Publications
Publications
Journal Papers
Fabien Charmet, Tomohiro Morikawa (Corresponding Author), Akira Tanaka, Takeshi Takahashi, ‘‘Visual phishing detectiOns aRe Through EXplanations,’’ ACM Transactions on Internet Technology, Volume 24, Issue 2, Article No. 9, pp 1–24, 2024 . (Impact Factor: 5.3)
Yu-Wei Chang, Hong-Yen Chen, Chansu Han, Tomohiro Morikawa, Takeshi Takahashi, Tsung-Nan Lin, ‘‘FINISH: Efficient and Scalable NMF-based Federated Learning for Detecting Malware Activities,’’ IEEE Transactions on Emerging Topics in Computing (TETC), pp.1-16, 2023. (Impact Factor: 5.9)
Fabien Charmet, Tomohiro Morikawa, Takeshi Takahashi, “Toward a Better Understanding of Mobile Users’Behavior: A Web Session Repair Scheme,” IEEE Access, Vol.10, pp. 99931-99943, 2022 (Impact Factor: 3.9)
Tomohiro Morikawa, Takeshi Takahashi, Tao Ban, Daisuke Inoue, “Detecting Android Malware and Classifying Its Families in Large-scale Datasets,” ACM Transactions on Management Information Systems, Vol.13(2), pp.1-21, 2021 (Impact Factor: 2.5)
Yun-Chung Chen, Hong-Yen Chen, Takeshi Takahashi, Tomohiro Morikawa, Tsung-Nan Lin, “Impact of Code Deobfuscation and Feature Interaction in Android Malware Detection,” IEEE Access, Vol.9, pp.123208-123219, 2021 (Impact Factor: 3.9)
Tomohiro Morikawa, Tao Ban, Chansu Han, Takeshi Takahashi, Katsunari Yoshioka, Junrichi Takeuchi, Abdolhossein Sarrafzadeh, Meikang Qiu, Daisuke Inoue, “Leveraging Machine Learning Techniques to Identify Deceptive Decoy Documents Associated with Targeted Email Attacks,” IEEE Access, Vol.9, pp.87962-87971, 2021 (Impact Factor: 3.9)
Tzu-Ling Wan, Tao Ban, Shin-Ming Cheng, Yen-Ting Lee, Tomohiro Morikawa, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue, “Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files,” IEEE Open Journal of the Computer Society, Vol.1, pp. 262-275, 2020 (Impact Factor: 5.9)
Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Tomohiro Morikawa, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori,“Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library,” IEICE Transactions on Information and Systems,Vol. 103-D, No. 2, pp. 276–291, 2020
Tomohiro Morikawa, Akinori Fujino, Tatsuya Mori, Tao Ban, Takeshi Takahashi, and Daisuke Inoue, “Automatically Generating Malware Analysis Reports Using Sandbox Logs,” IEICE Transactions on Information and Systems, Vol.E101-D, No.11, pp.2622-2632, 2018
Tomohiro Morikawa, Xiapu Luo, Mitsuaki Akiyama, Takuya watanabe, Tatsuya Mori, “PAdetective: A Systematic Approach to Automate Detection of Promotional Attackers in Mobile App Store,” Journal of Information Processing, vol.26, pp.212-223, 2018 (Recommend Paper)
Tomohiro Morikawa, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, and Tatsuya Mori, “Automating URL Blacklist Generation with Similarity Search Approach,” IEICE Transactions on Information and Systems, Vol.E99-D, No.4, pp. 873–882, 2016
Conference Papers
Ayumu Masudome, Tao Ban, Takeshi Takahashi, Tsung-Nan Lin, Tomohiro Morikawa (Corresponding Author), ‘‘An Accurate and Robust Deep Learning-Based Stacked Generalization Method for Android Malware Detection,’’ The 17th International Symposium on Pervasive Systems, Algorithms and Networks, I-SPAN 2025 (to be appear) (Best Paper Award)
Wei-Ren Zhuang, Tao Ban, Shin-Ming Cheng, Tomohiro Morikawa, Takeshi Takahashi, ‘‘Novel Malware Similarity Analysis: Regional Longest Common Substring Algorithm with Elastic Suffix Tree,’’ The 17th International Symposium on Pervasive Systems, Algorithms and Networks, I-SPAN 2025 (to be appear)
Chun-I Fan, Sheng-Feng Lu, Cheng-Han Shie, Ming-Feng Tsai, Tomohiro Morikawa (Corresponding Author), Takeshi Takahashi, and Tao Ban,‘‘An Explainable Android Malware Detection Framework Based on Graph Neural Network,’ Mobile Internet Security - 8th International Conference, MobiSec 2024 (to be appear) (Best Paper Award)
Jiaxing Zhou, Tao Ban, Tomohiro Morikawa, Takeshi Takahashi, Daisuke Inoue, “Color-Coded Attribute Graph: Visual Exploration of Distinctive Traits of IoT-Malware Families,” The IEEE Symposium on Computers and Communication (ISCC 2023), 2023 (to appear)
Chansu Han, Akira Tanaka, Jun’ichi Takeuchi, Takeshi Takahashi, Tomohiro Morikawa and Tsung-Nan Lin, “Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns Based on Darknet Analysis,” In Proceedings of the 9th International Conference on Information Systems Security and Privacy ICISSP - Volume 1, pp. 617-625, 2023
