Understanding the origins of mobile app vulnerabilities: A large-scale measurement study of free and paid apps T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ... 2017 IEEE/ACM 14th International Conference on Mining Software Repositories …, 2017 | 49 | 2017 |
Api chaser: Anti-analysis resistant malware analyzer Y Kawakoya, M Iwamura, E Shioji, T Hariu International Workshop on Recent Advances in Intrusion Detection, 123-143, 2013 | 37 | 2013 |
Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks E Shioji, Y Kawakoya, M Iwamura, T Hariu Proceedings of the 28th annual computer security applications conference …, 2012 | 33 | 2012 |
Vulnerability of MRD-code-based universal secure network coding against stronger eavesdroppers E Shioji, R Matsumoto, T Uyematsu IEICE transactions on fundamentals of electronics, communications and …, 2010 | 15 | 2010 |
Stealth loader: Trace-free program loading for API obfuscation Y Kawakoya, E Shioji, Y Otsuki, M Iwamura, T Yada International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017 | 12 | 2017 |
Understanding the security management of global third-party android marketplaces Y Ishii, T Watanabe, F Kanei, Y Takata, E Shioji, M Akiyama, T Yagi, ... Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market …, 2017 | 12 | 2017 |
Api chaser: Taint-assisted sandbox for evasive malware analysis Y Kawakoya, E Shioji, M Iwamura, J Miyoshi Journal of Information Processing 27, 297-314, 2019 | 10 | 2019 |
User blocking considered harmful? An attacker-controllable side channel to identify social accounts T Watanabe, E Shioji, M Akiyama, K Sasaoka, T Yagi, T Mori 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 323-337, 2018 | 10 | 2018 |
A pilot study on consumer IoT device vulnerability disclosure and patch release in Japan and the United States A Nakajima, T Watanabe, E Shioji, M Akiyama, M Woo Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 9 | 2019 |
Understanding the responsiveness of mobile app developers to software library updates T Yasumatsu, T Watanabe, F Kanei, E Shioji, M Akiyama, T Mori Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019 | 8 | 2019 |
Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites. T Watanabe, E Shioji, M Akiyama, T Mori NDSS, 2020 | 7 | 2020 |
Study on the vulnerabilities of free and paid mobile apps associated with software library T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishii, ... IEICE TRANSACTIONS on Information and Systems 103 (2), 276-291, 2020 | 4 | 2020 |
I know what you did last login: inconsistent messages tell existence of a target's account to insiders AA Hasegawa, T Watanabe, E Shioji, M Akiyama Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 3 | 2019 |
A study on the vulnerabilities of mobile apps associated with software modules T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ... arXiv preprint arXiv:1702.03112, 2017 | 3 | 2017 |
GUI 構造に基づいた Android アプリケーション動的解析支援の検討 塩治榮太朗, 秋山満昭, 岩村誠, 針生剛男 コンピュータセキュリティシンポジウム 2012 論文集 2012 (3), 36-43, 2012 | 3 | 2012 |
Stealth loader: Trace-free program loading for analysis evasion Y Kawakoya, E Shioji, Y Otsuki, M Iwamura, J Miyoshi Journal of Information Processing 26, 673-686, 2018 | 2 | 2018 |
Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel T Watanabe, E Shioji, M Akiyama, K Sasaoka, T Yagi, T Mori IEICE Transactions on Information and Systems 103 (2), 239-255, 2020 | 1 | 2020 |
API コール間のデータ依存関係を利用したマルウェア通信内容の特定 川古谷裕平, 塩治榮太朗, 岩村誠, 針生剛男 コンピュータセキュリティシンポジウム 2013 論文集 2013 (4), 745-752, 2013 | 1 | 2013 |
メモリアクセス値のエントロピーに基づく自動アンパッキング 塩治榮太朗, 川古谷裕平, 岩村誠, 伊藤光恭 電子情報通信学会技術研究報告; 信学技報 110 (475), 41-46, 2011 | 1 | 2011 |
Specifying device, specifying method, and specifying program M Akiyama, E Shioji US Patent App. 17/605,658, 2022 | | 2022 |