Takuya Watanabe
Orcid: 0000-0001-7205-5367Affiliations:
- NTT Secure Platform Labs. / Waseda University, Japan
According to our database1,
Takuya Watanabe
authored at least 31 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Understanding the Breakdown of Same-origin Policies in Web Services That Rehost Websites.
J. Inf. Process., 2024
J. Inf. Process., 2024
Longitudinal Measurement Study of the Domain Names Associated With the Olympic Games.
IEEE Access, 2024
2023
J. Inf. Process., 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
2022
Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework.
Proceedings of the 25th International Symposium on Research in Attacks, 2022
2021
J. Cyber Secur. Mobil., 2021
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021
2020
Addressing the Privacy Threat to Identify Existence of a Target's Account on Sensitive Services.
J. Inf. Process., 2020
1-day, 2 Countries - A Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States.
IEICE Trans. Inf. Syst., 2020
Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?
IEICE Trans. Inf. Syst., 2020
Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel.
IEICE Trans. Inf. Syst., 2020
Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library.
IEICE Trans. Inf. Syst., 2020
Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
2019
Understanding the Responsiveness of Mobile App Developers to Software Library Updates.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
A Pilot Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
I know what you did last login: inconsistent messages tell existence of a target's account to insiders.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
PADetective: A Systematic Approach to Automate Detection of Promotional Attackers in Mobile App Store.
J. Inf. Process., 2018
IEICE Trans. Inf. Syst., 2018
User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
2017
IEICE Trans. Inf. Syst., 2017
IEICE Trans. Inf. Syst., 2017
CoRR, 2017
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, 2017
Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017
Proceedings of the Applications and Techniques in Information Security, 2017
2016
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 2016
2015
RouteDetector: Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human Mobility.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015
Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015