• 742 引用
  • 14 h指数
20002020

年単位の研究成果

Pureに変更を加えた場合、すぐここに表示されます。

研究成果

2020
公開

Discovering Malicious URLs Using Machine Learning Techniques

Sun, B., Takahashi, T., Zhu, L. & Mori, T., 2020, Intelligent Systems Reference Library. Springer, p. 33-60 28 p. (Intelligent Systems Reference Library; 巻数 177).

研究成果: Chapter

Follow your silhouette: Identifying the social account of website visitors through user-blocking side channel

Watanabe, T., Shioji, E., Akiyama, M., Sasaoka, K., Yagi, T. & Mori, T., 2020, : : IEICE Transactions on Information and Systems. E103D, 2, p. 239-255 17 p.

研究成果: Article

公開

Study on the vulnerabilities of free and paid mobile apps associated with software library

Watanabe, T., Akiyama, M., Kanei, F., Shioji, E., Takata, Y., Sun, B., Ishii, Y., Shibahara, T., Yagi, T. & Mori, T., 2020, : : IEICE Transactions on Information and Systems. E103D, 2, p. 276-291 16 p.

研究成果: Article

公開
2019

Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility

Iijima, R., Minami, S., Zhou, Y., Takehisa, T., Takahashi, T., Oikawa, Y. & Mori, T., 2019, (Accepted/In press) : : IEEE Transactions on Emerging Topics in Computing.

研究成果: Article

Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?

Mori, K., Watanabe, T., Zhou, Y., Akiyama Hasegawa, A., Akiyama, M. & Mori, T., 2019 6, Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019. Institute of Electrical and Electronics Engineers Inc., p. 159-171 13 p. 8802462. (Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019).

研究成果: Conference contribution

1 引用 (Scopus)

Eiger: Automated IOC generation for accurate and interpretable endpoint malware detection

Kurogome, Y., Otsuki, Y., Kawakoya, Y., Iwamura, M., Hayashi, S., Mori, T. & Sen, K., 2019 12 9, Proceedings - 35th Annual Computer Security Applications Conference, ACSAC 2019. Association for Computing Machinery, p. 687-701 15 p. (ACM International Conference Proceeding Series).

研究成果: Conference contribution

公開
2 引用 (Scopus)

Poster: A first look at the privacy risks of voice assistant apps

Natatsuka, A., Akiyama, M., Iijima, R., Sakai, T., Watanabe, T. & Mori, T., 2019 11 6, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2633-2635 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

研究成果: Conference contribution

1 引用 (Scopus)

ShamFinder: An automated framework for detecting IDN homographs

Suzuki, H., Chiba, D., Yoneya, Y., Mori, T. & Goto, S., 2019 10 21, IMC 2019 - Proceedings of the 2019 ACM Internet Measurement Conference. Association for Computing Machinery, p. 449-462 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

研究成果: Conference contribution

公開
2 引用 (Scopus)

Tap 'n ghost: A compilation of novel attack techniques against smartphone touchscreens

Maruyama, S., Wakabayashi, S. & Mori, T., 2019 5, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 620-637 18 p. 8835251. (Proceedings - IEEE Symposium on Security and Privacy; 巻数 2019-May).

研究成果: Conference contribution

3 引用 (Scopus)

Understanding the inconsistencies between text descriptions and the use of privacy-sensitive resources of mobile apps

Watanabe, T., Akiyama, M., Sakai, T., Washizaki, H. & Mori, T., 2019, SOUPS 2015 - Proceedings of the 11th Symposium on Usable Privacy and Security. USENIX Association, p. 241-255 15 p. (SOUPS 2015 - Proceedings of the 11th Symposium on Usable Privacy and Security).

研究成果: Conference contribution

14 引用 (Scopus)

Understanding the origins of weak cryptographic algorithms used for signing android apps

Yoshida, K., Imai, H., Serizawa, N., Mori, T. & Kanaoka, A., 2019, : : Journal of information processing. 27, p. 593-602 10 p.

