Conference Papers

[Google Scholar][DBLP][Microsoft Academic Search]

Note: Papers published at IEEE proceedings and shared below are the accepted versions, but not the final published version. See the IEEE web for copyright issues.

  1. M. Yajima, D. Chiba, Y. Yoneya, and T. Mori, “Measuring Adoption of DNS Security Mechanisms with Cross-Sectional Approach,” Proceedings of the IEEE Global Communications Conference: Communication & InformationSystems Security (Globecom 2021), Madrid, Spain December 2021 (to appear)
  2. Ayako Akiyama Hasegawa, Naomi Yamashita, Mitsuaki Akiyama, and Tatsuya Mori, “Why They Ignore English Emails: The Challenges of Non-Native Speakers in Identifying Phishing Emails,” Proceedings of the Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), August 2021.(acceptance rate = 9.8%=26/131)[Talk Video][PDF][bibtex]
  3. Ryo Kawaoka, Daiki Chiba, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori, “A First Look at COVID-19 Domain Names: Origin and Implications, ” Proceedings of the Passive and Active Measurement Conference 2021 (PAM 2021) [PDF][Talk video]
  4. Y. Sakurai, T. Watanabe, T. Okuda, M. Akiyama, and T. Mori, “Discovering HTTPSified Phishing Websites Using the TLS Certificates Footprints,” Proceedings of the 5th IEEE International Workshop on Traffic Measurements for Cybersecurity (WTMC2020), pp. 521-530, September 2020 [Video Talk][PDF]
  5. T. Watanabe, E. Shioji, M. Akiyama, T. Mori, “Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites,” Proceedings of the 26th Network and Distributed System Security Symposium (NDSS2020), pp. 1–15, February 2020 (acceptance rate=17.4%) DISTINGUISHED PAPER AWARD [PDF]
  6. Yuma Kurogome, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Syogo Hayashi, Tatsuya Mori, and Koushik Sen, “EIGER: Automated IOC Generation for Accurate and Interpretable Endpoint Malware Detection, ” Proceedings of the 35th Annual Computer Security Applications Conference (ACSAC2019), pp. xx–xx, December 2019. (acceptance rate = 22.6%=60/266)
  7. H. Suzuki, D. Chiba, Y. Yoneya, T. Mori, and S. Goto, “ShamFinder: An Automated Framework for Detecting IDN Homographs,” Proceedings of the 19th ACM  Internet Measurement Conference (IMC 2019),  pp. 449–462, October 2019 (acceptance rate = 19.3%=38/197)  [PDF][Slide][arXiv]
  8. K. Mori, T. Watanabe, Y. Zhou, A. Hasegawa, M. Akiyama, T. Mori, “Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?,” Proceedings of the 4th IEEE European Workshop on Usable Security (EuroUSEC 2019), pp. 159-171, June 2019 [PDF]
  9. S. Maruyama, S. Wakabayashi, and T. Mori, “Tap ‘n Ghost: A Compilation of Novel Attack Techniques against Smartphone Touchscreens,” Proceedings of the 40th IEEE Symposium on Security and Privacy (S&P 2019), pp. 628-645, May 2019 (acceptance rate = 12.5%=84/673) [PDF][slide][short video][YouTube][threatpost][gbhackers][ZDNet]
  10. T. Yasumatsu, T. Watanabe, F. Kanei, E. Shioji, M. Akiyama, and T. Mori, “Understanding the Responsiveness of Mobile App Developers to Software Library Updates,” Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (CODASPY 2019), pp. 13–24, March 2019. (acceptance rate: 28/119=23.5%) [PDF]
