About me
- Yuta TAKATA | 高田雄太
- I received my M.E. and Ph.D. from Waseda University in 2013 and 2018, respectively.
- I was a researcher at NTT R&D and a member of NTT-CERT from 2013 to 2018.
- Now I am a principal researcher and a senior manager at a consulting firm. Since joining the firm in 2019, I have been engaged in R&D of technologies related to cyber security.
- I am also a part-time lecturer at Waseda University from 2018.
Interests
- Cyber Security
- Web Security and Privacy
- Network Security
- Blockchain and web3
- DID and VC
- Honeypot / Honeyclient
Like
- Swimming
- Tennis
- Snowboarding
- Mountain Climbing
- Trip
- Beer and Wine
Doctoral Thesis
- Analyzing Hidden Features of Web-based Attacks.
Yuta Takata
Doctoral Thesis, March 2018.
Refereed Journal
- Analysis of Privacy Compliance by Classifying Policies Before and After the Japanese Law Revision.
Keika Mori, Tatsuya Nagai, Yuta Takata, Masaki Kamizono, and Tatsuya Mori.
Journal of Information Processing, Vol.31, pp.829--841, December 2023. - Investigations of electronic signatures for construction of trust services.
Kenta Nomura, Yuta Takata, Hiroshi Kumagai, and Masaki Kamizono, Yoshiaki Shiraishi, Masami Mohri, and Masakatu Morii.
IEICE TRANSACTIONS on Information and Systems, Vol.E106--D, No.9, pp.1436--1451, September 2023. - The Uncontrolled Web: Measuring Security Governance on the Web.
Yuta TAKATA, Hiroshi KUMAGAI, and Masaki KAMIZONO.
IEICE TRANSACTIONS on Information and Systems, Vol.E104--D, No.11, pp.1828--1838, November 2021. - Risk Analysis of Cookie Sharing by Link Decoration and CNAME Cloaking.
Yuta Takata, Daiki Ito, Hiroshi Kumagai, and Masaki Kamizono.
Journal of Information Processing, Vol.29, pp.649--656, October 2021. - Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library.
Takuya WATANABE, Mitsuaki AKIYAMA, Fumihiro KANEI, Eitaro SHIOJI, Yuta TAKATA, Bo SUN, Yuta ISHII, Toshiki SHIBAHARA, Takeshi YAGI, and Tatsuya MORI.
IEICE TRANSACTIONS on Information and Systems, Vol.103.D, Issue 2, pp.276--291, Feburary 2020. - Evasive Malicious Website Detection by Leveraging Redirection Subgraph Similarities.
Toshiki SHIBAHARA, Yuta TAKATA, Mitsuaki AKIYAMA, Takeshi YAGI, Kunio HATO, and Masayuki MURATA.
IEICE TRANSACTIONS on Information and Systems, Vol.102.D, Issue 3, pp.430--443, March 2019. - Event De-noising Convolutional Neural Network for Detection Malicious URL Sequences from Proxy Logs.
Toshiki SHIBAHARA, Kohei YAMANISHI, Yuta TAKATA, Daiki CHIBA, Taiga HOKAGUCHI, Mitsuaki AKIYAMA, Takeshi YAGI, Yuichi OHSHITA, and Masayuki MURATA.
IEICE TRANSACTIONS on Fundamental of Electronics, Communications and Computer Sciences, Vol.E101--A, No.12, pp.2149--2161, December 2018. - Identifying Evasive Code in Malicious Websites By Analyzing Redirection Differences.
Yuta TAKATA, Mitsuaki AKIYAMA, Takeshi YAGI, Takeo HARIU, Kazuhiko OHKUBO, and Shigeki GOTO.
IEICE TRANSACTIONS on Information and Systems, Vol.E101--D, No.11, pp.2600--2611, November 2018. - Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities.
Hiroki NAKANO, Fumihiro KANEI, Yuta TAKATA, Mitsuaki AKIYAMA, and Katsunari YOSHIOKA.
IEICE TRANSACTIONS on Information and Systems, Vol.E101--D, No.11, pp.2576--2583, November 2018. - Fine-grained Analysis of Compromised Websites with Redirection Graphs and JavaScript Traces.
