Posters/Demos

2024
  1. Y. Tanaka, K. Nomoto, R. Kobayashi, G. Tsuruoka, T. Mori, “A Novel Attack Exploiting the Vulnerabilities of LiDAR Point Cloud Pre-Processing Filters,” in NDSS, Poster Session, Feb 2024.
  2. G. Tsuruoka, T. Sato, Q. A. Chen, “Adversarial Retroreflective Patches: A Novel Stealthy Attack on Traffic Sign Recognition at Night,” in NDSS, Poster Session, Feb 2024.
  3. Y. Zhao, Z. He, T. Mori, “Bypassing Control Invariants-Based Defenses in Autonomous Vehicles,” in NDSS, Poster Session, Feb 2024.
  4. Z. He, Y. Zhao, T. Mori, “Robustness of Reinforcement-Learning-Based Autonomous Driving to Adversarial Inputs,” in NDSS, Poster Session, Feb 2024.
  5. R. Kobayashi, K. Nomoto, Y. Tanaka, G. Tsuruoka, T. Mori, “Shadow Hack: Adversarial Shadow Attack Against LiDAR Object Detection,” in NDSS, Poster Session, 2024.
  6. Z. He, T. Mori, “Poster: Robustness of DRL-Based Autonomous Driving to Adversarial Inputs,” in Proceedings of the Symposium on Vehicle Security and Privacy (VehicleSec), Feb 2024.
  7. Y. Zhao, T. Mori, “Poster: Bypassing Physical Invariants-Based Defenses in Autonomous Vehicles,” in Proceedings of the Symposium on Vehicle Security and Privacy (VehicleSec), Feb 2024.

2022

  1. Chun-Ming Chang, Hsu-Chun Hsiao, Timothy Lynar, and Tatsuya Mori, “Know Your Victim: Tor Browser Setting Identification via Network Traffic Analysis, ” Proceeding the ACM Web Conference (TheWebConf 2022) April 2022  (acceptance rate: 32.7%=35/107)
2021
  1. Kazuki Nomoto, Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata and Tatsuya Mori, “Can the Exposure Notification Framework Expose Personal Information?, ” Proceeding o f the Network and Distributed System Security Symposium (NDSS 2021) [PDF]
2019
  1. Atsuko Natatsuka, Ryo Iijima, Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, and Tatsuya Mori, “A First Look at the Privacy Risks of Voice Assistant Apps,” (poster presentation), Proc. of ACM Conference on Computer and Communications Security (CCS 2019) (to appear)
2018
  1. R. Iijima, S. Minami, Y. Zhou, T. Takehisa, T. Takahashi, Y. Oikawa, and T. Mori, “Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams,” (poster presentation), Proc. of ACM Conference on Computer and Communications Security (CCS 2018), pp. 2222–2224, Oct. 2018 [ACM Digital Library]
  2. K. Mori, Y. Zhou, and T. Mori, “Understanding the Propensity of Password Creation: Comparative Analysis of Three Language Spheres,” (poster presentation), Proc. of the 14th Symposium on Usable Privacy and Security (SOUPS 2018), Augst 2018 (acceptance rate: 69.0%=40/58)
2017
  1. S. Maruyama, S. Wakabayashi, and Tatsuya Mori, “TOUCHFLOOD: A Novel Class of Attacks against Capacitive Touchscreens“, (poster presentation) Proc. of ACM CCS 2017, pp. 2551–2553, Oct 2017. [paper][poster] (acceptance rate: 65.5%=36/55)
  2. S. Wakabayashi, S. Maruyama, T. Mori, S. Goto, M. Kinugawa, and Y. Hayashi, “Is Active Electromagnetic Side-channel Attack Practical?“, (poster presentation) Proc. of ACM CCS 2017, pp. 2587–2589, Oct 2017. [paper][poster] (acceptance rate: 65.5%=36/55)
  3. A. Hasegawa, M. Akiyama, T. Mori, and T. Yagi, “Your Purchase History Has Been Exposed: Privacy Threats on Auction Sites,” (poster presentation) the 13th Symposium on Usable Privacy and Security (SOUPS 2017), July 12-14, 2017, SANTA CLARA, CA (acceptance rate: 67.6%=25/37)
  4. 丸山 誠太, “静電容量方式タッチパネルに対する攻撃“, コンピューターセキュリティシンポジウム(CSS2017) デモセッション DPS-16, 2017年10月
  5. 若林 哲宇, “電波再帰反射攻撃の実用性評価“, コンピューターセキュリティシンポジウム(CSS2017) デモセッション DPS-17, 2017年10月
2016
  1. Bo Sun, Akinori Fujino, and Tatsuya Mori, “Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs,” (poster presentation) 23rd ACM Conference on Computer and Communications Security 2016 (ACM CCS 2016), Vienna, Austria, Oct 2016. [paper][poster] (acceptance rate: 41.3%=38/92)
  2. Y. Ota, A. Kanaoka, and T. Mori, “”I’m stuck, too!” Revisiting Difficulties of Using Web Authentication Mechanisms for Visually Impaired Person, ” (poster presentation), the 12th Symposium on Usable Privacy and Security (SOUPS 2016), June 22-24, 2016, Denver CO. [paper][poster]
2015
  1. Y. Haga, Y. Takata, M. Akiyama, T. Mori, and S. Goto, “Canvas Fingerprinting in the Wild: A Large-scale Measurement and Evaluation, ” (poster presentation), The 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2015)
  2. Y. Ishii, T. Watanabe, M. Akiyama, and T. Mori, “Understanding the Origins of Similar Android Apps,” (poster presentation), The 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2015)
  3. B. Sun, T. Watanabe, M. Akiyama, and T. Mori, “Seeing is Believing? The analysis of unusual ratings and reviews on Android app store,” (poster presentation), The 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2015)
  4. T. Harada, T. Mori, and S. Goto, “Detecting Malicious Wireless APs: Methodology and Field Studies,” (poster presentation), The 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2015)
  5. M. Shimura, M. Hatada, T. Mori, and S. goto, “Analysis of Spam Mail Containing Malicious Attachments using Spamtrap,” The 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2015)
2014
  1. M. Hatada, M. Terada, and T. Mori, “Seven years in MWS: experiences of sharing datasets with anti-malware research community in Japan“, (poster presentation) 21st ACM Conference on Computer and Communications Security 2014 (ACM CCS 2014), Arizona, USA, Nov 2014. [paper][poster]
  2. T. Watanabe and T. Mori,”Understanding the consistency between words and actions for Android apps.”,(poster presentation) 9th ACM Symposium on Information, Computer and Communications Security(ASIACCS 2014), Kyoto, Japan, June 2014 [poster] BEST POSTER AWARD
2013
  1. 笹生憲,”TCPヘッダーと通信パターンの分類を利用したダークネット通信解析”,The 10th IEEE Tokyo Young Researchers Workshop, 2013年12月