/Senior Distinguished

Senior Distinguished Researcher Mitsuaki Akiyama
  • Senior Distinguished Researcher

    Mitsuaki Akiyama

  • NTT Social Informatics Laboratories

Research on usability-enhancing privacy and security technologies against latent cyber threats

We aim to develop an inclusive ICT society based on usability-enhancing privacy and security technologies that support users’ understanding and optimal decisions against latent cyber threats we unveil by using defensive and offensive approaches.


  • IEEE/IPSJ SAINT 2011 Best Paper Award (2011)
  • IPSJ Specially Selected Paper (2013)
  • IPSJ Activity Contribution Award (2015)
  • IEICE Communications Society Best Paper Award (2017)
  • ATIS 2017 Best Paper Award (2017)
  • IEEE ICOIN Best Paper Award (2018)
  • ISOC NDSS 2020 Distinguished Paper Award (2020)
  • Cybersecurity Encouragement Award of the Minister for Internal Affairs and Communications (2020)
  • DIMVA Best Paper Award (2020)
  • JPCERT/CC Appreciation Award (2020)

Academic Activities

  • International Workshop on Security (IWSEC), Program Committee (2016, 2017, 2018, 2019, 2020, 2021)
  • International Workshop on Security (IWSEC), Poster Chair (2021)
  • IEEE International Conference on Computers, Software & Applications (COMPSAC), Program Committee (2017, 2018, 2019, 2020, 2021)
  • IEEE Cyber Science and Technology Congress (CyberSciTech), Program Committee (2019)
  • European Symposium on Research in Computer Security (ESORICS) Program Committee (2019, 2020, 2021)
  • IPSJ CSEC, Steering Committee (2019--)
  • International Conference on Applied Cryptography and Network Security (ACNS) Program Committee (2021)
  • anti Malware engineering WorkShop (MWS), Planning committee (2010--)
  • JSPS 192nd Committee on Cyber Security, Cyber Security Ethics Worging Group, Secretariat (2018--2020)
  • SecHack365 Advisor (2019), Trainer (2020, 2021)
  • ACM ASIA Conference on Computer and Communications Security (ASIACCS), Program Committee (2022)

Visiting Professor

  • Part-time Lecturer of Waseda University (2015-)
  • IAS Visiting Researcher of Yokohama National University (2015-)
  • Guest Associate Professor of Osaka University (2015-)
  • Part-time Lecturer of Okayama University (2018-)



  • Mitsuaki Akiyama, Makoto Iwamura, Yuhei Kawakoya, Kazufumi Aoki, and Mitsutaka Itoh. Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks, IEICE Transactions on Communications, Vol. 93-B, No. 5, pp. 1131-1139, May, 2010.
  • Mitsuaki Akiyama, Takeshi Yagi, Kazufumi Aoki, Takeo Hariu, and Youki Kadobayashi. Active Credential Leakage for Observing Web-based Attack Cycle, RAID 2013.
  • Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Hironori Washizaki, and Tasuya Mori. Understanding Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps, USENIX SOUPS 2015.
  • Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, and Shigeki Goto. Website Forensic Investigation to Identify Evidence and Impact of Compromise, SecureComm 2016.
  • Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Takeshi Yada, Tatsuya Mori, and Shigeki Goto. DomainProfiler: Discovering Domain Names Abused in Future, IEEE/IFIP DSN 2016.
  • Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori, and Youki Kadobayashi. Analyzing The Ecosystem of Malicious URL Redirection Through Longitudinal Observation from Honeypots, Elsevier Computers & Security, Volume 69, August 2017, Pages 155-173
  • Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, and Tatsuya Mori. User Blocking Considered Harmful? An Attacker-controllable Side Channel to Identify Social Accounts, IEEE EuroS&P 2018.
  • Mitsuaki Akiyama, Takeshi Yagi, and Youki Kadobayashi, HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle, Springer International Journal of Information Security, Vol. 17, Issue 2, pp. 135-151, April, 2018.
  • Elkana G Pariwono, Daiki Chiba, Mitsuaki Akiyama, and Tatsuya Mori, Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps, ASIACCS 2018.
  • Tatsuhiko Yasumatsu, Takuya Watanabe, Fumihiro Kanei, Eitaro Shioji, Mitsuaki Akiyama and Tatsuya Mori, Understanding the Responsiveness of Mobile App Developers to Software Library Updates, ACM CODASPY 2019.
  • Asuka Nakajima, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, and Maverick Woo, A Pilot Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States, ACM ASIACCS 2019.
  • Satoshi Furutani, Toshiki Shibahara, Mitsuaki Akiyama, Kunio Hato, and Masaki Aida, Graph Signal Processing for Directed Graphs based on the Hermitian Laplacian, ECML/PKDD 2019.
  • Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide, Yuta Sawabe, Shigeki Goto, and Mitsuaki Akiyama, DomainScouter: Understanding the Risks of Deceptive IDNs, RAID2019.
  • Ayako Akiyama Hasegawa, Takuya Watanabe, Eitaro Shioji, and Mitsuaki Akiyama, I Know What You Did Last Login: Inconsistent Messages Tell Existence of a Target's Account to Insiders, ACSAC 2019.
  • Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, and Tatsuya Mori, Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites, NDSS 2020.
  • Takashi Koide, Daiki Chiba, Mitsuaki Akiyama, Katsunari Yoshioka, and Tsutomu Matsumoto, It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites, DIMVA 2020.
  • Takashi Koide, Daiki Chiba, and Mitsuaki Akiyama, To Get Lost is to Learn the Way: Automatically Collecting Multi-step Social Engineering Attacks on the Web, ASIACCS 2020.



  • Web/Mobile/IoT security, Usable security and privacy, Offensive security, Explainable security

Related Contents