Elkana presented a talk at AsiaCCS

Elkana presented a talk at ACM ASIACCS 2018 held in Incheon, Korea.

E. Pariwono, D. Chiba, M. Akiyama, and T. Mori, “Don’t throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps,” Proceedings of the 13th ACM ASIA Conference on Information, Computer and Communications Security (ASIACCS 2018), pp. 147–158, June 2018 (acceptance rate: 62/310=20.0%) [PDF]

A copy of the user-blocking paper is now available at arXiv.

Our paper presented at EuroS&P 2018 is now available as a preprint at arXiv:

Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori
User Blocking Considered Harmful? An Attacker-controllable Side Channel to Identify Social Accounts,” arXiv:1805.05085 [cs.CR], May 2018.
https://arxiv.org/abs/1805.05085

A special website for this research project is under preparation. Please stay tuned.

A workshop paper got accepted.

Our paper submitted to the 10th IEEE International Workshop on Security Aspects in Processes and Services Engineering (SAPSE 2018) was accepted for publication. This is a joint work with Toho University. Congratulations, Yoshida-san and Kanaoka-sensei!

Kanae Yoshida, Hironori Imai, Nana Serizawa, Tatsuya Mori, and Akira Kanaoka,
Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps,” In Proceedings of the 10th IEEE International Workshop on Security Aspects in Processes and Services Engineering (SAPSE 2018), July 2018 (accepted).

SCIS2018論文賞

暗号とセキュリティシンポジウム(SCIS2018)で発表した下記発表が論文賞を頂きました。本研究は本学表現工学科、及川研究室との共同研究です。飯島君、おめでとう!

飯島涼,南翔汰,シュウインゴウ,及川靖広,森達哉, “パラメトリックスピーカーを利用した音声認識機器への攻撃と評価,”暗号と情報セキュリティシンポジウム (SCIS 2018), 2018年1月

A paper got accepted.

Our paper submitted to Elsevier Computers & Security got accepted for publication. This is a joint work with NTT Secure platform Labs. Congratulations Chiba-San!

D. Chiba, M. Akiyama, T. Yagi, K. Hato, T. Mori, and S. Goto,
DomainChroma: Building Actionable Threat Intelligence from Malicious Domain Names,” Elsevier Computers & Security, vol. xx, pp. xxx-xxx, 2018 (in press)