Toshiki SHIBAHARA


Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library
Takuya WATANABE Mitsuaki AKIYAMA Fumihiro KANEI Eitaro SHIOJI Yuta TAKATA Bo SUN Yuta ISHII Toshiki SHIBAHARA Takeshi YAGI Tatsuya MORI 
Publication:   
Publication Date: 2020/02/01
Vol. E103-D  No. 2  pp. 276-291
Type of Manuscript:  Special Section PAPER (Special Section on Security, Privacy, Anonymity and Trust in Cyberspace Computing and Communications)
Category: Network Security
Keyword: 
mobile appsoftware libraryvulnerability
 Summary | Full Text:PDF

Efficient Dynamic Malware Analysis for Collecting HTTP Requests using Deep Learning
Toshiki SHIBAHARA Takeshi YAGI Mitsuaki AKIYAMA Daiki CHIBA Kunio HATO 
Publication:   
Publication Date: 2019/04/01
Vol. E102-D  No. 4  pp. 725-736
Type of Manuscript:  Special Section PAPER (Special Section on Data Engineering and Information Management)
Category: 
Keyword: 
infected host detectionnetwork behaviorsequential datarecursive neural network
 Summary | Full Text:PDF

Evasive Malicious Website Detection by Leveraging Redirection Subgraph Similarities
Toshiki SHIBAHARA Yuta TAKATA Mitsuaki AKIYAMA Takeshi YAGI Kunio HATO Masayuki MURATA 
Publication:   
Publication Date: 2019/03/01
Vol. E102-D  No. 3  pp. 430-443
Type of Manuscript:  Special Section PAPER (Special Section on Foundations of Computer Science — Algorithm, Theory of Computation, and their Applications —)
Category: 
Keyword: 
drive-by download attackbrowser fingerprintinggraph miningclustering
 Summary | Full Text:PDF

Event De-Noising Convolutional Neural Network for Detecting Malicious URL Sequences from Proxy Logs
Toshiki SHIBAHARA Kohei YAMANISHI Yuta TAKATA Daiki CHIBA Taiga HOKAGUCHI Mitsuaki AKIYAMA Takeshi YAGI Yuichi OHSITA Masayuki MURATA 
Publication:   
Publication Date: 2018/12/01
Vol. E101-A  No. 12  pp. 2149-2161
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
drive-by download attackcommunication log analysisdeep neural networkdata augmentation
 Summary | Full Text:PDF