Skip to main content

Showing 1–8 of 8 results for author: Yamaguchi, F

Searching in archive cs. Search in all archives.
.
  1. Scalable Language Agnostic Taint Tracking using Explicit Data Dependencies

    Authors: Sedick David Baker Effendi, Xavier Pinho, Andrei Michael Dreyer, Fabian Yamaguchi

    Abstract: Taint analysis using explicit whole-program data-dependence graphs is powerful for vulnerability discovery but faces two major challenges. First, accurately modeling taint propagation through calls to external library procedures requires extensive manual annotations, which becomes impractical for large ecosystems. Second, the sheer size of whole-program graph representations leads to serious scala… ▽ More

    Submitted 6 June, 2025; originally announced June 2025.

    Comments: 9 pages including appendix, SOAP'25

    ACM Class: D.2.4

  2. arXiv:2310.00673  [pdf, other

    cs.LG cs.CR

    Learning Type Inference for Enhanced Dataflow Analysis

    Authors: Lukas Seidel, Sedick David Baker Effendi, Xavier Pinho, Konrad Rieck, Brink van der Merwe, Fabian Yamaguchi

    Abstract: Statically analyzing dynamically-typed code is a challenging endeavor, as even seemingly trivial tasks such as determining the targets of procedure calls are non-trivial without knowing the types of objects at compile time. Addressing this challenge, gradual typing is increasingly added to dynamically-typed languages, a prominent example being TypeScript that introduces static typing to JavaScript… ▽ More

    Submitted 4 October, 2023; v1 submitted 1 October, 2023; originally announced October 2023.

    Comments: - fixed last author's name - fixed header

    Journal ref: 28th European Symposium on Research in Computer Security (ESORICS) 2023

  3. arXiv:2211.04972  [pdf, ps, other

    cs.RO

    Hibikino-Musashi@Home 2018 Team Description Paper

    Authors: Yutaro Ishida, Sansei Hori, Yuichiro Tanaka, Yuma Yoshimoto, Kouhei Hashimoto, Gouki Iwamoto, Yoshiya Aratani, Kenya Yamashita, Shinya Ishimoto, Kyosuke Hitaka, Fumiaki Yamaguchi, Ryuhei Miyoshi, Kentaro Honda, Yushi Abe, Yoshitaka Kato, Takashi Morie, Hakaru Tamukoh

    Abstract: Our team, Hibikino-Musashi@Home (the shortened name is HMA), was founded in 2010. It is based in the Kitakyushu Science and Research Park, Japan. We have participated in the RoboCup@Home Japan open competition open platform league every year since 2010. Moreover, we participated in the RoboCup 2017 Nagoya as open platform league and domestic standard platform league teams. Currently, the Hibikino-… ▽ More

    Submitted 9 November, 2022; originally announced November 2022.

    Comments: 8 pages, 5 figures, RoboCup@Home

  4. arXiv:1706.00206  [pdf, ps, other

    cs.CR cs.PL cs.SE

    Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing

    Authors: Bhargava Shastry, Federico Maggi, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert

    Abstract: Taint-style vulnerabilities comprise a majority of fuzzer discovered program faults. These vulnerabilities usually manifest as memory access violations caused by tainted program input. Although fuzzers have helped uncover a majority of taint-style vulnerabilities in software to date, they are limited by (i) extent of test coverage; and (ii) the availability of fuzzable test cases. Therefore, fuzzi… ▽ More

    Submitted 1 June, 2017; originally announced June 2017.

    Comments: 10 pages excl. bibliography

  5. arXiv:1704.02786  [pdf, other

    cs.CR

    Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery

    Authors: Tommi Unruh, Bhargava Shastry, Malte Skoruppa, Federico Maggi, Konrad Rieck, Jean-Pierre Seifert, Fabian Yamaguchi

    Abstract: The Web is replete with tutorial-style content on how to accomplish programming tasks. Unfortunately, even top-ranked tutorials suffer from severe security vulnerabilities, such as cross-site scripting (XSS), and SQL injection (SQLi). Assuming that these tutorials influence real-world software development, we hypothesize that code snippets from popular tutorials can be used to bootstrap vulnerabil… ▽ More

    Submitted 10 April, 2017; originally announced April 2017.

    Comments: 17+3 pages

  6. arXiv:1610.06022  [pdf, other

    cs.CR

    From Malware Signatures to Anti-Virus Assisted Attacks

    Authors: Christian Wressnegger, Kevin Freeman, Fabian Yamaguchi, Konrad Rieck

    Abstract: Although anti-virus software has significantly evolved over the last decade, classic signature matching based on byte patterns is still a prevalent concept for identifying security threats. Anti-virus signatures are a simple and fast detection mechanism that can complement more sophisticated analysis strategies. However, if signatures are not designed with care, they can turn from a defensive mech… ▽ More

    Submitted 19 October, 2016; originally announced October 2016.

  7. When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries

    Authors: Aylin Caliskan, Fabian Yamaguchi, Edwin Dauber, Richard Harang, Konrad Rieck, Rachel Greenstadt, Arvind Narayanan

    Abstract: The ability to identify authors of computer programs based on their coding style is a direct threat to the privacy and anonymity of programmers. While recent work found that source code can be attributed to authors with high accuracy, attribution of executable binaries appears to be much more difficult. Many distinguishing features present in source code, e.g. variable names, are removed in the co… ▽ More

    Submitted 17 December, 2017; v1 submitted 28 December, 2015; originally announced December 2015.

    Comments: 15 pages

  8. arXiv:1508.04627  [pdf, other

    cs.CR cs.PL

    Towards Vulnerability Discovery Using Staged Program Analysis

    Authors: Bhargava Shastry, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert

    Abstract: Eliminating vulnerabilities from low-level code is vital for securing software. Static analysis is a promising approach for discovering vulnerabilities since it can provide developers early feedback on the code they write. But, it presents multiple challenges not the least of which is understanding what makes a bug exploitable and conveying this information to the developer. In this paper, we pres… ▽ More

    Submitted 6 April, 2016; v1 submitted 19 August, 2015; originally announced August 2015.

    Comments: A revised version to appear in the proceedings of the 13th conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), July 2016