-
Notifications
You must be signed in to change notification settings - Fork 0
/
index.html
379 lines (379 loc) · 31 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
<!doctype html>
<html lang="ja" data-bs-theme="auto">
<head>
<meta charset="utf-8">
<title>高田雄太 | Yuta Takata</title>
<meta name="description" content="高田雄太 | Yuta Takata, Hi! :)" />
<meta name="keywords" content="Yuta Takata,高田雄太" />
<meta name="author" content="Yuta Takata">
<meta name="viewport" content="width=device-width, initial-scale=1">
<meta name="google-site-verification" content="sZs864b7dPLaO5cwT5G-mVD2u2DG6F2MmaSSgDusMpg" />
<script src="js/color-modes.js"></script>
<link href="css/bootstrap.min.css" rel="stylesheet">
<link href="css/sticky-footer-navbar.css" rel="stylesheet">
<style>
a,a:visited {color: #41924B;}
h2,h3 {color: #FE8402;}
.me {text-decoration: underline; font-weight:bold;}
header a, button.dropdown-toggle, button.dropdown-toggle > svg {
color: #eee !important;
fill: #eee !important;
}
.hero-unit {
padding: 20px;
height:160px;
background-image: url(img/sw.jpg);
background-size: 100%;
background-repeat: no-repeat;
background-position: center;
-webkit-border-radius: 6px;
-moz-border-radius: 6px;
border-radius: 6px;
}
</style>
</head>
<body class="d-flex flex-column h-100">
<svg xmlns="http://www.w3.org/2000/svg" style="display: none;">
<symbol id="check2" viewBox="0 0 16 16">
<path d="M13.854 3.646a.5.5 0 0 1 0 .708l-7 7a.5.5 0 0 1-.708 0l-3.5-3.5a.5.5 0 1 1 .708-.708L6.5 10.293l6.646-6.647a.5.5 0 0 1 .708 0z"/>
</symbol>
<symbol id="circle-half" viewBox="0 0 16 16">
<path d="M8 15A7 7 0 1 0 8 1v14zm0 1A8 8 0 1 1 8 0a8 8 0 0 1 0 16z"/>
</symbol>
<symbol id="moon-stars-fill" viewBox="0 0 16 16">
<path d="M6 .278a.768.768 0 0 1 .08.858 7.208 7.208 0 0 0-.878 3.46c0 4.021 3.278 7.277 7.318 7.277.527 0 1.04-.055 1.533-.16a.787.787 0 0 1 .81.316.733.733 0 0 1-.031.893A8.349 8.349 0 0 1 8.344 16C3.734 16 0 12.286 0 7.71 0 4.266 2.114 1.312 5.124.06A.752.752 0 0 1 6 .278z"/>
<path d="M10.794 3.148a.217.217 0 0 1 .412 0l.387 1.162c.173.518.579.924 1.097 1.097l1.162.387a.217.217 0 0 1 0 .412l-1.162.387a1.734 1.734 0 0 0-1.097 1.097l-.387 1.162a.217.217 0 0 1-.412 0l-.387-1.162A1.734 1.734 0 0 0 9.31 6.593l-1.162-.387a.217.217 0 0 1 0-.412l1.162-.387a1.734 1.734 0 0 0 1.097-1.097l.387-1.162zM13.863.099a.145.145 0 0 1 .274 0l.258.774c.115.346.386.617.732.732l.774.258a.145.145 0 0 1 0 .274l-.774.258a1.156 1.156 0 0 0-.732.732l-.258.774a.145.145 0 0 1-.274 0l-.258-.774a1.156 1.156 0 0 0-.732-.732l-.774-.258a.145.145 0 0 1 0-.274l.774-.258c.346-.115.617-.386.732-.732L13.863.1z"/>
</symbol>
<symbol id="sun-fill" viewBox="0 0 16 16">
<path d="M8 12a4 4 0 1 0 0-8 4 4 0 0 0 0 8zM8 0a.5.5 0 0 1 .5.5v2a.5.5 0 0 1-1 0v-2A.5.5 0 0 1 8 0zm0 13a.5.5 0 0 1 .5.5v2a.5.5 0 0 1-1 0v-2A.5.5 0 0 1 8 13zm8-5a.5.5 0 0 1-.5.5h-2a.5.5 0 0 1 0-1h2a.5.5 0 0 1 .5.5zM3 8a.5.5 0 0 1-.5.5h-2a.5.5 0 0 1 0-1h2A.5.5 0 0 1 3 8zm10.657-5.657a.5.5 0 0 1 0 .707l-1.414 1.415a.5.5 0 1 1-.707-.708l1.414-1.414a.5.5 0 0 1 .707 0zm-9.193 9.193a.5.5 0 0 1 0 .707L3.05 13.657a.5.5 0 0 1-.707-.707l1.414-1.414a.5.5 0 0 1 .707 0zm9.193 2.121a.5.5 0 0 1-.707 0l-1.414-1.414a.5.5 0 0 1 .707-.707l1.414 1.414a.5.5 0 0 1 0 .707zM4.464 4.465a.5.5 0 0 1-.707 0L2.343 3.05a.5.5 0 1 1 .707-.707l1.414 1.414a.5.5 0 0 1 0 .708z"/>
</symbol>
</svg>
<header>
<nav class="navbar navbar-expand-md navbar-dark fixed-top bg-dark">
<div class="container-fluid">
<a class="navbar-brand" href="#">Hello</a>
<div class="dropdown bd-mode-toggle">
<button class="btn btn-bd-primary py-2 dropdown-toggle d-flex align-items-center"
id="bd-theme"
type="button"
aria-expanded="false"
data-bs-toggle="dropdown"
aria-label="Toggle theme (auto)">
<svg class="bi my-1 theme-icon-active" width="1em" height="1em"><use href="#circle-half"></use></svg>
<span class="visually-hidden" id="bd-theme-text">Toggle theme</span>
</button>
