Papers per year

[Google Scholar][DBLP][Microsoft Academic Search]

Note: Papers published at IEEE proceedings and shared below are the accepted versions, but not the final published version. See the IEEE web for copyright issues.

2024

Journal Articles
  1. T. Watanabe, E. Shioji, M. Akiyama, T. Mori, “Understanding the Breakdown of Same-Origin Policies in Web Services That Rehost Websites,” Journal of Information Processing, vol. xx, no. xx., pp. xxxx-xxxxx (in press)
  2. R. Kawaoka, D. Chiba, T. Watanabe, M. Akiyama, and T. Mori, “Longitudinal Measurement Study of the Domain Names Associated with Olympic Games,” IEEE ACCESS, Vol. XX, No. XX. pp. XXXX-XXXX, 2024 [Early access version] (the title will be changed)
Conference Proceedings
  1. Kazuki Matsuo, Satoshi Tanda, Yuhei Kawakoya, Kuniyasu Suzaki, and Tatsuya Mori, “SmmPack: Obfuscation for SMM Modules,” the 21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2024), pp. xxxx-xxxx, July 2024
  2. Ryo Iijima, Tetsuya Takehisa, Tetsushi Ohki, and Tatsuya Mori, “The Catcher in the Eye: Recognizing Users by their Blinks“, Proceedings of the 19th ACM ASIA Conference on Information, Computer and Communications Security (ASIACCS 2024), pp. xxxx–xxxx, June 2024 (acceptance rate: 65/301=21.6%)
  3. Lachlan Moore and Tatsuya Mori, “VPN Awareness and Misconceptions: A Comparative Study in Canadian and Japanese Contexts“, Proceedings of the Symposium on Usable Security and Privacy (USEC 2024), pp. xxxx-xxxx, Feb 2024
  4. R. Kobayashi, K. Nomoto, Y. Tanaka, G. Tsuruoka, T. Mori, “WIP: Shadow Hack: Adversarial Shadow Attack Against LiDAR Object Detection,” Proceedings of the Symposium on Vehicle Security and Privacy (VehicleSec 2024), pp. xxxx-xxxx, Feb 2024
  5. G. Tsuruoka, T. Sato, A. Chen, K. Nomoto, R. Kobayashi, Y. Tanaka, T. Mori, “WIP: Adversarial Retroreflective Patches: A Novel Stealthy Attack on Traffic Sign Recognition at Night,” Proceedings of the Symposium on Vehicle Security and Privacy (VehicleSec 2024), pp. xxxx-xxxx, Feb 2024
Poster
  1. Z. He, T. Mori, “Poster: Robustness of DRL-Based Autonomous Driving to Adversarial Inputs,” Proceedings of the Symposium on Vehicle Security and Privacy (VehicleSec 2024), pp. xxxx-xxxx, Feb 2024
  2. Y. Zhao, T. Mori, “Poster: Bypassing Physical Invariants-Based Defenses in Autonomous Vehicles,” Proceedings of the Symposium on Vehicle Security and Privacy (VehicleSec 2024), pp. xxxx-xxxx, Feb 2024

