• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Mori Tatsuya  森 達哉

Researcher Number 60708551
Other IDs
  • ORCIDhttps://orcid.org/0000-0003-1583-4174
External Links
Affiliation (Current) 2025: 早稲田大学, 理工学術院, 教授
Affiliation (based on the past Project Information) *help 2018 – 2024: 早稲田大学, 理工学術院, 教授
2013 – 2017: 早稲田大学, 理工学術院, 准教授
Review Section/Research Field
Principal Investigator
Medium-sized Section 60:Information science, computer engineering, and related fields / Basic Section 60070:Information security-related / Information security / Information network
Except Principal Investigator
Information security
Keywords
Principal Investigator
セキュリティ / 機械学習 / センサ / アプリ / IoT / 攻撃 / プライバシー / センサー / 推定 / 物体 … More / 3D / ユーザ / 点群 / ユーザビリティ / 3次元 / 実世界 / 認証 / 敵対的入力 / 自動運転車 / 制御 / AI / 自動運転 / 符号化文字集合 / ホモグラフ / 文字セキュリティ / 文字符号 / ユニコード / 文字 / 著作権保護 / 自然言語処理 / 認知 / ホモグリフ / 解析 / マルウェア / コンテクスト / プライバシ / コンテキスト / Cyber deception / 音声認識 / 音声アシスタント / 音声 / サイドチャネル / 位置情報 / スマートフォン / 高速 / アルゴリズム / 計測 / インターネット / 通信 / スケーラビリティ / グラフ / 暗号化 / DNS / トラヒック … More
Except Principal Investigator
情報通信工学 / インターネット高度化 / 人工知能 / 高信頼性ネットワーク / モバイルマルウェア / 機械学習 / 悪性通信 / サイバー攻撃 / マルウェア対策 / セキュア・ネットワーク / モバイル / 大規模データ解析 / マルウェア / セキュリティ Less
  • Research Projects

    (8 results)
  • Research Products

    (76 results)
  • Co-Researchers

    (12 People)
  •  Understanding the impact of adversarial inputs on autonomous driving systems and developing countermeasure technologiesPrincipal Investigator

    • Principal Investigator
      森 達哉
    • Project Period (FY)
      2022 – 2024
    • Research Category
      Grant-in-Aid for Scientific Research (A)
    • Review Section
      Medium-sized Section 60:Information science, computer engineering, and related fields
    • Research Institution
      Waseda University
  •  Development of real-world oriented authentication technologiesPrincipal Investigator

    • Principal Investigator
      森 達哉
    • Project Period (FY)
      2022 – 2024
    • Research Category
      Grant-in-Aid for Challenging Research (Exploratory)
    • Review Section
      Medium-sized Section 60:Information science, computer engineering, and related fields
    • Research Institution
      Waseda University
  •  Research on Security of CharactersPrincipal Investigator

    • Principal Investigator
      Tatsuya Mori
    • Project Period (FY)
      2020 – 2022
    • Research Category
      Grant-in-Aid for Challenging Research (Exploratory)
    • Review Section
      Medium-sized Section 60:Information science, computer engineering, and related fields
    • Research Institution
      Waseda University
  •  Context-aware Approaches for Securing Appified IoT DevicesPrincipal Investigator

    • Principal Investigator
      Mori Tatsuya
    • Project Period (FY)
      2019 – 2021
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Review Section
      Basic Section 60070:Information security-related
    • Research Institution
      Waseda University
  •  Pioneering Acoustic Security ResearchPrincipal Investigator

    • Principal Investigator
      Mori Tatsuya
    • Project Period (FY)
      2018 – 2019
    • Research Category
      Grant-in-Aid for Challenging Research (Exploratory)
    • Review Section
      Medium-sized Section 60:Information science, computer engineering, and related fields
    • Research Institution
      Waseda University
  •  Malware Informatics as a Power Base of Cyber Security Analysis

