Mitsuaki Akiyama

Orcid: 0000-0001-7052-8562

According to our database1, Mitsuaki Akiyama authored at least 118 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Understanding the Breakdown of Same-origin Policies in Web Services That Rehost Websites.
J. Inf. Process., 2024

An Investigation of Privacy and Security in VR APPs through URL String Analysis.
J. Inf. Process., 2024

Editor's Message to Special Issue of Cybersecurity Technologies for Secure Supply-Chain.
J. Inf. Process., 2024

Longitudinal Measurement Study of the Domain Names Associated With the Olympic Games.
IEEE Access, 2024

How WEIRD is Usable Privacy and Security Research?
Proceedings of the 33rd USENIX Security Symposium, 2024

Evaluation of Adversarial Examples Based on Original Definition.
Proceedings of the HCI International 2024 Posters, 2024

2023
Seeing is not always believing: Insights on IoT manufacturing from firmware composition analysis and vendor survey.
Comput. Secur., October, 2023

Analysis of Non-Experts' Security- and Privacy-Related Questions on a Q&A Site.
IEICE Trans. Inf. Syst., September, 2023

Interpreting Graph-Based Sybil Detection Methods as Low-Pass Filtering.
IEEE Trans. Inf. Forensics Secur., 2023

Understanding the Inconsistencies in the Permissions Mechanism of Web Browsers.
J. Inf. Process., 2023

A Survey on the Geographic Diversity of Usable Privacy and Security Research.
CoRR, 2023

Analysis of Homophily Effects on Information Diffusion on Social Networks.
IEEE Access, 2023

Browser Permission Mechanisms Demystified.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Analyzing the Use of Public and In-house Secure Development Guidelines in U.S. and Japanese Industries.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework.
Proc. Priv. Enhancing Technol., 2022

Exploring Event-synced Navigation Attacks across User-generated Content Platforms in the Wild.
J. Inf. Process., 2022

Experiences, Behavioral Tendencies, and Concerns of Non-Native English Speakers in Identifying Phishing Emails.
J. Inf. Process., 2022

Understanding Security Risks of Ad-based URL Shortening Services Caused by Users' Behaviors.
J. Inf. Process., 2022

DomainPrio: Prioritizing Domain Name Investigations to Improve SOC Efficiency.
IEEE Access, 2022

Understanding Non-Experts' Security- and Privacy-Related Questions on a Q&A Site.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Competitive Information Spreading on Modular Networks.
Proceedings of the Network Science - 7th International Winter Conference, 2022

Objection!: Identifying Misclassified Malicious Activities with XAI.
Proceedings of the IEEE International Conference on Communications, 2022

2021
Time-Series Measurement of Parked Domain Names and Their Malicious Uses.
IEICE Trans. Commun., July, 2021

Auto-creation of Robust Android Malware Family Trees.
J. Inf. Process., 2021

Understanding the Fake Removal Information Advertisement Sites.
J. Inf. Process., 2021

A Comprehensive Measurement of Cloud Service Abuse.
J. Inf. Process., 2021

Identifying the Phishing Websites Using the Patterns of TLS Certificates.
J. Cyber Secur. Mobil., 2021

To Get Lost is to Learn the Way: An Analysis of Multi-Step Social Engineering Attacks on the Web.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Why They Ignore English Emails: The Challenges of Non-Native Speakers in Identifying Phishing Emails.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

Analyzing Security Risks of Ad-Based URL Shortening Services Caused by Users' Behaviors.
Proceedings of the Security and Privacy in Communication Networks, 2021

A First Look at COVID-19 Domain Names: Origin and Implications.
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021

Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions.
Proceedings of the Advances in Information and Computer Security, 2021

Auto-creation of Android Malware Family Tree.
Proceedings of the ICC 2021, 2021

Brand Validation: Security Indicator to Better Indicate Website Identity.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2021

Careless Participants Are Essential for Our Phishing Study: Understanding the Impact of Screening Methods.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021

Detecting Event-synced Navigation Attacks across User-generated Content Platforms.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

A Cross-role and Bi-national Analysis on Security Efforts and Constraints of Software Development Projects.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Addressing the Privacy Threat to Identify Existence of a Target's Account on Sensitive Services.
J. Inf. Process., 2020

1-day, 2 Countries - A Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States.
IEICE Trans. Inf. Syst., 2020

Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?
IEICE Trans. Inf. Syst., 2020

Detecting and Understanding Online Advertising Fraud in the Wild.
IEICE Trans. Inf. Syst., 2020

DomainScouter: Analyzing the Risks of Deceptive Internationalized Domain Names.
IEICE Trans. Inf. Syst., 2020

Exploration into Gray Area: Toward Efficient Labeling for Detecting Malicious Domain Names.
IEICE Trans. Commun., 2020

Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel.
IEICE Trans. Inf. Syst., 2020

Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library.
IEICE Trans. Inf. Syst., 2020

Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Time-series Measurement of Parked Domain Names.
Proceedings of the IEEE Global Communications Conference, 2020

Sybil Detection as Graph Filtering.
Proceedings of the IEEE Global Communications Conference, 2020

Discovering HTTPSified Phishing Websites Using the TLS Certificates Footprints.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

