关注
Eitaro Shioji
Eitaro Shioji
在 lab.ntt.co.jp 的电子邮件经过验证
标题
引用次数
引用次数
年份
Understanding the origins of mobile app vulnerabilities: A large-scale measurement study of free and paid apps
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ...
2017 IEEE/ACM 14th International Conference on Mining Software Repositories …, 2017
562017
Api chaser: Anti-analysis resistant malware analyzer
Y Kawakoya, M Iwamura, E Shioji, T Hariu
Research in Attacks, Intrusions, and Defenses: 16th International Symposium …, 2013
482013
Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks
E Shioji, Y Kawakoya, M Iwamura, T Hariu
Proceedings of the 28th annual computer security applications conference …, 2012
362012
A pilot study on consumer IoT device vulnerability disclosure and patch release in Japan and the United States
A Nakajima, T Watanabe, E Shioji, M Akiyama, M Woo
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
242019
Stealth loader: Trace-free program loading for API obfuscation
Y Kawakoya, E Shioji, Y Otsuki, M Iwamura, T Yada
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
222017
Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites.
T Watanabe, E Shioji, M Akiyama, T Mori
NDSS, 2020
192020
Api chaser: Taint-assisted sandbox for evasive malware analysis
Y Kawakoya, E Shioji, M Iwamura, J Miyoshi
Journal of Information Processing 27, 297-314, 2019
182019
Understanding the security management of global third-party android marketplaces
Y Ishii, T Watanabe, F Kanei, Y Takata, E Shioji, M Akiyama, T Yagi, ...
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market …, 2017
152017
Vulnerability of MRD-code-based universal secure network coding against stronger eavesdroppers
E Shioji, R Matsumoto, T Uyematsu
IEICE transactions on fundamentals of electronics, communications and …, 2010
152010
User blocking considered harmful? An attacker-controllable side channel to identify social accounts
T Watanabe, E Shioji, M Akiyama, K Sasaoka, T Yagi, T Mori
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 323-337, 2018
132018
Understanding the responsiveness of mobile app developers to software library updates
T Yasumatsu, T Watanabe, F Kanei, E Shioji, M Akiyama, T Mori
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
122019
I know what you did last login: inconsistent messages tell existence of a target's account to insiders
AA Hasegawa, T Watanabe, E Shioji, M Akiyama
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
72019
Seeing is not always believing: Insights on IoT manufacturing from firmware composition analysis and vendor survey
M Akiyama, S Shiraishi, A Fukumoto, R Yoshimoto, E Shioji, T Yamauchi
Computers & Security 133, 103389, 2023
62023
Study on the vulnerabilities of free and paid mobile apps associated with software library
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishii, ...
IEICE TRANSACTIONS on Information and Systems 103 (2), 276-291, 2020
62020
テイント伝搬に基づく解析対象コードの追跡方法
川古谷裕平, 岩村誠, 針生剛男
情報処理学会論文誌 54 (8), 2079-2089, 2013
62013
A study on the vulnerabilities of mobile apps associated with software modules
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ...
arXiv preprint arXiv:1702.03112, 2017
52017
A Cross-role and Bi-national Analysis on Security Efforts and Constraints of Software Development Projects
F Kanei, AA Hasegawa, E Shioji, M Akiyama
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
32021
Stealth loader: Trace-free program loading for analysis evasion
Y Kawakoya, E Shioji, Y Otsuki, M Iwamura, J Miyoshi
Journal of Information Processing 26, 673-686, 2018
32018
GUI 構造に基づいた Android アプリケーション動的解析支援の検討
塩治榮太朗, 秋山満昭, 岩村誠, 針生剛男
コンピュータセキュリティシンポジウム 2012 論文集 2012 (3), 36-43, 2012
32012
Identification device, identification method, and identification program
A Nakajima, E Shioji, K Hato, M Akiyama, T Shibahara
US Patent 11,830,238, 2023
22023
系统目前无法执行此操作,请稍后再试。
文章 1–20