    • Principal Investigator
      Goto Shigeki
    • Project Period (FY)
      2016 – 2018
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      Information security
    • Research Institution
      Waseda University
  •  Understanding the threats caused by correlating human mobility and smart device sensorsPrincipal Investigator

    • Principal Investigator
      Mori Tatsuya
    • Project Period (FY)
      2015 – 2016
    • Research Category
      Grant-in-Aid for Challenging Exploratory Research
    • Research Field
      Information security
    • Research Institution
      Waseda University
  •  Fine-grained traffic monitoring for ultra high-speed networksPrincipal Investigator

    • Principal Investigator
      Mori Tatsuya
    • Project Period (FY)
      2013 – 2015
    • Research Category
      Grant-in-Aid for Research Activity Start-up
    • Research Field
      Information network
    • Research Institution
      Waseda University

All 2023 2022 2021 2020 2019 2018 2017 2016 2015 2014

All Journal Article Presentation Patent

  • [Journal Article] PinchKey: A Natural and User-Friendly Approach to VR User Authentication2023

    • Author(s)
      Suzuki Mei、Iijima Ryo、Nomoto Kazuki、Ohki Tetsushi、Mori Tatsuya
    • Journal Title

      Proceedings of the 2023 European Symposium on Usable Security

      Volume: - Pages: 192-211

    • DOI

      10.1145/3617072.3617122

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-22K19782
  • [Journal Article] Cyber-physical firewall: monitoring and controlling the threats caused by malicious analog signals2022

    • Author(s)
      Ryo Iijima, Tatsuya Takehisa, Tatsuya Mori
    • Journal Title

      Proceedings of the 19th ACM International Conference on Computing Frontiers

      Volume: 1 Pages: 296-304

    • DOI

      10.1145/3528416.3530997

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-19H04111
  • [Journal Article] On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework2022

    • Author(s)
      Kazuki Nomoto, Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata, Tatsuya Mori
    • Journal Title

      Proceedings on Privacy Enhancing Technologies ; 2022

      Volume: 1 Pages: 1-18

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-19H04111
  • [Journal Article] Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams and its Feasibility2019

    • Author(s)
      Iijima Ryo、Minami Shota、Zhou Yunao、Takehisa Tatsuya、Takahashi Takeshi、Oikawa Yasuhiro、Mori Tatsuya
    • Journal Title

      IEEE Transactions on Emerging Topics in Computing

      Volume: 1 Issue: 4 Pages: 1-15

    • DOI

      10.1109/tetc.2019.2953041

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-18K19789
  • [Journal Article] Poster: A First Look at the Privacy Risks of Voice Assistant Apps2019

    • Author(s)
      Natatsuka Atsuko、Iijima Ryo、Watanabe Takuya、Akiyama Mitsuaki、Sakai Tetsuya、Mori Tatsuya
    • Journal Title

      Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security

      Volume: 1 Pages: 2633-2635

    • DOI

      10.1145/3319535.3363274

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-19H04111, KAKENHI-PROJECT-18K19789
  • [Journal Article] Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps2019

    • Author(s)
      Yoshida Kanae、Imai Hironori、Serizawa Nana、Mori Tatsuya、Kanaoka Akira
    • Journal Title

      Journal of Information Processing

      Volume: 27 Issue: 0 Pages: 593-602

    • DOI

      10.2197/ipsjjip.27.593

    • NAID

      130007706907

    • ISSN
      1882-6652
    • Language
      Japanese
    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-19H04111
  • [Journal Article] PADetective: A Systematic Approach to Automate Detection of Promotional Attackers in Mobile App Store2018

    • Author(s)
      B. Sun, X. Luo, M. Akiyama, T. Watanabe and T. Mori
    • Journal Title

      Journal of Information Processing

      Volume: 26 Issue: 0 Pages: 212-223

    • DOI

      10.2197/ipsjjip.26.212

    • NAID

      130006351608

    • ISSN
      1882-6652
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Journal Article] Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps2018

    • Author(s)
      WATANABE Takuya、AKIYAMA Mitsuaki、SAKAI Tetsuya、WASHIZAKI Hironori、MORI Tatsuya
    • Journal Title

      IEICE Trans. Inf. & Syst.