研究成果: Article

公開

Understanding the responsiveness of mobile app developers to software library updates

Yasumatsu, T., Watanabe, T., Kanei, F., Shioji, E., Akiyama, M. & Mori, T., 2019 3 13, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 13-24 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

研究成果: Conference contribution

公開
1 引用 (Scopus)
2018

A feasibility study of radio-frequency retroreflector attack

Wakabayashi, S., Maruyama, S., Mori, T., Goto, S., Kinugawa, M. & Hayashi, Y. I., 2018.

研究成果: Paper

Automatically generating malware analysis reports using sandbox logs

Sun, B., Fujino, A., Mori, T., Ban, T., Takahashi, T. & Inoue, D., 2018 11 1, : : IEICE Transactions on Information and Systems. E101D, 11, p. 2622-2632 11 p.

研究成果: Article

1 引用 (Scopus)

Detecting malware-infected devices using the HTTP header patterns

Mizuno, S., Hatada, M., Mori, T. & Goto, S., 2018 5 1, : : IEICE Transactions on Information and Systems. E101D, 5, p. 1370-1379 10 p.

研究成果: Article

1 引用 (Scopus)

DomainChroma: Building actionable threat intelligence from malicious domain names

Chiba, D., Akiyama, M., Yagi, T., Hato, K., Mori, T. & Goto, S., 2018 8, : : Computers and Security. 77, p. 138-161 24 p.

研究成果: Article

4 引用 (Scopus)

DomainProfiler: toward accurate and early discovery of domain names abused in future

Chiba, D., Yagi, T., Akiyama, M., Shibahara, T., Mori, T. & Goto, S., 2018 11 1, : : International Journal of Information Security. 17, 6, p. 661-680 20 p.

研究成果: Article

Don't throw me away: Threats caused by the abandoned internet resources used by android apps

Pariwono, E., Akiyama, M., Chiba, D. & Mori, T., 2018 5 29, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 147-158 12 p.

研究成果: Conference contribution

3 引用 (Scopus)

PADetective: A systematic approach to automate detection of promotional attackers in mobile app store

Sun, B., Luo, X., Akiyama, M., Watanabe, T. & Mori, T., 2018 1 1, : : Journal of Information Processing. 26, p. 212-223 12 p.

研究成果: Article

1 引用 (Scopus)

Stay on-topic: Generating context-specific fake restaurant reviews

Juuti, M., Sun, B., Mori, T. & Asokan, N., 2018 1 1, Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Proceedings. Lopez, J., Zhou, J. & Soriano, M. (版). Springer Verlag, p. 132-151 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 11098 LNCS).

研究成果: Conference contribution

5 引用 (Scopus)

Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps

Yoshida, K., Imai, H., Serizawa, N., Mori, T. & Kanaoka, A., 2018 6 8, Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018. Demartini, C., Reisman, S., Liu, L., Tovar, E., Takakura, H., Yang, J-J., Lung, C-H., Ahamed, S. I., Hasan, K., Conte, T., Nakamura, M., Zhang, Z., Akiyama, T., Claycomb, W. & Cimato, S. (版). IEEE Computer Society, 巻 2. p. 713-718 6 p. 8377952

研究成果: Conference contribution

User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts

Watanabe, T., Shioji, E., Akiyama, M., Sasaoka, K., Yagi, T. & Mori, T., 2018 7 6, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. Institute of Electrical and Electronics Engineers Inc., p. 323-337 15 p. (Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018).

研究成果: Conference contribution

4 引用 (Scopus)
2017

Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots

Akiyama, M., Yagi, T., Yada, T., Mori, T. & Kadobayashi, Y., 2017, (Accepted/In press) : : Computers and Security.

研究成果: Article

10 引用 (Scopus)

APPraiser: A large scale analysis of android clone apps

Ishii, Y., Watanabe, T., Akiyama, M. & Mori, T., 2017 8 1, : : IEICE Transactions on Information and Systems. E100D, 8, p. 1703-1713 11 p.

