Skip to main content

Showing 1–19 of 19 results for author: Yamaguchi, F

.
  1. Scalable Language Agnostic Taint Tracking using Explicit Data Dependencies

    Authors: Sedick David Baker Effendi, Xavier Pinho, Andrei Michael Dreyer, Fabian Yamaguchi

    Abstract: Taint analysis using explicit whole-program data-dependence graphs is powerful for vulnerability discovery but faces two major challenges. First, accurately modeling taint propagation through calls to external library procedures requires extensive manual annotations, which becomes impractical for large ecosystems. Second, the sheer size of whole-program graph representations leads to serious scala… ▽ More

    Submitted 6 June, 2025; originally announced June 2025.

    Comments: 9 pages including appendix, SOAP'25

    ACM Class: D.2.4

  2. arXiv:2310.00673  [pdf, other

    cs.LG cs.CR

    Learning Type Inference for Enhanced Dataflow Analysis

    Authors: Lukas Seidel, Sedick David Baker Effendi, Xavier Pinho, Konrad Rieck, Brink van der Merwe, Fabian Yamaguchi

    Abstract: Statically analyzing dynamically-typed code is a challenging endeavor, as even seemingly trivial tasks such as determining the targets of procedure calls are non-trivial without knowing the types of objects at compile time. Addressing this challenge, gradual typing is increasingly added to dynamically-typed languages, a prominent example being TypeScript that introduces static typing to JavaScript… ▽ More

    Submitted 4 October, 2023; v1 submitted 1 October, 2023; originally announced October 2023.

    Comments: - fixed last author's name - fixed header

    Journal ref: 28th European Symposium on Research in Computer Security (ESORICS) 2023

  3. arXiv:2211.04972  [pdf, ps, other

    cs.RO

    Hibikino-Musashi@Home 2018 Team Description Paper

    Authors: Yutaro Ishida, Sansei Hori, Yuichiro Tanaka, Yuma Yoshimoto, Kouhei Hashimoto, Gouki Iwamoto, Yoshiya Aratani, Kenya Yamashita, Shinya Ishimoto, Kyosuke Hitaka, Fumiaki Yamaguchi, Ryuhei Miyoshi, Kentaro Honda, Yushi Abe, Yoshitaka Kato, Takashi Morie, Hakaru Tamukoh

    Abstract: Our team, Hibikino-Musashi@Home (the shortened name is HMA), was founded in 2010. It is based in the Kitakyushu Science and Research Park, Japan. We have participated in the RoboCup@Home Japan open competition open platform league every year since 2010. Moreover, we participated in the RoboCup 2017 Nagoya as open platform league and domestic standard platform league teams. Currently, the Hibikino-… ▽ More

    Submitted 9 November, 2022; originally announced November 2022.

    Comments: 8 pages, 5 figures, RoboCup@Home

  4. arXiv:1706.00206  [pdf, ps, other

    cs.CR cs.PL cs.SE

    Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing

    Authors: Bhargava Shastry, Federico Maggi, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert

    Abstract: Taint-style vulnerabilities comprise a majority of fuzzer discovered program faults. These vulnerabilities usually manifest as memory access violations caused by tainted program input. Although fuzzers have helped uncover a majority of taint-style vulnerabilities in software to date, they are limited by (i) extent of test coverage; and (ii) the availability of fuzzable test cases. Therefore, fuzzi… ▽ More

    Submitted 1 June, 2017; originally announced June 2017.

    Comments: 10 pages excl. bibliography

  5. arXiv:1704.02786  [pdf, other

    cs.CR

    Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery

    Authors: Tommi Unruh, Bhargava Shastry, Malte Skoruppa, Federico Maggi, Konrad Rieck, Jean-Pierre Seifert, Fabian Yamaguchi

    Abstract: The Web is replete with tutorial-style content on how to accomplish programming tasks. Unfortunately, even top-ranked tutorials suffer from severe security vulnerabilities, such as cross-site scripting (XSS), and SQL injection (SQLi). Assuming that these tutorials influence real-world software development, we hypothesize that code snippets from popular tutorials can be used to bootstrap vulnerabil… ▽ More

    Submitted 10 April, 2017; originally announced April 2017.

    Comments: 17+3 pages

  6. arXiv:1610.06022  [pdf, other

    cs.CR

    From Malware Signatures to Anti-Virus Assisted Attacks

    Authors: Christian Wressnegger, Kevin Freeman, Fabian Yamaguchi, Konrad Rieck

    Abstract: Although anti-virus software has significantly evolved over the last decade, classic signature matching based on byte patterns is still a prevalent concept for identifying security threats. Anti-virus signatures are a simple and fast detection mechanism that can complement more sophisticated analysis strategies. However, if signatures are not designed with care, they can turn from a defensive mech… ▽ More

    Submitted 19 October, 2016; originally announced October 2016.