      Volume: E101.D Issue: 11 Pages: 2584-2599

    • DOI

      10.1587/transinf.2017ICP0006

    • ISSN
      0916-8532, 1745-1361
    • Year and Date
      2018-11-01
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Journal Article] Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams2018

    • Author(s)
      Iijima Ryo、Minami Shota、Yunao Zhou、Takehisa Tatsuya、Takahashi Takeshi、Oikawa Yasuhiro、Mori Tatsuya
    • Journal Title

      CCS '18 Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security

      Volume: 1 Pages: 2222-2224

    • DOI

      10.1145/3243734.3278497

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-18K19789
  • [Journal Article] Detecting Malware-Infected Devices Using the HTTP Header Patterns2018

    • Author(s)
      S. Mizuno, M. Hatada, T. Mori, and S. Goto
    • Journal Title

      IEICE Trans. Inf. & Syst.

      Volume: E101.D Issue: 5 Pages: 1370-1379

    • DOI

      10.1587/transinf.2017EDP7294

    • NAID

      130006729785

    • ISSN
      0916-8532, 1745-1361
    • Year and Date
      2018-05-01
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Journal Article] Automatically Generating Malware Analysis Reports Using Sandbox Logs2018

    • Author(s)
      SUN Bo、FUJINO Akinori、MORI Tatsuya、BAN Tao、TAKAHASHI Takeshi、INOUE Daisuke
    • Journal Title

      IEICE Trans. Inf. & Syst.

      Volume: E101.D Issue: 11 Pages: 2622-2632

    • DOI

      10.1587/transinf.2017ICP0011

    • ISSN
      0916-8532, 1745-1361
    • Year and Date
      2018-11-01
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Journal Article] Tracking the Human Mobility Using Mobile Device Sensors2017

    • Author(s)
      T. Watanabe, M. Akiyama, and T. Mori
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: 印刷中

    • NAID

      130005876017

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15K12038
  • [Journal Article] APPraiser: A large scale analysis of Android clone apps2017

    • Author(s)
      Y. Ishii, T. Watanabe, M. Akiyama, and T. Mori
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: 印刷中

    • NAID

      130005876000

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Journal Article] Finding New Varieties of Malware with the Classification of Network Behavior2017

    • Author(s)
      M. Hatada and T. Mori
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: 印刷中

    • NAID

      130005876003

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Journal Article] Statistical Estimation of the Names of HTTPS Servers with Domain Name Graphs2016

    • Author(s)
      T. Mori, T. Inoue, A. Shimoda, K. Sato, K. Ishibashi, and S. Goto
    • Journal Title

      Computer Communications

      Volume: 未定 Pages: 104-113

    • DOI

      10.1016/j.comcom.2016.01.013

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-25880020
  • [Journal Article] RouteDetector: Sensor-based Positioning System that Exploits Spatio-temporal Regularity of Human Mobility2015

    • Author(s)
      T. Watanabe, M. Akiyama, and T. Mori
    • Journal Title

      Proceedings of the 9th USENIX Workshop on Offensive Technologies (WOOT ’15)

      Volume: 無し Pages: 1-11

    • Peer Reviewed / Acknowledgement Compliant / Open Access
    • Data Source
      KAKENHI-PROJECT-15K12038
  • [Patent] 位置推定装置、位置推定方法および位置推定プログラム2015

    • Inventor(s)
      渡邉、森、他
    • Industrial Property Rights Holder
      渡邉、森、他
    • Industrial Property Rights Type
      特許
    • Filing Date
      2015-07-27
    • Data Source
      KAKENHI-PROJECT-15K12038
  • [Patent] アクセス数推定装置、アクセス数推定方法、及びプログラム2015

