Our paper submitted to the 26th Network and Distributed System Security Symposium (NDSS 2020), which is one of the “Top 4” security conferences, is accepted for publication. Congratulations, Watanabe-kun!
T. Watanabe, E. Shioji, M. Akiyama, T. Mori, “Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites,” Proceedings of the 26th Network and Distributed System Security Symposium (NDSS2020), pp. xx–xx, February 2020. (acceptance rate has not been fixed: it will be around 18% according to PC chairs) (to appear)
The following four papers were accepted for publication at IEEE Trans. and IEICE Trans. Congratulations!
R. Iijima, S. Minami, Y. Zhou, T. Takehisa, T. Takahashi, Y. Oikawa, and T. Mori, “Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility,” IEEE Transactions on Emerging Topics in Computing PP(99):1-1 · November 2019 (online early access: https://ieeexplore.ieee.org/document/8906174)
Mitsuhiro HATADA Tatsuya MORI, “CLAP: Classification of Android PUAs by Similarity of DNS Queries,” IEICE TRANSACTIONS on Information and Systems Vol. xxx, No. xxx, pp. xxx-xxxx, DOI: 10.1587/transinf.2019INP0003
Takuya WATANABE Mitsuaki AKIYAMA Fumihiro KANEI Eitaro SHIOJI Yuta TAKATA Bo SUN Yuta ISHII Toshiki SHIBAHARA Takeshi YAGI Tatsuya MORI, “Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library,” IEICE TRANSACTIONS on Information and Systems, Vol. xxx, No. xxx, pp. xxx-xxxx, DOI: 10.1587/transinf.2019INP0011
Takuya WATANABE Eitaro SHIOJI Mitsuaki AKIYAMA Keito SASAOKA Takeshi YAGI Tatsuya MORI, “Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel,” IEICE TRANSACTIONS on Information and Systems, Vol. xxx, No. xxx, pp. xxx-xxxx, DOI: 10.1587/transinf.2019INP0012