Follow
Eitaro Shioji
Eitaro Shioji
Verified email at lab.ntt.co.jp
Title
Cited by
Cited by
Year
Understanding the origins of mobile app vulnerabilities: A large-scale measurement study of free and paid apps
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ...
2017 IEEE/ACM 14th International Conference on Mining Software Repositories …, 2017
552017
Api chaser: Anti-analysis resistant malware analyzer
Y Kawakoya, M Iwamura, E Shioji, T Hariu
Research in Attacks, Intrusions, and Defenses: 16th International Symposium …, 2013
452013
Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks
E Shioji, Y Kawakoya, M Iwamura, T Hariu
Proceedings of the 28th annual computer security applications conference …, 2012
362012
A pilot study on consumer IoT device vulnerability disclosure and patch release in Japan and the United States
A Nakajima, T Watanabe, E Shioji, M Akiyama, M Woo
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
212019
Stealth loader: Trace-free program loading for API obfuscation
Y Kawakoya, E Shioji, Y Otsuki, M Iwamura, T Yada
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
202017
Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites.
T Watanabe, E Shioji, M Akiyama, T Mori
NDSS, 2020
192020
Api chaser: Taint-assisted sandbox for evasive malware analysis
Y Kawakoya, E Shioji, M Iwamura, J Miyoshi
Journal of Information Processing 27, 297-314, 2019
172019
Vulnerability of MRD-code-based universal secure network coding against stronger eavesdroppers
E Shioji, R Matsumoto, T Uyematsu
IEICE transactions on fundamentals of electronics, communications and …, 2010
152010
Understanding the security management of global third-party android marketplaces
Y Ishii, T Watanabe, F Kanei, Y Takata, E Shioji, M Akiyama, T Yagi, ...
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market …, 2017
142017
User blocking considered harmful? An attacker-controllable side channel to identify social accounts
T Watanabe, E Shioji, M Akiyama, K Sasaoka, T Yagi, T Mori
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 323-337, 2018
122018
Understanding the responsiveness of mobile app developers to software library updates
T Yasumatsu, T Watanabe, F Kanei, E Shioji, M Akiyama, T Mori
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
112019
Study on the vulnerabilities of free and paid mobile apps associated with software library
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishii, ...
IEICE TRANSACTIONS on Information and Systems 103 (2), 276-291, 2020
52020
I know what you did last login: inconsistent messages tell existence of a target's account to insiders
AA Hasegawa, T Watanabe, E Shioji, M Akiyama
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
52019
A study on the vulnerabilities of mobile apps associated with software modules
T Watanabe, M Akiyama, F Kanei, E Shioji, Y Takata, B Sun, Y Ishi, ...
arXiv preprint arXiv:1702.03112, 2017
42017
Seeing is not always believing: Insights on IoT manufacturing from firmware composition analysis and vendor survey
M Akiyama, S Shiraishi, A Fukumoto, R Yoshimoto, E Shioji, T Yamauchi
Computers & Security 133, 103389, 2023
32023
A cross-role and bi-national analysis on security efforts and constraints of software development projects
F Kanei, AA Hasegawa, E Shioji, M Akiyama
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
32021
Stealth loader: Trace-free program loading for analysis evasion
Y Kawakoya, E Shioji, Y Otsuki, M Iwamura, J Miyoshi
Journal of Information Processing 26, 673-686, 2018
32018
GUI 構造に基づいた Android アプリケーション動的解析支援の検討
塩治榮太朗, 秋山満昭, 岩村誠, 針生剛男
コンピュータセキュリティシンポジウム 2012 論文集 2012 (3), 36-43, 2012
32012
Identification device, identification method, and identification program
A Nakajima, E Shioji, K Hato, M Akiyama, T Shibahara
US Patent 11,830,238, 2023
22023
Browser Permission Mechanisms Demystified
K Nomoto, T Watanabe, E Shioji, M Akiyama, T Mori
30th Annual Network and Distributed System Security Symposium, NDSS 2023, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20