• 742 引用
  • 14 h指数
20002020

年単位の研究成果

Pureに変更を加えた場合、すぐここに表示されます。

研究成果

フィルター
Conference contribution
2019

Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?

Mori, K., Watanabe, T., Zhou, Y., Akiyama Hasegawa, A., Akiyama, M. & Mori, T., 2019 6, Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019. Institute of Electrical and Electronics Engineers Inc., p. 159-171 13 p. 8802462. (Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019).

研究成果: Conference contribution

1 引用 (Scopus)

Eiger: Automated IOC generation for accurate and interpretable endpoint malware detection

Kurogome, Y., Otsuki, Y., Kawakoya, Y., Iwamura, M., Hayashi, S., Mori, T. & Sen, K., 2019 12 9, Proceedings - 35th Annual Computer Security Applications Conference, ACSAC 2019. Association for Computing Machinery, p. 687-701 15 p. (ACM International Conference Proceeding Series).

研究成果: Conference contribution

公開
2 引用 (Scopus)

Poster: A first look at the privacy risks of voice assistant apps

Natatsuka, A., Akiyama, M., Iijima, R., Sakai, T., Watanabe, T. & Mori, T., 2019 11 6, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2633-2635 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

研究成果: Conference contribution

1 引用 (Scopus)

ShamFinder: An automated framework for detecting IDN homographs

Suzuki, H., Chiba, D., Yoneya, Y., Mori, T. & Goto, S., 2019 10 21, IMC 2019 - Proceedings of the 2019 ACM Internet Measurement Conference. Association for Computing Machinery, p. 449-462 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

研究成果: Conference contribution

公開
2 引用 (Scopus)

Tap 'n ghost: A compilation of novel attack techniques against smartphone touchscreens

Maruyama, S., Wakabayashi, S. & Mori, T., 2019 5, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 620-637 18 p. 8835251. (Proceedings - IEEE Symposium on Security and Privacy; 巻数 2019-May).

研究成果: Conference contribution

3 引用 (Scopus)

Understanding the inconsistencies between text descriptions and the use of privacy-sensitive resources of mobile apps

Watanabe, T., Akiyama, M., Sakai, T., Washizaki, H. & Mori, T., 2019, SOUPS 2015 - Proceedings of the 11th Symposium on Usable Privacy and Security. USENIX Association, p. 241-255 15 p. (SOUPS 2015 - Proceedings of the 11th Symposium on Usable Privacy and Security).

研究成果: Conference contribution

14 引用 (Scopus)

Understanding the responsiveness of mobile app developers to software library updates

Yasumatsu, T., Watanabe, T., Kanei, F., Shioji, E., Akiyama, M. & Mori, T., 2019 3 13, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 13-24 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

研究成果: Conference contribution

公開
1 引用 (Scopus)
2018

Don't throw me away: Threats caused by the abandoned internet resources used by android apps

Pariwono, E., Akiyama, M., Chiba, D. & Mori, T., 2018 5 29, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 147-158 12 p.

研究成果: Conference contribution

3 引用 (Scopus)

Stay on-topic: Generating context-specific fake restaurant reviews

Juuti, M., Sun, B., Mori, T. & Asokan, N., 2018 1 1, Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Proceedings. Lopez, J., Zhou, J. & Soriano, M. (版). Springer Verlag, p. 132-151 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 11098 LNCS).

研究成果: Conference contribution

5 引用 (Scopus)

Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps

Yoshida, K., Imai, H., Serizawa, N., Mori, T. & Kanaoka, A., 2018 6 8, Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018. Demartini, C., Reisman, S., Liu, L., Tovar, E., Takakura, H., Yang, J-J., Lung, C-H., Ahamed, S. I., Hasan, K., Conte, T., Nakamura, M., Zhang, Z., Akiyama, T., Claycomb, W. & Cimato, S. (版). IEEE Computer Society, 巻 2. p. 713-718 6 p. 8377952

研究成果: Conference contribution

User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts

Watanabe, T., Shioji, E., Akiyama, M., Sasaoka, K., Yagi, T. & Mori, T., 2018 7 6, Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. Institute of Electrical and Electronics Engineers Inc., p. 323-337 15 p. (Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018).

