Conference Papers

[Google Scholar][DBLP][Microsoft Academic Search]

Note: Papers published at IEEE proceedings and shared below are the accepted versions, but not the final published version. See the IEEE web for copyright issues.

  1. Kazuki Matsuo, Satoshi Tanda, Yuhei Kawakoya, Kuniyasu Suzaki, and Tatsuya Mori, “SmmPack: Obfuscation for SMM Modules,” the 21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2024), pp. xxxx-xxxx, July 2024
  2. Ryo Iijima, Tetsuya Takehisa, Tetsushi Ohki, and Tatsuya Mori, “The Catcher in the Eye: Recognizing Users by their Blinks“, Proceedings of the 19th ACM ASIA Conference on Information, Computer and Communications Security (ASIACCS 2024), pp. xxxx–xxxx, June 2024 (acceptance rate: 65/301=21.6%)
  3. Lachlan Moore and Tatsuya Mori, “VPN Awareness and Misconceptions: A Comparative Study in Canadian and Japanese Contexts“, Proceedings of the Symposium on Usable Security and Privacy (USEC 2024), pp. xxxx-xxxx, Feb 2024
  4. R. Kobayashi, K. Nomoto, Y. Tanaka, G. Tsuruoka, T. Mori, “WIP: Shadow Hack: Adversarial Shadow Attack Against LiDAR Object Detection,” Proceedings of the Symposium on Vehicle Security and Privacy (VehicleSec 2024), pp. xxxx-xxxx, Feb 2024
  5. G. Tsuruoka, T. Sato, A. Chen, K. Nomoto, R. Kobayashi, Y. Tanaka, T. Mori, “WIP: Adversarial Retroreflective Patches: A Novel Stealthy Attack on Traffic Sign Recognition at Night,” Proceedings of the Symposium on Vehicle Security and Privacy (VehicleSec 2024), pp. xxxx-xxxx, Feb 2024
  6. Keika Mori, Yuta Takata, Daiki Ito, Masaki Kamizono, and Tatsuya Mori, “Impact Analysis of Organizational Structure of Group Companies on Privacy Policies,” Proceedings of he Workshop on Privacy in the Electronic Society (WPES 2023), pp. 159-164,  November 2023 [PDF]
  7. Mei Suzuki, Ryo Iijima, Kazuki Nomoto, Tetsushi Ohki), Tatsuya Mori, “PinchKey: A Natural and User-Friendly Approach to VR User Authentication,” Proceedings of the European Symposium on Usable Security (EuroUSEC), October 2023. [PDF]
  8. M. Yajima, D. Chiba, Y. Yoneya, T. Mori, “A First Look at Brand Indicators for Message Identification (BIMI),” Proceedings of the Passive and Active Measurement Conference 2023 (PAM 2023), Mar 2023 (Acceptance rate=27/80=33.8%) [PDF][YouTube]
  9. Kazuki Nomoto, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori, “Browser Permission Mechanisms Demystified” The Network and Distributed System Security Symposium (NDSS 2023), February 2023 (Acceptance rate=94/581=16.2%) [PDF]
  10. Atsuko Natatsuka, Ryo Iijima, Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Tatsuya Mori, “Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework,” Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2022), October 2022  (Acceptance rate=35/139=25.2%) [PDF]
  11. Kazuki Nomoto , Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata, and Tatsuya Mori, “On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework,” Proceedings of the 22nd Privacy Enhancing Technologies Symposium (PETS 2022), July 2022 (Acceptance rate=37/168=22.0%) [PDF][YouTube]
  12. Ayako A. Hasegawa, Naomi Yamashita, Tatsuya Mori, Daisuke Inoue, Mitsuaki Akiyama, “Understanding Non-Experts’ Security- and Privacy-Related Questions on a Q&A Site,” Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), August 2022 (Acceptance rate=37/133=27.8%) [PDF][YouTube]