<ul class="dropdown-menu dropdown-menu-end shadow" aria-labelledby="bd-theme-text">
<li>
<button type="button" class="dropdown-item d-flex align-items-center" data-bs-theme-value="light" aria-pressed="false">
<svg class="bi me-2 opacity-50 theme-icon" width="1em" height="1em"><use href="#sun-fill"></use></svg>
Light
<svg class="bi ms-auto d-none" width="1em" height="1em"><use href="#check2"></use></svg>
</button>
</li>
<li>
<button type="button" class="dropdown-item d-flex align-items-center" data-bs-theme-value="dark" aria-pressed="false">
<svg class="bi me-2 opacity-50 theme-icon" width="1em" height="1em"><use href="#moon-stars-fill"></use></svg>
Dark
<svg class="bi ms-auto d-none" width="1em" height="1em"><use href="#check2"></use></svg>
</button>
</li>
<li>
<button type="button" class="dropdown-item d-flex align-items-center active" data-bs-theme-value="auto" aria-pressed="true">
<svg class="bi me-2 opacity-50 theme-icon" width="1em" height="1em"><use href="#circle-half"></use></svg>
Auto
<svg class="bi ms-auto d-none" width="1em" height="1em"><use href="#check2"></use></svg>
</button>
</li>
</ul>
</div>
</div>
</nav>
</header>
<main class="flex-shrink-0">
<div class="container" style="max-width:1200px;">
<div class="hero-unit mt-3 mb-3"></div>
<div class="row">
<div class="col-lg-6">
<h2>About me</h2>
<p>
<ul>
<li><b>Yuta TAKATA | 高田雄太</b></li>
<li>I received my M.E. and Ph.D. from Waseda University in 2013 and 2018, respectively.</li>
<li>I was a researcher at NTT R&D and a member of NTT-CERT from 2013 to 2018.</li>
<li>Now I am a principal researcher and a senior manager at a consulting firm. Since joining the firm in 2019, I have been engaged in R&D of technologies related to cyber security.</li>
<li>I am also a part-time lecturer at Waseda University from 2018.</li>
</ul>
</p>
</div>
<div class="col-lg-auto">
<h2>Interests</h2>
<p>
<ul>
<li>Cyber Security</li>
<li>Web Security and Privacy</li>
<li>Network Security</li>
<li>Blockchain and web3</li>
<li>DID and VC</li>
<li>Honeypot / Honeyclient</li>
</ul>
</p>
</div>
<div class="col-lg-auto">
<h2>Like</h2>
<p>
<ul>
<li>Swimming</li>
<li>Tennis</li>
<li>Snowboarding</li>
<li>Mountain Climbing</li>
<li>Trip</li>
<li>Beer and Wine</li>
</ul>
</p>
</div>
</div>
<hr />
<div class="col-lg-12">
<h3>Doctoral Thesis</h3>
<ul>
<li><b><a href="//hdl.handle.net/2065/00057177" target="_blank">Analyzing Hidden Features of Web-based Attacks.</a></b><br/>
<span class="me">Yuta Takata</span><br />
Doctoral Thesis, March 2018.</li>
</ul>
<h3>Refereed Journal</h3>
<ul>
<li><b><a href="//doi.org/10.2197/ipsjjip.31.829" target="_blank">Analysis of Privacy Compliance by Classifying Policies Before and After the Japanese Law Revision.</a></b><br />
Keika Mori, Tatsuya Nagai, <span class="me">Yuta Takata</span>, Masaki Kamizono, and Tatsuya Mori.<br />
Journal of Information Processing, Vol.31, pp.829--841, December 2023.</li>
<li><b><a href="//doi.org/10.1587/transinf.2022OFI0001" target="_blank">Investigations of electronic signatures for construction of trust services.</a></b><br />
Kenta Nomura, <span class="me">Yuta Takata</span>, Hiroshi Kumagai, and Masaki Kamizono, Yoshiaki Shiraishi, Masami Mohri, and Masakatu Morii.<br />
IEICE TRANSACTIONS on Information and Systems, Vol.E106--D, No.9, pp.1436--1451, September 2023.</li>
<li><b><a href="//doi.org/10.1587/transinf.2021NGP0003" target="_blank">The Uncontrolled Web: Measuring Security Governance on the Web.</a></b><br />
<span class="me">Yuta TAKATA</span>, Hiroshi KUMAGAI, and Masaki KAMIZONO.<br />
IEICE TRANSACTIONS on Information and Systems, Vol.E104--D, No.11, pp.1828--1838, November 2021.</li>
<li><b><a href="//doi.org/10.2197/ipsjjip.29.649" target="_blank">Risk Analysis of Cookie Sharing by Link Decoration and CNAME Cloaking.</a></b><br />
<span class="me">Yuta Takata</span>, Daiki Ito, Hiroshi Kumagai, and Masaki Kamizono.<br />
