Fellows
/Senior Distinguished
Researchers
/Distinguished
Researchers

Senior Distinguished Researcher Mitsuaki Akiyama
  • Senior Distinguished Researcher

    Mitsuaki Akiyama

  • NTT Social Informatics Laboratories

Research on usability-enhancing privacy and security technologies against latent cyber threats

We aim to develop an inclusive ICT society based on usability-enhancing privacy and security technologies that support users’ understanding and optimal decisions against latent cyber threats we unveil by using defensive and offensive approaches.

In this page

Awards

  • IEEE/IPSJ SAINT 2011 Best Paper Award (2011)
  • IPSJ Specially Selected Paper (2013)
  • IPSJ Activity Contribution Award (2015)
  • IEICE Communications Society Best Paper Award (2017)
  • ATIS 2017 Best Paper Award (2017)
  • IEEE ICOIN Best Paper Award (2018)
  • ISOC NDSS 2020 Distinguished Paper Award (2020)
  • Cybersecurity Encouragement Award of the Minister for Internal Affairs and Communications (2020)
  • DIMVA Best Paper Award (2020)
  • JPCERT/CC Appreciation Award (2020)
  • EuroUSEC Best Paper Award (2021)
  • IPSJ/IEEE-Computer Society Young Computer Researcher Award (2022)

Academic Activities

  • International Workshop on Security (IWSEC), Program Committee (2016, 2017, 2018, 2019, 2020, 2021)
  • International Workshop on Security (IWSEC), Poster Chair (2021)
  • IEEE International Conference on Computers, Software & Applications (COMPSAC), Program Committee (2017, 2018, 2019, 2020, 2021)
  • IEEE Cyber Science and Technology Congress (CyberSciTech), Program Committee (2019)
  • European Symposium on Research in Computer Security (ESORICS) Program Committee (2019, 2020, 2021)
  • IPSJ CSEC, Steering Committee (2019--)
  • International Conference on Applied Cryptography and Network Security (ACNS) Program Committee (2021)
  • anti Malware engineering WorkShop (MWS), Planning committee (2010--)
  • JSPS 192nd Committee on Cyber Security, Cyber Security Ethics Worging Group, Secretariat (2018--2020)
  • SecHack365 Advisor (2019), Trainer (2020, 2021)
  • ACM ASIA Conference on Computer and Communications Security (ASIACCS), Program Committee (2022, 2023, 2024)
  • ISOC Network and Distributed System Security Symposium (NDSS), Program Committee (2024, 2025)

Visiting Professor

  • Part-time Lecturer of Waseda University (2015-2022)
  • IAS Visiting Researcher of Yokohama National University (2015-)
  • Guest Associate Professor / Guest Professor of Osaka University (2015-)
  • Part-time Lecturer of Okayama University (2018-)