    • Inventor(s)
      森、後藤、他
    • Industrial Property Rights Holder
      森、後藤、他
    • Industrial Property Rights Type
      特許
    • Filing Date
      2015-09-04
    • Data Source
      KAKENHI-PROJECT-25880020
  • [Presentation] リズム感の違いを利用した個人認証方式の開発と評価2023

    • Author(s)
      髙瀬由梨、野本一輝、飯島涼、森達哉
    • Organizer
      セキュリティ心理学とトラスト研究会(IPSJ-SPT)2023年3月
    • Data Source
      KAKENHI-PROJECT-22K19782
  • [Presentation] WorldAuth: 周辺実世界の特徴を利用した 新たな認証フレームワークの提案2023

    • Author(s)
      鈴木芽依,飯島涼,小林竜之輔,田中優奈,大木哲史,森達哉
    • Organizer
      コンピュータセキュリティシンポジウム 2023
    • Data Source
      KAKENHI-PROJECT-22K19782
  • [Presentation] MagSerea:周辺世界の3軸磁気情報に基づく認証方式2023

    • Author(s)
      相場智也,森達哉,西垣正勝,大木哲史
    • Organizer
      コンピュータセキュリティシンポジウム 2023
    • Data Source
      KAKENHI-PROJECT-22K19782
  • [Presentation] VRデバイス向けハンドジェスチャ認証システムの開発2023

    • Author(s)
      鈴木芽依、飯島涼、野本一輝、森 達哉
    • Organizer
      情報通信システムセキュリティ研究会(ICSS)2023年3月
    • Data Source
      KAKENHI-PROJECT-22K19782
  • [Presentation] リズムタップ:リズム感の違いを利用した包摂的な個人認証技術の提案とユーザビリティ評価2023

    • Author(s)
      髙瀬由梨,利川悠斗,野本一輝,飯島涼,森達哉
    • Organizer
      コンピュータセキュリティシンポジウム 2023
    • Data Source
      KAKENHI-PROJECT-22K19782
  • [Presentation] 手首の表面筋電位を用いたスマートウォッチ向けジェスチャ認証方式2023

    • Author(s)
      渡部晃久、飯島涼、森達哉
    • Organizer
      情報通信システムセキュリティ研究会(ICSS)2023年3月
    • Data Source
      KAKENHI-PROJECT-22K19782
  • [Presentation] LiDARへの攻撃に対する自己位置推定機能の頑健性評価2023

    • Author(s)
      南澤勇太、小林竜之輔、森達哉
    • Organizer
      情報処理学会コンピュータセキュリティ研究会(CSEC)2023-CSEC-100
    • Data Source
      KAKENHI-PROJECT-22H00519
  • [Presentation] Fonty : テキストのコピーを防止する文字交換方式の提案と評価“2023

    • Author(s)
      野本一輝,森達哉
    • Organizer
      信学技報, vol. 122, no. 422, ICSS2022-61, pp. 79-84
    • Data Source
      KAKENHI-PROJECT-20K21797
  • [Presentation] ユーザの自然な動作を利用したヘッドマウントディスプレイユーザ認証方法の提案と評価2022

    • Author(s)
      鈴木芽依、飯島涼、野本一輝、森 達哉
    • Organizer
      コンピュータセキュリティシンポジウム2022論文集
    • Data Source
      KAKENHI-PROJECT-22K19782
  • [Presentation] リズムタップ: 視覚障害者と健常者のどちらにも使いやすい認証技術の提案と評価2022

    • Author(s)
      髙瀬由梨、野本一輝、飯島涼、森達哉
    • Organizer
      コンピュータセキュリティシンポジウム2022論文集
    • Data Source
      KAKENHI-PROJECT-22K19782
  • [Presentation] Exposure Notification Frameworkがもたらすプライバシーリスクの評価と対策2021