Journal of Information Processing, Vol.29, pp.649--656, October 2021.</li>
<li><b><a href="//doi.org/10.1587/transinf.2019INP0011" target="_blank">Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library.</a></b><br />
Takuya WATANABE, Mitsuaki AKIYAMA, Fumihiro KANEI, Eitaro SHIOJI, <span class="me">Yuta TAKATA</span>, Bo SUN, Yuta ISHII, Toshiki SHIBAHARA, Takeshi YAGI, and Tatsuya MORI.<br />
IEICE TRANSACTIONS on Information and Systems, Vol.103.D, Issue 2, pp.276--291, Feburary 2020.</li>
<li><b><a href="//doi.org/10.1587/transinf.2018FCP0007" target="_blank">Evasive Malicious Website Detection by Leveraging Redirection Subgraph Similarities.</a></b><br />
Toshiki SHIBAHARA, <span class="me">Yuta TAKATA</span>, Mitsuaki AKIYAMA, Takeshi YAGI, Kunio HATO, and Masayuki MURATA.<br />
IEICE TRANSACTIONS on Information and Systems, Vol.102.D, Issue 3, pp.430--443, March 2019.</li>
<li><b><a href="//doi.org/10.1587/transfun.E101.A.2149" target="_blank">Event De-noising Convolutional Neural Network for Detection Malicious URL Sequences from Proxy Logs.</a></b><br />
Toshiki SHIBAHARA, Kohei YAMANISHI, <span class="me">Yuta TAKATA</span>, Daiki CHIBA, Taiga HOKAGUCHI, Mitsuaki AKIYAMA, Takeshi YAGI, Yuichi OHSHITA, and Masayuki MURATA.<br />
IEICE TRANSACTIONS on Fundamental of Electronics, Communications and Computer Sciences, Vol.E101--A, No.12, pp.2149--2161, December 2018.</li>
<li><b><a href="//doi.org/10.1587/transinf.2017ICP0005" target="_blank">Identifying Evasive Code in Malicious Websites By Analyzing Redirection Differences.</a></b><br />
<span class="me">Yuta TAKATA</span>, Mitsuaki AKIYAMA, Takeshi YAGI, Takeo HARIU, Kazuhiko OHKUBO, and Shigeki GOTO.<br />
IEICE TRANSACTIONS on Information and Systems, Vol.E101--D, No.11, pp.2600--2611, November 2018.</li>
<li><b><a href="//doi.org/10.1587/transinf.2017ICP0009" target="_blank">Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities.</a></b><br />
Hiroki NAKANO, Fumihiro KANEI, <span class="me">Yuta TAKATA</span>, Mitsuaki AKIYAMA, and Katsunari YOSHIOKA.<br />
IEICE TRANSACTIONS on Information and Systems, Vol.E101--D, No.11, pp.2576--2583, November 2018.</li>
<li><b><a href="//doi.org/10.1587/transinf.2016ICP0011" target="_blank">Fine-grained Analysis of Compromised Websites with Redirection Graphs and JavaScript Traces.</a></b><br />
<span class="me">Yuta TAKATA</span>, Mitsuaki AKIYAMA, Takeshi YAGI, Takeshi YADA, and Shigeki GOTO.<br />
IEICE TRANSACTIONS on Information and Systems, Vol.E100--D, No.8, pp.1714--1728, August 2017.</li>
<li><b><a href="//doi.org/10.1587/transinf.2016ICP0020" target="_blank">Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study.</a></b><br />
Yumehisa HAGA, <span class="me">Yuta TAKATA</span>, Mitsuaki AKIYAMA, and Tatsuya MORI.<br />
IEICE TRANSACTIONS on Information and Systems, Vol.E100--D, No.8, pp.1663--1670, August 2017.</li>
<li><b><a href="//doi.org/10.1587/transinf.2015ICP0013" target="_blank">MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks.</a></b><br />
<span class="me">Yuta TAKATA</span>, Mitsuaki AKIYAMA, Takeshi YAGI, Takeo HARIU, and Shigeki GOTO.<br />
IEICE TRANSACTIONS on Information and Systems, Vol.E99--D, No.4, pp.860--872, April 2016.</li>
</ul>
<h3>Refereed International Conference</h3>
<ul>
<li><b><a href="#" target="_blank">Evaluating LLMs Towards Automated Assessment of Privacy Policy Understandability.</a></b><br />
Keika Mori, Daiki Ito, Takumi Fukunaga, Takuya Watanabe, <span class="me">Yuta Takata</span>, Masaki Kamizono, and Tatsuya Mori.<br />
To appear in Proceedings of the Usable Security and Privacy Symposium (<b>USEC'25</b>), Feb 2025.<br />
Acceptance rate: <code class="small">33.3%</code> (14/42)
</li>
<li><b><a href="//doi.org/10.1145/3589334.3645459" target="_blank">Investigations of Top-Level Domain Name Collisions in Blockchain Naming Services.</a></b>
<a href="//www2024.thewebconf.org/program/full-schedule/" target="_blank"><span class="badge bg-success">Oral Session: Systems#3</span></a>
