Shohei Kakei

Orcid: 0000-0003-3137-4956

According to our database1, Shohei Kakei authored at least 13 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Detection of Inconsistencies between Guidance Pages and Actual Data Collection of Third-party SDKs in Android Apps.
Proceedings of the IEEE/ACM 11th International Conference on Mobile Software Engineering and Systems, 2024

2023
Design of Enclosing Signing Keys by All Issuers in Distributed Public Key Certificate-Issuing Infrastructure.
IEICE Trans. Inf. Syst., September, 2023

Execution Recording and Reconstruction for Detecting Information Flows in Android Apps.
IEEE Access, 2023

2022
Value-utilized taint propagation: toward precise detection of apps' information flows across Android API calls.
Int. J. Inf. Sec., 2022

Granting Access Privileges Using OpenID Connect in Permissioned Distributed Ledgers.
Proceedings of the Security and Privacy in Communication Networks, 2022

Plug and Analyze: Usable Dynamic Taint Tracker for Android Apps.
Proceedings of the 22nd IEEE International Working Conference on Source Code Analysis and Manipulation, 2022

2021
Simplifying Dynamic Public Key Certificate Graph for Certification Path Building in Distributed Public Key Infrastructure.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021

FirmPot: A Framework for Intelligent-Interaction Honeypots Using Firmware of IoT Devices.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

VTDroid: Value-based Tracking for Overcoming Anti-Taint-Analysis Techniques in Android Apps.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Cross-Certification Towards Distributed Authentication Infrastructure: A Case of Hyperledger Fabric.
IEEE Access, 2020

2019
Prevention of Data Leakage due to Implicit Information Flows in Android Applications.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

Designing Authentication and Authorization System with Blockchain.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2016
SSL Client Authentication with TPM.
IEICE Trans. Inf. Syst., 2016


  Loading...