研究成果: Conference contribution

4 引用 (Scopus)
2017

BotDetector: A robust and scalable approach toward detecting malware-infected devices

Mizuno, S., Hatada, M., Mori, T. & Goto, S., 2017 7 28, 2017 IEEE International Conference on Communications, ICC 2017. Institute of Electrical and Electronics Engineers Inc., 7997372

研究成果: Conference contribution

5 引用 (Scopus)

Characterizing promotional attacks in mobile app store

Sun, B., Luo, X., Akiyama, M., Watanabe, T. & Mori, T., 2017 1 1, Applications and Techniques in Information Security - 8th International Conference, ATIS 2017, Proceedings. Kim, D. S., Li, G., Zhang, X. & Batten, L. (版). Springer Verlag, p. 113-127 15 p. (Communications in Computer and Information Science; 巻数 719).

研究成果: Conference contribution

1 引用 (Scopus)

Detecting and Classifying Android PUAs by Similarity of DNS queries

Hatada, M. & Mori, T., 2017 9 7, Proceedings - 2017 IEEE 41st Annual Computer Software and Applications Conference Workshops, COMPSAC 2017. Demartini, C., Yang, J-J., Ahamed, S. I., Conte, T., Akiyama, T., Reisman, S., Takakura, H., Hasan, K., Claycomb, W., Nakamura, M., Tovar, E., Zhang, Z., Liu, L., Lung, C-H. & Cimato, S. (版). IEEE Computer Society, p. 590-595 6 p. 8029995. (Proceedings - International Computer Software and Applications Conference; 巻数 2).

研究成果: Conference contribution

4 引用 (Scopus)

DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names

Chiba, D., Akiyama, M., Yagi, T., Yada, T., Mori, T. & Goto, S., 2017 9 7, Proceedings - 2017 IEEE 41st Annual Computer Software and Applications Conference, COMPSAC 2017. IEEE Computer Society, 巻 1. p. 643-648 6 p. 8029671

研究成果: Conference contribution

2 引用 (Scopus)

Poster: Touchflood: A novel class of attacks against capacitive touchscreens

Maruyama, S., Wakabayashi, S. & Mori, T., 2017 10 30, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 巻 Part F131467. p. 2551-2553 3 p.

研究成果: Conference contribution

Poster: Is active electromagnetic side-channel attack practical?

Wakabayashi, S., Maruyama, S., Mori, T., Goto, S., Kinugawa, M. & Hayashi, Y. I., 2017 10 30, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 巻 Part F131467. p. 2587-2589 3 p.

研究成果: Conference contribution

3 引用 (Scopus)

Understanding the origins of mobile app vulnerabilities: A large-scale measurement study of free and paid apps

Watanabe, T., Akiyama, M., Kanei, F., Shioji, E., Takata, Y., Sun, B., Ishi, Y., Shibahara, T., Yagi, T. & Mori, T., 2017 6 29, Proceedings - 2017 IEEE/ACM 14th International Conference on Mining Software Repositories, MSR 2017. IEEE Computer Society, p. 14-24 11 p. 7962351

研究成果: Conference contribution

14 引用 (Scopus)

Understanding the security management of global third-party android marketplaces

Ishii, Y., Watanabe, T., Kanei, F., Takata, Y., Shioji, E., Akiyama, M., Yagi, T., Sun, B. & Mori, T., 2017 9 5, WAMA 2017 - Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, Co-located with FSE 2017. Sarro, F., Shihab, E., Kaimann, D., Nagappan, M. & Platenius, M. C. (版). Association for Computing Machinery, Inc, p. 12-18 7 p.