2023

Journal Articles
  1. Keika Mori, Tatsuya Nagai, Yuta Takata, Masaki Kamizono, and Tatsuya Mori, “Analysis of Privacy Compliance by Classifying Policies Before and After the Japanese Law Revision,” Journal of Information Processing, vol. xx, no. xx., pp. xxxx-xxxxx (in press)
  2. Kazuki Nomoto, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori, “Understanding the Inconsistencies in the Permissions Mechanism of Web Browsers,” Journal of Information Processing, 2023, Volume 31, Pages 620-642, September 2023 [PDF] JIP Specially Selected Paper certificate
  3. Ichiro Asomura, Ryo Iijima, Tatsuya Mori, “Automating the Detection of Fraudulent Activities in Online Banking Service,” Journal of Information Processing, Volume 31, Pages 643-653, September 2023 [PDF]
  4. Ayako A. HASEGAWA, Mitsuaki AKIYAMA, Naomi YAMASHITA, Daisuke INOUE, Tatsuya MORI, “Analysis of Non-Experts’ Security- and Privacy-Related Questions on a Q&A Site,” Journal IEICE TRANSACTIONS on Information and Systems, Vol.E106-D, No.9, pp.1380–1396 [PDF]
Conference Proceedings
  1. Keika Mori, Yuta Takata, Daiki Ito, Masaki Kamizono, and Tatsuya Mori, “Impact Analysis of Organizational Structure of Group Companies on Privacy Policies,” Proceedings of he Workshop on Privacy in the Electronic Society (WPES 2023), pp. 159-164,  November 2023 [PDF]
  2. Mei Suzuki, Ryo Iijima, Kazuki Nomoto, Tetsushi Ohki), Tatsuya Mori, “PinchKey: A Natural and User-Friendly Approach to VR User Authentication,” Proceedings of the European Symposium on Usable Security (EuroUSEC), October 2023. [PDF]
  3. M. Yajima, D. Chiba, Y. Yoneya, T. Mori, “A First Look at Brand Indicators for Message Identification (BIMI),” Proceedings of the Passive and Active Measurement Conference 2023 (PAM 2023), Mar 2023 (Acceptance rate=27/80=33.8%) [PDF][YouTube]
  4. Kazuki Nomoto, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori, “Browser Permission Mechanisms Demystified” The Network and Distributed System Security Symposium (NDSS 2023), February 2023 (Acceptance rate=94/581=16.2%) [PDF]

2022

Journal Articles
  1. Ayako A. Hasegawa, Naomi Yamashita, Mitsuaki Akiyama, and Tatsuya Mori.
    Experiences, Behavioral Tendencies, and Concerns of Non-Native English Speakers in Identifying Phishing Emails,” In Journal of Information Processing (JIP), Vol.30, pages 841-858. 2022.
  2. Tianying Xie, Hayato Yamana, and Tatsuya Mori, “CHE: Channel-wise Homomorphic Encryption for Ciphertext Inference in Convolutional Neural Network,” IEEE ACCESS, Volume: 10, pp. 107446–107458, September 2022 [PDF]
Conference Proceedings
  1. Atsuko Natatsuka, Ryo Iijima, Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori, “Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework,” Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2022), October 2022  (Acceptance rate=35/139=25.2%) [PDF]
  2. Kazuki Nomoto , Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata, and Tatsuya Mori, “On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework,” Proceedings of the 22nd Privacy Enhancing Technologies Symposium (PETS 2022), July 2022 (Acceptance rate=37/168=22.0%) [PDF][YouTube]
  3. Ayako A. Hasegawa, Naomi Yamashita, Tatsuya Mori, Daisuke Inoue, Mitsuaki Akiyama, “Understanding Non-Experts’ Security- and Privacy-Related Questions on a Q&A Site,” Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), August 2022 (Acceptance rate=37/133=27.8%) [PDF][YouTube]
  4. Kentaro Sako, Shin’ichiro Matsuo, Tatsuya Mori, “Distributed Random Number Generation Method on Smart Contracts,” Proceedings of the 4th Blockchain and Internet of Things Conference (BIOTC 2022) July 2022
  5. Ryo Iijima, Tatsuya Takehisa and Tatsuya Mori, “Cyber-Physical Firewall: Monitoring and Controlling the Threats Caused by Malicious Analog Signals,” Proceedings of  the 19th ACM International Conference on Computing Frontiers (CF’22), pp. 296-304, Turin, Piedmont, Italy, May 2022. [PDF]
Poster
  1. Chun-Ming Chang, Hsu-Chun Hsiao, Timothy Lynar, and Tatsuya Mori, “Know Your Victim: Tor Browser Setting Identification via Network Traffic Analysis, ” Proceeding the ACM Web Conference (TheWebConf 2022) April 2022  (acceptance rate: 32.7%=35/107)