  7. When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries

    Authors: Aylin Caliskan, Fabian Yamaguchi, Edwin Dauber, Richard Harang, Konrad Rieck, Rachel Greenstadt, Arvind Narayanan

    Abstract: The ability to identify authors of computer programs based on their coding style is a direct threat to the privacy and anonymity of programmers. While recent work found that source code can be attributed to authors with high accuracy, attribution of executable binaries appears to be much more difficult. Many distinguishing features present in source code, e.g. variable names, are removed in the co… ▽ More

    Submitted 17 December, 2017; v1 submitted 28 December, 2015; originally announced December 2015.

    Comments: 15 pages

  8. arXiv:1508.04627  [pdf, other

    cs.CR cs.PL

    Towards Vulnerability Discovery Using Staged Program Analysis

    Authors: Bhargava Shastry, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert

    Abstract: Eliminating vulnerabilities from low-level code is vital for securing software. Static analysis is a promising approach for discovering vulnerabilities since it can provide developers early feedback on the code they write. But, it presents multiple challenges not the least of which is understanding what makes a bug exploitable and conveying this information to the developer. In this paper, we pres… ▽ More

    Submitted 6 April, 2016; v1 submitted 19 August, 2015; originally announced August 2015.

    Comments: A revised version to appear in the proceedings of the 13th conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), July 2016

  9. arXiv:quant-ph/0603159  [pdf, ps, other

    quant-ph

    A naturally error suppressing quantum memory

    Authors: Fumiko Yamaguchi, Yoshihisa Yamamoto

    Abstract: We propose a method to construct quantum storage wherein the phase error due to decoherence is naturally suppressed without constant error detection and correction. As an example, we describe a quantum memory made of two physical qubits encoded in the ground state of a two-qubit phase-error detecting code. Such a system can be simulated by introducing a coupling between the two physical qubits.… ▽ More

    Submitted 17 March, 2006; originally announced March 2006.

  10. Quantum error correction via robust probe modes

    Authors: Fumiko Yamaguchi, Kae Nemoto, William J. Munro

    Abstract: We propose a new scheme for quantum error correction using robust continuous variable probe modes, rather than fragile ancilla qubits, to detect errors without destroying data qubits. The use of such probe modes reduces the required number of expensive qubits in error correction and allows efficient encoding, error detection and error correction. Moreover, the elimination of the need for direct… ▽ More

    Submitted 3 May, 2006; v1 submitted 9 November, 2005; originally announced November 2005.

    Comments: 5 pages, 3 figures

    Journal ref: Phys. Rev. A 73, 060302R (2006)

  11. Hybrid quantum repeater using bright coherent light

    Authors: P. van Loock, T. D. Ladd, K. Sanaka, F. Yamaguchi, Kae Nemoto, W. J. Munro, Y. Yamamoto

    Abstract: We describe a quantum repeater protocol for long-distance quantum communication. In this scheme, entanglement is created between qubits at intermediate stations of the channel by using a weak dispersive light-matter interaction and distributing the outgoing bright coherent light pulses among the stations. Noisy entangled pairs of electronic spin are then prepared with high success probability vi… ▽ More

    Submitted 22 June, 2006; v1 submitted 26 October, 2005; originally announced October 2005.

    Comments: title changed, final published version

    Journal ref: Phys. Rev. Lett. 96, 240501 (2006)

  12. arXiv:quant-ph/0411099  [pdf, ps, other

    quant-ph

    Efficient decoupling and recoupling in solid state NMR for quantum computation

    Authors: Fumiko Yamaguchi, Thaddeus D. Ladd, Cyrus P. Master, Yoshihisa Yamamoto, Navin Khaneja

    Abstract: A scheme for decoupling and selectively recoupling large networks of dipolar-coupled spins is proposed. The scheme relies on a combination of broadband, decoupling pulse sequences applied to all the nuclear spins with a band-selective pulse sequence for single spin rotations or recoupling. The evolution-time overhead required for selective coupling is independent of the number of spins, subject… ▽ More

    Submitted 15 November, 2004; originally announced November 2004.

    Comments: 10 pages, 4 figures

  13. Efficiency of free energy calculations of spin lattices by spectral quantum algorithms

    Authors: Cyrus P. Master, Fumiko Yamaguchi, Yoshihisa Yamamoto

    Abstract: Quantum algorithms are well-suited to calculate estimates of the energy spectra for spin lattice systems. These algorithms are based on the efficient calculation of the discrete Fourier components of the density of states. The efficiency of these algorithms in calculating the free energy per spin of general spin lattices to bounded error is examined. We find that the number of Fourier components… ▽ More

    Submitted 10 July, 2002; v1 submitted 15 June, 2002; originally announced June 2002.

