Mitsuaki Akiyama, Makoto Iwamura, Yuhei Kawakoya, Kazufumi Aoki, and Mitsutaka Itoh. Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks, IEICE Transactions on Communications, Vol. 93-B, No. 5, pp. 1131-1139, May, 2010.
Mitsuaki Akiyama, Takeshi Yagi, Kazufumi Aoki, Takeo Hariu, and Youki Kadobayashi. Active Credential Leakage for Observing Web-based Attack Cycle, RAID 2013.
Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Hironori Washizaki, and Tasuya Mori. Understanding Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps, USENIX SOUPS 2015.
Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, and Shigeki Goto. Website Forensic Investigation to Identify Evidence and Impact of Compromise, SecureComm 2016.
Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Tatsuya Mori, and Youki Kadobayashi. Analyzing The Ecosystem of Malicious URL Redirection Through Longitudinal Observation from Honeypots, Elsevier Computers & Security, Volume 69, August 2017, Pages 155-173
Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, and Tatsuya Mori. User Blocking Considered Harmful? An Attacker-controllable Side Channel to Identify Social Accounts, IEEE EuroS&P 2018.
Mitsuaki Akiyama, Takeshi Yagi, and Youki Kadobayashi, HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle, Springer International Journal of Information Security, Vol. 17, Issue 2, pp. 135-151, April, 2018.
Elkana G Pariwono, Daiki Chiba, Mitsuaki Akiyama, and Tatsuya Mori, Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps, ASIACCS 2018.
Tatsuhiko Yasumatsu, Takuya Watanabe, Fumihiro Kanei, Eitaro Shioji, Mitsuaki Akiyama and Tatsuya Mori, Understanding the Responsiveness of Mobile App Developers to Software Library Updates, ACM CODASPY 2019.
Asuka Nakajima, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, and Maverick Woo, A Pilot Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States, ACM ASIACCS 2019.
Satoshi Furutani, Toshiki Shibahara, Mitsuaki Akiyama, Kunio Hato, and Masaki Aida, Graph Signal Processing for Directed Graphs based on the Hermitian Laplacian, ECML/PKDD 2019.
Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide, Yuta Sawabe, Shigeki Goto, and Mitsuaki Akiyama, DomainScouter: Understanding the Risks of Deceptive IDNs, RAID2019.
Ayako Akiyama Hasegawa, Takuya Watanabe, Eitaro Shioji, and Mitsuaki Akiyama, I Know What You Did Last Login: Inconsistent Messages Tell Existence of a Target's Account to Insiders, ACSAC 2019.
Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, and Tatsuya Mori, Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites, NDSS 2020.
Takashi Koide, Daiki Chiba, Mitsuaki Akiyama, Katsunari Yoshioka, and Tsutomu Matsumoto, It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites, DIMVA 2020.
Takashi Koide, Daiki Chiba, and Mitsuaki Akiyama, To Get Lost is to Learn the Way: Automatically Collecting Multi-step Social Engineering Attacks on the Web, ASIACCS 2020.
Ayako Akiyama Hasegawa, Naomi Yamashita, Mitsuaki Akiyama, and Tatsuya Mori, Why They Ignore English Emails: The Challenges of Non-Native Speakers in Identifying Phishing Emails, SOUPS 2021.
Tenga Matsuura, Ayako Akiyama Hasegawa, Mitsuaki Akiyama, and Tatsuya Mori, Careless Participants Are Essential for Our Phishing Study: Understanding the Impact of Screening Methods, EuroUSEC 2021.
Fumihiro Kanei, Ayako Akiyama Hasegawa, Eitaro Shioji, and Mitsuaki Akiyama, A Cross-role and Bi-national Analysis on Security Efforts and Constraints of Software Development Projects, ACSAC 2021.
Ayako Akiyama Hasegawa, Naomi Yamashita, Tatsuya Mori, Daisuke Inoue, and Mitsuaki Akiyama, Understanding Non-Experts' Security- and Privacy-Related Questions on a Q&A Site, SOUPS 2022.
Atsuko Natatsuka, Ryo Iijima, Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, and Tatsuya Mori, Understanding the Behavior Transparency of Voice Assistant Applications Using the ChatterBox Framework, RAID 2022.
Kazuki Nomoto, Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata, and Tatsuya Mori, On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework, PETS 2022.
Fumihiro Kanei, Ayako Akiyama Hasegawa, Eitaro Shioji, and Mitsuaki Akiyama, Analyzing the Use of Public and In-house Secure Development Guidelines in U.S. and Japanese Industries, CHI 2023.
Satoshi Furutani, Toshiki Shibahara, Mitsuaki Akiyama, and Masaki Aida, Interpreting Graph-Based Sybil Detection Methods as Low-Pass Filtering. IEEE Transactions on Information and Forensics Security, Volume 18, pp. 1225-1236 (2023).
Mitsuaki Akiyama, Shugo Shiraishi, Akifumi Fukumoto, Ryota Yoshimoto, Eitaro Shioji, and Toshihiro Yamauchi, Seeing is not always believing: Insights on IoT manufacturing from firmware composition analysis and vendor survey. Elsevier Computers & Security, Volume 133, 103389 (2023).
Ayako A. Hasegawa, Daisuke Inoue, and Mitsuaki Akiyama, How WEIRD is Usable Privacy and Security Research?, USENIX Security 2024.