Yuta TAKATA, Mitsuaki AKIYAMA, Takeshi YAGI, Takeshi YADA, and Shigeki GOTO.
IEICE TRANSACTIONS on Information and Systems, Vol.E100--D, No.8, pp.1714--1728, August 2017. - Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study.
Yumehisa HAGA, Yuta TAKATA, Mitsuaki AKIYAMA, and Tatsuya MORI.
IEICE TRANSACTIONS on Information and Systems, Vol.E100--D, No.8, pp.1663--1670, August 2017. - MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks.
Yuta TAKATA, Mitsuaki AKIYAMA, Takeshi YAGI, Takeo HARIU, and Shigeki GOTO.
IEICE TRANSACTIONS on Information and Systems, Vol.E99--D, No.4, pp.860--872, April 2016.
Refereed International Conference
- Investigations of Top-Level Domain Name Collisions in Blockchain Naming Services.
Oral Session: Systems#3
Daiki Ito(*), Yuta Takata(*), Hiroshi Kumagai, and Masaki Kamizono. (*) Co-first authors with equal contribution.
Proceedings of the ACM Web Conference (WWW'24), May 2024.
Acceptance rate:20.2%
(405/2008), Oral rate: 46.7% (189/405) - Account Discovery: Identifying Web3 SNS Accounts at Risk of De-anonymization.
Daiki Ito(*), Yuta Takata(*), Keika Mori, Ryoya Furukawa, Hiroshi Kumagai, and Masaki Kamizono. (*) Co-first authors with equal contribution.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing (SAC'24), DAPP track, April 2024.
Acceptance rate:23.3%
(180/773) - A Trust Service Model Adaptable to Various Assurance Levels by Linking Digital IDs and Certificates.
Junichiro Hayata, Kenta Nomura, Yuta Takata, Hiroshi Kumagai, Masaki Kamizono, Tsuyoshi Kono, Yoshihiro Maeda and Naohisa Fukuda
Proceedings of the 8th International Conference on Cryptography, Security and Privacy (CSP'24), April 2024.
- Impact Analysis of Organizational Structure of Group Companies on Privacy Policies.
Keika Mori, Yuta Takata, Daiki Ito, Masaki Kamizono and Tatsuya Mori.
Proceedings of the 21st Workshop on Privacy in the Electronic Society (WPES'23), November 2023.
- Money Talks: Detection of Disposable Phishing Websites by Analyzing Its Building Costs.
Daiki Ito, Yuta Takata, and Masaki Kamizono.
Proceedings of the 4th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA'22), December 2022.
- Analysis of Privacy Compliance by Classifying Multiple Policies on the Web.
Keika Mori, Tatsuya Nagai, Yuta Takata, and Masaki Kamizono.
Proceedings of the 46th Annual International Computers, Software & Applications Conference (COMPSAC'22), July 2022.
- Fake News Detection via Biased User Profiles in Social Networking Sites.
Ryoya Furukawa, Daiki Ito, Yuta Takata, Hiroshi Kumagai, Masaki Kamizono, Yoshiaki Shiraishi, and Masakatu Morii.
Proceedings of the 20th IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT'21), December 2021.
Acceptance rate:27.6%
(57/206) - Discovering Evasive Code in Malicious Websites with High- and Low-interaction Honeyclients.
Abstract
Slide
APNIC Blog
The Register
Yuta Takata
30th Annual FIRST Conference (FIRST'18), June 2018.
Acceptance rate:under 32.5%
(65/over 200) - Understanding Evasion Techniques that Abuse Differences among JavaScript Implementations.
Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, and Shigeki Goto.
Poceedings of the 18th International Conference on Web Information Systems Engineering (WISE'17), October 2017.
Acceptance rate:25.0%
(49/196) - Understanding the Security Management of Global Third-Party Android Marketplaces.
Yuta Ishii, Takuya Watanabe, Fumihiko Kanei, Yuta Takata, Eitaro Shioji, Mitsuaki Akiyama, Takeshi Yagi, Bo Sun, and Tatsuya Mori.