  13. Kentaro Sako, Shin’ichiro Matsuo, Tatsuya Mori, “Distributed Random Number Generation Method on Smart Contracts,” Proceedings of the 4th Blockchain and Internet of Things Conference (BIOTC 2022) July 2022 [PDF]
  14. Ryo Iijima, Tatsuya Takehisa and Tatsuya Mori, “Cyber-Physical Firewall: Monitoring and Controlling the Threats Caused by Malicious Analog Signals,” Proceedings of  the 19th ACM International Conference on Computing Frontiers (CF’22), pp. 296-304, Turin, Piedmont, Italy, May 2022. [PDF]
  15. M. Yajima, D. Chiba, Y. Yoneya, and T. Mori, “Measuring Adoption of DNS Security Mechanisms with Cross-Sectional Approach,” Proceedings of the IEEE Global Communications Conference: Communication & InformationSystems Security (Globecom 2021), Madrid, Spain December 2021[PDF]
  16. T. Matsuura, A. Hasegawa, M. Akiyama, and T. Mori, “Careless Participants Are Essential For Our Phishing Study: Understanding the Impact of Screening Methods“, In Proceedings of the 2021 European Symposium on Usable Security (EuroUSEC 2021), October, 2021. (acceptance rate: 24%=15/62) Best Paper Award [PDF]
  17. Ayako Akiyama Hasegawa, Naomi Yamashita, Mitsuaki Akiyama, and Tatsuya Mori, “Why They Ignore English Emails: The Challenges of Non-Native Speakers in Identifying Phishing Emails,” Proceedings of the Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), August 2021.(acceptance rate = 19.8%=26/131)[Talk Video][PDF][bibtex]
  18. Ryo Kawaoka, Daiki Chiba, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori, “A First Look at COVID-19 Domain Names: Origin and Implications, ” Proceedings of the Passive and Active Measurement Conference 2021 (PAM 2021) [PDF][Talk video]
  19. Y. Sakurai, T. Watanabe, T. Okuda, M. Akiyama, and T. Mori, “Discovering HTTPSified Phishing Websites Using the TLS Certificates Footprints,” Proceedings of the 5th IEEE International Workshop on Traffic Measurements for Cybersecurity (WTMC2020), pp. 521-530, September 2020 [Video Talk][PDF]
  20. T. Watanabe, E. Shioji, M. Akiyama, T. Mori, “Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites,” Proceedings of the 26th Network and Distributed System Security Symposium (NDSS2020), pp. 1–15, February 2020 (acceptance rate=17.4%) DISTINGUISHED PAPER AWARD [PDF]
  21. Yuma Kurogome, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Syogo Hayashi, Tatsuya Mori, and Koushik Sen, “EIGER: Automated IOC Generation for Accurate and Interpretable Endpoint Malware Detection, ” Proceedings of the 35th Annual Computer Security Applications Conference (ACSAC2019), pp. 687–701, December 2019. (acceptance rate = 22.6%=60/266) [PDF]
  22. H. Suzuki, D. Chiba, Y. Yoneya, T. Mori, and S. Goto, “ShamFinder: An Automated Framework for Detecting IDN Homographs,” Proceedings of the 19th ACM  Internet Measurement Conference (IMC 2019),  pp. 449–462, October 2019 (acceptance rate = 19.3%=38/197)  [PDF][Slide][arXiv]
  23. K. Mori, T. Watanabe, Y. Zhou, A. Hasegawa, M. Akiyama, T. Mori, “Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?,” Proceedings of the 4th IEEE European Workshop on Usable Security (EuroUSEC 2019), pp. 159-171, June 2019 [PDF]
  24. S. Maruyama, S. Wakabayashi, and T. Mori, “Tap ‘n Ghost: A Compilation of Novel Attack Techniques against Smartphone Touchscreens,” Proceedings of the 40th IEEE Symposium on Security and Privacy (S&P 2019), pp. 628-645, May 2019 (acceptance rate = 12.5%=84/673) [PDF][slide][short video][YouTube][threatpost][gbhackers][ZDNet]
