Research on usability-enhancing privacy and security technologies against latent cyber threats
We aim to develop an inclusive ICT society based on usability-enhancing privacy and security technologies that support users’ understanding and optimal decisions against latent cyber threats we unveil by using defensive and offensive approaches.
Awards
IEEE/IPSJ SAINT 2011 Best Paper Award (2011)
IPSJ Specially Selected Paper (2013)
IPSJ Activity Contribution Award (2015)
IEICE Communications Society Best Paper Award (2017)
ATIS 2017 Best Paper Award (2017)
IEEE ICOIN Best Paper Award (2018)
ISOC NDSS 2020 Distinguished Paper Award (2020)
Cybersecurity Encouragement Award of the Minister for Internal Affairs and Communications (2020)
DIMVA Best Paper Award (2020)
JPCERT/CC Appreciation Award (2020)
Academic Activities
International Workshop on Security (IWSEC), Program Committee (2016, 2017, 2018, 2019, 2020, 2021)
International Workshop on Security (IWSEC), Poster Chair (2021)
IEEE International Conference on Computers, Software & Applications (COMPSAC), Program Committee (2017, 2018, 2019, 2020, 2021)
IEEE Cyber Science and Technology Congress (CyberSciTech), Program Committee (2019)
European Symposium on Research in Computer Security (ESORICS) Program Committee (2019, 2020, 2021)
IPSJ CSEC, Steering Committee (2019--)
International Conference on Applied Cryptography and Network Security (ACNS) Program Committee (2021)
anti Malware engineering WorkShop (MWS), Planning committee (2010--)
ACM ASIA Conference on Computer and Communications Security (ASIACCS), Program Committee (2022)
Visiting Professor
Part-time Lecturer of Waseda University (2015-)
IAS Visiting Researcher of Yokohama National University (2015-)
Guest Associate Professor of Osaka University (2015-)
Part-time Lecturer of Okayama University (2018-)
Publications
Papers
Mitsuaki Akiyama, Makoto Iwamura, Yuhei Kawakoya, Kazufumi Aoki, and Mitsutaka Itoh. Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks, IEICE Transactions on Communications, Vol. 93-B, No. 5, pp. 1131-1139, May, 2010.
Mitsuaki Akiyama, Takeshi Yagi, Kazufumi Aoki, Takeo Hariu, and Youki Kadobayashi. Active Credential Leakage for Observing Web-based Attack Cycle, RAID 2013.
Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Hironori Washizaki, and Tasuya Mori. Understanding Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps, USENIX SOUPS 2015.
Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, and Shigeki Goto. Website Forensic Investigation to Identify Evidence and Impact of Compromise, SecureComm 2016.
Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori, and Youki Kadobayashi. Analyzing The Ecosystem of Malicious URL Redirection Through Longitudinal Observation from Honeypots, Elsevier Computers & Security, Volume 69, August 2017, Pages 155-173
Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, and Tatsuya Mori. User Blocking Considered Harmful? An Attacker-controllable Side Channel to Identify Social Accounts, IEEE EuroS&P 2018.
Mitsuaki Akiyama, Takeshi Yagi, and Youki Kadobayashi, HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle, Springer International Journal of Information Security, Vol. 17, Issue 2, pp. 135-151, April, 2018.
Elkana G Pariwono, Daiki Chiba, Mitsuaki Akiyama, and Tatsuya Mori, Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps, ASIACCS 2018.
Tatsuhiko Yasumatsu, Takuya Watanabe, Fumihiro Kanei, Eitaro Shioji, Mitsuaki Akiyama and Tatsuya Mori, Understanding the Responsiveness of Mobile App Developers to Software Library Updates, ACM CODASPY 2019.
Asuka Nakajima, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, and Maverick Woo, A Pilot Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States, ACM ASIACCS 2019.
Satoshi Furutani, Toshiki Shibahara, Mitsuaki Akiyama, Kunio Hato, and Masaki Aida, Graph Signal Processing for Directed Graphs based on the Hermitian Laplacian, ECML/PKDD 2019.
Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide, Yuta Sawabe, Shigeki Goto, and Mitsuaki Akiyama, DomainScouter: Understanding the Risks of Deceptive IDNs, RAID2019.
Ayako Akiyama Hasegawa, Takuya Watanabe, Eitaro Shioji, and Mitsuaki Akiyama, I Know What You Did Last Login: Inconsistent Messages Tell Existence of a Target's Account to Insiders, ACSAC 2019.
Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, and Tatsuya Mori, Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites, NDSS 2020.
Takashi Koide, Daiki Chiba, Mitsuaki Akiyama, Katsunari Yoshioka, and Tsutomu Matsumoto, It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites, DIMVA 2020.
Takashi Koide, Daiki Chiba, and Mitsuaki Akiyama, To Get Lost is to Learn the Way: Automatically Collecting Multi-step Social Engineering Attacks on the Web, ASIACCS 2020.