2021

Journal Articles
  1. Yuji Sakurai, Takuya Watanabe, Tetsuya Okuda, Mitsuaki Akiyama, Tatsuya Mori, “Identifying the Phishing Websites Using the Patterns of TLS Certificates, ” Journal of Cyber Security and Mobility,  Volume 10, Issue 2, pp. 451–486, 2021 [PDF]
Conference Proceedings
  1. M. Yajima, D. Chiba, Y. Yoneya, and T. Mori, “Measuring Adoption of DNS Security Mechanisms with Cross-Sectional Approach,” Proceedings of the IEEE Global Communications Conference: Communication & InformationSystems Security (Globecom 2021), Madrid, Spain December 2021 (to appear)
  2. T. Matsuura, A. Hasegawa, M. Akiyama, and T. Mori, “Careless Participants Are Essential For Our Phishing Study: Understanding the Impact of Screening Methods“, In Proceedings of the 2021 European Symposium on Usable Security (EuroUSEC 2021), October, 2021. (acceptance rate: 24%=15/62Best Paper Award [PDF]
  3. Ayako Akiyama Hasegawa, Naomi Yamashita, Mitsuaki Akiyama, and Tatsuya Mori, “Why They Ignore English Emails: The Challenges of Non-Native Speakers in Identifying Phishing Emails,” Proceedings of the Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), August 2021.(acceptance rate = 19.8%=26/131)[Talk Video][PDF][bibtex]
  4. Ryo Kawaoka, Daiki Chiba, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori, “A First Look at COVID-19 Domain Names: Origin and Implications, ” Proceedings of the Passive and Active Measurement Conference 2021 (PAM 2021) [PDF][Talk video]
Poster
  1. Kazuki Nomoto, Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata and Tatsuya Mori, “Can the Exposure Notification Framework Expose Personal Information?, ” Proceeding o f the Network and Distributed System Security Symposium (NDSS 2021) [PDF]

2020

Journal Articles
  1. Ayako Akiyama Hasegawa, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, and Tatsuya Mori, “Addressing the Privacy Threat to Identify Existence of a Target’s Account on Sensitive Services,” Journal of Information Processing (JIP), Vol.28, pages 1030-1046. December 2020. [PDF]
  2. K. Mori, T. Watanabe, Y. Zhou, A. A. Hasegawa, M. Akiyama, and T. Mori, “Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?,” IEICE Transactions on Information and Systems, Vol. 103-D, No. 7, pp. 1541-1555, July 2020 [PDF]
  3. Mitsuhiro HATADA Tatsuya MORI, “CLAP: Classification of Android PUAs by Similarity of DNS Queries,” IEICE TRANSACTIONS on Information and Systems, Vol. 103-D, No. 2, pp. 265–275, January 2020 [PDF]
  4. Takuya WATANABE Mitsuaki AKIYAMA Fumihiro KANEI Eitaro SHIOJI Yuta TAKATA Bo SUN Yuta ISHII Toshiki SHIBAHARA Takeshi YAGI Tatsuya MORI, “Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library,” IEICE TRANSACTIONS on Information and Systems, Vol. 103-D, No. 2, pp. 276–291,  January 2020 [PDF]
  5. Takuya WATANABE Eitaro SHIOJI Mitsuaki AKIYAMA Keito SASAOKA Takeshi YAGI Tatsuya MORI, “Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel,” IEICE TRANSACTIONS on Information and Systems, Vol. 103-D, No. 2, pp. 239–255, January 2020 [PDF]
Conference Proceedings
  1. Y. Sakurai, T. Watanabe, T. Okuda, M. Akiyama, and T. Mori, “Discovering HTTPSified Phishing Websites Using the TLS Certificates Footprints,” Proceedings of the 5th IEEE International Workshop on Traffic Measurements for Cybersecurity (WTMC2020), pp. 521-530, September 2020 [Video Talk]
  2. T. Watanabe, E. Shioji, M. Akiyama, T. Mori, “Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites,” Proceedings of the 26th Network and Distributed System Security Symposium (NDSS2020), pp. 1–15, February 2020 (acceptance rate=17.4%) DISTINGUISHED PAPER AWARD [PDF]

