Kazuki Iwamoto's Resource
English
(17th August,2025 last updated)
Profile
Amateur Radio
- Call Sign
- JE2HIM
- Since
- 26th November,1992
- Transmitter
- IC-2330 (144MHz,430MHz),SB3
Academic background
- 2015 Docter of Engineering, the Course of Depertment of Mathematics and System Development in the Interdisciplinary Graduate School of Science and Technology, Shinshu University
- 2008 Master of Engineering, the Course of Information Engineering in the Division of Science and Technology, Master's Program, in the Graduate School, Shinshu University
- 1998 Department of Information Sciences, Tokyo Denki University
- 1994 Shizuoka Prefectural Shizuoka High School (The department of common, Full-time schooling system)
License
- International Driving Permit A
- International Driving Permit B
- International Driving Permit C
- International Driving Permit D
- International Driving Permit E
- Permit of Boat's Operator (1st Class)
- Permit of Boat's Operator (Personal Water Craft)
- On-the-Ground II-Category Special Radio Operator
- Maritime II-Category Special Radio Operator
- Amateur Fourth-Class Radio Operator
- Grade A Gunpowder Handling Safety Person in Charge
- Hazardous Materials Officer Grade B Category 1
- Hazardous Materials Officer Grade B Category 2
- Hazardous Materials Officer Grade B Category 3
- Hazardous Materials Officer Grade B Category 4
- Hazardous Materials Officer Grade B Category 5
- Hazardous Materials Officer Grade B Category 6
- Toxic substance and Highly poisonous substance Handling Person
Qualification
- Registered Information Security Specialist
- Applied Information Technology Engineer
- The 2nd class Graphic Information Skill Official Approval CG Section
- The 2nd class Timetable Official Approval
- Disaster Prevention Expert
Education
- Compact vehicle construction equipment (for leveling, transporting, loading, and excavating)
Prefectures Score
Research
Main Author
Journal
- Kazuki Iwamoto, Katsumi Wasaki : The Method for Shellcode Extraction from Malicious Document File Using Entropy and Emulation ; Journal of Information Processing, Vol.56, No.3, pp.892-902, (2015).
- Kazuki Iwamoto, Katsumi Wasaki : Malware Classification Based on Extracted API Sequence by Static Analysis ; Journal of Information Processing, Vol.54, No.3, pp.1199-1210, (2013).
International Conference
Symposium, Report
- Kazuki Iwamoto : Verification of NCD-based clustering for extracting information to disable IoT malware ; IPSJ SIG Technical Report, Vol.2022-CSEC-98, No.11, pp.1-7, (2022).
- Kazuki Iwamoto : Survey of False-Positive by Antivirus Software and Proposal of the Countermeasures ; Proceedings of Computer Security Symposium 2018, Vol.2018, No.2, pp.577-584, (2018).
- Kazuki, Iwamoto, Kazuki Takada, Yu Tsuda, Takashi, Tomine, Daisuke, Inoue : Survey Analysis of Anti Virtual Machine Functions in Malicious Software ; Proceedings of Computer Security Symposium 2017, Vol.2017, No.2, (2017).
- Kazuki Iwamoto, Masaki Kamizono, Yu Tsuda, Takashi Tomine, Daisuke Inoue, Koji Nakao : Proposal for Shellcode Extraction from Malicious Document File ; IPSJ SIG Technical Report, Vol.2014-CSEC-65, No.13, pp.1-6,(2014).
- Kazuki Iwamoto, Masata Nishida, Katsumi Wasaki : Proposal for Automated Method to Narrow Down to Suspicious Android Application by Comparing Control Flow Graph ; IPSJ SIG Technical Report, Vol.2013-CSEC-63, No.2, pp.1-7, (2013).
- Kazuki Iwamoto, Masata Nishida, Katsumi Wasaki : Evaluation of Android Malware Detection Method without Code Analysis ; IPSJ SIG Technical Report, Vol.2013-CSEC-62, No.60, pp.1-8, (2013).
- Kazuki Iwamoto, Katsumi Wasaki : Detection Method for Android Malware by comparing Control Flow Graphs ; IPSJ SIG Technical Report, Vol.2013-CSEC-61, No.5, pp.1-8, (2013).
- Kazuki Iwamoto, Katsumi Wasaki : Detection Method for Android Malware by using Control Flow Analysis ; Proceedings of Computer Security Symposium 2011, Vol.2011, No.3, pp.714-719, (2011).
- Kazuki Iwamoto, Katsumi Wasaki : Detecting Original Entry Point based on Comparing Runtime Library Codes in Malware Unpacking ; IEICE Technical Report (ICSS2011-10), Vol.111, No.81, pp.57-62, (2011).
