Makoto Iwamura
Orcid: 0009-0003-8640-7089
According to our database1,
Makoto Iwamura
authored at least 30 papers
between 1998 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the 6th IEEE International Conference on Knowledge Innovation and Invention, 2023
2022
Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks.
Proceedings of the 25th International Symposium on Research in Attacks, 2022
2021
Automatic Reverse Engineering of Script Engine Binaries for Building Script API Tracers.
DTRAP, 2021
2020
ROPminer: Learning-Based Static Detection of ROP Chain Considering Linkability of ROP Gadgets.
IEICE Trans. Inf. Syst., 2020
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020
2019
J. Inf. Process., 2019
Proceedings of the Advances in Information and Computer Security, 2019
Detecting Successful Attacks from IDS Alerts Based On Emulation of Remote Shellcodes.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
My script engines know what you did in the dark: converting engines into script API tracers.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
EIGER: automated IOC generation for accurate and interpretable endpoint malware detection.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
J. Inf. Process., 2018
J. Inf. Process., 2018
2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
2016
POSTER: Static ROP Chain Detection Based on Hidden Markov Model Considering ROP Chain Integrity.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2013
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
2012
Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of IEEE International Conference on Communications, 2011
Controlling malware HTTP communications in dynamic analysis system using search engine.
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011
2010
Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks.
IEICE Trans. Commun., 2010
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010
2009
J. Robotics Mechatronics, 2009
2002
Motion Planning of Under-Actuated Mechanical Systems: Convergence Analysis for Iterative Methods.
Proceedings of the 2002 IEEE International Conference on Robotics and Automation, 2002
2001
Proceedings of the 2001 IEEE International Conference on Robotics and Automation, 2001
2000
A gradient-based approach to collision-free quasi-optimal trajectory planning of nonholonomic systems.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2000
Near-Optimal Motion Planning for Nonholonomic Systems Using Time-Axis Transformation and Gradient Method.
Proceedings of the 2000 IEEE International Conference on Robotics and Automation, 2000
1999
Proceedings of the Proceedings 1999 IEEE/RSJ International Conference on Intelligent Robots and Systems. Human and Environment Friendly Robots with High Intelligence and Emotional Quotients, 1999
Proceedings of the 1999 IEEE International Conference on Robotics and Automation, 1999
1998
Time-optimal motion planning of skid-steer mobile robots in the presence of obstacles.
Proceedings of the Proceedings 1998 IEEE/RSJ International Conference on Intelligent Robots and Systems. Innovations in Theory, 1998