<br />
Daiki Ito(*), <span class="me">Yuta Takata(*)</span>, Hiroshi Kumagai, and Masaki Kamizono. (*) Co-first authors with equal contribution.<br />
Proceedings of the ACM Web Conference (<b>WWW'24</b>), May 2024.<br />
Acceptance rate: <code class="small">20.2%</code> (405/2008), Oral rate: 46.7% (189/405)
</li>
<li><b><a href="//doi.org/10.1145/3605098.3635895" target="_blank">Account Discovery: Identifying Web3 SNS Accounts at Risk of De-anonymization.</a></b><br />
Daiki Ito(*), <span class="me">Yuta Takata(*)</span>, Keika Mori, Ryoya Furukawa, Hiroshi Kumagai, and Masaki Kamizono. (*) Co-first authors with equal contribution.<br />
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing (<b>SAC'24</b>), DAPP track, April 2024.<br />
Acceptance rate: <code class="small">23.3%</code> (180/773)
</li>
<li><b><a href="//doi.org.10.1109/CSP62567.2024.00014" target="_blank">A Trust Service Model Adaptable to Various Assurance Levels by Linking Digital IDs and Certificates.</a></b><br />
Junichiro Hayata, Kenta Nomura, <span class="me">Yuta Takata</span>, Hiroshi Kumagai, Masaki Kamizono, Tsuyoshi Kono, Yoshihiro Maeda and Naohisa Fukuda<br />
Proceedings of the 8th International Conference on Cryptography, Security and Privacy (<b>CSP'24</b>), April 2024.<br />
</li>
<li><b><a href="//doi.org/10.1145/3603216.3624954" target="_blank">Impact Analysis of Organizational Structure of Group Companies on Privacy Policies.</a></b><br />
Keika Mori, <span class="me">Yuta Takata</span>, Daiki Ito, Masaki Kamizono and Tatsuya Mori.<br />
Proceedings of the 21st Workshop on Privacy in the Electronic Society (<b>WPES'23</b>), November 2023.<br />
</li>
<li><b><a href="//doi.org/10.1109/TPS-ISA56441.2022.00022" target="_blank">Money Talks: Detection of Disposable Phishing Websites by Analyzing Its Building Costs.</a></b><br />
Daiki Ito, <span class="me">Yuta Takata</span>, and Masaki Kamizono.<br />
Proceedings of the 4th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (<b>TPS-ISA'22</b>), December 2022.<br />
</li>
<li><b><a href="//doi.org/10.1109/COMPSAC54236.2022.00276" target="_blank">Analysis of Privacy Compliance by Classifying Multiple Policies on the Web.</a></b><br />
Keika Mori, Tatsuya Nagai, <span class="me">Yuta Takata</span>, and Masaki Kamizono.<br />
Proceedings of the 46th Annual International Computers, Software & Applications Conference (<b>COMPSAC'22</b>), July 2022.<br />
</li>
<li><b><a href="//doi.org/10.1145/3486622.3493939">Fake News Detection via Biased User Profiles in Social Networking Sites.</a></b><br />
Ryoya Furukawa, Daiki Ito, <span class="me">Yuta Takata</span>, Hiroshi Kumagai, Masaki Kamizono, Yoshiaki Shiraishi, and Masakatu Morii.<br />
Proceedings of the 20th IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (<b>WI-IAT'21</b>), December 2021.<br />
Acceptance rate: <code class="small">27.6%</code> (57/206)</li>
<li><b><a href="//www.first.org/conference/2018/program#pdiscovering-evasive-code-in-malicious-websites-with-high-and-low-interaction-honeyclients" target="_blank">Discovering Evasive Code in Malicious Websites with High- and Low-interaction Honeyclients.</a></b>
<a href="//www.first.org/conference/2018/program#pdiscovering-evasive-code-in-malicious-websites-with-high-and-low-interaction-honeyclients" target="_blank"><span class="badge bg-primary">Abstract</span></a>
<a href="pdf/FIRST30-takata.pdf" target="_blank"><span class="badge bg-primary">Slide</span></a>
<a href="//blog.apnic.net/2018/08/07/discovering-evasive-code-in-malicious-websites/" target="_blank"><span class="badge bg-success">APNIC Blog</span></a>
<a href="//www.theregister.co.uk/2018/08/09/how_evil_javascript_helps_attackers_tag_possible_victims_and_gives_away_their_intent/" target="_blank"><span class="badge bg-success">The Register</span></a>
<br />
