Conference Papers

[Google Scholar][DBLP][Microsoft Academic Search]

Note: Papers published at IEEE proceedings and shared below are the accepted versions, but not the final published version. See the IEEE web for copyright issues.

  1. E. Pariwono, D. Chiba, M. Akiyama, and T. Mori, “Don’t throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps,”
    Proceedings of the 13th ACM ASIA Conference on Information, Computer and Communications Security (ASIACCS 2018), pp. xx–xx, June 2018 (acceptance rate: 62/310=20.0%) (to appear).
  2. T. Watanabe, E. Shioji, M. Akiyama, K. Sasaoka, T. Yagi, and T. Mori, “User Blocking Considered Harmful? An Attacker-controllable Side Channel to Identify Social Accounts,”
    Proceedings of the 3rd IEEE European Symposium on Security and Privacy (Euro S&P 2018), pp. xx–xx, April 2018 (acceptance rate: 33/144=22.9%) (to appear).
  3. Y. Ishii, T. Watanabe, F. Kanei, Y. Takata, E. Shioji, M. Akiyama, T. Yagi, B. Sun and T. Mori, “Understanding the Security Management of Global Third-Party Android Marketplaces,” Proceedings of the 2nd International Workshop on App Market Analytics (WAMA 2017), pp. 12-18, September 2017 [ACM DL][PDF]
  4. M. Hatada and T. Mori, “Detecting and Classifying Android PUAs by similarity of DNS queries,” Proceedings of the 7th IEEE International COMPSAC Workshop on Network Technologies for Security, Administration and Protection (NETSAP 2017), pp. 590-595, July 2017 [PDF][Xplore]
  5. B. Sun, X. Luo, M. Akiyama, T. Watanabe and T. Mori, “Characterizing Promotional Attacks in Mobile App Store,” Proceedings of the 8th International Conference on Applications and Techniques in Information Security (ATIS 2017), pp. 113-127, July 2017 (BEST PAPER AWARD). [Springer]
  6. D. Chiba, M. Akiyama, T. Yagi, T. Yada, T. Mori, and S. Goto, “DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names,” Proceedings of the 41st Annual Computer Software and Applications Conference (COMPSAC 2017), pp. 643-648, July 2017 (acceptance rate: 25%). [IEEE Xplore]
  7. T. Watanabe, M. Akiyama, F. Kanei, E. Shioji, Y. Takata, B. Sun, Y. Ishii, T. Shibahara, T. Yagi and T. Mori, “Understanding the Origins of Mobile App Vulnerabilities: A Large-scale Measurement Study of Free and Paid Apps,” Proceedings of IEEE/ACM 14th International Conference on Mining Software Repositories (MSR 2017), May 2017 (acceptance rate: 27.2%=43/158) [IEEE Xplore]
  8. S. Mizuno, M. Hatada, T. Mori, and S. Goto, “BotDetector: A robust and scalable approach toward detecting malware-infected devices,” Proceedings of the IEEE International Conference on Communications (ICC 2017), May 2017. (acceptance rate, ICC CISS: 30.5%=84/275) [IEEE Xplore]
  9. D. Chiba, T. Yagi, M. Akiyama, T. Shibahara, T. Yada, T. Mori, and S. Goto, “DomainProfiler: Discovering Domain Names Abused in Future,” Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016), pp. 491-502, June 2016. (acceptance rate: 22.4%=58/259) [Xplore]
  10. Y. Ishii, T. Watanabe, M. Akiyama, and T. Mori, “Clone or Relative?: Understanding the Origins of Similar Android Apps,” Proceedings of the ACM International Workshop on Security And Privacy Analytics (IWSPA 2016), pp. 25-32, Mar 2016, (full paper acceptance rate: 30.0%=6/20) [ACM DL][PDF] (submitted version)
  11. Y. Haga, A. Saso, T. Mori, and S. Goto, “Increasing the Darkness of Darknet Traffic,” Proceedings of the IEEE Global Communications Conference (GLOBECOM 2015), pp. 1-7, December 2015, San Diego CA, US. (acceptance rate, Globecom CISS: 28.8%=68/236) [IEEE Xplore]
  12. A. Shimoda, K. Ishibashi, K. Sato, M. Tsujino, T. Inoue, M. Shimura, T. Takebe, K. Takahashi, T. Mori, and S. Goto, “Inferring Popularity of Domain Names with DNS Traffic: Exploiting Cache Timeout Heuristics,” Proceedings of the IEEE Global Communications Conference (GLOBECOM 2015), pp. 1-6, December 2015, San Diego CA, US. (acceptance rate, Globecom CQRM: 35.4%=40/113) [IEEE Xplore]
  13. T. Watanabe, M. Akiyama, and T. Mori, “RouteDetector: Sensor-based Positioning System that Exploits Spatio-temporal Regularity of Human Mobility,” Proceedings of the 9th USENIX Workshop on Offensive Technologies (WOOT ’15), pp. 1-11, August 2015, Washington D.C., US. (acceptance rate: 35.1% = 20/57) [PDF][slide][bibtex][USENIX]
  14. T. Watanabe, M. Akiyama, T. Sakai, H. Washizaki, and T. Mori, “Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps,” Proceedings of Symposium on Usable Privacy and Security (SOUPS 2015), pp. 241–255, July 2015, Ottawa, Canada. (acceptance rate: 23.7% = 22/93) [PDF][slide][bibtex][USENIX][Data]
  15. B. Sun, M. Akiyama, T. Yagi, M. Hatada, and T. Mori, “AutoBLG: Automatic URL Blacklist Generator Using Search Space Expansion and Filters,” Proceedings of the Twentieth IEEE Symposium on Computers and Communication (ISCC 2015), pp. 205–211, Jul. 2015. (acceptance rate: 40.2% = 137/341) [IEEE Xplore][PDF][slide][bibtex]
  16. T. Mori, T. Inoue, A. Shimoda, K. Sato, K. Ishibashi, and S. Goto, “SFMap: Inferring Services over Encrypted Web Flows using Dynamical Domain Name Graphs,” Proceedings of IFIP Traffic Monitoring and Analysis workshop (TMA 2015), LNCS 9053, pp. 126–139, Apr. 2015. (acceptance rate: 29.6% = 16/54) [bibtex][PDF][slide] DOI: 10.1007/978-3-319-17172-2_9
  17. A. Fujino, J. Murakami, and T. Mori, “Discovering Similar Malware Samples Using API Call Topics,” Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference (CCNC 2015), pp. 140–147, Jan 2015 (acceptance rate: 37.1%) [IEEE Xplore][bibtex][PDF][slide]  DOI: 978-1-4799-6390-4/15/
  18. N. Kamiyama, R. Kawahara, T. Mori, “Loss Recovery Method for Content Pre-distribution in VoD Service“, Proceedings of the World Telecommunications Congress (WTC 2014), pp.1-6, June 2014 [IEEE Xplore] BEST PAPER AWARD
  19. T. Kimura, K. Ishibashi, T. Mori, H. Sawada, T. Toyono, K. Nishimatsu, A. Watanabe, A. Shimoda, and K. Shiomoto, “Spatio-temporal Factorization of Log Data for Understanding Network Events“, Proceedings of the IEEE INFOCOM 2014, May 2014 (acceptance rate: 19.4%) [IEEE Xplore][bibtex][PDF]