2019

Journal Articles
  1. R. Iijima, S. Minami, Y. Zhou, T. Takehisa, T. Takahashi, Y. Oikawa, and T. Mori, “Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility,” IEEE Transactions on Emerging Topics in Computing PP(99):1-1 · November 2019 [PDF]
  2. Kanae Yoshida, Hironori Imai, Nana Serizawa, Tatsuya Mori, Akira Kanaoka, “Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps,” Journal of Information Processing (JIP) Vol. 27, pp. 593-602, September 2019 [PDF]
Conference Proceedings
  1. Yuma Kurogome, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Syogo Hayashi, Tatsuya Mori, and Koushik Sen, “EIGER: Automated IOC Generation for Accurate and Interpretable Endpoint Malware Detection, ” Proceedings of the 35th Annual Computer Security Applications Conference (ACSAC2019), pp. xx–xx, December 2019. (acceptance rate = 22.6%=60/266) (to appear)
  2. H. Suzuki, D. Chiba, Y. Yoneya, T. Mori, and S. Goto, “ShamFinder: An Automated Framework for Detecting IDN Homographs,” Proceedings of the 19th ACM  Internet Measurement Conference (IMC 2019),  pp. 449–462, October 2019 (acceptance rate = 19.3%=38/197)  [PDF][Slide][arXiv]
  3. K. Mori, T. Watanabe, Y. Zhou, A. Hasegawa, M. Akiyama, T. Mori, “Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?,” Proceedings of the 4th IEEE European Workshop on Usable Security (EuroUSEC 2019), pp. 159-171, June 2019 [PDF]
  4. S. Maruyama, S. Wakabayashi, and T. Mori, “Tap ‘n Ghost: A Compilation of Novel Attack Techniques against Smartphone Touchscreens,” Proceedings of the 40th IEEE Symposium on Security and Privacy (S&P 2019), pp. 628-645, May 2019 (acceptance rate = 12.5%=84/673)[PDF][slide][short video][YouTube][threatpost][gbhackers][ZDNet]
  5. T. Yasumatsu, T. Watanabe, F. Kanei, E. Shioji, M. Akiyama, and T. Mori, “Understanding the Responsiveness of Mobile App Developers to Software Library Updates,” Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (CODASPY 2019), pp. 13–24, March 2019. (acceptance rate: 28/119=23.5%) [PDF]
Poster
  1. Atsuko Natatsuka, Ryo Iijima, Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, and Tatsuya Mori, “A First Look at the Privacy Risks of Voice Assistant Apps,” (poster presentation), Proc. of ACM Conference on Computer and Communications Security (CCS 2019) (to appear)