  11. M. Juuti, B. Sun, T. Mori, and N. Asokan, “Stay On-Topic: Generating Context-specific Fake Restaurant Reviews,” Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS 2018), pp. 132–151, September 2018 (acceptance rate: 56/283=19.8%) [Springer]
  12. S. Wakabayashi, S. Maruyama, T. Mori, S. Goto, M. Kinugawa, and Y. Hayashi, “A Feasibility Study of Radio-frequency Retroreflector Attack,” Proceedings of the 12th USENIX Workshop on Offensive Technologies (WOOT 2018), August 2018. (BEST STUDENT PAPER AWARD) [PDF]
  13. K. Yoshida, H. Imai, N. Serizawa, T. Mori, and A. Kanaoka, “Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps,” In Proceedings of the 10th IEEE International Workshop on Security Aspects in Processes and Services Engineering (SAPSE 2018), pp. 713–718, July 2018. [IEEE Xplore]
  14. E. Pariwono, D. Chiba, M. Akiyama, and T. Mori, “Don’t throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps,” Proceedings of the 13th ACM ASIA Conference on Information, Computer and Communications Security (ASIACCS 2018), pp. 147–158, June 2018 (acceptance rate: 62/310=20.0%) [PDF]
  15. T. Watanabe, E. Shioji, M. Akiyama, K. Sasaoka, T. Yagi, and T. Mori, “User Blocking Considered Harmful? An Attacker-controllable Side Channel to Identify Social Accounts,”
    Proceedings of the 3rd IEEE European Symposium on Security and Privacy (Euro S&P 2018), pp. 323–337, April 2018 (acceptance rate: 33/144=22.9%). [IEEE Xplore
  16. Y. Ishii, T. Watanabe, F. Kanei, Y. Takata, E. Shioji, M. Akiyama, T. Yagi, B. Sun and T. Mori, “Understanding the Security Management of Global Third-Party Android Marketplaces,” Proceedings of the 2nd International Workshop on App Market Analytics (WAMA 2017), pp. 12-18, September 2017 [ACM DL][PDF]
  17. M. Hatada and T. Mori, “Detecting and Classifying Android PUAs by similarity of DNS queries,” Proceedings of the 7th IEEE International COMPSAC Workshop on Network Technologies for Security, Administration and Protection (NETSAP 2017), pp. 590-595, July 2017 [PDF][Xplore]
  18. B. Sun, X. Luo, M. Akiyama, T. Watanabe and T. Mori, “Characterizing Promotional Attacks in Mobile App Store,” Proceedings of the 8th International Conference on Applications and Techniques in Information Security (ATIS 2017), pp. 113-127, July 2017 (BEST PAPER AWARD). [Springer]
  19. D. Chiba, M. Akiyama, T. Yagi, T. Yada, T. Mori, and S. Goto, “DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names,” Proceedings of the 41st Annual Computer Software and Applications Conference (COMPSAC 2017), pp. 643-648, July 2017 (acceptance rate: 25%). [IEEE Xplore]
  20. T. Watanabe, M. Akiyama, F. Kanei, E. Shioji, Y. Takata, B. Sun, Y. Ishii, T. Shibahara, T. Yagi and T. Mori, “Understanding the Origins of Mobile App Vulnerabilities: A Large-scale Measurement Study of Free and Paid Apps,” Proceedings of IEEE/ACM 14th International Conference on Mining Software Repositories (MSR 2017), May 2017 (acceptance rate: 27.2%=43/158) [IEEE Xplore]
  21. S. Mizuno, M. Hatada, T. Mori, and S. Goto, “BotDetector: A robust and scalable approach toward detecting malware-infected devices,” Proceedings of the IEEE International Conference on Communications (ICC 2017), May 2017. (acceptance rate, ICC CISS: 30.5%=84/275) [IEEE Xplore]
