研究者業績

森川 智博(孫 博)

モリカワ トモヒロ  (Tomohiro Morikawa (Bo Sun))

基本情報

所属
兵庫県立大学 大学院 情報科学研究科 准教授
学位
博士(工学)(2018年2月 早稲田大学)

J-GLOBAL ID
201601019783857916
researchmap会員ID
7000017476

日本国籍取得に伴い、2021年2月より名前が変わりました.


論文

 29
  • Fabien Charmet, Tomohiro Morikawa, Akira Tanaka, Takeshi Takahashi
    ACM Transactions on Internet Technology 2024年5月6日  査読有り責任著者
    Phishing attacks reached a record high in 2022, as reported by the Anti-Phishing Work Group [1], following an upward trend accelerated during the pandemic. Attackers employ increasingly sophisticated tools in their attempts to deceive unaware users into divulging confidential information. Recently, the research community has turned to the utilization of screenshots of legitimate and malicious websites to identify the brands that attackers aim to impersonate. In the field of Computer Vision, convolutional neural networks (CNNs) have been employed to analyze the visual rendering of websites, addressing the problem of phishing detection. However, along with the development of these new models, arose the need to understand their inner workings and the rationale behind each prediction. Answering the question, “How is this website attempting to steal the identity of a well-known brand?” becomes crucial when protecting end-users from such threats. In cybersecurity, the application of explainable AI (XAI) is an emerging approach that aims to answer such questions. In this paper, we propose VORTEX, a phishing website detection solution equipped with the capability to explain how a screenshot attempts to impersonate a specific brand. We conduct an extensive analysis of XAI methods for the phishing detection problem and demonstrate that VORTEX provides meaningful explanations regarding the detection results. Additionally, we evaluate the robustness of our model against Adversarial Example attacks. We adapt these attacks to the VORTEX architecture and evaluate their efficacy across multiple models and datasets. Our results show that VORTEX achieves superior accuracy compared to previous models, and learns semantically meaningful patterns to provide actionable explanations about phishing websites. Finally, VORTEX demonstrates an acceptable level of robustness against adversarial example attacks.
  • Jiaxing Zhou, Tao Ban, Tomohiro Morikawa, Takeshi Takahashi, Daisuke Inoue
    2023 IEEE Symposium on Computers and Communications (ISCC) 2023年7月9日  査読有り
  • Yu-Wei Chang, Hong-Yen Chen, Chansu Han, Tomohiro Morikawa, Takeshi Takahashi, Tsung-Nan Lin
    IEEE Transactions on Emerging Topics in Computing 1-16 2023年  査読有り
  • International Conference on Information Systems Security and Privacy (ICISSP) 2023年  査読有り
  • Mitsuhiro Umizaki, Tomohiro Morikawa, Akira Fujita, Takeshi Takahashi, Tsung-Nan Lin, Daisuke Inoue
    2022 IEEE Symposium on Computers and Communications (ISCC) 2022年6月30日  査読有り
  • Chun-I Fan, Cheng-Han Shie, Che-Ming Hsu, Tao Ban, Tomohiro Morikawa, Takeshi Takahashi
    2022 IEEE Conference on Dependable and Secure Computing (DSC) 2022年6月22日  査読有り
  • Fabien Charmet, Harry C. Tanuwidjaja, Tomohiro Morikawa, Takeshi Takahashi
    Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security 2022年5月30日  査読有り
  • Shih-Chun Lin, Pang-Cheng Wl, Hong-Yen Chen, Tomohiro Morikawa, Takeshi Takahashi, Tsung-Nan Lin
    ICC 2022 - IEEE International Conference on Communications 2022年5月16日  査読有り
  • Fabien Charmet, Tomohiro Morikawa, Takeshi Takahashi
    IEEE Access 10 99931-99943 2022年  査読有り
  • Bo Sun, Takeshi Takahashi, Tao Ban, Daisuke Inoue
    ACM Transactions on Management Information Systems 13(2) 1-21 2021年10月14日  査読有り
    To relieve the burden of security analysts, Android malware detection and its family classification need to be automated. There are many previous works focusing on using machine (or deep) learning technology to tackle these two important issues, but as the number of mobile applications has increased in recent years, developing a scalable and precise solution is a new challenge that needs to be addressed in the security field. Accordingly, in this article, we propose a novel approach that not only enhances the performance of both Android malware and its family classification, but also reduces the running time of the analysis process. Using large-scale datasets obtained from different sources, we demonstrate that our method is able to output a high F-measure of 99.71% with a low FPR of 0.37%. Meanwhile, the computation time for processing a 300K dataset is reduced to nearly 3.3 hours. In addition, in classification evaluation, we demonstrate that the F-measure, precision, and recall are 97.5%, 96.55%, 98.64%, respectively, when classifying 28 malware families. Finally, we compare our method with previous studies in both detection and classification evaluation. We observe that our method produces better performance in terms of its effectiveness and efficiency.