2018

Journal articles
  1. Bo Sun, Akinori Fujino, Tatsuya Mori, Tao Ban, Takeshi Takahashi, and Daisuke Inoue, “Automatically Generating Malware Analysis Reports Using Sandbox Logs,” IEICE Transactions on Information and Systems, Vol. E101-D, No. 11, pp. 2622–2632, November 2018. [PDF]
  2. T. Watanabe, M. Akiyama, T. Sakai, H. Washizaki, and T. Mori, “Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps,” IEICE Transactions on Information and Systems, Vol. Vol.E101-D, No. 11, pp. 2584–2599, November 2018. [PDF]
  3. 長谷川 彩子, 秋山 満昭, 八木 毅, 森 達哉, “オンラインオークションにおける購入履歴漏洩のリスクとユーザ認識の調査,” 情報処理学会論文誌, Vol. 59, No. 9, pp. 1689–1698, 2018年9月 [PDF]
  4. D. Chiba, M. Akiyama, T. Yagi, K. Hato, T. Mori, and S. Goto, “DomainChroma: Building Actionable Threat Intelligence from Malicious Domain Names,” Elsevier Computers & Security, Volume 77, Pages 138-161, August 2018 [PDF]
  5. S. Mizuno, M. Hatada, T. Mori, and S. Goto, “Detecting Malware-infected Devices Using the HTTP Header Patterns,” IEICE Transactions on Information and Systems, Vol. E101-D, No.5, pp.1370-1379, May. 2018. [PDF]
  6. B. Sun, X. Luo, M. Akiyama, T. Watanabe and T. Mori, “PADetective: A Systematic Approach to Automate Detection of Promotional Attackers in Mobile App Store,” Journal of Information Processing (JIP), vol. 26, pp. 212-223, April 2018 https://doi.org/10.2197/ipsjjip.26.212
  7. D. Chiba, T. Yagi, M. Akiyama, T. Shibahara, T. Mori, and S. Goto, “DomainProfiler: Towards Accurate and Early Discovery of Domain Names Abused in Future,” International Journal of Information Security, Volume 17, Issue 6, pp 661–680, 2018 [PDF] DOI:10.1007/s10207-017-0396-7
Conference Proceedings
  1. M. Juuti, B. Sun, T. Mori, and N. Asokan, “Stay On-Topic: Generating Context-specific Fake Restaurant Reviews,” Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS 2018), pp. 132–151, September 2018 (acceptance rate: 56/283=19.8%) [Springer]
  2. S. Wakabayashi, S. Maruyama, T. Mori, S. Goto, M. Kinugawa, and Y. Hayashi, “A Feasibility Study of Radio-frequency Retroreflector Attack,” Proceedings of the 12th USENIX Workshop on Offensive Technologies (WOOT 2018), August 2018. (BEST STUDENT PAPER AWARD) [PDF]
  3. K. Yoshida, H. Imai, N. Serizawa, T. Mori, and A. Kanaoka, “Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps,” In Proceedings of the 10th IEEE International Workshop on Security Aspects in Processes and Services Engineering (SAPSE 2018), pp. 713–718, July 2018. [IEEE Xplore]
  4. E. Pariwono, D. Chiba, M. Akiyama, and T. Mori, “Don’t throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps,” Proceedings of the 13th ACM ASIA Conference on Information, Computer and Communications Security (ASIACCS 2018), pp. 147–158, June 2018 (acceptance rate: 62/310=20.0%) [PDF]
  5. T. Watanabe, E. Shioji, M. Akiyama, K. Sasaoka, T. Yagi, and T. Mori, “User Blocking Considered Harmful? An Attacker-controllable Side Channel to Identify Social Accounts,”
    Proceedings of the 3rd IEEE European Symposium on Security and Privacy (Euro S&P 2018), pp. 323–337, April 2018 (acceptance rate: 33/144=22.9%). [IEEE Xplore
Preprints
  1. Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori, “User Blocking Considered Harmful? An Attacker-controllable Side Channel to Identify Social Accounts,” arXiv:1805.05085 [cs.CR], May 2018.
  2. Mika Juuti, Bo Sun, Tatsuya Mori, N. Asokan, “Stay On-Topic: Generating Context-specific Fake Restaurant Reviews,” arXiv:1805.02400 [cs.CR] May 2018
Posters
  1. R. Iijima, S. Minami, Y. Zhou, T. Takehisa, T. Takahashi, Y. Oikawa, and T. Mori, “Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams,” (poster presentation), Proc. of ACM Conference on Computer and Communications Security (CCS 2018), pp. 2222–2224, Oct. 2018 [ACM Digital Library]
  2. K. Mori, Y. Zhou, and T. Mori, “Understanding the Propensity of Password Creation: Comparative Analysis of Three Language Spheres,” (poster presentation), Proc. of the 14th Symposium on Usable Privacy and Security (SOUPS 2018), Augst 2018 (acceptance rate: 69.0%=40/58)