<span class="me">Yuta Takata</span><br />
30th Annual FIRST Conference (<b>FIRST'18</b>), June 2018.<br />
Acceptance rate: <code class="small">under 32.5%</code> (65/over 200)</li>
<li><b><a href="//doi.org/10.1007/978-3-319-68786-5_22" target="_blank">Understanding Evasion Techniques that Abuse Differences among JavaScript Implementations.</a></b><br />
<span class="me">Yuta Takata</span>, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, and Shigeki Goto.<br />
Poceedings of the 18th International Conference on Web Information Systems Engineering (<b>WISE'17</b>), October 2017.<br />
Acceptance rate: <code class="small">25.0%</code> (49/196)</li>
<li><b><a href="//doi.org/10.1145/3121264.3121267" taget="_blank">Understanding the Security Management of Global Third-Party Android Marketplaces.</a></b><br />
Yuta Ishii, Takuya Watanabe, Fumihiko Kanei, <span class="me">Yuta Takata</span>, Eitaro Shioji, Mitsuaki Akiyama, Takeshi Yagi, Bo Sun, and Tatsuya Mori.<br />
Proceedings of the 2nd International Workshop on App Market Analytics (<b>WAMA'17</b>), September 2017.</li>
<li><b><a href="//doi.org/10.1109/COMPSAC.2017.105" target="_blank">Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph Similarities.</a></b><br />
Toshiki Shibahara, <span class="me">Yuta Takata</span>, Mitsuaki Akiyama, Takeshi Yagi, and Takeshi Yada.<br />
Proceedings of the 41th Annual International Computers, Software & Applications Conference (<b>COMPSAC'17</b>), July 2017.<br />
Acceptance rate: <code class="small">20%</code> (58/290)</li>
<li><b><a href="//doi.org/10.1109/MSR.2017.23" target="_blank">Understanding the Origins of Mobile App Vulnerabilities: A Large-scale Measurement Study of Free and Paid Apps.</a></b><br />
Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, <span class="me">Yuta Takata</span>, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, and Tatsuya Mori.<br />
Proceedings of the 14th International Conference on Mining Software Repositories (<b>MSR'17</b>), May 2017.<br />
Acceptance rate: <code class="small">30.6%</code> (37/121)</li>
<li><b><a href="//doi.org/10.1109/ICC.2017.7996831" target="_blank">Malicious URL Sequence Detection using Event De-noising Convolutional Neural Network.</a></b><br />
Toshiki Shibahara, Kohei Yamanishi, <span class="me">Yuta Takata</span>, Daiki Chiba, Mitsuaki Akiyama, Takeshi Yagi, Yuichi Ohsita, and Masayuki Murata.<br />
Proceedings of IEEE International Conference on Communications (<b>ICC'17</b>), May 2017.<br />
Acceptance rate of ICC-CISS: <code class="small">30.5%</code> (84/275)</li>
<li><b><a href="//doi.org/10.1007/978-3-319-59608-2_25" target="_blank">Website Forensic Investigation to Identify Evidence and Impact of Compromise.</a></b><a href="pdf/takata-SecureComm16.pdf" target="_blank"><span class="badge bg-primary">preprint</span></a><br />
<span class="me">Yuta Takata</span>, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, and Shigeki Goto.<br />
Proceedings of the International Conference on Security and Privacy in Communication Networks (<b>SecureComm'16</b>), October 2016.<br />
Acceptance rate: <code class="small">23.4%</code> (32/137)</li>
<li><b><a href="//doi.org/10.1109/COMPSAC.2015.76" target="_blank">MineSpider : Extracting URLs from Environment-dependent Drive-by Download Attacks.</a></b><br />
<span class="me">Yuta Takata</span>, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, and Shigeki Goto.<br />
Proceedings of the 39th Annual International Computers, Software & Applications Conference (<b>COMPSAC'15</b>), July 2015.</li>
<li><b><a href="//doi.org/10.7125/APAN.32.7" target="_blank">Analysis of Redirection Caused by Web-based Malware.</a></b> <span class="badge bg-danger">Best Student Paper Award</span><br />
<span class="me">Yuta Takata</span>, Shigeki Goto, and Tatsuya Mori.<br />
Proceedings of the Asia Pacific Advanced Network (<b>APAN'11</b>) 2011, August 2011.