研究成果: Article

1 引用 (Scopus)

BotDetector: A robust and scalable approach toward detecting malware-infected devices

Mizuno, S., Hatada, M., Mori, T. & Goto, S., 2017 7 28, 2017 IEEE International Conference on Communications, ICC 2017. Institute of Electrical and Electronics Engineers Inc., 7997372

研究成果: Conference contribution

5 引用 (Scopus)

Building a scalable web tracking detection system: Implementation and the empirical study

Haga, Y., Takata, Y., Akiyama, M. & Mori, T., 2017 8, : : IEICE Transactions on Information and Systems. E100D, 8, p. 1663-1670 8 p.

研究成果: Article

Characterizing promotional attacks in mobile app store

Sun, B., Luo, X., Akiyama, M., Watanabe, T. & Mori, T., 2017 1 1, Applications and Techniques in Information Security - 8th International Conference, ATIS 2017, Proceedings. Kim, D. S., Li, G., Zhang, X. & Batten, L. (版). Springer Verlag, p. 113-127 15 p. (Communications in Computer and Information Science; 巻数 719).

研究成果: Conference contribution

1 引用 (Scopus)

Detecting and Classifying Android PUAs by Similarity of DNS queries

Hatada, M. & Mori, T., 2017 9 7, Proceedings - 2017 IEEE 41st Annual Computer Software and Applications Conference Workshops, COMPSAC 2017. Demartini, C., Yang, J-J., Ahamed, S. I., Conte, T., Akiyama, T., Reisman, S., Takakura, H., Hasan, K., Claycomb, W., Nakamura, M., Tovar, E., Zhang, Z., Liu, L., Lung, C-H. & Cimato, S. (版). IEEE Computer Society, p. 590-595 6 p. 8029995. (Proceedings - International Computer Software and Applications Conference; 巻数 2).

研究成果: Conference contribution

4 引用 (Scopus)

DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names

Chiba, D., Akiyama, M., Yagi, T., Yada, T., Mori, T. & Goto, S., 2017 9 7, Proceedings - 2017 IEEE 41st Annual Computer Software and Applications Conference, COMPSAC 2017. IEEE Computer Society, 巻 1. p. 643-648 6 p. 8029671

研究成果: Conference contribution

2 引用 (Scopus)

Evaluation of EM information leakage caused by IEMI with hardware Trojan

Kinugawa, M., Hayashi, Y. I. & Mori, T., 2017, : : IEEJ Transactions on Fundamentals and Materials. 137, 3, p. 153-157 5 p.

研究成果: Article

Network event extraction from log data with nonnegative tensor factorization

Kimura, T., Ishibashi, K., Mori, T., Sawada, H., Toyono, T., Nishimatsu, K., Watanabe, A., Shimoda, A. & Shiomoto, K., 2017 10 1, : : IEICE Transactions on Communications. E100B, 10, p. 1865-1878 14 p.

研究成果: Article

2 引用 (Scopus)

Poster: Touchflood: A novel class of attacks against capacitive touchscreens

Maruyama, S., Wakabayashi, S. & Mori, T., 2017 10 30, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 巻 Part F131467. p. 2551-2553 3 p.

研究成果: Conference contribution

Poster: Is active electromagnetic side-channel attack practical?

Wakabayashi, S., Maruyama, S., Mori, T., Goto, S., Kinugawa, M. & Hayashi, Y. I., 2017 10 30, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 巻 Part F131467. p. 2587-2589 3 p.

研究成果: Conference contribution

3 引用 (Scopus)

Tracking the human mobility using mobile device sensors

Watanabe, T., Akiyama, M. & Mori, T., 2017 8, : : IEICE Transactions on Information and Systems. E100D, 8, p. 1680-1690 11 p.

研究成果: Article

1 引用 (Scopus)

Understanding the origins of mobile app vulnerabilities: A large-scale measurement study of free and paid apps

Watanabe, T., Akiyama, M., Kanei, F., Shioji, E., Takata, Y., Sun, B., Ishi, Y., Shibahara, T., Yagi, T. & Mori, T., 2017 6 29, Proceedings - 2017 IEEE/ACM 14th International Conference on Mining Software Repositories, MSR 2017. IEEE Computer Society, p. 14-24 11 p. 7962351

研究成果: Conference contribution

14 引用 (Scopus)

Understanding the security management of global third-party android marketplaces

Ishii, Y., Watanabe, T., Kanei, F., Takata, Y., Shioji, E., Akiyama, M., Yagi, T., Sun, B. & Mori, T., 2017 9 5, WAMA 2017 - Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, Co-located with FSE 2017. Sarro, F., Shihab, E., Kaimann, D., Nagappan, M. & Platenius, M. C. (版). Association for Computing Machinery, Inc, p. 12-18 7 p.