Proceedings of the 2nd International Workshop on App Market Analytics (WAMA'17), September 2017. - Detecting Malicious Websites by Integrating Malicious, Benign, and Compromised Redirection Subgraph Similarities.
Toshiki Shibahara, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, and Takeshi Yada.
Proceedings of the 41th Annual International Computers, Software & Applications Conference (COMPSAC'17), July 2017.
Acceptance rate:20%
(58/290) - Understanding the Origins of Mobile App Vulnerabilities: A Large-scale Measurement Study of Free and Paid Apps.
Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishii, Toshiki Shibahara, Takeshi Yagi, and Tatsuya Mori.
Proceedings of the 14th International Conference on Mining Software Repositories (MSR'17), May 2017.
Acceptance rate:30.6%
(37/121) - Malicious URL Sequence Detection using Event De-noising Convolutional Neural Network.
Toshiki Shibahara, Kohei Yamanishi, Yuta Takata, Daiki Chiba, Mitsuaki Akiyama, Takeshi Yagi, Yuichi Ohsita, and Masayuki Murata.
Proceedings of IEEE International Conference on Communications (ICC'17), May 2017.
Acceptance rate of ICC-CISS:30.5%
(84/275) - Website Forensic Investigation to Identify Evidence and Impact of Compromise.preprint
Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, and Shigeki Goto.
Proceedings of the International Conference on Security and Privacy in Communication Networks (SecureComm'16), October 2016.
Acceptance rate:23.4%
(32/137) - MineSpider : Extracting URLs from Environment-dependent Drive-by Download Attacks.
Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, and Shigeki Goto.
Proceedings of the 39th Annual International Computers, Software & Applications Conference (COMPSAC'15), July 2015. - Analysis of Redirection Caused by Web-based Malware. Best Student Paper Award
Yuta Takata, Shigeki Goto, and Tatsuya Mori.
Proceedings of the Asia Pacific Advanced Network (APAN'11) 2011, August 2011.
Poster
- POSTER: Predicting Website Abuse Using Update Histories.
Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, and Shigeki Goto
In WWW'18 Companion: The 2018 Web Conference Companion, April 2018. - POSTER: Protecting Android Apps from Repackaging by Self-Protection Code. Poster
Fumihiro Kanei, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, and Takeshi Yada
In the Network and Distributed System Security Symposium (NDSS), Feb 2017. - POSTER: Canvas Fingerprinting in the Wild: A Large-scale Measurement and Evaluation.
Yumehisa Haga, Yuta Takata, Mitsuaki Akiyama, Tatsuya Mori, and Shigeki Goto.
In the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Nov 2015. - POSTER: Observing Interaction between Java and JavaScript for privacy leakage detection in Android.
Fumihiro Kanei, Mitsuaki Akiyama, Yuta Takata, and Takeshi Yada.
In the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Nov 2015. - POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains.
Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Yuta Takata, and Takeshi Yada.
In the 22nd ACM Conference on Computer and Communications Security (CCS), Oct 2015. - POSTER: Extracting Redirect-Chain Variations in Drive-by Download Attacks Using Emulati on of Various Client Environments.
Yuta Takata, Mitsuaki Akiyama, and Takeo Hariu.
In the 23rd USENIX Security Symposium, Aug 2014.
Book
- 実践サイバーセキュリティモニタリング Amazon
八木 毅, 青木 一史, 秋山 満昭, 幾世 知範, 高田 雄太, 千葉 大紀
コロナ社, 2016年3月.
Award
- CSS2024 優秀論文賞, "プライバシーポリシーに対するユーザの理解度測定のための大規模言語モデル評価", コンピュータセキュリティシンポジウム (CSS) 2024.
- CSS2023 優秀論文賞, "ブロックチェーンネーミングサービスにおけるトップレベルドメイン名前衝突の調査", コンピュータセキュリティシンポジウム (CSS) 2023.
- 2020年度 CSEC 優秀研究賞, "リンクデコレーションおよび CNAME クローキングによるクッキー共有のリスク分析", CSEC 第90回研究会.