</li>
</ul>
</div>
<div class="col-lg-12">
<h3>Poster</h3>
<ul>
<li><b><a href="//doi.org/10.1145/3184558.3186903" target="_blank">POSTER: Predicting Website Abuse Using Update Histories.</a></b><br />
<span class="me">Yuta Takata</span>, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, and Shigeki Goto<br />
In WWW'18 Companion: The 2018 Web Conference Companion, April 2018.</li>
<li><b><a href="//www.internetsociety.org/resources/doc/2017/protecting-android-apps-from-repackaging-by-self-protection-code/" target="_blank">POSTER: Protecting Android Apps from Repackaging by Self-Protection Code.</a></b> <a href="//www.internetsociety.org/resources/doc/2017/protecting-android-apps-from-repackaging-by-self-protection-code/" target="_blank"><span class="badge bg-primary">Poster</span></a><br />
Fumihiro Kanei, <span class="me">Yuta Takata</span>, Mitsuaki Akiyama, Takeshi Yagi, and Takeshi Yada<br />
In the Network and Distributed System Security Symposium (NDSS), Feb 2017.</li>
<li><b>POSTER: Canvas Fingerprinting in the Wild: A Large-scale Measurement and Evaluation.</b><br />
Yumehisa Haga, <span class="me">Yuta Takata</span>, Mitsuaki Akiyama, Tatsuya Mori, and Shigeki Goto.<br />
In the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Nov 2015.</li>
<li><b>POSTER: Observing Interaction between Java and JavaScript for privacy leakage detection in Android.</b><br />
Fumihiro Kanei, Mitsuaki Akiyama, <span class="me">Yuta Takata</span>, and Takeshi Yada.<br />
In the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Nov 2015.</li>
<li><b><a href="//doi.org/10.1145/2810103.2810112" target="_blank">POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains.</a></b><br />
Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, <span class="me">Yuta Takata</span>, and Takeshi Yada.<br />
In the 22nd ACM Conference on Computer and Communications Security (CCS), Oct 2015.</li>
<li><b>POSTER: Extracting Redirect-Chain Variations in Drive-by Download Attacks Using Emulati on of Various Client Environments.</b><br />
<span class="me">Yuta Takata</span>, Mitsuaki Akiyama, and Takeo Hariu.<br />
In the 23rd USENIX Security Symposium, Aug 2014.</li>
</ul>
</div>
<div class="col-lg-12">
<h3>Book</h3>
<ul>
<li><b><a href="//amzn.to/2Bmf5WZ" target="_blank">実践サイバーセキュリティモニタリング</a> <a href="//amzn.to/2Bmf5WZ" target="_blank"><span class="badge bg-primary">Amazon</span></a></b><br />
八木 毅, 青木 一史, 秋山 満昭, 幾世 知範, <span class="me">高田 雄太</span>, 千葉 大紀<br />
コロナ社, 2016年3月.</li>
</ul>
</div>
<div class="col-lg-12">
<h3>Award</h3>
<ul>
<li><a href="//www.iwsec.org/css/2024/award.html" target="_blank">CSS2024 優秀論文賞</a>, "プライバシーポリシーに対するユーザの理解度測定のための大規模言語モデル評価", コンピュータセキュリティシンポジウム (CSS) 2024.</li>
<li><a href="//www.iwsec.org/css/2023/award.html" target="_blank">CSS2023 優秀論文賞</a>, "ブロックチェーンネーミングサービスにおけるトップレベルドメイン名前衝突の調査", コンピュータセキュリティシンポジウム (CSS) 2023.</li>
<li><a href="//www.ipsj.or.jp/award/csec-award.html" target="_blank">2020年度 CSEC 優秀研究賞</a>, "リンクデコレーションおよび CNAME クローキングによるクッキー共有のリスク分析", CSEC 第90回研究会.</li>