研究成果: Conference contribution

7 引用 (Scopus)
2016

AutoBLG: Automatic URL blacklist generator using search space expansion and filters

Sun, B., Akiyama, M., Yagi, T., Hatada, M. & Mori, T., 2016 2 11, 20th IEEE Symposium on Computers and Communication, ISCC 2015. Institute of Electrical and Electronics Engineers Inc., p. 625-631 7 p. 7405584. (Proceedings - IEEE Symposium on Computers and Communications; 巻数 2016-February).

研究成果: Conference contribution

3 引用 (Scopus)

Automating URL blacklist generation with similarity search approach

Sun, B., Akiyama, M., Yagi, T., Hatada, M. & Mori, T., 2016 4 1, : : IEICE Transactions on Information and Systems. E99D, 4, p. 873-882 10 p.

研究成果: Article

5 引用 (Scopus)

Clone or relative? Understanding the origins of similar Android apps

Ishii, Y., Watanabe, T., Akiyama, M. & Mori, T., 2016 3 11, IWSPA 2016 - Proceedings of the 2016 ACM International Workshop on Security and Privacy Analytics, co-located with CODASPY 2016. Association for Computing Machinery, Inc, p. 25-32 8 p.

研究成果: Conference contribution

9 引用 (Scopus)

Domain profiler: Discovering domain names abused in future

Chiba, D., Yagi, T., Akiyama, M., Shibahara, T., Yada, T., Mori, T. & Goto, S., 2016 9 29, Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016. Institute of Electrical and Electronics Engineers Inc., p. 491-502 12 p. 7579766

研究成果: Conference contribution

15 引用 (Scopus)

Poster: Toward automating the generation of malware analysis reports using the sandbox logs

Sun, B., Fujino, A. & Mori, T., 2016 10 24, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 巻 24-28-October-2016. p. 1814-1816 3 p.

研究成果: Conference contribution

4 引用 (Scopus)
2015

Discovering similar malware samples using API call topics

Fujino, A., Murakami, J. & Mori, T., 2015 7 14, 2015 12th Annual IEEE Consumer Communications and Networking Conference, CCNC 2015. Institute of Electrical and Electronics Engineers Inc., p. 140-147 8 p. 7157960

研究成果: Conference contribution

13 引用 (Scopus)

Increasing the darkness of darknet traffic

Haga, Y., Saso, A., Mori, T. & Goto, S., 2015, 2015 IEEE Global Communications Conference, GLOBECOM 2015. Institute of Electrical and Electronics Engineers Inc., 7416973. (2015 IEEE Global Communications Conference, GLOBECOM 2015).

研究成果: Conference contribution

Inferring popularity of domain names with DNS traffic: exploiting cache timeout heuristics

Shimoda, A., Ishibashi, K., Sato, K., Tsujino, M., Inoue, T., Shimura, M., Takebe, T., Takahashi, K., Mori, T. & Goto, S., 2015, 2015 IEEE Global Communications Conference, GLOBECOM 2015. Institute of Electrical and Electronics Engineers Inc., 7417638. (2015 IEEE Global Communications Conference, GLOBECOM 2015).

研究成果: Conference contribution

1 引用 (Scopus)
5 引用 (Scopus)
2 引用 (Scopus)

SFMap: Inferring services over encrypted web flows using dynamical domain name graphs

Mori, T., Inoue, T., Shimoda, A., Sato, K., Ishibashi, K. & Goto, S., 2015 1 1, Traffic Monitoring and Analysis - 7th International Workshop, TMA 2015, Proceedings. Barlet-Ros, P., Bonaventure, O. & Steiner, M. (版). Springer Verlag, p. 126-139 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9053).

研究成果: Conference contribution

12 引用 (Scopus)