- 2018年度 CSEC 優秀研究賞, "Web プッシュ通知の悪用に関する実態調査", CSEC 第83回研究会.
- 2017年度情報通信システムセキュリティ研究賞, "ユーザ操作が起点となるWeb上の攻撃の収集", ICSS2017.
- CSS2016 学生論文賞, "Webトラッキング検知システムの構築とサードパーティトラッキングサイトの調査", コンピュータセキュリティシンポジウム (CSS) 2016.
- 2011 APAN Best Student Paper Award, "Analysis of Redirection Caused by Web-based Malware", APAN2011.
- 日本電信電話株式会社 (NTT) 社長表彰: 発明考案表彰(2015), 業務成績表彰(2017)
- セキュリティ競技 MWS Cup: 芸術部門優勝(2010), 総合優勝(2012), 芸術部門優勝(2013)
Professional Activity
- 早稲田大学「グローバルビジネス世界における、サイバーセキュリティを考える」: 非常勤講師 (2021--2024)
- 早稲田大学「高度サイバー攻撃対策技術」: 非常勤講師 (2018--2019)
- 情報処理学会 論文誌ジャーナル編集委員会「 AI社会を安全にするコンピュータセキュリティ技術」: 編集委員 (2024)
- 情報処理学会 コンピュータセキュリティ研究会 (CSEC): 専門/運営委員 (2019--2024)
- 情報処理学会 コンピュータセキュリティシンポジウム (CSS): 実行委員 (2018), プログラム委員 (2020--2024)
- 情報処理学会 マルウェア対策研究人材育成ワークショップ (MWS): 実行委員長 (2018), プログラム委員長 (2021), その他各種委員 (2014--2024)
- ACM/SIGAPP Symposium on Applied Computing (SAC): Program Committee (DAPP Track 2025)
- IEEE Conference on Dependable and Secure Computing (DSC): Program Committee (2024)
- International Workshop on Security (IWSEC): Local Organizing Committee (2019--2021)
Misc
- 現実を守る: 合成メディアの時代における真実
PDF (ja)
Web (ja)
Masaki Kamizono, Hiroshi Kumagai, Yuta Takata, Shogo Suzuki, Yuji Sakurai, Takumi Fukunaga, and Kazuki Nomoto.
Tech Trends 2024 - スマートフォン認証: マイナンバーカードに基づく安全性・利便性の高い認証機能のスマートフォンへの搭載
PDF (ja)
Web (ja)
Masaki Kamizono, Hiroshi Kumagai, Yuta Takata, Tsunekazu Saito, and Kenta Nomura.
TMT Predictions 2024 - Web3時代の「住所重複」問題、通信障害や誤送金リスクへの対策が課題
Web (ja)
Masaki Kamizono, Yuta Takata, and Satoru Kohda.
ホットイシュー DTFA Institute - 個人情報保護法改正に伴うウェブプライバシー対応調査
Web (ja)
Masaki Kamizono, Hiroshi Kumagai, Yuta Takata, Daiki Ito, and Tatsuya Nagai.
Whitepaper 2023 - FinTech: Fintech 時代の新たな技術と今後
PDF (ja)
Web (ja)
Masaki Kamizono, Hiroshi Kumagai, Yuta Takata, and Kenta Nomura.
TMT Predictions 2021 - A Study on the Vulnerabilities of Mobile Apps associated with Software Modules.
preprint (en)
Takuya Watanabe, Mitsuaki Akiyama, Fumihiro Kanei, Eitaro Shioji, Yuta Takata, Bo Sun, Yuta Ishi, Toshiki Shibahara, Takeshi Yagi, and Tatsuya Mori.
arXiv:1702.03112 - Security Intelligence for Malware Countermeasures to Support NTT Group's Security Business.
PDF (en)
PDF (ja)
Takeo Hariu, Keiichi Yokoyama, Mitsuhiro Hatada, Tekashi Yada, Takeshi Yagi, Mitsuaki Akiyama, Tomonori Ikuse, Yuta Takata, Daiki Chiba, and Yasuyuki Tanaka.
NTT Technical Review, Vol.13, No.12, 2015.