研究成果: Conference contribution

7 引用 (Scopus)
2016

AutoBLG: Automatic URL blacklist generator using search space expansion and filters

Sun, B., Akiyama, M., Yagi, T., Hatada, M. & Mori, T., 2016 2 11, 20th IEEE Symposium on Computers and Communication, ISCC 2015. Institute of Electrical and Electronics Engineers Inc., p. 625-631 7 p. 7405584. (Proceedings - IEEE Symposium on Computers and Communications; 巻数 2016-February).

研究成果: Conference contribution

3 引用 (Scopus)

Clone or relative? Understanding the origins of similar Android apps

Ishii, Y., Watanabe, T., Akiyama, M. & Mori, T., 2016 3 11, IWSPA 2016 - Proceedings of the 2016 ACM International Workshop on Security and Privacy Analytics, co-located with CODASPY 2016. Association for Computing Machinery, Inc, p. 25-32 8 p.

研究成果: Conference contribution

9 引用 (Scopus)

Domain profiler: Discovering domain names abused in future

Chiba, D., Yagi, T., Akiyama, M., Shibahara, T., Yada, T., Mori, T. & Goto, S., 2016 9 29, Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016. Institute of Electrical and Electronics Engineers Inc., p. 491-502 12 p. 7579766

研究成果: Conference contribution

15 引用 (Scopus)

Poster: Toward automating the generation of malware analysis reports using the sandbox logs

Sun, B., Fujino, A. & Mori, T., 2016 10 24, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 巻 24-28-October-2016. p. 1814-1816 3 p.

研究成果: Conference contribution

4 引用 (Scopus)
2015

Discovering similar malware samples using API call topics

Fujino, A., Murakami, J. & Mori, T., 2015 7 14, 2015 12th Annual IEEE Consumer Communications and Networking Conference, CCNC 2015. Institute of Electrical and Electronics Engineers Inc., p. 140-147 8 p. 7157960

研究成果: Conference contribution

13 引用 (Scopus)

Increasing the darkness of darknet traffic

Haga, Y., Saso, A., Mori, T. & Goto, S., 2015, 2015 IEEE Global Communications Conference, GLOBECOM 2015. Institute of Electrical and Electronics Engineers Inc., 7416973. (2015 IEEE Global Communications Conference, GLOBECOM 2015).

研究成果: Conference contribution

Inferring popularity of domain names with DNS traffic: exploiting cache timeout heuristics

Shimoda, A., Ishibashi, K., Sato, K., Tsujino, M., Inoue, T., Shimura, M., Takebe, T., Takahashi, K., Mori, T. & Goto, S., 2015, 2015 IEEE Global Communications Conference, GLOBECOM 2015. Institute of Electrical and Electronics Engineers Inc., 7417638. (2015 IEEE Global Communications Conference, GLOBECOM 2015).

研究成果: Conference contribution

1 引用 (Scopus)

SFMap: Inferring services over encrypted web flows using dynamical domain name graphs

Mori, T., Inoue, T., Shimoda, A., Sato, K., Ishibashi, K. & Goto, S., 2015 1 1, Traffic Monitoring and Analysis - 7th International Workshop, TMA 2015, Proceedings. Barlet-Ros, P., Bonaventure, O. & Steiner, M. (版). Springer Verlag, p. 126-139 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9053).

研究成果: Conference contribution

12 引用 (Scopus)
2014

Loss recovery method for content pre-distribution in VoD service

Kamiyama, N., Kawahara, R. & Mori, T., 2014, Proceedings of World Telecommunications Congress 2014, WTC 2014. Institute of Electrical and Electronics Engineers Inc., 6840006. (Proceedings of World Telecommunications Congress 2014, WTC 2014).

研究成果: Conference contribution

Seven years in MWS: Experiences of sharing datasets with anti-malware research community in Japan

Hatada, M., Terada, M. & Mori, T., 2014 11 3, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 1433-1435 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

研究成果: Conference contribution

1 引用 (Scopus)

Spatio-temporal factorization of log data for understanding network events

Kimura, T., Ishibashi, K., Mori, T., Sawada, H., Toyono, T., Nishimatsu, K., Watanabe, A., Shimoda, A. & Shiomoto, K., 2014 1 1, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 610-618 9 p. 6847986. (Proceedings - IEEE INFOCOM).