2017

Journal articles
  1. T. Kimura, K. Ishibashi, T. Mori, H. Sawada, T. Toyono, K. Nishimatsu, A. Watanabe, A. Shimoda, and K. Shiomoto, “Network Event Extraction from Log Data with Nonnegative Tensor Factorization,” IEICE Transactions on Communications, Vol.E100-B, No.10, pp.1865-1878, Oct. 2017.
  2. M. Hatada and T. Mori, “Finding New Varieties of Malware with the Classification of Network Behavior,” IEICE Transactions on Information and Systems, Vol. E100-D, No. 8, pp. 1691–1702, Aug. 2017 [PDF]
  3. T. Watanabe, M. Akiyama, and T. Mori, “Tracking the Human Mobility Using Mobile Device Sensors,” IEICE Transactions on Information and Systems, Vol. E100-D, No. 8, pp. 1680–1690, Aug. 2017 [PDF]
  4. Y. Haga, Y. Takata, M. Akiyama, and T. Mori, “Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study,” IEICE Transactions on Information and Systems, Vol. 100-D, No. 8, pp. 1663–1670, Aug. 2017 [PDF]
  5. Y. Ishii, T. Watanabe, M. Akiyama, and T. Mori, “APPraiser: A large scale analysis of Android clone apps,” IEICE Transactions on Information and Systems, Vol. E100-D, No. 8, pp. 1703–1713, Aug. 2017 [PDF]
  6. M. Akiyama, T. Yagi, T. Yada, T. Mori, and Y. Kadobayashi, “Analyzing the Ecosystem of Malicious URL Redirection Through Longitudinal Observation from Honeypots,” Elsevier Computers & Security, vol. 69, pp. 155–173, Aug. 2017 [abstract]
  7. 衣川昌宏,林優一,森達哉 “意図的な電磁妨害時にハードウェアトロイよって引き起こされる情報漏えい評価” 電気学会論文誌A,Vol. 137, No. 3, pp. 153–157, 2017年3月 [JSTAGE]
Conference Proceedings
  1. Y. Ishii, T. Watanabe, F. Kanei, Y. Takata, E. Shioji, M. Akiyama, T. Yagi, B. Sun and T. Mori, “Understanding the Security Management of Global Third-Party Android Marketplaces,” Proceedings of the 2nd International Workshop on App Market Analytics (WAMA 2017), September 2017 [ACM DL]
  2. M. Hatada and T. Mori, “Detecting and Classifying Android PUAs by similarity of DNS queries,” Proceedings of the 7th IEEE International COMPSAC Workshop on Network Technologies for Security, Administration and Protection (NETSAP 2017), pp. 590-595, July 2017 [PDF]
  3. B. Sun, X. Luo, M. Akiyama, T. Watanabe and T. Mori, “Characterizing Promotional Attacks in Mobile App Store,” Proceedings of the 8th International Conference on Applications and Techniques in Information Security (ATIS 2017), pp. 113-127, July 2017 (BEST PAPER AWARD). [Springer]
  4. D. Chiba, M. Akiyama, T. Yagi, T. Yada, T. Mori, and S. Goto, “DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names,” Proceedings of the 41st Annual Computer Software and Applications Conference (COMPSAC 2017), July 2017 (acceptance rate: 25%). [IEEE Xplore]
  5. T. Watanabe, M. Akiyama, F. Kanei, E. Shioji, Y. Takata, B. Sun, Y. Ishii, T. Shibahara, T. Yagi and T. Mori, “Understanding the Origins of Mobile App Vulnerabilities: A Large-scale Measurement Study of Free and Paid Apps,” Proceedings of IEEE/ACM 14th International Conference on Mining Software Repositories (MSR 2017), May 2017 (acceptance rate: 27.2%=43/158) [IEEE Xplore]
  6. S. Mizuno, M. Hatada, T. Mori, and S. Goto, “BotDetector: A robust and scalable approach toward detecting malware-infected devices,” Proceedings of the IEEE International Conference on Communications (ICC 2017), May 2017. (acceptance rate, ICC CISS: 30.5%=84/275) [IEEE Xplore]
Preprint
  1. Seita Maruyama, Satohiro Wakabayashi, Tatsuya Mori “Trojan of Things: Embedding Malicious NFC Tags into Common Objects,” arXiv:1702.07124 [cs.CR]
  2. T. Watanabe, M. Akiyama, F. Kanei, E. Shioji, Y. Takata, B. Sun, Y. Ishi, T. Shibahara, T. Yagi, T. Mori, “A Study on the Vulnerabilities of Mobile Apps associated with Software Modules,” arXiv:1702.03112 [cs.CR]
Posters
  1. S. Maruyama, S. Wakabayashi, and Tatsuya Mori, “TOUCHFLOOD: A Novel Class of Attacks against Capacitive Touchscreens“, (poster presentation) Proc. of ACM CCS 2017, pp. 2551–2553, Oct 2017. [paper][poster] (acceptance rate: 65.5%=36/55)
  2. S. Wakabayashi, S. Maruyama, T. Mori, S. Goto, M. Kinugawa, and Y. Hayashi, “Is Active Electromagnetic Side-channel Attack Practical?“, (poster presentation) Proc. of ACM CCS 2017, pp. 2587–2589, Oct 2017. [paper][poster] (acceptance rate: 65.5%=36/55)
  3. A. Hasegawa, M. Akiyama, T. Mori, and T. Yagi, “Your Purchase History Has Been Exposed: Privacy Threats on Auction Sites,” (poster presentation) the 13th Symposium on Usable Privacy and Security (SOUPS 2017), July 12-14, 2017, SANTA CLARA, CA (acceptance rate: 67.6%=25/37)

