About me

  • Yuta TAKATA
  • y.takata (a) goto.info.waseda.ac.jp
  • I received my M.E. and Ph.D. from Waseda University in 2013 and 2018, respectively.
  • I was a researcher at NTT R&D and a member of NTT-CERT from 2013 to 2018.
  • Now I am a senior researcher at a consulting firm. Since joining the firm in 2019, I have been engaged in R&D of technologies related to cyber security.
  • I am also an adjunct instructor at Waseda University since 2018.

Interests

  • Web Security
  • Cyber Security
  • Honeypot / Honeyclient
  • Program Analysis

Like

  • Swimming, Tennis, Snowboarding
  • Trip
  • Beer and Wine


Doctoral Thesis

Refereed Journal

Refereed Conference

Poster

  • POSTER: Predicting Website Abuse Using Update Histories. DOI
    Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, and Shigeki Goto
    In WWW'18 Companion: The 2018 Web Conference Companion, April 2018.
  • POSTER: Protecting Android Apps from Repackaging by Self-Protection Code. Poster
    Fumihiro Kanei, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, and Takeshi Yada
    In the Network and Distributed System Security Symposium (NDSS), Feb 2017.
  • POSTER: Canvas Fingerprinting in the Wild: A Large-scale Measurement and Evaluation.
    Yumehisa Haga, Yuta Takata, Mitsuaki Akiyama, Tatsuya Mori, and Shigeki Goto.
    In the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Nov 2015.
  • POSTER: Observing Interaction between Java and JavaScript for privacy leakage detection in Android.
    Fumihiro Kanei, Mitsuaki Akiyama, Yuta Takata, and Takeshi Yada.
    In the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Nov 2015.
  • POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains. DOI
    Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Yuta Takata, and Takeshi Yada.
    In the 22nd ACM Conference on Computer and Communications Security (CCS), Oct 2015.
  • POSTER: Extracting Redirect-Chain Variations in Drive-by Download Attacks Using Emulati on of Various Client Environments.
    Yuta Takata, Mitsuaki Akiyama, and Takeo Hariu.
    In the 23rd USENIX Security Symposium, Aug 2014.

Book

  •   実践サイバーセキュリティモニタリング Amazon
    八木 毅, 青木 一史, 秋山 満昭, 幾世 知範, 高田 雄太, 千葉 大紀
    コロナ社, 2016年3月.

Misc