<li><a href="//www.ipsj.or.jp/award/csec-award.html" target="_blank">2018年度 CSEC 優秀研究賞</a>, "Web プッシュ通知の悪用に関する実態調査", CSEC 第83回研究会.</li>
<li><a href="//www.ieice.org/iss/icss/award.html" target="_blank">2017年度情報通信システムセキュリティ研究賞</a>, "ユーザ操作が起点となるWeb上の攻撃の収集", ICSS2017.</li>
<li><a href="//www.iwsec.org/css/2016/award.htm" target="_blank">CSS2016 学生論文賞</a>, "Webトラッキング検知システムの構築とサードパーティトラッキングサイトの調査", コンピュータセキュリティシンポジウム (CSS) 2016.</li>
<li><a href="//apan.net/meetings/apan32/Session/Slides/agm/4-2.pdf" target="_blank">2011 APAN Best Student Paper Award</a>, "Analysis of Redirection Caused by Web-based Malware", APAN2011.</li>
<li>日本電信電話株式会社 (NTT) 社長表彰: 発明考案表彰(2015), 業務成績表彰(2017)</li>
<li>セキュリティ競技 <a href="//www.iwsec.org/mws/mwscup.html" target="_blank">MWS Cup</a>: 芸術部門優勝(2010), 総合優勝(2012), 芸術部門優勝(2013)</li>
</ul>
</div>
<div class="col-lg-12">
<h3>Professional Activity</h3>
<ul>
<li>早稲田大学「<a href="//www.wsl.waseda.jp/syllabus/JAA104.php?pKey=2603034050012024260303405026&pLng=jp" target="_blank">グローバルビジネス世界における、サイバーセキュリティを考える</a>」: 非常勤講師 (2021--2024)</li>
<li>早稲田大学「<a href="//www.wsl.waseda.jp/syllabus/JAA104.php?pKey=5101061049012019510106104951&pLng=jp" target="_blank">高度サイバー攻撃対策技術</a>」: 非常勤講師 (2018--2019)</li>
<li>電子情報通信学会 情報通信システムセキュリティ小特集編集委員会: 編集委員 (<a href="#">2025</a>)</li>
<li>情報処理学会 論文誌ジャーナル編集委員会: 編集委員 (<a href="//www.ipsj.or.jp/journal/cfp/25-N.html" target="_blank">2024</a>)</li>
<li>情報処理学会 <a href="//www.iwsec.org/csec/" target="_blank">コンピュータセキュリティ研究会 (CSEC)</a>: 専門/運営委員 (2019--2024)</li>
<li>情報処理学会 <a href="//www.iwsec.org/css/" target="_blank">コンピュータセキュリティシンポジウム (CSS)</a>: 実行委員 (2018), プログラム委員 (2020--2024)</li>
<li>情報処理学会 <a href="//www.iwsec.org/mws/" target="_blank">マルウェア対策研究人材育成ワークショップ (MWS)</a>: 実行委員長 (2018), プログラム委員長 (2021), その他各種委員 (2014--2024)</li>
<li><a href="//www.sigapp.org/sac/sac2025/" target="_blank">ACM/SIGAPP Symposium on Applied Computing (SAC)</a>: Program Committee (<a href="//www.cas-blockchain-certification.com/en/pc-members-acm-sac-dapp" target="_blank">DAPP Track 2025</a>)</li>
<li><a href="//attend.ieee.org/dsc-2024/organization-and-program-committee/" target="_blank">IEEE Conference on Dependable and Secure Computing (DSC)</a>: Program Committee (2024)</li>
<li><a href="//www.iwsec.org/" target="_blank">International Workshop on Security (IWSEC)</a>: Local Organizing Committee (2019--2021)</li>
</ul>
</div>
<div class="col-lg-12">
<h3>Misc</h3>
<ul>
<li><b>現実を守る: 合成メディアの時代における真実</b>
<a href="//www2.deloitte.com/content/dam/Deloitte/jp/Documents/technology/tsa/jp-tsa-tech-trends-2024-perspective-5.pdf" target="_blank"><span class="badge bg-primary">PDF (ja)</span></a>
<a href="//www2.deloitte.com/jp/ja/pages/technology/articles/tsa/tech-trends.html" target="_blank"><span class="badge bg-primary">Web (ja)</span></a>
<br />
Masaki Kamizono, Hiroshi Kumagai, <span class="me">Yuta Takata</span>, Shogo Suzuki, Yuji Sakurai, Takumi Fukunaga, and Kazuki Nomoto.<br />
Tech Trends 2024</li>
<li><b>スマートフォン認証: マイナンバーカードに基づく安全性・利便性の高い認証機能のスマートフォンへの搭載</b>
<a href="//www2.deloitte.com/content/dam/Deloitte/jp/Documents/technology-media-telecommunications/et/jp-tmt-predictions-2024-all.pdf#page=76" target="_blank"><span class="badge bg-primary">PDF (ja)</span></a>
