Eitaro Shioji

Orcid: 0000-0001-8743-9101

According to our database1, Eitaro Shioji authored at least 23 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Seeing is not always believing: Insights on IoT manufacturing from firmware composition analysis and vendor survey.
Comput. Secur., October, 2023

Understanding the Inconsistencies in the Permissions Mechanism of Web Browsers.
J. Inf. Process., 2023

Browser Permission Mechanisms Demystified.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Analyzing the Use of Public and In-house Secure Development Guidelines in U.S. and Japanese Industries.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2021
A Cross-role and Bi-national Analysis on Security Efforts and Constraints of Software Development Projects.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Addressing the Privacy Threat to Identify Existence of a Target's Account on Sensitive Services.
J. Inf. Process., 2020

1-day, 2 Countries - A Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States.
IEICE Trans. Inf. Syst., 2020

Follow Your Silhouette: Identifying the Social Account of Website Visitors through User-Blocking Side Channel.
IEICE Trans. Inf. Syst., 2020

Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library.
IEICE Trans. Inf. Syst., 2020

Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
API Chaser: Taint-Assisted Sandbox for Evasive Malware Analysis.
J. Inf. Process., 2019

Understanding the Responsiveness of Mobile App Developers to Software Library Updates.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

A Pilot Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

I know what you did last login: inconsistent messages tell existence of a target's account to insiders.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Stealth Loader: Trace-free Program Loading for Analysis Evasion.
J. Inf. Process., 2018

User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
A Study on the Vulnerabilities of Mobiles Apps associated with Software Modules.
CoRR, 2017

Understanding the security management of global third-party Android marketplaces.
Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, 2017

Stealth Loader: Trace-Free Program Loading for API Obfuscation.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017

2013
API Chaser: Anti-analysis Resistant Malware Analyzer.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

2012
Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2010
Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010


  Loading...