Four papers have been accepted!

The following four papers have been accepted to each conference. Congratulations!

  • Atsuko Natatsuka, Ryo Iijima, Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori, “Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework,” Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2022), October 2022  (Acceptance rate=35/139=25.2%)
  • Kazuki Nomoto , Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata, and Tatsuya Mori, “On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework,” Proceedings of the 22nd Privacy Enhancing Technologies Symposium (PETS 2022), July 2022 (Acceptance rate=37/168=22.0%)
  • Ayako A. Hasegawa, Naomi Yamashita, Tatsuya Mori, Daisuke Inoue, Mitsuaki Akiyama, “Understanding Non-Experts’ Security- and Privacy-Related Questions on a Q&A Site,” Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), August 2022 (Acceptance rate=37/133=27.8%)
  • Kentaro Sako, Shin’ichiro Matsuo, Tatsuya Mori, “Distributed Random Number Generation Method on Smart Contracts,” Proceedings of the 4th Blockchain and Internet of Things Conference (BIOTC 2022) July 2022




A paper got accepted! (Mal-IoT)

Our paper submitted to the 7th International Workshop on Malicious Software and Hardware in the Internet of Things-IoT 2022 (Mal-IoT 2022) has been accepted for publication. Congratulations, Iijima-kun!

Ryo Iijima, Tatsuya Takehisa and Tatsuya Mori, “Cyber-Physical Firewall: Monitoring and Controlling the Threats Caused by Malicious Analog Signals,” Proceedings of  the 19th ACM International Conference on Computing Frontiers (CF’22), pp. xx-xx, Turin, Piedmont, Italy, May 2022.

A Poster paper accepted

A poster paper submitted to TheWecConf 2022 by Chun-Ming Chang, a double degree program student coming from National Taiwan University, has been accepted. Congratulations!

Chun-Ming Chang, Hsu-Chun Hsiao, Timothy Lynar, and Tatsuya Mori, “Know Your Victim: Tor Browser Setting Identification via Network Traffic Analysis, ” Proceeding the ACM Web Conference (TheWebConf 2022)

Yajima-kun contributed an article to APNIC Blog

Yajima-kun contributed an article to APNIC Blog titled “Adoption of DNS security mechanisms related to ease-of-use, cost“.


The contents of this article are based on the following research results, which were presented at OARConline 35a.

M. Yajima, D. Chiba, Y. Yoneya, and T. Mori, “How prevalent is the operation of DNS security mechanisms?[Video Talk][PDF]