Publications

Papers

  • Mitsuaki Akiyama, Makoto Iwamura, Yuhei Kawakoya, Kazufumi Aoki, and Mitsutaka Itoh. Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks, IEICE Transactions on Communications, Vol. 93-B, No. 5, pp. 1131-1139, May, 2010.
  • Mitsuaki Akiyama, Takeshi Yagi, Kazufumi Aoki, Takeo Hariu, and Youki Kadobayashi. Active Credential Leakage for Observing Web-based Attack Cycle, RAID 2013.
  • Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Hironori Washizaki, and Tasuya Mori. Understanding Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps, USENIX SOUPS 2015.
  • Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, and Shigeki Goto. Website Forensic Investigation to Identify Evidence and Impact of Compromise, SecureComm 2016.
  • Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Takeshi Yada, Tatsuya Mori, and Shigeki Goto. DomainProfiler: Discovering Domain Names Abused in Future, IEEE/IFIP DSN 2016.
  • Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori, and Youki Kadobayashi. Analyzing The Ecosystem of Malicious URL Redirection Through Longitudinal Observation from Honeypots, Elsevier Computers & Security, Volume 69, August 2017, Pages 155-173
  • Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, and Tatsuya Mori. User Blocking Considered Harmful? An Attacker-controllable Side Channel to Identify Social Accounts, IEEE EuroS&P 2018.
  • Mitsuaki Akiyama, Takeshi Yagi, and Youki Kadobayashi, HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle, Springer International Journal of Information Security, Vol. 17, Issue 2, pp. 135-151, April, 2018.
  • Elkana G Pariwono, Daiki Chiba, Mitsuaki Akiyama, and Tatsuya Mori, Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps, ASIACCS 2018.
  • Tatsuhiko Yasumatsu, Takuya Watanabe, Fumihiro Kanei, Eitaro Shioji, Mitsuaki Akiyama and Tatsuya Mori, Understanding the Responsiveness of Mobile App Developers to Software Library Updates, ACM CODASPY 2019.
  • Asuka Nakajima, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, and Maverick Woo, A Pilot Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States, ACM ASIACCS 2019.
  • Satoshi Furutani, Toshiki Shibahara, Mitsuaki Akiyama, Kunio Hato, and Masaki Aida, Graph Signal Processing for Directed Graphs based on the Hermitian Laplacian, ECML/PKDD 2019.
  • Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide, Yuta Sawabe, Shigeki Goto, and Mitsuaki Akiyama, DomainScouter: Understanding the Risks of Deceptive IDNs, RAID2019.
  • Ayako Akiyama Hasegawa, Takuya Watanabe, Eitaro Shioji, and Mitsuaki Akiyama, I Know What You Did Last Login: Inconsistent Messages Tell Existence of a Target's Account to Insiders, ACSAC 2019.
  • Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, and Tatsuya Mori, Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites, NDSS 2020.
  • Takashi Koide, Daiki Chiba, Mitsuaki Akiyama, Katsunari Yoshioka, and Tsutomu Matsumoto, It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites, DIMVA 2020.
  • Takashi Koide, Daiki Chiba, and Mitsuaki Akiyama, To Get Lost is to Learn the Way: Automatically Collecting Multi-step Social Engineering Attacks on the Web, ASIACCS 2020.
  • Ayako Akiyama Hasegawa, Naomi Yamashita, Mitsuaki Akiyama, and Tatsuya Mori, Why They Ignore English Emails: The Challenges of Non-Native Speakers in Identifying Phishing Emails, SOUPS 2021.
  • Tenga Matsuura, Ayako Akiyama Hasegawa, Mitsuaki Akiyama, and Tatsuya Mori, Careless Participants Are Essential for Our Phishing Study: Understanding the Impact of Screening Methods, EuroUSEC 2021.
  • Fumihiro Kanei, Ayako Akiyama Hasegawa, Eitaro Shioji, and Mitsuaki Akiyama, A Cross-role and Bi-national Analysis on Security Efforts and Constraints of Software Development Projects, ACSAC 2021.
  • Ayako Akiyama Hasegawa, Naomi Yamashita, Tatsuya Mori, Daisuke Inoue, and Mitsuaki Akiyama, Understanding Non-Experts' Security- and Privacy-Related Questions on a Q&A Site, SOUPS 2022.
  • Atsuko Natatsuka, Ryo Iijima, Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, and Tatsuya Mori, Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework, RAID 2022.
  • Kazuki Nomoto, Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata, and Tatsuya Mori, On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework, PETS 2022.
  • Kazuki Nomoto, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, and Tatsuya Mori, Browser Permission Mechanisms Demystified, NDSS 2023.
  • Fumihiro Kanei, Ayako Akiyama Hasegawa, Eitaro Shioji, and Mitsuaki Akiyama, Analyzing the Use of Public and In-house Secure Development Guidelines in U.S. and Japanese Industries, CHI 2023.
  • Satoshi Furutani, Toshiki Shibahara, Mitsuaki Akiyama, and Masaki Aida, Interpreting Graph-Based Sybil Detection Methods as Low-Pass Filtering. IEEE Transactions on Information and Forensics Security, Volume 18, pp. 1225-1236 (2023).
  • Mitsuaki Akiyama, Shugo Shiraishi, Akifumi Fukumoto, Ryota Yoshimoto, Eitaro Shioji, and Toshihiro Yamauchi, Seeing is not always believing: Insights on IoT manufacturing from firmware composition analysis and vendor survey. Elsevier Computers and Security, Volume 133, 103389 (2023).
  • Ayako A. Hasegawa, Daisuke Inoue, and Mitsuaki Akiyama, How WEIRD is Usable Privacy and Security Research?, USENIX Security 2024.

Links

Keywords

Related Contents