  25. T. Yasumatsu, T. Watanabe, F. Kanei, E. Shioji, M. Akiyama, and T. Mori, “Understanding the Responsiveness of Mobile App Developers to Software Library Updates,” Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (CODASPY 2019), pp. 13–24, March 2019. (acceptance rate: 28/119=23.5%) [PDF]
  26. M. Juuti, B. Sun, T. Mori, and N. Asokan, “Stay On-Topic: Generating Context-specific Fake Restaurant Reviews,” Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS 2018), pp. 132–151, September 2018 (acceptance rate: 56/283=19.8%) [Springer]
  27. S. Wakabayashi, S. Maruyama, T. Mori, S. Goto, M. Kinugawa, and Y. Hayashi, “A Feasibility Study of Radio-frequency Retroreflector Attack,” Proceedings of the 12th USENIX Workshop on Offensive Technologies (WOOT 2018), August 2018. (BEST STUDENT PAPER AWARD) [PDF]
  28. K. Yoshida, H. Imai, N. Serizawa, T. Mori, and A. Kanaoka, “Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps,” In Proceedings of the 10th IEEE International Workshop on Security Aspects in Processes and Services Engineering (SAPSE 2018), pp. 713–718, July 2018. [IEEE Xplore]
  29. E. Pariwono, D. Chiba, M. Akiyama, and T. Mori, “Don’t throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps,” Proceedings of the 13th ACM ASIA Conference on Information, Computer and Communications Security (ASIACCS 2018), pp. 147–158, June 2018 (acceptance rate: 62/310=20.0%) [PDF]
  30. T. Watanabe, E. Shioji, M. Akiyama, K. Sasaoka, T. Yagi, and T. Mori, “User Blocking Considered Harmful? An Attacker-controllable Side Channel to Identify Social Accounts,”
    Proceedings of the 3rd IEEE European Symposium on Security and Privacy (Euro S&P 2018), pp. 323–337, April 2018 (acceptance rate: 33/144=22.9%). [IEEE Xplore
  31. Y. Ishii, T. Watanabe, F. Kanei, Y. Takata, E. Shioji, M. Akiyama, T. Yagi, B. Sun and T. Mori, “Understanding the Security Management of Global Third-Party Android Marketplaces,” Proceedings of the 2nd International Workshop on App Market Analytics (WAMA 2017), pp. 12-18, September 2017 [ACM DL][PDF]
  32. M. Hatada and T. Mori, “Detecting and Classifying Android PUAs by similarity of DNS queries,” Proceedings of the 7th IEEE International COMPSAC Workshop on Network Technologies for Security, Administration and Protection (NETSAP 2017), pp. 590-595, July 2017 [PDF][Xplore]
  33. B. Sun, X. Luo, M. Akiyama, T. Watanabe and T. Mori, “Characterizing Promotional Attacks in Mobile App Store,” Proceedings of the 8th International Conference on Applications and Techniques in Information Security (ATIS 2017), pp. 113-127, July 2017 (BEST PAPER AWARD). [Springer]
  34. D. Chiba, M. Akiyama, T. Yagi, T. Yada, T. Mori, and S. Goto, “DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names,” Proceedings of the 41st Annual Computer Software and Applications Conference (COMPSAC 2017), pp. 643-648, July 2017 (acceptance rate: 25%). [IEEE Xplore]
  35. T. Watanabe, M. Akiyama, F. Kanei, E. Shioji, Y. Takata, B. Sun, Y. Ishii, T. Shibahara, T. Yagi and T. Mori, “Understanding the Origins of Mobile App Vulnerabilities: A Large-scale Measurement Study of Free and Paid Apps,” Proceedings of IEEE/ACM 14th International Conference on Mining Software Repositories (MSR 2017), May 2017 (acceptance rate: 27.2%=43/158) [IEEE Xplore]
  36. S. Mizuno, M. Hatada, T. Mori, and S. Goto, “BotDetector: A robust and scalable approach toward detecting malware-infected devices,” Proceedings of the IEEE International Conference on Communications (ICC 2017), May 2017. (acceptance rate, ICC CISS: 30.5%=84/275) [IEEE Xplore]