    • Author(s)
      野本一輝、秋山満昭、衛藤将史、猪俣敦夫、森達哉
    • Organizer
      信学技報(ICSS)
    • Data Source
      KAKENHI-PROJECT-19H04111
  • [Presentation] 慣性計測装置に対する共振誘発攻撃の評価2021

    • Author(s)
      南澤勇太,飯島涼,森達哉
    • Organizer
      信学技報(ICSS)
    • Data Source
      KAKENHI-PROJECT-19H04111
  • [Presentation] オンライン機械翻訳システムに対するホモグリフ攻撃の脆弱性調査2021

    • Author(s)
      坂本岳史、森達哉
    • Organizer
      情報通信システムセキュリティ研究会 (ICSS)
    • Data Source
      KAKENHI-PROJECT-20K21797
  • [Presentation] Can the Exposure Notification Framework Expose Personal Information2021

    • Author(s)
      Kazuki Nomoto, Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata and Tatsuya Mori
    • Organizer
      NDSS 2021 Poster
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-19H04111
  • [Presentation] Voice Assistant アプリの対話型解析システムの開発2021

    • Author(s)
      刀塚敦子、飯島涼、渡邉卓弥、秋山満昭、酒井哲也、森達哉
    • Organizer
      信学技報(ICSS)
    • Data Source
      KAKENHI-PROJECT-19H04111
  • [Presentation] 東京2020オリンピック公式ドメイン名に対する類似ドメイン名の実態調査2021

    • Author(s)
      河岡諒,千葉大紀,渡邉卓弥,秋山満昭,鈴木宏彰,森達哉
    • Organizer
      コンピュータセキュリティシンポジウム2021
    • Data Source
      KAKENHI-PROJECT-20K21797
  • [Presentation] Voice Assistant アプリ解析ツールによる挙動解析2021

    • Author(s)
      刀塚敦子,飯島涼,渡邉卓弥,秋山満昭,酒井哲也,森達哉
    • Organizer
      コンピュータセキュリティシンポジウム2021
    • Data Source
      KAKENHI-PROJECT-19H04111
  • [Presentation] 接触確認フレームワークに対する陽性者特定攻撃の評価と対策2021

    • Author(s)
      野本 一輝,秋山 満昭,衛藤 将史,猪俣 敦夫,森 達哉
    • Organizer
      コンピュータセキュリティシンポジウム2021
    • Data Source
      KAKENHI-PROJECT-19H04111
  • [Presentation] アナログ信号によるセキュリティ脅威をアナログ信号による脅威を検知・規制するセキュリティフレームワークの提案と検証2021

    • Author(s)
      飯島 涼, 竹久 達也,森 達哉
    • Organizer
      コンピュータセキュリティシンポジウム2021
    • Data Source
      KAKENHI-PROJECT-19H04111
  • [Presentation] Output Security Framework: アナログ信号によるセキュリティ脅威を出力側で規制するフレームワークの提案2021

    • Author(s)
      飯島 涼, 南 翔汰, シュウ インゴウ, 竹久 達也, 高橋 健志, 及川 靖広, 森 達哉
    • Organizer
      暗号と情報セキュリティシンポジウム2021 (SCIS2021)
    • Data Source
      KAKENHI-PROJECT-19H04111
  • [Presentation] マルウェアの動的解析におけるログ出力が停止する現象の実態調査2020

    • Author(s)
      森本 康太,鄭 俊俊,瀧本 栄二,齋藤 彰一,毛利 公一
    • Organizer
      情報処理学会研究報告,Vol. 2020-SPT-36,No. 25,pp. 1-8,2020.
    • Data Source
      KAKENHI-PROJECT-19H04111
  • [Presentation] 心電図を標的とした敵対的攻撃2020

    • Author(s)
      小野大河,菅原健,森達哉
    • Organizer
      情報通信システムセキュリティ研究会 (ICSS) , Vol. ICSS2019-90 pp.131-136 2020年2月
    • Data Source
      KAKENHI-PROJECT-19H04111
  • [Presentation] 音声認識装置と人間の認知機能のギャップを悪用した攻撃2020