    Comments: 9 pages, 4 figures; corrected typographical and minor mathematical errors

  14. Quantum Search with Two-atom Collisions in Cavity QED

    Authors: F. Yamaguchi, P. Milman, M. Brune, J. M. Raimond, S. Haroche

    Abstract: We propose a scheme to implement two-qubit Grover's quantum search algorithm using Cavity Quantum Electrodynamics. Circular Rydberg atoms are used as quantum bits (qubits). They interact with the electromagnetic field of a non-resonant cavity . The quantum gate dynamics is provided by a cavity-assisted collision, robust against decoherence processes. We present the detailed procedure and analyze… ▽ More

    Submitted 29 March, 2002; originally announced March 2002.

    Comments: 4 pages, 2 figures

  15. An all silicon quantum computer

    Authors: T. D. Ladd, J. R. Goldman, F. Yamaguchi, Y. Yamamoto, E. Abe, K. M. Itoh

    Abstract: A solid-state implementation of a quantum computer composed entirely of silicon is proposed. Qubits are Si-29 nuclear spins arranged as chains in a Si-28 (spin-0) matrix with Larmor frequencies separated by a large magnetic field gradient. No impurity dopants or electrical contacts are needed. Initialization is accomplished by optical pumping, algorithmic cooling, and pseudo-pure state technique… ▽ More

    Submitted 7 September, 2001; originally announced September 2001.

    Comments: ReVTeX 4, 5 pages, 2 figures

    Journal ref: Phys. Rev. Lett. 89, 017901 (2002)

  16. arXiv:quant-ph/0107084  [pdf, ps, other

    quant-ph cond-mat.mes-hall

    Electron Entanglement via a Quantum Dot

    Authors: William D. Oliver, F. Yamaguchi, Y. Yamamoto

    Abstract: This Letter presents a method of electron entanglement generation. The system under consideration is a single-level quantum dot with one input and two output leads. The leads are arranged such that the dot is empty, single electron tunneling is suppressed by energy conservation, and two-electron virtual co-tunneling is allowed. This yields a pure, non-local spin-singlet state at the output leads… ▽ More

    Submitted 16 July, 2001; originally announced July 2001.

    Comments: 4 pages

    Journal ref: PHYS REV LETT 88 (3): Art. No. 037901 JAN 21 2002

  17. arXiv:quant-ph/0009122  [pdf, ps, other

    quant-ph

    Quantum computation in a one-dimensional crystal lattice with NMR force microscopy

    Authors: T. D. Ladd, J. R. Goldman, A. Dana, F. Yamaguchi, Y. Yamamoto

    Abstract: A proposal for a scalable, solid-state implementation of a quantum computer is presented. Qubits are fluorine nuclear spins in a solid crystal of fluorapatite [Ca_5 F(PO_4)_3] with resonant frequencies separated by a large field gradient. Quantum logic is accomplished using nuclear-nuclear dipolar couplings with decoupling and selective recoupling RF pulse sequences. Magnetic resonance force mic… ▽ More

    Submitted 12 June, 2001; v1 submitted 28 September, 2000; originally announced September 2000.

    Comments: RevTeX, 5 pages, 3 figures Some small errors fixed

  18. arXiv:quant-ph/0005128  [pdf, ps, other

    quant-ph

    Concurrent Quantum Computation

    Authors: F. Yamaguchi, C. P. Master, Y. Yamamoto

    Abstract: A quantum computer is a multi-particle interferometer that comprises beam splitters at both ends and arms, where the n two-level particles undergo the interactions among them. The arms are designed so that relevant functions required to produce a computational result is stored in the phase shifts of the 2^n arms. They can be detected by interferometry that allows us to utilize quantum parallelis… ▽ More

    Submitted 31 May, 2000; originally announced May 2000.

    Comments: 12 pages, 1 table

  19. Efficient implementation of selective recoupling in heteronuclear spin systems using Hadamard matrices

    Authors: Debbie W. Leung, Isaac L. Chuang, Fumiko Yamaguchi, Yoshihisa Yamamoto

    Abstract: We present an efficient scheme which couples any designated pair of spins in heteronuclear spin systems. The scheme is based on the existence of Hadamard matrices. For a system of $n$ spins with pairwise coupling, the scheme concatenates $cn$ intervals of system evolution and uses at most $c n^2$ pulses where $c \approx 1$. Our results demonstrate that, in many systems, selective recoupling is p… ▽ More

    Submitted 28 April, 1999; originally announced April 1999.

    Comments: 7 pages, 4 figures, mypsfig2, revtex, submitted April 27, 1999

    Journal ref: Phys.Rev.A61:042310,2000