Mitsuaki AKIYAMA


Efficient Dynamic Malware Analysis for Collecting HTTP Requests using Deep Learning
Toshiki SHIBAHARA Takeshi YAGI Mitsuaki AKIYAMA Daiki CHIBA Kunio HATO 
Publication:   
Publication Date: 2019/04/01
Vol. E102-D  No. 4  pp. 725-736
Type of Manuscript:  Special Section PAPER (Special Section on Data Engineering and Information Management)
Category: 
Keyword: 
infected host detectionnetwork behaviorsequential datarecursive neural network
 Summary | Full Text:PDF

Evasive Malicious Website Detection by Leveraging Redirection Subgraph Similarities
Toshiki SHIBAHARA Yuta TAKATA Mitsuaki AKIYAMA Takeshi YAGI Kunio HATO Masayuki MURATA 
Publication:   
Publication Date: 2019/03/01
Vol. E102-D  No. 3  pp. 430-443
Type of Manuscript:  Special Section PAPER (Special Section on Foundations of Computer Science — Algorithm, Theory of Computation, and their Applications —)
Category: 
Keyword: 
drive-by download attackbrowser fingerprintinggraph miningclustering
 Summary | Full Text:PDF

Event De-Noising Convolutional Neural Network for Detecting Malicious URL Sequences from Proxy Logs
Toshiki SHIBAHARA Kohei YAMANISHI Yuta TAKATA Daiki CHIBA Taiga HOKAGUCHI Mitsuaki AKIYAMA Takeshi YAGI Yuichi OHSITA Masayuki MURATA 
Publication:   
Publication Date: 2018/12/01
Vol. E101-A  No. 12  pp. 2149-2161
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
drive-by download attackcommunication log analysisdeep neural networkdata augmentation
 Summary | Full Text:PDF

Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities
Hiroki NAKANO Fumihiro KANEI Yuta TAKATA Mitsuaki AKIYAMA Katsunari YOSHIOKA 
Publication:   
Publication Date: 2018/11/01
Vol. E101-D  No. 11  pp. 2576-2583
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Mobile Application and Web Security
Keyword: 
Mobile AppVulnerabilitiesQuestion and Answer WebsiteCode Snippets
 Summary | Full Text:PDF

Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps
Takuya WATANABE Mitsuaki AKIYAMA Tetsuya SAKAI Hironori WASHIZAKI Tatsuya MORI 
Publication:   
Publication Date: 2018/11/01
Vol. E101-D  No. 11  pp. 2584-2599
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Mobile Application and Web Security
Keyword: 
mobile securityandroidtextual descriptionprogram analysisprivacy leakage
 Summary | Full Text:PDF

Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences
Yuta TAKATA Mitsuaki AKIYAMA Takeshi YAGI Takeo HARIU Kazuhiko OHKUBO Shigeki GOTO 
Publication:   
Publication Date: 2018/11/01
Vol. E101-D  No. 11  pp. 2600-2611
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Mobile Application and Web Security
Keyword: 
malicious websiteredirectionjavascriptevasive code
 Summary | Full Text:PDF

Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study
Yumehisa HAGA Yuta TAKATA Mitsuaki AKIYAMA Tatsuya MORI 
Publication:   
Publication Date: 2017/08/01
Vol. E100-D  No. 8  pp. 1663-1670
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Privacy
Keyword: 
web trackingweb browser fingerprint
 Summary | Full Text:PDF

Tracking the Human Mobility Using Mobile Device Sensors
Takuya WATANABE Mitsuaki AKIYAMA Tatsuya MORI 
Publication:   
Publication Date: 2017/08/01
Vol. E100-D  No. 8  pp. 1680-1690
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Privacy
Keyword: 
mobile securityside-channel attacklocation identification
 Summary | Full Text:PDF

Fine-Grained Analysis of Compromised Websites with Redirection Graphs and JavaScript Traces
Yuta TAKATA Mitsuaki AKIYAMA Takeshi YAGI Takeshi YADA Shigeki GOTO 
Publication:   
Publication Date: 2017/08/01
Vol. E100-D  No. 8  pp. 1714-1728
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Internet Security
Keyword: 
compromised websitedrive-by downloadredirection graphprogram trace
 Summary | Full Text:PDF

APPraiser: A Large Scale Analysis of Android Clone Apps
Yuta ISHII Takuya WATANABE Mitsuaki AKIYAMA Tatsuya MORI 
Publication:   
Publication Date: 2017/08/01
Vol. E100-D  No. 8  pp. 1703-1713
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Program Analysis
Keyword: 
mobile securityAndroidrepackaginglarge-scale data
 Summary | Full Text:PDF

BotProfiler: Detecting Malware-Infected Hosts by Profiling Variability of Malicious Infrastructure
Daiki CHIBA Takeshi YAGI Mitsuaki AKIYAMA Kazufumi AOKI Takeo HARIU Shigeki GOTO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2016/05/01
Vol. E99-B  No. 5  pp. 1012-1023
Type of Manuscript:  Special Section PAPER (Special Section on Internet Architectures and Management Methods that Enable Flexible and Secure Deployment of Network Services)
Category: 
Keyword: 
malwarebotnetdynamic analysistemplate
 Summary | Full Text:PDF

MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks
Yuta TAKATA Mitsuaki AKIYAMA Takeshi YAGI Takeo HARIU Shigeki GOTO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/04/01
Vol. E99-D  No. 4  pp. 860-872
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Web security
Keyword: 
drive-by downloadweb-based malwarecode analysisredirection analysis
 Summary | Full Text:PDF

Automating URL Blacklist Generation with Similarity Search Approach
Bo SUN Mitsuaki AKIYAMA Takeshi YAGI Mitsuhiro HATADA Tatsuya MORI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/04/01
Vol. E99-D  No. 4  pp. 873-882
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Web security
Keyword: 
drive-by-downloadURL blacklistsearch spacemachine learningweb client honeypot
 Summary | Full Text:PDF

Client Honeypot Multiplication with High Performance and Precise Detection
Mitsuaki AKIYAMA Takeshi YAGI Youki KADOBAYASHI Takeo HARIU Suguru YAMAGUCHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/04/01
Vol. E98-D  No. 4  pp. 775-787
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security―Against Cyberattacks―)
Category: Attack Monitoring & Detection
Keyword: 
client honeypotdrive-by downloadweb-based malwareprocess sandboxintrusion detection
 Summary | Full Text:PDF

Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks
Mitsuaki AKIYAMA Makoto IWAMURA Yuhei KAWAKOYA Kazufumi AOKI Mitsutaka ITOH 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2010/05/01
Vol. E93-B  No. 5  pp. 1131-1139
Type of Manuscript:  Special Section PAPER (Special Section on Technology and Architecture for Sustainable Growth of the Internet)
Category: 
Keyword: 
malwareclient honeypotintrusion detection
 Summary | Full Text:PDF