研究成果: Conference contribution

43 引用 (Scopus)
2013

A periodic combined-content distribution mechanism in peer-assisted content delivery networks

Maki, N., Shinkuma, R., Mori, T., Kamiyama, N. & Kawahara, R., 2013 8 14, International Telecommunication Union - Proceedings of the 2013 ITU Kaleidoscope Academic Conference: Building Sustainable Communities, K 2013. p. 217-224 8 p. 6533770. (International Telecommunication Union - Proceedings of the 2013 ITU Kaleidoscope Academic Conference: Building Sustainable Communities, K 2013).

研究成果: Conference contribution

3 引用 (Scopus)

Expected traffic reduction by content-oriented incentive in peer-assisted content delivery networks

Maki, N., Nishio, T., Shinkuma, R., Takahashi, T., Mori, T., Kamiyama, N. & Kawahara, R., 2013 5 1, International Conference on Information Networking 2013, ICOIN 2013. p. 450-455 6 p. 6496421. (International Conference on Information Networking).

研究成果: Conference contribution

5 引用 (Scopus)

Few-mode fiber for optical MIMO transmission with low computational complexity

Sakamoto, T., Mori, T., Yamamoto, T. & Yamamoto, F., 2013 7 22, Next-Generation Optical Communication: Components, Sub-Systems, and Systems II. 86470B. (Proceedings of SPIE - The International Society for Optical Engineering; 巻数 8647).

研究成果: Conference contribution

1 引用 (Scopus)

Modal gain controllable all-fiber type multimode fiber amplifier

Wada, M., Sakamoto, T., Mori, T., Hanzawa, N., Yamamoto, T. & Yamamoto, F., 2013 10 28, 2013 18th OptoElectronics and Communications Conference Held Jointly with 2013 International Conference on Photonics in Switching, OECC/PS 2013. 6597395. (2013 18th OptoElectronics and Communications Conference Held Jointly with 2013 International Conference on Photonics in Switching, OECC/PS 2013).

研究成果: Conference contribution

2 引用 (Scopus)
2012

Autonomic load balancing for flow monitoring

Kamiyama, N., Mori, T. & Kawahara, R., 2012 12 1, 2012 IEEE International Conference on Communications, ICC 2012. p. 2684-2688 5 p. 6363789. (IEEE International Conference on Communications).

研究成果: Conference contribution

Detecting malicious websites by learning IP address features

Chiba, D., Tobe, K., Mori, T. & Goto, S., 2012 11 1, Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012. p. 29-39 11 p. 6305258. (Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012).

研究成果: Conference contribution

15 引用 (Scopus)
2011

How is e-mail sender authentication used and misused?

Mori, T., Takahashi, Y., Sato, K. & Ishibashi, K., 2011 10 13, Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS 2011. p. 31-37 7 p. (ACM International Conference Proceeding Series).

研究成果: Conference contribution

6 引用 (Scopus)

Limiting pre-distribution and clustering users on multicast pre-distribution VoD

Kamiyama, N., Kawahara, R., Mori, T. & Hasegawa, H., 2011 9 19, Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, IM 2011. p. 706-709 4 p. 5990661. (Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, IM 2011).

研究成果: Conference contribution

1 引用 (Scopus)

Multicast pre-distribution in VoD services

Kamiyama, N., Kawahara, R., Mori, T. & Hasegawa, H., 2011 9 19, 2011 IEEE International Workshop Technical Committee on Communications Quality and Reliability, CQR 2011. 5996079. (2011 IEEE International Workshop Technical Committee on Communications Quality and Reliability, CQR 2011).