2016

Journal articles
  1. T. Mori, T. Inoue, A. Shimoda, K. Sato, K. Ishibashi, and S. Goto, “Statistical Estimation of the Names of HTTPS Servers with Domain Name Graphs,” Computer Communications, Volume 94, Pages 104–113, November 2016. [abstract]
  2. B. Sun, M. Akiyama, T. Yagi, M. Hatada, and T. Mori, “Automating URL Blacklist Generation with Similarity Search Approach,” IEICE Transactions on Information and Systems, Vol.E99-D, No.4, pp. 873–882, April 2016 [IEICE].
Conference Proceedings
  1. D. Chiba, T. Yagi, M. Akiyama, T. Shibahara, T. Yada, T. Mori, and S. Goto, “DomainProfiler: Discovering Domain Names Abused in Future,” Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016), June 2016. (acceptance rate: 22.4%=58/259)
  2. Y. Ishii, T. Watanabe, M. Akiyama, and T. Mori, “Clone or Relative?: Understanding the Origins of Similar Android Apps,” Proceedings of the ACM International Workshop on Security And Privacy Analytics (IWSPA 2016), pp. 25-32, Mar 2016, (full paper acceptance rate: 30.0%=6/20) [ACM DL][PDF] (submitted version)
Posters
  1. Bo Sun, Akinori Fujino, and Tatsuya Mori, “Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs,” (poster presentation) 23rd ACM Conference on Computer and Communications Security 2016 (ACM CCS 2016), Vienna, Austria, Oct 2016. [paper][poster] (acceptance rate: 41.3%=38/92)
  2. Y. Ota, A. Kanaoka, and T. Mori, “”I’m stuck, too!” Revisiting Difficulties of Using Web Authentication Mechanisms for Visually Impaired Person, ” (poster presentation), the 12th Symposium on Usable Privacy and Security (SOUPS 2016), June 22-24, 2016, Denver CO. [paper][poster]

