[Google Scholar][DBLP][Microsoft Academic Search]
- Kazuki Matsuo, Satoshi Tanda, Kuniyasu Suzaki, Yuhei Kawakoya, Tatsuya Mori, “SmmPack: Obfuscation for SMM Modules with TPM Sealed Key“, arXiv:2405.04355 [cs.CR], May 2024.
- Taiga Ono, Takeshi Sugawara, Jun Sakuma, Tatsuya Mori, “Application of Adversarial Examples to Physical ECG Signals,” arXiv:2108.08972 [cs.LG], Aug 2021
- Ryo Kawaoka, Daiki Chiba, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori, “A First Look at COVID-19 Domain Names: Origin and Implications,” arXiv:2102.05290 [cs.CY], Feb 2021
- Hiroaki Suzuki, Daiki Chiba, Yoshiro Yoneya, Tatsuya Mori, Shigeki Goto, “ShamFinder: An Automated Framework for Detecting IDN Homographs,” arXiv:1909.97539 [cs.CR][cs.NI], September 2019.
- Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori, “User Blocking Considered Harmful? An Attacker-controllable Side Channel to Identify Social Accounts,” arXiv:1805.05085 [cs.CR], May 2018.
- Mika Juuti, Bo Sun, Tatsuya Mori, N. Asokan, “Stay On-Topic: Generating Context-specific Fake Restaurant Reviews,” arXiv:1805.02400 [cs.CR] May 2018
- Seita Maruyama, Satohiro Wakabayashi, Tatsuya Mori “Trojan of Things: Embedding Malicious NFC Tags into Common Objects,” arXiv:1702.07124 [cs.CR] Feb 2017
- T. Watanabe, M. Akiyama, F. Kanei, E. Shioji, Y. Takata, B. Sun, Y. Ishi, T. Shibahara, T. Yagi, T. Mori, “A Study on the Vulnerabilities of Mobile Apps associated with Software Modules,” arXiv:1702.03112 [cs.CR]Feb 2017