<a href="//www2.deloitte.com/jp/ja/pages/technology-media-and-telecommunications/articles/et/tmt-predictions.html" target="_blank"><span class="badge bg-primary">Web (ja)</span></a>
<br />
Masaki Kamizono, Hiroshi Kumagai, <span class="me">Yuta Takata</span>, Tsunekazu Saito, and Kenta Nomura.<br />
TMT Predictions 2024</li>
<li><b>Web3時代の「住所重複」問題、通信障害や誤送金リスクへの対策が課題</b>
<a href="//faportal.deloitte.jp/institute/report/articles/000980.html" target="_blank"><span class="badge bg-primary">Web (ja)</span></a><br />
Masaki Kamizono, <span class="me">Yuta Takata</span>, and Satoru Kohda.<br />
ホットイシュー DTFA Institute</li>
<li><b>個人情報保護法改正に伴うウェブプライバシー対応調査</b>
<a href="//www2.deloitte.com/jp/ja/pages/about-deloitte/articles/dt-arlcs/cookie-consent-banner.html" target="_blank"><span class="badge bg-primary">Web (ja)</span></a><br />
Masaki Kamizono, Hiroshi Kumagai, <span class="me">Yuta Takata</span>, Daiki Ito, and Tatsuya Nagai.<br />
Whitepaper 2023</li>
<li><b>FinTech: Fintech 時代の新たな技術と今後</b>
<a href="//www2.deloitte.com/content/dam/Deloitte/jp/Documents/technology-media-telecommunications/jp-tmt-predictions-2021-all.pdf" target="_blank"><span class="badge bg-primary">PDF (ja)</span></a>
<a href="//www2.deloitte.com/jp/ja/pages/technology-media-and-telecommunications/articles/tmt-predictions-2021-fintech.html" target="_blank"><span class="badge bg-primary">Web (ja)</span></a>
<br />
Masaki Kamizono, Hiroshi Kumagai, <span class="me">Yuta Takata</span>, and Kenta Nomura.<br />
TMT Predictions 2021</li>
<li><b>A Study on the Vulnerabilities of Mobile Apps associated with Software Modules.</b>
<a href="//arxiv.org/abs/1702.03112" target="_blank"><span class="badge bg-primary">preprint (en)</span></a>
<br />
Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, <span class="me">Yuta Takata</span>, Bo Sun, Yuta Ishi, Toshiki Shibahara, Takeshi Yagi, and Tatsuya Mori.<br />
arXiv:1702.03112</li>
<li><b>Security Intelligence for Malware Countermeasures to Support NTT Group's Security Business.</b>
<a href="//www.ntt-review.jp/archive/ntttechnical.php?contents=ntr201512fa3.pdf" target="_blank"><span class="badge bg-primary">PDF (en)</span></a>
<a href="//www.ntt.co.jp/journal/1510/files/jn201510018.pdf" target="_blank"><span class="badge bg-primary">PDF (ja)</span></a>
<br />
Takeo Hariu, Keiichi Yokoyama, Mitsuhiro Hatada, Tekashi Yada, Takeshi Yagi, Mitsuaki Akiyama, Tomonori Ikuse, <span class="me">Yuta Takata</span>, Daiki Chiba, and Yasuyuki Tanaka.<br />
NTT Technical Review, Vol.13, No.12, 2015.</li>
</ul>
</div>
</main>
<footer class="footer mt-auto py-3 bg-body-tertiary">
<div class="container">
<span class="text-body-secondary">(C) Yuta Takata</span>
</div>
</footer>
<script src="js/bootstrap.bundle.min.js"></script>
<script async src="//www.googletagmanager.com/gtag/js?id=G-KBQ48HEQSF"></script>
<script type="text/javascript">
window.dataLayer = window.dataLayer || [];
function gtag(){dataLayer.push(arguments);}
gtag('js', new Date());
gtag('config', 'G-KBQ48HEQSF');
</script>
</body>
</html>