研究成果: Conference contribution

7 引用 (Scopus)

Performance evaluation of peer-assisted content distribution

Kawahara, R., Kamiyama, N., Mori, T. & Hasegawa, H., 2011 6 7, 2011 IEEE Consumer Communications and Networking Conference, CCNC'2011. p. 725-729 5 p. 5766586. (2011 IEEE Consumer Communications and Networking Conference, CCNC'2011).

研究成果: Conference contribution

Traffic engineering using overlay network

Kawahara, R., Harada, S., Kamiyama, N., Mori, T., Hasegawa, H. & Nakao, A., 2011 9 2, 2011 IEEE International Conference on Communications, ICC 2011. 5963441. (IEEE International Conference on Communications).

研究成果: Conference contribution

1 引用 (Scopus)
2010

Analyzing influence of network topology on designing ISP-operated CDN

Kamiyama, N., Mori, T., Kawahara, R., Harada, S. & Hasegawa, H., 2010, Proceedings of 2010 14th International Telecommunications Network Strategy and Planning Symposium, Networks 2010. 5624931. (Proceedings of 2010 14th International Telecommunications Network Strategy and Planning Symposium, Networks 2010).

研究成果: Conference contribution

1 引用 (Scopus)

Characterizing traffic flows originating from large-scale video sharing services

Mori, T., Kawahara, R., Hasegawa, H. & Shimogawa, S., 2010 5 14, Traffic Monitoring and Analysis - Second International Workshop, TMA 2010, Proceedings. p. 17-31 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 6003 LNCS).

研究成果: Conference contribution

17 引用 (Scopus)

Impact of topology on parallel video streaming

Kamiyania, N., Kawahara, R., Mori, T., Harada, S. & Hasegawa, H., 2010 1 1, Proceedings of the 2010 IEEE/IFIP Network Operations and Management Symposium, NOMS 2010. IEEE Computer Society, p. 607-614 8 p. 5488436. (Proceedings of the 2010 IEEE/IFIP Network Operations and Management Symposium, NOMS 2010).

研究成果: Conference contribution

6 引用 (Scopus)

On the effectiveness of IP reputation for spam filtering

Esquivel, H., Akella, A. & Mori, T., 2010 5 18, 2010 2nd International Conference on COMmunication Systems and NETworks, COMSNETS 2010. 5431981. (2010 2nd International Conference on COMmunication Systems and NETworks, COMSNETS 2010).

研究成果: Conference contribution

19 引用 (Scopus)

Optimally designing capacity and location of caches to reduce P2P traffic

Kamiyama, N., Kawahara, R., Mori, T., Harada, S. & Hasegawa, H., 2010 8 13, 2010 IEEE International Conference on Communications, ICC 2010. 5501837. (IEEE International Conference on Communications).

研究成果: Conference contribution

2 引用 (Scopus)

Sensor in the dark: Building untraceable large-scale honeypots using virtualization technologies

Shimoda, A., Mori, T. & Goto, S., 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 22-30 9 p. 5598179. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

研究成果: Conference contribution

2 引用 (Scopus)
2009

Adaptive bandwidth control to handle long-duration large flows

Kawahara, R., Mori, T., Kamiyama, N., Harada, S. & Hasegawa, H., 2009 11 19, Proceedings - 2009 IEEE International Conference on Communications, ICC 2009. 5198696. (IEEE International Conference on Communications).

研究成果: Conference contribution

Improving deployability of peer-assisted CDN platform with incentive

Mori, T., Kamiyama, N., Harada, S., Hasegawa, H. & Kawahara, R., 2009 12 1, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference. 5425962. (GLOBECOM - IEEE Global Telecommunications Conference).

研究成果: Conference contribution

8 引用 (Scopus)

ISP-Operated CDN

Kamiyama, N., Mori, T., Kawahara, R., Harada, S. & Hasegawa, H., 2009 10 12, IEEE INFOCOM Workshops 2009. 5072157. (Proceedings - IEEE INFOCOM).

研究成果: Conference contribution

15 引用 (Scopus)