Preprints

[Google Scholar][DBLP][Microsoft Academic Search]

  1. Kazuki Matsuo, Satoshi Tanda, Kuniyasu Suzaki, Yuhei Kawakoya, Tatsuya Mori, “SmmPack: Obfuscation for SMM Modules with TPM Sealed Key“, arXiv:2405.04355 [cs.CR], May 2024.
  2. Taiga Ono, Takeshi Sugawara, Jun Sakuma, Tatsuya Mori, “Application of Adversarial Examples to Physical ECG Signals,” arXiv:2108.08972 [cs.LG], Aug 2021
  3. Ryo Kawaoka, Daiki Chiba, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori, “A First Look at COVID-19 Domain Names: Origin and Implications,” arXiv:2102.05290 [cs.CY], Feb 2021
  4. Hiroaki Suzuki, Daiki Chiba, Yoshiro Yoneya, Tatsuya Mori, Shigeki Goto, “ShamFinder: An Automated Framework for Detecting IDN Homographs,arXiv:1909.97539 [cs.CR][cs.NI], September 2019.
  5. Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori, “User Blocking Considered Harmful? An Attacker-controllable Side Channel to Identify Social Accounts,” arXiv:1805.05085 [cs.CR], May 2018.
  6. Mika Juuti, Bo Sun, Tatsuya Mori, N. Asokan, “Stay On-Topic: Generating Context-specific Fake Restaurant Reviews,” arXiv:1805.02400 [cs.CR] May 2018
  7. Seita Maruyama, Satohiro Wakabayashi, Tatsuya Mori “Trojan of Things: Embedding Malicious NFC Tags into Common Objects,” arXiv:1702.07124 [cs.CR] Feb 2017
  8. T. Watanabe, M. Akiyama, F. Kanei, E. Shioji, Y. Takata, B. Sun, Y. Ishi, T. Shibahara, T. Yagi, T. Mori, “A Study on the Vulnerabilities of Mobile Apps associated with Software Modules,” arXiv:1702.03112 [cs.CR]Feb 2017