  37. D. Chiba, T. Yagi, M. Akiyama, T. Shibahara, T. Yada, T. Mori, and S. Goto, “DomainProfiler: Discovering Domain Names Abused in Future,” Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016), pp. 491-502, June 2016. (acceptance rate: 22.4%=58/259) [Xplore]
  38. Y. Ishii, T. Watanabe, M. Akiyama, and T. Mori, “Clone or Relative?: Understanding the Origins of Similar Android Apps,” Proceedings of the ACM International Workshop on Security And Privacy Analytics (IWSPA 2016), pp. 25-32, Mar 2016, (full paper acceptance rate: 30.0%=6/20) [ACM DL][PDF] (submitted version)
  39. Y. Haga, A. Saso, T. Mori, and S. Goto, “Increasing the Darkness of Darknet Traffic,” Proceedings of the IEEE Global Communications Conference (GLOBECOM 2015), pp. 1-7, December 2015, San Diego CA, US. (acceptance rate, Globecom CISS: 28.8%=68/236) [IEEE Xplore]
  40. A. Shimoda, K. Ishibashi, K. Sato, M. Tsujino, T. Inoue, M. Shimura, T. Takebe, K. Takahashi, T. Mori, and S. Goto, “Inferring Popularity of Domain Names with DNS Traffic: Exploiting Cache Timeout Heuristics,” Proceedings of the IEEE Global Communications Conference (GLOBECOM 2015), pp. 1-6, December 2015, San Diego CA, US. (acceptance rate, Globecom CQRM: 35.4%=40/113) [IEEE Xplore]
  41. T. Watanabe, M. Akiyama, and T. Mori, “RouteDetector: Sensor-based Positioning System that Exploits Spatio-temporal Regularity of Human Mobility,” Proceedings of the 9th USENIX Workshop on Offensive Technologies (WOOT ’15), pp. 1-11, August 2015, Washington D.C., US. (acceptance rate: 35.1% = 20/57) [PDF][slide][bibtex][USENIX]
  42. T. Watanabe, M. Akiyama, T. Sakai, H. Washizaki, and T. Mori, “Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps,” Proceedings of Symposium on Usable Privacy and Security (SOUPS 2015), pp. 241–255, July 2015, Ottawa, Canada. (acceptance rate: 23.7% = 22/93) [PDF][slide][bibtex][USENIX][Data]
  43. B. Sun, M. Akiyama, T. Yagi, M. Hatada, and T. Mori, “AutoBLG: Automatic URL Blacklist Generator Using Search Space Expansion and Filters,” Proceedings of the Twentieth IEEE Symposium on Computers and Communication (ISCC 2015), pp. 205–211, Jul. 2015. (acceptance rate: 40.2% = 137/341) [IEEE Xplore][PDF][slide][bibtex]
  44. T. Mori, T. Inoue, A. Shimoda, K. Sato, K. Ishibashi, and S. Goto, “SFMap: Inferring Services over Encrypted Web Flows using Dynamical Domain Name Graphs,” Proceedings of IFIP Traffic Monitoring and Analysis workshop (TMA 2015), LNCS 9053, pp. 126–139, Apr. 2015. (acceptance rate: 29.6% = 16/54) [bibtex][PDF][slide] DOI: 10.1007/978-3-319-17172-2_9
  45. A. Fujino, J. Murakami, and T. Mori, “Discovering Similar Malware Samples Using API Call Topics,” Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference (CCNC 2015), pp. 140–147, Jan 2015 (acceptance rate: 37.1%) [IEEE Xplore][bibtex][PDF][slide]  DOI: 978-1-4799-6390-4/15/
  46. N. Kamiyama, R. Kawahara, T. Mori, “Loss Recovery Method for Content Pre-distribution in VoD Service“, Proceedings of the World Telecommunications Congress (WTC 2014), pp.1-6, June 2014 [IEEE Xplore] BEST PAPER AWARD
  47. T. Kimura, K. Ishibashi, T. Mori, H. Sawada, T. Toyono, K. Nishimatsu, A. Watanabe, A. Shimoda, and K. Shiomoto, “Spatio-temporal Factorization of Log Data for Understanding Network Events“, Proceedings of the IEEE INFOCOM 2014, May 2014 (acceptance rate: 19.4%) [IEEE Xplore][bibtex][PDF]