Eitaro Shioji
Orcid: 0000-0001-8743-9101
According to our database1,
Eitaro Shioji
authored at least 24 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Understanding the Breakdown of Same-origin Policies in Web Services That Rehost Websites.
J. Inf. Process., 2024
2023
Seeing is not always believing: Insights on IoT manufacturing from firmware composition analysis and vendor survey.
Comput. Secur., October, 2023
J. Inf. Process., 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Analyzing the Use of Public and In-house Secure Development Guidelines in U.S. and Japanese Industries.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
2021
A Cross-role and Bi-national Analysis on Security Efforts and Constraints of Software Development Projects.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Addressing the Privacy Threat to Identify Existence of a Target's Account on Sensitive Services.
J. Inf. Process., 2020
1-day, 2 Countries - A Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States.
IEICE Trans. Inf. Syst., 2020
Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel.
IEICE Trans. Inf. Syst., 2020
Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library.
IEICE Trans. Inf. Syst., 2020
Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
2019
J. Inf. Process., 2019
Understanding the Responsiveness of Mobile App Developers to Software Library Updates.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
A Pilot Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
I know what you did last login: inconsistent messages tell existence of a target's account to insiders.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
J. Inf. Process., 2018
User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
2017
CoRR, 2017
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017
2013
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
2012
Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2010
Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010