Makoto Iwamura

Orcid: 0009-0003-8640-7089

According to our database1, Makoto Iwamura authored at least 29 papers between 1998 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Xunpack: Cross-Architecture Unpacking for Linux IoT Malware.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Development of Assist Mechanisms for Lifting Luggage Using the Lower Limbs.
Proceedings of the 6th IEEE International Conference on Knowledge Innovation and Invention, 2023

2022
Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

2020
ROPminer: Learning-Based Static Detection of ROP Chain Considering Linkability of ROP Gadgets.
IEICE Trans. Inf. Syst., 2020

Security Threat Analysis of Automotive Infotainment Systems.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

2019
API Chaser: Taint-Assisted Sandbox for Evasive Malware Analysis.
J. Inf. Process., 2019

Toward the Analysis of Distributed Code Injection in Post-mortem Forensics.
Proceedings of the Advances in Information and Computer Security, 2019

Detecting Successful Attacks from IDS Alerts Based On Emulation of Remote Shellcodes.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

My script engines know what you did in the dark: converting engines into script API tracers.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

EIGER: automated IOC generation for accurate and interpretable endpoint malware detection.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Stealth Loader: Trace-free Program Loading for Analysis Evasion.
J. Inf. Process., 2018

Taint-assisted IAT Reconstruction against Position Obfuscation.
J. Inf. Process., 2018

Building stack traces from memory dump of Windows x64.
Digit. Investig., 2018

2017
Stealth Loader: Trace-Free Program Loading for API Obfuscation.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

2016
POSTER: Static ROP Chain Detection Based on Hidden Markov Model Considering ROP Chain Integrity.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2013
API Chaser: Anti-analysis Resistant Malware Analyzer.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

2012
Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Towards Efficient Analysis for Malware in the Wild.
Proceedings of IEEE International Conference on Communications, 2011

Controlling malware HTTP communications in dynamic analysis system using search engine.
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011

2010
Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks.
IEICE Trans. Commun., 2010

Memory behavior-based automatic malware unpacking in stealth debugging environment.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

2009
"Future Dream!" Review of The 2007 Robotics-Mechatronics Design Competition.
J. Robotics Mechatronics, 2009

2002
Motion Planning of Under-Actuated Mechanical Systems: Convergence Analysis for Iterative Methods.
Proceedings of the 2002 IEEE International Conference on Robotics and Automation, 2002

2001
Sub-Optimal Trajectory Planning of Mobile Manipulator.
Proceedings of the 2001 IEEE International Conference on Robotics and Automation, 2001

2000
A gradient-based approach to collision-free quasi-optimal trajectory planning of nonholonomic systems.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2000

Near-Optimal Motion Planning for Nonholonomic Systems Using Time-Axis Transformation and Gradient Method.
Proceedings of the 2000 IEEE International Conference on Robotics and Automation, 2000

1999
Near-optimal trajectory planning for nonholonomic Caplygin systems.
Proceedings of the Proceedings 1999 IEEE/RSJ International Conference on Intelligent Robots and Systems. Human and Environment Friendly Robots with High Intelligence and Emotional Quotients, 1999

Quasi-Time-Optimal Motion Planning of Mobile Platforms in the Presence of Obstacles.
Proceedings of the 1999 IEEE International Conference on Robotics and Automation, 1999

1998
Time-optimal motion planning of skid-steer mobile robots in the presence of obstacles.
Proceedings of the Proceedings 1998 IEEE/RSJ International Conference on Intelligent Robots and Systems. Innovations in Theory, 1998


  Loading...