2015

Conference Proceedings
  1. Y. Haga, A. Saso, T. Mori, and S. Goto, “Increasing the Darkness of Darknet Traffic,” Proceedings of the IEEE Global Communications Conference (GLOBECOM 2015), pp. 1-7, December 2015, San Diego CA, US. (acceptance rate, Globecom CISS: 28.8%=68/236) [IEEE Xplore]
  2. A. Shimoda, K. Ishibashi, K. Sato, M. Tsujino, T. Inoue, M. Shimura, T. Takebe, K. Takahashi, T. Mori, and S. Goto, “Inferring Popularity of Domain Names with DNS Traffic: Exploiting Cache Timeout Heuristics,” Proceedings of the IEEE Global Communications Conference (GLOBECOM 2015), pp. 1-6, December 2015, San Diego CA, US. (acceptance rate, Globecom CQRM: 35.4%=40/113) [IEEE Xplore]
  3. T. Watanabe, M. Akiyama, and T. Mori, “RouteDetector: Sensor-based Positioning System that Exploits Spatio-temporal Regularity of Human Mobility,” Proceedings of the 9th USENIX Workshop on Offensive Technologies (WOOT ’15), pp. 1-11, August 2015, Washington D.C., US. (acceptance rate: 35.1% = 20/57) [PDF][slide][bibtex][USENIX]
  4. T. Watanabe, M. Akiyama, T. Sakai, H. Washizaki, and T. Mori, “Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps,” Proceedings of Symposium on Usable Privacy and Security (SOUPS 2015), pp. 241–255, July 2015, Ottawa, Canada. (acceptance rate: 23.7% = 22/93) [PDF][slide][bibtex][USENIX][Data]
  5. B. Sun, M. Akiyama, T. Yagi, M. Hatada, and T. Mori, “AutoBLG: Automatic URL Blacklist Generator Using Search Space Expansion and Filters,” Proceedings of the Twentieth IEEE Symposium on Computers and Communication (ISCC 2015), pp. 205–211, Jul. 2015. (acceptance rate: 40.2% = 137/341) [IEEE Xplore][PDF][slide][bibtex]
  6. T. Mori, T. Inoue, A. Shimoda, K. Sato, K. Ishibashi, and S. Goto, “SFMap: Inferring Services over Encrypted Web Flows using Dynamical Domain Name Graphs,” Proceedings of IFIP Traffic Monitoring and Analysis workshop (TMA 2015), LNCS 9053, pp. 126–139, Apr. 2015. (acceptance rate: 29.6% = 16/54) [bibtex][PDF][slide] DOI: 10.1007/978-3-319-17172-2_9
  7. A. Fujino, J. Murakami, and T. Mori, “Discovering Similar Malware Samples Using API Call Topics,” Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference (CCNC 2015), pp. 140–147, Jan 2015 (acceptance rate: 37.1%) [IEEE Xplore][bibtex][PDF][slide]  DOI: 978-1-4799-6390-4/15/
Posters
  1. Y. Haga, Y. Takata, M. Akiyama, T. Mori, and S. Goto, “Canvas Fingerprinting in the Wild: A Large-scale Measurement and Evaluation, ” (poster presentation), The 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2015)
  2. Y. Ishii, T. Watanabe, M. Akiyama, and T. Mori, “Understanding the Origins of Similar Android Apps,” (poster presentation), The 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2015)
  3. B. Sun, T. Watanabe, M. Akiyama, and T. Mori, “Seeing is Believing? The analysis of unusual ratings and reviews on Android app store,” (poster presentation), The 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2015)
  4. T. Harada, T. Mori, and S. Goto, “Detecting Malicious Wireless APs: Methodology and Field Studies,” (poster presentation), The 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2015)
  5. M. Shimura, M. Hatada, T. Mori, and S. goto, “Analysis of Spam Mail Containing Malicious Attachments using Spamtrap,” The 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2015)

2014

Conference Proceedings
  1. N. Kamiyama, R. Kawahara, T. Mori, “Loss Recovery Method for Content Pre-distribution in VoD Service“, Proceedings of the World Telecommunications Congress (WTC 2014), pp.1-6, June 2014 [IEEE Xplore] BEST PAPER AWARD
  2. T. Kimura, K. Ishibashi, T. Mori, H. Sawada, T. Toyono, K. Nishimatsu, A. Watanabe, A. Shimoda, and K. Shiomoto, “Spatio-temporal Factorization of Log Data for Understanding Network Events“, Proceedings of the IEEE INFOCOM 2014, May 2014 (acceptance rate: 19.4%) [IEEE Xplore][bibtex][PDF]
Posters
  1. M. Hatada, M. Terada, and T. Mori, “Seven years in MWS: experiences of sharing datasets with anti-malware research community in Japan“, (poster presentation) 21st ACM Conference on Computer and Communications Security 2014 (ACM CCS 2014), Arizona, USA, Nov 2014. [paper][poster]
  2. T. Watanabe and T. Mori,”Understanding the consistency between words and actions for Android apps.”,(poster presentation) 9th ACM Symposium on Information, Computer and Communications Security(ASIACCS 2014), Kyoto, Japan, June 2014 [poster] BEST POSTER AWARD

2013

Journal Papers
  1. Daiki Chiba, Kazuhiro Tobe, Tatsuya Mori, Shigeki Goto: Analyzing Spatial Structure of IP Addresses for Detecting Malicious Websites. Journal of Information Processing 21(3): 539-550 (2013) [PDF][bibtex]

Other past papers are listed here.