : IEEJ Transactions on Fundamentals and Materials. 137, 3, p. 153-157 5 p.

Research output: Contribution to journalArticle

Finding new varieties of malware with the classification of network behavior

Hatada, M. & Mori, T., 2017 Aug 1, In : IEICE Transactions on Information and Systems. E100D, 8, p. 1691-1702 12 p.

Research output: Contribution to journalArticle

Network event extraction from log data with nonnegative tensor factorization

Kimura, T., Ishibashi, K., Mori, T., Sawada, H., Toyono, T., Nishimatsu, K., Watanabe, A., Shimoda, A. & Shiomoto, K., 2017 Oct 1, In : IEICE Transactions on Communications. E100B, 10, p. 1865-1878 14 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Poster: Is active electromagnetic side-channel attack practical?

Wakabayashi, S., Maruyama, S., Mori, T., Goto, S., Kinugawa, M. & Hayashi, Y. I., 2017 Oct 30, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Vol. Part F131467. p. 2587-2589 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Poster: Touchflood: A novel class of attacks against capacitive touchscreens

Maruyama, S., Wakabayashi, S. & Mori, T., 2017 Oct 30, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Vol. Part F131467. p. 2551-2553 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Tracking the human mobility using mobile device sensors

Watanabe, T., Akiyama, M. & Mori, T., 2017 Aug, In : IEICE Transactions on Information and Systems. E100D, 8, p. 1680-1690 11 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Understanding the origins of mobile app vulnerabilities: A large-scale measurement study of free and paid apps

Watanabe, T., Akiyama, M., Kanei, F., Shioji, E., Takata, Y., Sun, B., Ishi, Y., Shibahara, T., Yagi, T. & Mori, T., 2017 Jun 29, Proceedings - 2017 IEEE/ACM 14th International Conference on Mining Software Repositories, MSR 2017. IEEE Computer Society, p. 14-24 11 p. 7962351

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

Understanding the security management of global third-party android marketplaces

Ishii, Y., Watanabe, T., Kanei, F., Takata, Y., Shioji, E., Akiyama, M., Yagi, T., Sun, B. & Mori, T., 2017 Sep 5, WAMA 2017 - Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, Co-located with FSE 2017. Sarro, F., Shihab, E., Kaimann, D., Nagappan, M. & Platenius, M. C. (eds.). Association for Computing Machinery, Inc, p. 12-18 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)
2016

AutoBLG: Automatic URL blacklist generator using search space expansion and filters

Sun, B., Akiyama, M., Yagi, T., Hatada, M. & Mori, T., 2016 Feb 11, 20th IEEE Symposium on Computers and Communication, ISCC 2015. Institute of Electrical and Electronics Engineers Inc., p. 625-631 7 p. 7405584. (Proceedings - IEEE Symposium on Computers and Communications; vol. 2016-February).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Automating URL blacklist generation with similarity search approach

Sun, B., Akiyama, M., Yagi, T., Hatada, M. & Mori, T., 2016 Apr 1, In : IEICE Transactions on Information and Systems. E99D, 4, p. 873-882 10 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Clone or relative? Understanding the origins of similar Android apps

Ishii, Y., Watanabe, T., Akiyama, M. & Mori, T., 2016 Mar 11, IWSPA 2016 - Proceedings of the 2016 ACM International Workshop on Security and Privacy Analytics, co-located with CODASPY 2016. Association for Computing Machinery, Inc, p. 25-32 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Domain profiler: Discovering domain names abused in future

Chiba, D., Yagi, T., Akiyama, M., Shibahara, T., Yada, T., Mori, T. & Goto, S., 2016 Sep 29, Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016. Institute of Electrical and Electronics Engineers Inc., p. 491-502 12 p. 7579766

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

Increasing the darkness of darknet traffic

Haga, Y., Saso, A., Mori, T. & Goto, S., 2016 Feb 23, 2015 IEEE Global Communications Conference, GLOBECOM 2015. Institute of Electrical and Electronics Engineers Inc., 7416973

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Inferring popularity of domain names with DNS traffic: exploiting cache timeout heuristics

Shimoda, A., Ishibashi, K., Sato, K., Tsujino, M., Inoue, T., Shimura, M., Takebe, T., Takahashi, K., Mori, T. & Goto, S., 2016 Feb 23, 2015 IEEE Global Communications Conference, GLOBECOM 2015. Institute of Electrical and Electronics Engineers Inc., 7417638

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Poster: Toward automating the generation of malware analysis reports using the sandbox logs

Sun, B., Fujino, A. & Mori, T., 2016 Oct 24, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 24-28-October-2016. p. 1814-1816 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)