    • Author(s)
      森達哉
    • Organizer
      IoTセキュリティフォーラム2020
    • Invited
    • Data Source
      KAKENHI-PROJECT-19H04111
  • [Presentation] Voice Assistant アプリの大規模実態調査2019

    • Author(s)
      刀塚敦子,飯島涼,渡邉卓弥,秋山満昭,酒井哲也,森達哉
    • Organizer
      コンピュータセキュリティシンポジウム2019論文集,Vol. 2019,pp. 618-625,2019年10月
    • Data Source
      KAKENHI-PROJECT-19H04111
  • [Presentation] Understanding the Responsiveness of Mobile App Developers to Software Library Updates2019

    • Author(s)
      T. Yasumatsu, T. Watanabe, F. Kanei, E. Shioji, M. Akiyama, and T. Mori
    • Organizer
      the 9th ACM Conference on Data and Application Security and Privacy (CODASPY 2019)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] A measurement study of the Internationalized domain name (IDN) homograph attacks: present and future2019

    • Author(s)
      Tatsuya Mori
    • Organizer
      Asia Pacific Advanced Network 47
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] Voice Assistant アプリの大規模実態調査2019

    • Author(s)
      刀塚敦子,飯島涼,渡邉卓弥,秋山満昭,酒井哲也,森達哉
    • Organizer
      コンピュータセキュリティシンポジウム2019
    • Data Source
      KAKENHI-PROJECT-18K19789
  • [Presentation] アナログ信号のセキュリティ2019

    • Author(s)
      森達哉
    • Organizer
      電子情報通信学会総合大会計測セキュリティと今後の方向性
    • Invited
    • Data Source
      KAKENHI-PROJECT-18K19789
  • [Presentation] 機械学習のセキュリティ2018

    • Author(s)
      森達哉
    • Organizer
      第41回情報理論とその応用シンポジウム(SITA)
    • Invited
    • Data Source
      KAKENHI-PROJECT-18K19789
  • [Presentation] 音波の分離放射による音声認識機器への攻撃:ユーザスタディ評価と対策技術の提案2018

    • Author(s)
      飯島涼、南翔汰、シュウインゴウ、竹久達也、高橋健志、及川靖広、森達哉
    • Organizer
      コンピュータセキュリティシンポジウム2018
    • Data Source
      KAKENHI-PROJECT-18K19789
  • [Presentation] PTRレコードの連続的設定を加味した動的IPアドレスブロックおよびクラウド領域検出2018

    • Author(s)
      中森 朋郁, 千葉 大紀, 秋山 満昭, 後藤 滋樹
    • Organizer
      コンピュータ・セキュリティ・シンポジウム 2018
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] Don’t throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps2018

    • Author(s)
      E. Pariwono, D. Chiba, M. Akiyama, and T. Mori
    • Organizer
      the 13th ACM ASIA Conference on Information, Computer and Communications Security (ASIACCS 2018)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps2018

    • Author(s)
      K. Yoshida, H. Imai, N. Serizawa, T. Mori, and A. Kanaoka
    • Organizer
      the 10th IEEE International Workshop on Security Aspects in Processes and Services Engineering (SAPSE 2018)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] Measurement Study of the Hijackable Internet Resources inside Mobile Apps2018

    • Author(s)
      Elkana Pariwono, Daiki Chiba, Mitsuaki Akiyama, and Tatsuya Mori
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS 2018)
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] Detecting Dynamic IP Addresses Using the Sequential Characteristics of PTR Records2018

    • Author(s)
      Tomofumi Nakamori, Daiki Chiba, Mitsuaki Akiyama, and Shigeki Goto
    • Organizer
      Asia Pacific Advanced Network 46, Research Workshop
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] BotDetector: A robust and scalable approach toward detecting malware-infected devices2017

