2024
Investigations of Top-Level Domain Name Collisions in Blockchain Naming Services.
Proceedings of the ACM on Web Conference 2024, 2024
Account Discovery: Identifying Web3 SNS Accounts at Risk of De-anonymization.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
2023
Investigations of Electronic Signatures for Construction of Trust Services.
IEICE Trans. Inf. Syst., September, 2023
Analysis of Privacy Compliance by Classifying Policies Before and After the Japanese Law Revision.
J. Inf. Process., 2023
Plausibility-Based Heuristics for Latent Space Classical Planning.
CoRR, 2023
Impact Analysis of Organizational Structure of Group Companies on Privacy Policies.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023
2022
Money Talks: Detection of Disposable Phishing Websites by Analyzing Its Building Costs.
Proceedings of the 4th IEEE International Conference on Trust, 2022
Analysis of Privacy Compliance by Classifying Multiple Policies on the Web.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
2021
Risk Analysis of Cookie Sharing by Link Decoration and CNAME Cloaking.
J. Inf. Process., 2021
The Uncontrolled Web: Measuring Security Governance on the Web.
IEICE Trans. Inf. Syst., 2021
Fake News Detection via Biased User Profiles in Social Networking Sites.
Proceedings of the WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence, Melbourne VIC Australia, December 14, 2021
2020
Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library.
IEICE Trans. Inf. Syst., 2020
2019
Evasive Malicious Website Detection by Leveraging Redirection Subgraph Similarities.
IEICE Trans. Inf. Syst., 2019
2018
Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences.
IEICE Trans. Inf. Syst., 2018
Event De-Noising Convolutional Neural Network for Detecting Malicious URL Sequences from Proxy Logs.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities.
IEICE Trans. Inf. Syst., 2018
POSTER: Predicting Website Abuse Using Update Histories.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018
2017
Fine-Grained Analysis of Compromised Websites with Redirection Graphs and JavaScript Traces.
IEICE Trans. Inf. Syst., 2017
Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study.
IEICE Trans. Inf. Syst., 2017
A Study on the Vulnerabilities of Mobiles Apps associated with Software Modules.
CoRR, 2017
Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017
Understanding the security management of global third-party Android marketplaces.
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, 2017
Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017
Malicious URL sequence detection using event de-noising convolutional neural network.
Proceedings of the IEEE International Conference on Communications, 2017
Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph Similarities.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
2016
MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks.
IEICE Trans. Inf. Syst., 2016
Website Forensic Investigation to Identify Evidence and Impact of Compromise.
Proceedings of the Security and Privacy in Communication Networks, 2016
2015
MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015