  22. D. Chiba, T. Yagi, M. Akiyama, T. Shibahara, T. Yada, T. Mori, and S. Goto, “DomainProfiler: Discovering Domain Names Abused in Future,” Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016), pp. 491-502, June 2016. (acceptance rate: 22.4%=58/259) [Xplore]
  23. Y. Ishii, T. Watanabe, M. Akiyama, and T. Mori, “Clone or Relative?: Understanding the Origins of Similar Android Apps,” Proceedings of the ACM International Workshop on Security And Privacy Analytics (IWSPA 2016), pp. 25-32, Mar 2016, (full paper acceptance rate: 30.0%=6/20) [ACM DL][PDF] (submitted version)
  24. Y. Haga, A. Saso, T. Mori, and S. Goto, “Increasing the Darkness of Darknet Traffic,” Proceedings of the IEEE Global Communications Conference (GLOBECOM 2015), pp. 1-7, December 2015, San Diego CA, US. (acceptance rate, Globecom CISS: 28.8%=68/236) [IEEE Xplore]
  25. A. Shimoda, K. Ishibashi, K. Sato, M. Tsujino, T. Inoue, M. Shimura, T. Takebe, K. Takahashi, T. Mori, and S. Goto, “Inferring Popularity of Domain Names with DNS Traffic: Exploiting Cache Timeout Heuristics,” Proceedings of the IEEE Global Communications Conference (GLOBECOM 2015), pp. 1-6, December 2015, San Diego CA, US. (acceptance rate, Globecom CQRM: 35.4%=40/113) [IEEE Xplore]
  26. T. Watanabe, M. Akiyama, and T. Mori, “RouteDetector: Sensor-based Positioning System that Exploits Spatio-temporal Regularity of Human Mobility,” Proceedings of the 9th USENIX Workshop on Offensive Technologies (WOOT ’15), pp. 1-11, August 2015, Washington D.C., US. (acceptance rate: 35.1% = 20/57) [PDF][slide][bibtex][USENIX]
  27. T. Watanabe, M. Akiyama, T. Sakai, H. Washizaki, and T. Mori, “Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps,” Proceedings of Symposium on Usable Privacy and Security (SOUPS 2015), pp. 241–255, July 2015, Ottawa, Canada. (acceptance rate: 23.7% = 22/93) [PDF][slide][bibtex][USENIX][Data]
  28. B. Sun, M. Akiyama, T. Yagi, M. Hatada, and T. Mori, “AutoBLG: Automatic URL Blacklist Generator Using Search Space Expansion and Filters,” Proceedings of the Twentieth IEEE Symposium on Computers and Communication (ISCC 2015), pp. 205–211, Jul. 2015. (acceptance rate: 40.2% = 137/341) [IEEE Xplore][PDF][slide][bibtex]
  29. T. Mori, T. Inoue, A. Shimoda, K. Sato, K. Ishibashi, and S. Goto, “SFMap: Inferring Services over Encrypted Web Flows using Dynamical Domain Name Graphs,” Proceedings of IFIP Traffic Monitoring and Analysis workshop (TMA 2015), LNCS 9053, pp. 126–139, Apr. 2015. (acceptance rate: 29.6% = 16/54) [bibtex][PDF][slide] DOI: 10.1007/978-3-319-17172-2_9
  30. A. Fujino, J. Murakami, and T. Mori, “Discovering Similar Malware Samples Using API Call Topics,” Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference (CCNC 2015), pp. 140–147, Jan 2015 (acceptance rate: 37.1%) [IEEE Xplore][bibtex][PDF][slide]  DOI: 978-1-4799-6390-4/15/
  31. N. Kamiyama, R. Kawahara, T. Mori, “Loss Recovery Method for Content Pre-distribution in VoD Service“, Proceedings of the World Telecommunications Congress (WTC 2014), pp.1-6, June 2014 [IEEE Xplore] BEST PAPER AWARD
  32. T. Kimura, K. Ishibashi, T. Mori, H. Sawada, T. Toyono, K. Nishimatsu, A. Watanabe, A. Shimoda, and K. Shiomoto, “Spatio-temporal Factorization of Log Data for Understanding Network Events“, Proceedings of the IEEE INFOCOM 2014, May 2014 (acceptance rate: 19.4%) [IEEE Xplore][bibtex][PDF]