    • Author(s)
      S. Mizuno, M. Hatada, T. Mori, and S. Goto
    • Organizer
      Proceedings of the IEEE International Conference on Communications (ICC 2017)
    • Place of Presentation
      Paris, France
    • Year and Date
      2017-05-21
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] Discriminating DRDoS Packets using Time Interval Analysis2017

    • Author(s)
      Daiki Noguchi, Tatsuya Mori, Yota Egusa, Kazuya Suzuki, Shigeki Goto
    • Organizer
      the 44th Meeting of the Asia-Pacific Advanced Network
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] Androidサードパーティマーケットの大規模調査2017

    • Author(s)
      石井悠太,渡邉卓弥,金井文宏,高田雄太,塩治榮太朗,秋山満昭,八木毅,森達哉
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS2017)
    • Place of Presentation
      沖縄県沖縄市
    • Year and Date
      2017-01-24
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] Understanding the Security Management of Global Third-Party Android Marketplaces2017

    • Author(s)
      Y. Ishii, T. Watanabe, F. Kanei, Y. Takata, E. Shioji, M. Akiyama, T. Yagi, B. Sun and T. Mori
    • Organizer
      the 2nd International Workshop on App Market Analytics (WAMA 2017)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] Characterizing Promotional Attacks in Mobile App Store2017

    • Author(s)
      B. Sun, X. Luo, M. Akiyama, T. Watanabe and T. Mori
    • Organizer
      the 8th International Conference on Applications and Techniques in Information Security (ATIS 2017)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] 「攻撃者の視点に立つ」〜情報セキュリティ研究の面白さ〜2017

    • Author(s)
      森達哉
    • Organizer
      IPSJ-ONE
    • Place of Presentation
      名古屋大学
    • Year and Date
      2017-03-18
    • Invited
    • Data Source
      KAKENHI-PROJECT-15K12038
  • [Presentation] PUPが生成するDNSクエリパターンの大規模調査2017

    • Author(s)
      畑田充弘,森達哉
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS 2017)
    • Place of Presentation
      沖縄県沖縄市
    • Year and Date
      2017-01-24
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] Large-scale network security measurement through the lens of darknet2017

    • Author(s)
      Tatsuya Mori
    • Organizer
      The 44th APAN Meeting, Network Security Workshop
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] How the Internet survey tools could affect network security monitoring?2017

    • Author(s)
      Tatsuya Mori
    • Organizer
      The 43rd APAN Meeting, Network Security Workshop
    • Place of Presentation
      New Delhi, India
    • Year and Date
      2017-02-12
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] DNSクエリ分析に基づくAndroid PUAの識別と亜種分類2017

    • Author(s)
      畑田充弘,森達哉
    • Organizer
      コンピュータセキュリティシンポジウム2017
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] Detecting and Classifying Android PUAs by similarity of DNS queries2017

    • Author(s)
      M. Hatada and T. Mori
    • Organizer
      the 7th IEEE International COMPSAC Workshop on Network Technologies for Security, Administration and Protection (NETSAP 2017)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] モバイルアプリ開発者による脆弱性対応の実態調査2017

    • Author(s)
      安松達彦,金井文宏,渡邉卓弥,塩治榮太朗,秋山満昭,森達哉
    • Organizer
      コンピュータセキュリティシンポジウム2017
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] 実行時の通信挙動を用いたマルウェアの分類と未知検体検出への応用2016

    • Author(s)
      畑田充弘,森達哉
    • Organizer
      コンピュータセキュリティシンポジウム2016論文集
    • Place of Presentation
      秋田県秋田市
    • Year and Date
      2016-10-11
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] マルウェアの通信モデルによるクラスタリング精度の評価2016

    • Author(s)
      畑田充弘,森達哉
    • Organizer
      信学技報, vol. 116, no. 131, ICSS2016-24
    • Place of Presentation
      山口県山口市
    • Year and Date
      2016-07-14
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] HTTPヘッダフィールドの可変性に基づくマルウェア感染端末の特定2016

