Recent selected papers

  1. Ryunosuke Kobayashi, Kazuki Nomoto, Yuna Tanaka, Go Tsuruoka, Tatsuya Mori, “Invisible but Detected: Physical Adversarial Shadow Attack and Defense on LiDAR Object Detection“, Proceedings of the 34th USENIX Conference on Security Symposium (USENIX Security 2025), August 2025 (to appear)
  2. H. Oyama, R. Iijima, T. Mori, “DeGhost: Unmasking Phantom Intrusions in Autonomous Recognition Systems,” Proceedings of the 9th IEEE European Symposium on Security and Privacy (Euro S&P 2024), pp. xxxx-xxxx, July 2024
  3. Ryo Iijima, Tetsuya Takehisa, Tetsushi Ohki, and Tatsuya Mori, “The Catcher in the Eye: Recognizing Users by their Blinks“, Proceedings of the 19th ACM ASIA Conference on Information, Computer and Communications Security (ASIACCS 2024), pp. 1739–1752, June 2024 (acceptance rate: 65/301=21.6%) [PDF]
  4. Kazuki Nomoto, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori, “Browser Permission Mechanisms Demystified” The Network and Distributed System Security Symposium (NDSS 2023), February 2023 [PDF]
  5. T. Watanabe, E. Shioji, M. Akiyama, T. Mori, “Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites,” Proceedings of the 26th Network and Distributed System Security Symposium (NDSS2020), pp. 1–15, February 2020 (acceptance rate=17.4%) DISTINGUISHED PAPER AWARD [PDF]
  6. R. Iijima, S. Minami, Y. Zhou, T. Takehisa, T. Takahashi, Y. Oikawa, and T. Mori, “Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility,” IEEE Transactions on Emerging Topics in Computing (TETC) November 2019 (online early access: https://ieeexplore.ieee.org/document/8906174)
  7. S. Maruyama, S. Wakabayashi, and T. Mori, “Tap ‘n Ghost: A Compilation of Novel Attack Techniques against Smartphone Touchscreens,” Proceedings of the 40th IEEE Symposium on Security and Privacy (S&P 2019), pp. 628-645, May 2019 (acceptance rate = 12.5%=84/673) [PDF][slide][short video][YouTube][threatpost][gbhackers][ZDNet][replication work]
  8. T. Watanabe, E. Shioji, M. Akiyama, K. Sasaoka, T. Yagi, and T. Mori, “User Blocking Considered Harmful? An Attacker-controllable Side Channel to Identify Social Accounts,” Proceedings of the 3rd IEEE European Symposium on Security and Privacy (Euro S&P 2018), pp. 323–337, April 2018 (acceptance rate: 33/144=22.9%). [IEEE Xplore]