Mitsuhiro Umizaki, Tomohiro Morikawa, Akira Fujita, Takeshi Takahashi, Tsung-Nan Lin, Daisuke Inoue, “Understanding the Characteristics of Public Blocklist Providers,” The IEEE Symposium on Computers and Communication (ISCC 2022), pp.1-7, 2022
Chun-I Fan, Cheng-Han Shie, Che-Ming Hsu, Tao Ban, Tomohiro Morikawa, Takeshi Takahashi, “IoT Botnet Detection Based on the Behaviors of DNS Queries,” The IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022), pp.1-7, 2022
Shih-Chun Lin, Pang-Cheng Wu ,Hong-Yen Chen, Tomohiro Morikawa, Takeshi Takahashi, and Tsung-Nan Lin, “SenseInput: An Image-Based Sensitive Input Detection Scheme for Phishing Website Detection,” in Proceedings of 2022 IEEE International Conference on Communications (ICC), pp.4180-4186, 2022 (acceptance rate: 962/2529=38.03%)
Chia-Yi Wu, Tao Ban, Shin-Ming Cheng, Tomohiro Morikawa, Takeshi Takahashi, “IoT Malware Detection Using Function-Call-Graph Embedding,” 2021 18th International Conference on Privacy, Security and Trust (PST), pp.1-9. 2021
Ruei-Hau Hsu, Yi-Cheng Wang, Chun-I Fan, Tomohiro Morikawa, Tao Ban, Takeshi Takahashi, Ting-Wei Wu and Shang-Wei Kao, “A Privacy-Preserving Federated Learning System for Android Malware Detection based on Edge Computing,” in Proceedings of The 15th Asia Joint Conference on Information Security (AsiaJCIS 2020), pp.128-136, 2020
Masaki Aota, Hideaki Kanehara, Masaki Kubo, Noboru Murata, Tomohiro Morikawa, Takeshi Takahashi, “Automating Vulnerability Classification from Description using Machine Learning,” IEEE Symposium on Computers and Communications, pp.1-7, 2020
Tomohiro Morikawa, Ban Tao, Shun-Chieh Chang, Yeali S. Sun, Takeshi Takahashi and Daisuke Inoue, “A Scalable and Accurate Feature Representation Method for Identifying Malicious Mobile Applications,” Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, pp.1182-1189, 2019 (acceptance rate: 258/1067=24.2%)
Shun-Chieh Chang, Yeali Sun, Wu Long Chuang, Meng Chang Chen, Tomohiro Morikawa and Takeshi Takahashi, “ANTSdroid:Using RasMMA algorithm to generate Malware Behavior Characteristics of Android Malware Family,” The 23rd IEEE Pacific Rim International Symposium on Dependable Computing, pp.257-262, 2018
Mika Juuti, Tomohiro Morikawa, Tatsuya Mori, and N. Asokan, “Stay On-Topic: Generating Context-specific Fake Restaurant Reviews,” Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS 2018), pp. 132–151, 2018 (acceptance rate: 56/283=19.8%)
Tomohiro Morikawa, Xiapu Luo, Mitsuaki Akiyama, Takuya Watanabe, Tatsuya Mori,“Characterizing Promotional Attacks in Mobile App Store”, International Conference on Applications and Technologies in Information Security (ATIS 2017), pp. 113-127, 2017 (Best Paper Award)
Yuta Ishii, Takuya Watanabe, Fumihiro Kanei, Yuta Takata, Eitaro Shioji, Mitsuaki Akiyama, Takeshi Yagi, Tomohiro Morikawa, Tatsuya Mori, “Understanding the Security Management of Global Third-Party Android Marketplaces,'' Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics, pp.12-18, 2017
Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Tomohiro Morikawa, Yuta Ishi, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori, “Understanding the Origins of Mobile App Vulnerabilities: A Large-scale Measurement Study of Free and Paid Apps,” Proceedings of the 14th International Conference on Mining Software Repositories (MSR 2017), pp.14-24, 2017. (acceptance rate: 27.2%=43/158)
Tomohiro Morikawa, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, Tatsuya Mori, “AutoBLG: Automatic URL Blacklist Generator Using Search Space Expansion and Filters,” Proceedings of the IEEE Symposium on Computers and Communication (ISCC 2015), pp.205–211, 2015. (CORE RANK B)
Books
Tomohiro Morikawa, T.Takahashi, L.Zhu, T.Mori, “Discovering Malicious URLs Using Machine Learning Techniques,” Intelligent Systems Reference Library, 151, 33 - 60, Springer International Publishing, 2020. DOI:10.1007/978-3-030-38788-43.
Invited Talks
Tomohiro Morikawa, “The current state and preventive measures of cybersecurity,” Sakakimonodukiri Exhibition 2021
Tomohiro Morikawa, “What can I do for you?The impact of Artificial Intelligence on Cybersecurity,” Rakuten Technology Workshop 2021
Tomohiro Morikawa, “Research output of Android project,” Rakuten technology workshop 2020
Tomohiro Morikawa, Xiapu Luo, Mitsuaki Akiyama, Takuya watanabe, Tatsuya Mori, “Understanding Promotional Attacks in Mobile Software Distribution Platform,” The 44nd APAN Meeting, Network Security Workshop, August 2017
Tomohiro Morikawa, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, Tatsuya Mori, “Automatic Generation of URL Blacklist,” The 42nd APAN Meeting, Network Security Workshop, August 2015.