  • Chia-Yi Wu, Tao Ban, Shin-Ming Cheng, Bo Sun, Takeshi Takahashi 0001
    PST 1-9 2021年  査読有り
  • Yun-Chung Chen, Hong-Yen Chen, Takeshi Takahashi, Bo Sun, Tsung-Nan Lin
    IEEE Access 9 123208-123219 2021年  査読有り
  • Bo Sun, Tao Ban, Chansu Han, Takeshi Takahashi, Katsunari Yoshioka, Junrichi Takeuchi, Abdolhossein Sarrafzadeh, Meikang Qiu, Daisuke Inoue
    IEEE Access 9 1-1 2021年  査読有り
  • Ruei-Hau Hsu, Yi-Cheng Wang, Chun-I Fan, Bo Sun, Tao Ban, Takeshi Takahashi, Ting-Wei Wu, Shang-Wei Kao
    2020 15th Asia Joint Conference on Information Security (AsiaJCIS) 128-136 2020年8月  査読有り
  • Masaki Aota, Hideaki Kanehara, Masaki Kubo, Noboru Murata, Bo Sun, Takeshi Takahashi
    2020 IEEE Symposium on Computers and Communications (ISCC) 1-7 2020年7月  査読有り
  • Takuya WATANABE, Mitsuaki AKIYAMA, Fumihiro KANEI, Eitaro SHIOJI, Yuta TAKATA, Bo SUN, Yuta ISHII, Toshiki SHIBAHARA, Takeshi YAGI, Tatsuya MORI
    IEICE Transactions on Information and Systems E103.D(2) 276-291 2020年2月1日  査読有り
  • Tzu-Ling Wan, Tao Ban, Shin-Ming Cheng, Yen-Ting Lee, Bo Sun, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue
    IEEE Open Journal of the Computer Society 1 262-275 2020年  査読有り
  • Bo Sun, Takeshi Takahashi, Lei Zhu, Tatsuya Mori
    Data Science in Cybersecurity and Cyberthreat Intelligence 33-60 2020年  査読有り筆頭著者
  • Bo Sun, Tao Ban, Shun-Chieh Chang, Yeali S. Sun, Takeshi Takahashi, Daisuke Inoue
    Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing 1182-1189 2019年4月8日  査読有り
  • Bo Sun, Akinori Fujino, Tatsuya Mori, Tao Ban, Takeshi Takahashi, Daisuke Inoue
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS E101D(11) 2622-2632 2018年11月  査読有り
    Analyzing a malware sample requires much more time and cost than creating it. To understand the behavior of a given malware sample, security analysts often make use of API call logs collected by the dynamic malware analysis tools such as a sandbox. As the amount of the log generated for a malware sample could become tremendously large, inspecting the log requires a time-consuming effort. Meanwhile, antivirus vendors usually publish malware analysis reports (vendor reports) on their websites. These malware analysis reports are the results of careful analysis done by security experts. The problem is that even though there are such analyzed examples for malware samples, associating the vendor reports with the sandbox logs is difficult. This makes security analysts not able to retrieve useful information described in vendor reports. To address this issue, we developed a system called AMAR-Generator that aims to automate the generation of malware analysis reports based on sandbox logs by making use of existing vendor reports. Aiming at a convenient assistant tool for security analysts, our system employs techniques including template matching, API behavior mapping, and malicious behavior database to produce concise human-readable reports that describe the malicious behaviors of malware programs. Through the performance evaluation, we first demonstrate that AMAR-Generator can generate human-readable reports that can be used by a security analyst as the first step of the malware analysis. We also demonstrate that AMAR-Generator can identify the malicious behaviors that are conducted by malware from the sandbox logs; the detection rates are up to 96.74%, 100%, and 74.87% on the sandbox logs collected in 2013, 2014, and 2015, respectively. We also present that it can detect malicious behaviors from unknown types of sandbox logs.
  • Bo Sun, Xiapu Luo, Mitsuaki Akiyama, Takuya Watanabe, Tatsuya Mori
    Journal of Information Processing 26 212-223 2018年  査読有り筆頭著者
  • Mika Juuti, Bo Sun, Tatsuya Mori, N. Asokan
    23rd European Symposium on Research in Computer Security, ESORICS 2018 132-151 2018年  査読有り
  • Shun Chieh Chang, Yeali S. Sun, Wu Long Chuang, Meng Chang Chen, Bo Sun, Takeshi Takahashi
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC) 257-262 2018年  査読有り
