Follow
Eitaro Shioji
Eitaro Shioji
Verified email at lab.ntt.co.jp
Title
Cited by
Cited by
Year
Understanding the origins of mobile app vulnerabilities: A large-scale measurement study of free and paid apps
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ...
2017 IEEE/ACM 14th International Conference on Mining Software Repositories …, 2017
492017
Api chaser: Anti-analysis resistant malware analyzer
Y Kawakoya, M Iwamura, E Shioji, T Hariu
International Workshop on Recent Advances in Intrusion Detection, 123-143, 2013
372013
Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks
E Shioji, Y Kawakoya, M Iwamura, T Hariu
Proceedings of the 28th annual computer security applications conference …, 2012
332012
Vulnerability of MRD-code-based universal secure network coding against stronger eavesdroppers
E Shioji, R Matsumoto, T Uyematsu
IEICE transactions on fundamentals of electronics, communications and …, 2010
152010
Stealth loader: Trace-free program loading for API obfuscation
Y Kawakoya, E Shioji, Y Otsuki, M Iwamura, T Yada
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
122017
Understanding the security management of global third-party android marketplaces
Y Ishii, T Watanabe, F Kanei, Y Takata, E Shioji, M Akiyama, T Yagi, ...
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market …, 2017
122017
Api chaser: Taint-assisted sandbox for evasive malware analysis
Y Kawakoya, E Shioji, M Iwamura, J Miyoshi
Journal of Information Processing 27, 297-314, 2019
102019
User blocking considered harmful? An attacker-controllable side channel to identify social accounts
T Watanabe, E Shioji, M Akiyama, K Sasaoka, T Yagi, T Mori
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 323-337, 2018
102018
A pilot study on consumer IoT device vulnerability disclosure and patch release in Japan and the United States
A Nakajima, T Watanabe, E Shioji, M Akiyama, M Woo
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
92019
Understanding the responsiveness of mobile app developers to software library updates
T Yasumatsu, T Watanabe, F Kanei, E Shioji, M Akiyama, T Mori
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
82019
Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites.
T Watanabe, E Shioji, M Akiyama, T Mori
NDSS, 2020
72020
Study on the vulnerabilities of free and paid mobile apps associated with software library
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishii, ...
IEICE TRANSACTIONS on Information and Systems 103 (2), 276-291, 2020
42020
I know what you did last login: inconsistent messages tell existence of a target's account to insiders
AA Hasegawa, T Watanabe, E Shioji, M Akiyama
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
32019
A study on the vulnerabilities of mobile apps associated with software modules
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ...
arXiv preprint arXiv:1702.03112, 2017
32017
GUI 構造に基づいた Android アプリケーション動的解析支援の検討
塩治榮太朗, 秋山満昭, 岩村誠, 針生剛男
コンピュータセキュリティシンポジウム 2012 論文集 2012 (3), 36-43, 2012
32012
Stealth loader: Trace-free program loading for analysis evasion
Y Kawakoya, E Shioji, Y Otsuki, M Iwamura, J Miyoshi
Journal of Information Processing 26, 673-686, 2018
22018
Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel
T Watanabe, E Shioji, M Akiyama, K Sasaoka, T Yagi, T Mori
IEICE Transactions on Information and Systems 103 (2), 239-255, 2020
12020
API コール間のデータ依存関係を利用したマルウェア通信内容の特定
川古谷裕平, 塩治榮太朗, 岩村誠, 針生剛男
コンピュータセキュリティシンポジウム 2013 論文集 2013 (4), 745-752, 2013
12013
メモリアクセス値のエントロピーに基づく自動アンパッキング
塩治榮太朗, 川古谷裕平, 岩村誠, 伊藤光恭
電子情報通信学会技術研究報告; 信学技報 110 (475), 41-46, 2011
12011
Specifying device, specifying method, and specifying program
M Akiyama, E Shioji
US Patent App. 17/605,658, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20