    • Author(s)
      水野翔,畑田充弘,森達哉,後藤滋樹
    • Organizer
      コンピュータセキュリティシンポジウム2016論文集
    • Place of Presentation
      秋田県秋田市
    • Year and Date
      2016-10-11
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] Analytics of Malware Traffic: Clustering and its Evaluation2016

    • Author(s)
      Mitsuhiro Hatada and Tatsuya Mori
    • Organizer
      The 42nd APAN Meeting, Network Security Workshop
    • Place of Presentation
      香港
    • Year and Date
      2016-08-01
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] Detecting malware-infected hosts using HTTP fingerprints2016

    • Author(s)
      Sho Mizuno, Mitsuhiro Hatada, Tatsuya Mori, and Shigeki Goto
    • Organizer
      The 42nd APAN Meeting, Network Security Workshop
    • Place of Presentation
      香港
    • Year and Date
      2016-08-01
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] モバイルアプリストアにおけるプロモーショナル攻撃の自動検知システム2016

    • Author(s)
      孫博,秋山満昭,森達哉
    • Organizer
      コンピュータセキュリティシンポジウム2016論文集
    • Place of Presentation
      秋田県秋田市
    • Year and Date
      2016-10-11
    • Data Source
      KAKENHI-PROJECT-16H02832
  • [Presentation] DNS クエリ・応答を用いた HTTPS 通信のホスト名推定2015

    • Author(s)
      森達哉,井上武,下田晃弘,佐藤一道,石橋圭介,後藤滋樹
    • Organizer
      電子情報通信学会 情報ネットワーク研究会
    • Place of Presentation
      沖縄県宜野湾市
    • Year and Date
      2015-03-03
    • Data Source
      KAKENHI-PROJECT-25880020
  • [Presentation] RouteDetector: 9軸センサ情報を用いた位置情報追跡攻撃2015

    • Author(s)
      渡邉卓弥,秋山満昭,森達哉
    • Organizer
      コンピュータセキュリティシンポジウム2015論文集
    • Place of Presentation
      長崎
    • Year and Date
      2015-10-23
    • Data Source
      KAKENHI-PROJECT-15K12038
  • [Presentation] 名前情報による隠されたトラヒックの顕現化2015

    • Author(s)
      森達哉,井上武,下田晃弘,佐藤一道,原田薫明,石橋圭介,芳賀夢久,笹生憲,後藤滋樹
    • Organizer
      電子情報通信学会 情報ネットワーク研究会
    • Place of Presentation
      広島
    • Year and Date
      2015-12-17
    • Invited
    • Data Source
      KAKENHI-PROJECT-25880020
  • [Presentation] SFMap: Inferring Services over Encrypted Web Flows using Dynamical Domain Name Graphs2015

    • Author(s)
      T. Mori, T. Inoue, A. Shimoda, K. Sato, K. Ishibashi, and S. Goto
    • Organizer
      IFIP Traffic Monitoring and Analysis workshop (TMA 2015)
    • Place of Presentation
      スペイン・バルセロナ
    • Year and Date
      2015-04-24
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-25880020
  • [Presentation] Inferring Services over Encrypted Web Flows2014

    • Author(s)
      森達哉
    • Organizer
      電子情報通信学会総合大会 B-7-71
    • Place of Presentation
      新潟大学
    • Data Source
      KAKENHI-PROJECT-25880020
  • 1.  Goto Shigeki (30287966)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 6 results
  • 2.  金岡 晃 (00455924)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 3.  吉岡 克成 (60415841)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 4.  山内 利宏 (80359942)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 5.  毛利 公一 (90313296)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 5 results
  • 6.  菅原 健 (60785236)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 7.  澤田 賢治 (80550946)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 8.  佐久間 淳 (90376963)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 9.  大木 哲史 (80537407)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 3 results
  • 10.  WATANABE Takuya
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 3 results
  • 11.  AKIYAMA Mitsuaki
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 3 results
  • 12.  YAGI Takeshi
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results

URL: 

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi