Accepted to Elsevier Computers & Security

Our paper submitted to Elsevier Computers & Security got accepted. This work was done by Dr. Mitsuaki Akiyama, NTT Network Technology Labs. Congrats Akiyama-san!

M. Akiyama, T. Yagi, T. Yada, T. Mori, and Y. Kadobayashi,
Analyzing the Ecosystem of Malicious URL Redirection Through Longitudinal Observation from Honeypots,”
Elsevier Computers & Security, vol. xx, issue xx, xx 2017, Pages xxxx–xxxx [online version] (in press)

Presented a poster at ACM CCS 2016

Sun-san presented a poster at ACM CCS 2016. We got many useful feedback from the attendees.

Bo Sun, Akinori Fujino, and Tatsuya Mori,
Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs,” (poster presentation) 23rd ACM Conference on Computer and Communications Security 2016 (ACM CCS 2016), Vienna, Austria, Oct 2016. [paper] (acceptance rate: 41.3%=38/92)


Presented three invited talks at APAN42

We presented the following three invited talks at the network security workshop of the 42nd APAN meeting. All these talks make use of machine learning techniques to solve the network security problems.
BTW, we survived the Typhoon Nida, which hit us at the venue. Look at the power of pink!

 

  • Bo Sun, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, and Tatsuya Mori, “Automatic Generation of URL Blacklist
  • Mitsuhiro Hatada and Tatsuya Mori, “Analytics of Malware Traffic: Clustering and its Evaluation
  • Sho Mizuno, Mitsuhiro Hatada, Tatsuya Mori, and Shigeki Goto, “Detecting malware-infected hosts using HTTP fingerprints

 




ICSS 7月研究会で発表をしました

D2の畑田さんとM1の星野君が山口市で開催された情報通信システムセキュリティ研究会(ICSS研究会)で下記の発表をしました。6月の研究会は6つの研究専門委員会の併催で、とても活況でした。

  • 畑田充弘,森達哉,”マルウェアの通信モデルによるクラスタリング精度の評価,” 信学技報, vol. 116, no. 131, ICSS2016-24, pp. 59-64, 2016年7月 [概要]
  • 星野遼,衣川昌宏,林優一,森達哉,”電波再帰反射攻撃成立条件の評価と対策,” 信学技報, vol. 116, no. 131, ICSS2016-23, pp. 53-58, 2016年7月 [概要]

IMG_8392
IMG_8395

Presented a poster at SOUPS 2016

Presented our poster work at SOUPS 2016. We got many useful feedback from the attendees. We are proud that there were no works except ours that performed the replication study, which plays a vital role in scientific research. Also, I should note that this work was done by the great effort of Ota-kun who graduated this spring and was not able to attend the conference.
Based on the findings we extracted through this preliminary work, we are planning to develop tools/systems that improve the usability of authentication for visually impaired person. We also plan to extend our study for generic handicapped people.

Yuya Ota, Akira Kanaoka, and Tatsuya Mori,
I’m Stuck, Too!” Revisiting Difficulties of Using Web Authentication Mechanisms for Visually Impaired Person (poster), SOUPS 2016 [PDF]