Featured on IEEE Spectrum

Our paper published by IEEE Transactions on Emerging Topics in Computing is featured on the website of IEEE Spectrum. 

How to Silently Hack a Smart Speaker

A technique using ultrasound can deliver voice commands to systems such as Google Home and Amazon Echo without bystanders picking up on the cues

By Michelle Hampson

The paper is available from the link below:
R. Iijima, S. Minami, Y. Zhou, T. Takehisa, T. Takahashi, Y. Oikawa, and T. Mori, “Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility,” IEEE Transactions on Emerging Topics in Computing PP(99):1-1 · November 2019 (online early access: https://ieeexplore.ieee.org/document/8906174)

 

Photo-illustration: Waseda University/IEEE Spectrum

A paper got accepted (NDSS 2020)

Our paper submitted to the 26th Network and Distributed System Security Symposium (NDSS 2020), which is one of the “Top 4” security conferences, is accepted for publication. Congratulations, Watanabe-kun!

T. Watanabe, E. Shioji, M. Akiyama, T. Mori, “Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites,” Proceedings of the 26th Network and Distributed System Security Symposium (NDSS2020), pp. xx–xx, February 2020. (acceptance rate has not been fixed: it will be around 18% according to PC chairs) (to appear)

Four journal articles got accepted

The following four papers were accepted for publication at IEEE Trans. and IEICE Trans. Congratulations!

  1. R. Iijima, S. Minami, Y. Zhou, T. Takehisa, T. Takahashi, Y. Oikawa, and T. Mori, “Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility,” IEEE Transactions on Emerging Topics in Computing PP(99):1-1 · November 2019 (online early access: https://ieeexplore.ieee.org/document/8906174) 
  2. Mitsuhiro HATADA Tatsuya MORI, “CLAP: Classification of Android PUAs by Similarity of DNS Queries,” IEICE TRANSACTIONS on Information and Systems
    Vol. xxx, No. xxx, pp. xxx-xxxx, DOI: 10.1587/transinf.2019INP0003
  3. Takuya WATANABE Mitsuaki AKIYAMA Fumihiro KANEI Eitaro SHIOJI Yuta TAKATA Bo SUN Yuta ISHII Toshiki SHIBAHARA Takeshi YAGI Tatsuya MORI, “Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library,” IEICE TRANSACTIONS on Information and Systems, Vol. xxx, No. xxx, pp. xxx-xxxx,  DOI: 10.1587/transinf.2019INP0011
  4. Takuya WATANABE Eitaro SHIOJI Mitsuaki AKIYAMA Keito SASAOKA Takeshi YAGI Tatsuya MORI, “Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel,” IEICE TRANSACTIONS on Information and Systems, Vol. xxx, No. xxx, pp. xxx-xxxx, DOI: 10.1587/transinf.2019INP0012
 

IoTセキュリティの取材協力 (Web記事)

IoTセキュリティに関して森が取材協力したWeb記事が公開されました (Binary District)

よく知られたごく一般的な話しかしていませんが、 課題が簡潔にまとまっていると思います。

Can We Stop Our Toasters From Spying on Us?

by Shivdeep Dhaliwal 07 October, 2019

https://journal.binarydistrict.com/can-we-stop-our-toasters-from-spying-on-us/ 

Image taken from: https://journal.binarydistrict.com/can-we-stop-our-toasters-from-spying-on-us/