We are delighted to announce that we share the CLAP dataset with the research community. The dataset includes 5,340 PUAs (Potentially-Unwanted Apps) that account for 237 of distinct varieties. More details as well as the way to download the data are available from the CLAP project page. Please feel free to drop us an e-mail message if you want to try out. Enjoy!
We proudly announce that our paper presented at NDSS2020 (which is one of the “Top 4” security conferences) got the distinguished paper award! Congratulations, Watanabe-kun, Shioji-san, and Akiyama-san! We believe that this is a steady first footprint for further growth of the Japanese security research community.
Updated the information about our research partners. Having industry partners is really great to us as we get invaluable opportunities to find/identify interesting research topics that do have impact to the real world. Their financial supports are also greatly appreciated. Hope we can enhance the circle of research collaboration.
A technique using ultrasound can deliver voice commands to systems such as Google Home and Amazon Echo without bystanders picking up on the cues
By Michelle Hampson
The paper is available from the link below: R. Iijima, S. Minami, Y. Zhou, T. Takehisa, T. Takahashi, Y. Oikawa, and T. Mori, “Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility,” IEEE Transactions on Emerging Topics in Computing PP(99):1-1 · November 2019 (online early access: https://ieeexplore.ieee.org/document/8906174)