    Malware developers often use various obfuscation techniques to generate polymorphic and metamorphic versions of malicious programs. As a result, variants of a malware family generally exhibit resembling behavior, and most importantly, they possess certain common essential codes so to achieve the same designed purpose. Meantime, keeping up with new variants and generating signatures for each individual in a timely fashion has been costly and inefficient for anti-virus software companies. It motivates us the idea of no more dancing with variants. In this paper, we aim to find a malware family's main characteristic operations or activities directly related to its intent. We propose a novel automatic dynamic Android profiling system and malware family runtime behavior signature generation method called Runtime API sequence Motif Mining Algorithm (RasMMA) based on the analysis of the sensitive and permission-related execution traces of the threads and processes of a set of variant APKs of a malware family. We show the effectiveness of using the generated family signature to detect new variants using real-world dataset. Moreover, current anti-malware tools usually treat detection models as a black box for classification and offer little explanations on how malwares behave and how they proceed step by step to infiltrate targeted system and achieve the goal. We take malware family DroidKungFu as a case study to illustrate that the generated family signature indeed captures key malicious activities of the family.
  • Yuta Ishii, Takuya Watanabe, Fumihiro Kanei, Yuta Takata, Eitaro Shioji, Mitsuaki Akiyama, Takeshi Yagi, Bo Sun, Tatsuya Mori
    Proceedings of the 2nd ACM SIGSOFT International Workshop on App Market Analytics 2017年9月5日  査読有り
  • Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishi, Toshiki Shibahara, Takeshi Yagi, Tatsuya Mori
    2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR) 2017年5月  査読有り
  • Bo Sun, Xiapu Luo, Mitsuaki Akiyama, Takuya Watanabe, Tatsuya Mori
    International Conference on Applications and Techniques in Information Security 113-127 2017年  査読有り
  • Bo Sun, Akinori Fujino, Tatsuya Mori
    Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016年10月24日  査読有り
  • Bo Sun, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, Tatsuya Mori
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS E99D(4) 873-882 2016年4月  査読有り
    Modern web users may encounter a browser security threat called drive-by-download attacks when surfing on the Internet. Drive-by-download attacks make use of exploit codes to take control of user's web browser. Many web users do not take such underlying threats into account while clicking URLs. URL Blacklist is one of the practical approaches to thwarting browser-targeted attacks. However, URL Blacklist cannot cope with previously unseen malicious URLs. Therefore, to make a URL blacklist effective, it is crucial to keep the URLs updated. Given these observations, we propose a framework called automatic blacklist generator (AutoBLG) that automates the collection of new malicious URLs by starting from a given existing URL blacklist. The primary mechanism of AutoBLG is expanding the search space of web pages while reducing the amount of URLs to be analyzed by applying several pre-filters such as similarity search to accelerate the process of generating blacklists. AutoBLG consists of three primary components: URL expansion, URL filtration, and URL verification. Through extensive analysis using a high-performance web client honeypot, we demonstrate that AutoBLG can successfully discover new and previously unknown drive-by-download URLs from the vast web space.
  • Bo Sun, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, Tatsuya Mori
    2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC) 625-631 2015年  査読有り
    Modern web users are exposed to a browser security threat called drive-by-download attacks that occur by simply visiting a malicious Uniform Resource Locator (URL) that embeds code to exploit web browser vulnerabilities. Many web users tend to click such URLs without considering the underlying threats. URL blacklists are an effective countermeasure to such browser-targeted attacks. URLs are frequently updated; therefore, collecting fresh malicious URLs is essential to ensure the effectiveness of a URL blacklist. We propose a framework called automatic blacklist generator (AutoBLG) that automatically identifies new malicious URLs using a given existing URL blacklist. The key idea of AutoBLG is expanding the search space of web pages while reducing the amount of URLs to be analyzed by applying several pre-filters to accelerate the process of generating blacklists. AutoBLG comprises three primary primitives: URL expansion, URL filtration, and URL verification. Through extensive analysis using a high-performance web client honeypot, we demonstrate that AutoBLG can successfully extract new and previously unknown drive-by-download URLs.

MISC

 6