Journal Papers

Since 2013.

[Google Scholar][DBLP][Microsoft Academic Search]

  1. K. Mori, T. Watanabe, Y. Zhou, A. A. Hasegawa, M. Akiyama, and T. Mori, “Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?,” IEICE Transactions on Information and Systems, Vol. XXX-D, No. X, pp. xxxx-xxxx, XXX 2020 (accepted for publication) 
  2. Mitsuhiro HATADA Tatsuya MORI, “CLAP: Classification of Android PUAs by Similarity of DNS Queries,” IEICE TRANSACTIONS on Information and Systems, Vol. 103-D, No. 2, pp. 265–275, January 2020 [PDF]
  3. Takuya WATANABE Mitsuaki AKIYAMA Fumihiro KANEI Eitaro SHIOJI Yuta TAKATA Bo SUN Yuta ISHII Toshiki SHIBAHARA Takeshi YAGI Tatsuya MORI, “Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library,” IEICE TRANSACTIONS on Information and Systems, Vol. 103-D, No. 2, pp. 276–291,  January 2020 [PDF]
  4. Takuya WATANABE Eitaro SHIOJI Mitsuaki AKIYAMA Keito SASAOKA Takeshi YAGI Tatsuya MORI, “Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel,” IEICE TRANSACTIONS on Information and Systems, Vol. 103-D, No. 2, pp. 239–255, January 2020 [PDF]
  5. R. Iijima, S. Minami, Y. Zhou, T. Takehisa, T. Takahashi, Y. Oikawa, and T. Mori, “Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility,” IEEE Transactions on Emerging Topics in Computing PP(99):1-1 · November 2019 (online early access: https://ieeexplore.ieee.org/document/8906174)
  6. Kanae Yoshida, Hironori Imai, Nana Serizawa, Tatsuya Mori, Akira Kanaoka, “Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps,” Journal of Information Processing (JIP) Vol. 27, pp. 593-602, September 2019 [PDF]
  7. Bo Sun, Akinori Fujino, Tatsuya Mori, Tao Ban, Takeshi Takahashi, and Daisuke Inoue, “Automatically Generating Malware Analysis Reports Using Sandbox Logs,” IEICE Transactions on Information and Systems, Vol. E101-D, No. 11, pp. 2622–2632, November 2018. [PDF]
  8. T. Watanabe, M. Akiyama, T. Sakai, H. Washizaki, and T. Mori, “Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps,” IEICE Transactions on Information and Systems, Vol. Vol.E101-D, No. 11, pp. 2584–2599, November 2018. [PDF]
  9. 長谷川彩子, 秋山満昭, 八木毅, 森達哉, “オンラインオークションにおける購入履歴漏洩のリスクとユーザ認識の調査,” 情報処理学会論文誌, Vol. 59, No. 9, pp. 1689–1698, 2018年9月 [PDF]
  10. D. Chiba, M. Akiyama, T. Yagi, K. Hato, T. Mori, and S. Goto, “DomainChroma: Building Actionable Threat Intelligence from Malicious Domain Names,” Elsevier Computers & Security, Volume 77, Pages 138-161, August 2018 [PDF]
  11. S. Mizuno, M. Hatada, T. Mori, and S. Goto, “Detecting Malware-infected Devices Using the HTTP Header Patterns,” IEICE Transactions on Information and Systems, Vol. E101-D, No.5, pp.1370-1379, May. 2018. [PDF]
  12. B. Sun, X. Luo, M. Akiyama, T. Watanabe and T. Mori, “PADetective: A Systematic Approach to Automate Detection of Promotional Attackers in Mobile App Store,” Journal of Information Processing (JIP), vol. 26, pp. 212-223, April 2018 https://doi.org/10.2197/ipsjjip.26.212
  13. D. Chiba, T. Yagi, M. Akiyama, T. Shibahara, T. Mori, and S. Goto, “DomainProfiler: Towards Accurate and Early Discovery of Domain Names Abused in Future,” International Journal of Information Security, Volume 17, Issue 6, pp 661–680, 2018 [PDF] DOI:10.1007/s10207-017-0396-7
  14. T. Kimura, K. Ishibashi, T. Mori, H. Sawada, T. Toyono, K. Nishimatsu, A. Watanabe, A. Shimoda, and K. Shiomoto, “Network Event Extraction from Log Data with Nonnegative Tensor Factorization,” IEICE Transactions on Communications, Vol.E100-B, No.10, pp.1865-1878, Oct. 2017.
  15. M. Hatada and T. Mori, “Finding New Varieties of Malware with the Classification of Network Behavior,” IEICE Transactions on Information and Systems, Vol. E100-D, No. 8, pp. 1691–1702, Aug. 2017 [PDF]
  16. T. Watanabe, M. Akiyama, and T. Mori, “Tracking the Human Mobility Using Mobile Device Sensors,” IEICE Transactions on Information and Systems, Vol. E100-D, No. 8, pp. 1680–1690, Aug. 2017 [PDF]
  17. Y. Haga, Y. Takata, M. Akiyama, and T. Mori, “Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study,” IEICE Transactions on Information and Systems, Vol. 100-D, No.
    8, pp. 1663–1670, Aug. 2017 [PDF]
  18. Y. Ishii, T. Watanabe, M. Akiyama, and T. Mori, “APPraiser: A large scale analysis of Android clone apps,” IEICE Transactions on Information and Systems, Vol. E100-D, No. 8, pp. 1703–1713, Aug. 2017 [PDF]
  19. M. Akiyama, T. Yagi, T. Yada, T. Mori, and Y. Kadobayashi, “Analyzing the Ecosystem of Malicious URL Redirection Through Longitudinal Observation from Honeypots,” Elsevier Computers & Security, vol. 69, pp. 155–173, Aug. 2017 [abstract]
  20. 衣川昌宏,林優一,森達哉 “意図的な電磁妨害時にハードウェアトロイよって引き起こされる情報漏えい評価” 電気学会論文誌A,Vol. 137, No. 3, pp. 153–157, 2017年3月 [JSTAGE]
  21. T. Mori, T. Inoue, A. Shimoda, K. Sato, K. Ishibashi, and S. Goto, “Statistical Estimation of the Names of HTTPS Servers with Domain Name Graphs,” Computer Communications, Volume 94, Pages 104–113, November 2016. [abstract]
  22. B. Sun, M. Akiyama, T. Yagi, M. Hatada, and T. Mori, “Automating URL Blacklist Generation with Similarity Search Approach,” IEICE Transactions on Information and Systems, Vol.E99-D, No.4, pp. 873–882, April 2016 [IEICE].
  23. Daiki Chiba, Kazuhiro Tobe, Tatsuya Mori, Shigeki Goto: Analyzing Spatial Structure of IP Addresses for Detecting Malicious Websites. Journal of Information Processing 21(3): 539-550 (2013) [PDF][bibtex]