Mitsuaki AKIYAMA


Event De-Noising Convolutional Neural Network for Detecting Malicious URL Sequences from Proxy Logs
Toshiki SHIBAHARA Kohei YAMANISHI Yuta TAKATA Daiki CHIBA Taiga HOKAGUCHI Mitsuaki AKIYAMA Takeshi YAGI Yuichi OHSITA Masayuki MURATA 
Publication:   
Publication Date: 2018/12/01
Vol. E101-A  No. 12  pp. 2149-2161
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
drive-by download attackcommunication log analysisdeep neural networkdata augmentation
 Summary | Full Text:PDF(3.9MB)

Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps
Takuya WATANABE Mitsuaki AKIYAMA Tetsuya SAKAI Hironori WASHIZAKI Tatsuya MORI 
Publication:   
Publication Date: 2018/11/01
Vol. E101-D  No. 11  pp. 2584-2599
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Mobile Application and Web Security
Keyword: 
mobile securityandroidtextual descriptionprogram analysisprivacy leakage
 Summary | Full Text:PDF(1.5MB)

Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences
Yuta TAKATA Mitsuaki AKIYAMA Takeshi YAGI Takeo HARIU Kazuhiko OHKUBO Shigeki GOTO 
Publication:   
Publication Date: 2018/11/01
Vol. E101-D  No. 11  pp. 2600-2611
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Mobile Application and Web Security
Keyword: 
malicious websiteredirectionjavascriptevasive code
 Summary | Full Text:PDF(1.7MB)

Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities
Hiroki NAKANO Fumihiro KANEI Yuta TAKATA Mitsuaki AKIYAMA Katsunari YOSHIOKA 
Publication:   
Publication Date: 2018/11/01
Vol. E101-D  No. 11  pp. 2576-2583
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Mobile Application and Web Security
Keyword: 
Mobile AppVulnerabilitiesQuestion and Answer WebsiteCode Snippets
 Summary | Full Text:PDF(1MB)

Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study
Yumehisa HAGA Yuta TAKATA Mitsuaki AKIYAMA Tatsuya MORI 
Publication:   
Publication Date: 2017/08/01
Vol. E100-D  No. 8  pp. 1663-1670
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Privacy
Keyword: 
web trackingweb browser fingerprint
 Summary | Full Text:PDF(633.9KB)

Tracking the Human Mobility Using Mobile Device Sensors
Takuya WATANABE Mitsuaki AKIYAMA Tatsuya MORI 
Publication:   
Publication Date: 2017/08/01
Vol. E100-D  No. 8  pp. 1680-1690
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Privacy
Keyword: 
mobile securityside-channel attacklocation identification
 Summary | Full Text:PDF(1.4MB)

Fine-Grained Analysis of Compromised Websites with Redirection Graphs and JavaScript Traces
Yuta TAKATA Mitsuaki AKIYAMA Takeshi YAGI Takeshi YADA Shigeki GOTO 
Publication:   
Publication Date: 2017/08/01
Vol. E100-D  No. 8  pp. 1714-1728
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Internet Security
Keyword: 
compromised websitedrive-by downloadredirection graphprogram trace
 Summary | Full Text:PDF(2.6MB)

APPraiser: A Large Scale Analysis of Android Clone Apps
Yuta ISHII Takuya WATANABE Mitsuaki AKIYAMA Tatsuya MORI 
Publication:   
Publication Date: 2017/08/01
Vol. E100-D  No. 8  pp. 1703-1713
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Program Analysis
Keyword: 
mobile securityAndroidrepackaginglarge-scale data
 Summary | Full Text:PDF(1.3MB)

BotProfiler: Detecting Malware-Infected Hosts by Profiling Variability of Malicious Infrastructure
Daiki CHIBA Takeshi YAGI Mitsuaki AKIYAMA Kazufumi AOKI Takeo HARIU Shigeki GOTO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2016/05/01
Vol. E99-B  No. 5  pp. 1012-1023
Type of Manuscript:  Special Section PAPER (Special Section on Internet Architectures and Management Methods that Enable Flexible and Secure Deployment of Network Services)
Category: 
Keyword: 
malwarebotnetdynamic analysistemplate
 Summary | Full Text:PDF(2.1MB)

MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks
Yuta TAKATA Mitsuaki AKIYAMA Takeshi YAGI Takeo HARIU Shigeki GOTO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/04/01
Vol. E99-D  No. 4  pp. 860-872
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Web security
Keyword: 
drive-by downloadweb-based malwarecode analysisredirection analysis
 Summary | Full Text:PDF(912KB)

Automating URL Blacklist Generation with Similarity Search Approach
Bo SUN Mitsuaki AKIYAMA Takeshi YAGI Mitsuhiro HATADA Tatsuya MORI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/04/01
Vol. E99-D  No. 4  pp. 873-882
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Web security
Keyword: 
drive-by-downloadURL blacklistsearch spacemachine learningweb client honeypot
 Summary | Full Text:PDF(2MB)

Client Honeypot Multiplication with High Performance and Precise Detection
Mitsuaki AKIYAMA Takeshi YAGI Youki KADOBAYASHI Takeo HARIU Suguru YAMAGUCHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/04/01
Vol. E98-D  No. 4  pp. 775-787
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security―Against Cyberattacks―)
Category: Attack Monitoring & Detection
Keyword: 
client honeypotdrive-by downloadweb-based malwareprocess sandboxintrusion detection
 Summary | Full Text:PDF(892.7KB)

Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks
Mitsuaki AKIYAMA Makoto IWAMURA Yuhei KAWAKOYA Kazufumi AOKI Mitsutaka ITOH 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2010/05/01
Vol. E93-B  No. 5  pp. 1131-1139
Type of Manuscript:  Special Section PAPER (Special Section on Technology and Architecture for Sustainable Growth of the Internet)
Category: 
Keyword: 
malwareclient honeypotintrusion detection
 Summary | Full Text:PDF(2.3MB)