A Large-scale Analysis of Cloud Service Abuse.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

To Get Lost is to Learn the Way: Automatically Collecting Multi-step Social Engineering Attacks on the Web.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Detecting Malware-infected Hosts Using Templates of Multiple HTTP Requests.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

2019
Using Seq2Seq Model to Detect Infection Focusing on Behavioral Features of Processes.
J. Inf. Process., 2019

Detection Method of Homograph Internationalized Domain Names with OCR.
J. Inf. Process., 2019

Detecting Dynamic IP Addresses and Cloud Blocks Using the Sequential Characteristics of PTR Records.
J. Inf. Process., 2019

Efficient Dynamic Malware Analysis for Collecting HTTP Requests using Deep Learning.
IEICE Trans. Inf. Syst., 2019

Evasive Malicious Website Detection by Leveraging Redirection Subgraph Similarities.
IEICE Trans. Inf. Syst., 2019

DomainScouter: Understanding the Risks of Deceptive IDNs.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Graph Signal Processing for Directed Graphs Based on the Hermitian Laplacian.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2019

Precise and Robust Detection of Advertising Fraud.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Exploration into Gray Area: Efficient Labeling for Malicious Domain Name Detection.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Understanding the Responsiveness of Mobile App Developers to Software Library Updates.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Cross-Vendor Knowledge Transfer for Managed Security Services with Triplet Network.
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, 2019

Poster: A First Look at the Privacy Risks of Voice Assistant Apps.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

A Pilot Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

I know what you did last login: inconsistent messages tell existence of a target's account to insiders.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
PADetective: A Systematic Approach to Automate Detection of Promotional Attackers in Mobile App Store.
J. Inf. Process., 2018

HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle.
Int. J. Inf. Sec., 2018

DomainProfiler: toward accurate and early discovery of domain names abused in future.
Int. J. Inf. Sec., 2018

Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps.
IEICE Trans. Inf. Syst., 2018

Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences.
IEICE Trans. Inf. Syst., 2018

Event De-Noising Convolutional Neural Network for Detecting Malicious URL Sequences from Proxy Logs.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities.
IEICE Trans. Inf. Syst., 2018

DomainChroma: Building actionable threat intelligence from malicious domain names.
Comput. Secur., 2018

POSTER: Predicting Website Abuse Using Update Histories.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

A method for estimating process maliciousness with Seq2Seq model.
Proceedings of the 2018 International Conference on Information Networking, 2018

User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Analysis of malware download sites by focusing on time series variation of malware.
J. Comput. Sci., 2017

Tracking the Human Mobility Using Mobile Device Sensors.
IEICE Trans. Inf. Syst., 2017

Fine-Grained Analysis of Compromised Websites with Redirection Graphs and JavaScript Traces.
IEICE Trans. Inf. Syst., 2017

APPraiser: A Large Scale Analysis of Android Clone Apps.
IEICE Trans. Inf. Syst., 2017

Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study.
IEICE Trans. Inf. Syst., 2017

A Study on the Vulnerabilities of Mobiles Apps associated with Software Modules.
CoRR, 2017

Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots.
Comput. Secur., 2017

Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Understanding the security management of global third-party Android marketplaces.
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, 2017

Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017

Malware originated HTTP traffic detection utilizing cluster appearance ratio.
Proceedings of the 2017 International Conference on Information Networking, 2017

Malicious URL sequence detection using event de-noising convolutional neural network.
Proceedings of the IEEE International Conference on Communications, 2017

Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph Similarities.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Characterizing Promotional Attacks in Mobile App Store.
Proceedings of the Applications and Techniques in Information Security, 2017

2016
MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks.
IEICE Trans. Inf. Syst., 2016

Automating URL Blacklist Generation with Similarity Search Approach.
IEICE Trans. Inf. Syst., 2016

BotProfiler: Detecting Malware-Infected Hosts by Profiling Variability of Malicious Infrastructure.
IEICE Trans. Commun., 2016

Website Forensic Investigation to Identify Evidence and Impact of Compromise.
Proceedings of the Security and Privacy in Communication Networks, 2016

Efficient Dynamic Malware Analysis Based on Network Behavior Using Deep Learning.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

DomainProfiler: Discovering Domain Names Abused in Future.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Clone or Relative?: Understanding the Origins of Similar Android Apps.
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016

Evaluation on Malware Classification by Session Sequence of Common Protocols.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Empowering Anti-malware Research in Japan by Sharing the MWS Datasets.
J. Inf. Process., 2015

Client Honeypot Multiplication with High Performance and Precise Detection.
IEICE Trans. Inf. Syst., 2015

RouteDetector: Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human Mobility.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected Hosts.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

AutoBLG: Automatic URL blacklist generator using search space expansion and filters.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2013
Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious URLs.
IT Prof., 2013

Active Credential Leakage for Observing Web-Based Attack Cycle.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

2012
Scalable and Performance-Efficient Client Honeypot on High Interaction System.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Characterizing Obfuscated JavaScript Using Abstract Syntax Trees: Experimenting with Malicious Scripts.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Searching Structural Neighborhood of Malicious URLs to Improve Blacklisting.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

2010
Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks.
IEICE Trans. Commun., 2010

2007
A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007


  Loading...