- Kazuki Iwamoto, Katsumi Wasaki : Investigation on Results of Malware Classification based on the Static Analysis ; "Proceedings of Multimedia, Distributed, Cooperative, and Mobile Symposium (DICOMO2010)", Information Processing Society of Japan, pp.477-491, (2010).
- Kazuki Iwamoto, Katsumi Wasaki : API Sequence Extraction and Cluster Analysis for Malware Codes based on the Static Analysis ; Proceedings of Computer Security Symposium 2009, Vol.2009, pp.1-6, (2009).
- Kazuki Iwamoto, Katsumi Wasaki : A Classification and Static Analysis for Malware Codes based on the Call Graph and the Control Flow ; "Proceedings of Multimedia, Distributed, Cooperative, and Mobile Symposium (DICOMO2008)", Information Processing Society of Japan, pp.1-14, (2008).
- Kazuki Iwamoto, Katsumi Wasaki : Classification and feature extraction by using computer virus static analysis ; IEICE Technical Report ( ISEC2007-127 ), Vol.107, No.397, pp.107-113, (2007).
Co Author
Journal
- Koji NAKAO, Katsunari YOSHIOKA, Takayuki SASAKI, Rui TANABE, Xuping HUANG, Takeshi TAKAHASHI, Akira FUJITA, Jun'ichi TAKEUCHI, Noboru MURATA, Junji SHIKATA, Kazuki IWAMOTO, Kazuki TAKADA, Yuki ISHIDA, Masaru TAKEUCHI, Naoto YANAI : "Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware" ; IEICE Transactions on Information and Systems, Vol.E106.D, No.9, pp.1302-1315, (2023).
- Kazuki Takada, Kazuki Iwamoto, Motoi Endo, Yoshio Okumura, Kouichirou Okada, Masata Nishida, Katsunari Yoshioka, Tsutomu Matsumoto : Proposal of Long-term Observation Method of Financial Malware Combining Static Analysis and Behavior Observation ; Journal of Information Processing, Vol. 59, No.12, pp.2087-2104, (2018).
International Conference
Symposium, Report
- Shu Akabane, Chansu Han, Kazuki Iwamoto, Ryoichi Isawa, TakeshiI Takahashi, Daisuke Inoue : Identification of user-defined functions based on function call sequence ; IPSJ SIG Technical Report, Vol.2024-CSEC-104, No.24, pp.1-8, (2024).
- Kazuki Takada, Kazuo Makishima, Kazuki Iwamoto, Katsunari Yoshioka : Attack trend analysis of IoT malware based on surface and dynamic analysis ; Proceedings of Computer Security Symposium 2023, pp.1317-1324, (2023).
- Takeshi Misu, Kazuki Iwamoto, Yoshio Okumura, Kazuki Takada, Katsunari Yoshioka : IoT Malware Static Analysis for Automated Extraction of Disabling Information ; Symposium on Cryptography and Information Security 2021, Session 2B1-2, (2021).
- Takao Mimura, Shun Umemoto, Jun Nakajima, Kazuo Makishima, Kazuki Iwamoto : A Report of Tracing Potentially Risky Apps by Using the Framework for Monitoring Web-Based Attacks Targeting Smartphone ; Proceedings of Computer Security Symposium 2020, pp.65-72, (2020).
- Takeshi Misu, Kazuki Iwamoto, Kazuki Takada, Katsunari Yoshioka : Automated Extraction of Kill Commands for Disabling IoT Malware ; Proceedings of Computer Security Symposium 2019, Vol.2019, pp.1321-1328, (2019).
- Takao Mimura, Kazuo Makishima, Kazuki Iwamoto : A Study of Web Pages Distributing Android Applications Shared in Twitter and Consideration of a Detecting Method ; Proceedings of Computer Security Symposium 2019, Vol.2019, pp.1148-1155, (2019).
- Takeshi Misu, Kazuo Makishima, Kazuki Iwamoto : A Study on Detection of Malicious JavaScript Based on Source Code Similarity ; Proceedings of Computer Security Symposium 2018, Vol.2018, No.2, pp.1148-1153, (2018).
- Takao Mimura, Kazuo Makishima, Kazuki Iwamoto : A Study of Android Applications Shared in Social Network Services ; Proceedings of Computer Security Symposium 2018, Vol.2018, No.2, pp.113-120, (2018).
- Takeshi Misu, Kazuo Makishima, Kouichirou Okada, Kazuki Iwamoto : A Study on Classification of Malicious JavaScript Based on Source Code Similarity ; Proceedings of Computer Security Symposium 2017, Vol.2017, No.2, (2017).
- Kazuki Takada, Kazuki Iwamoto, Yu Tsuda, Takashi Tomine, Daisuke Inoue : Development of Dynamic Analysis Tool that Avoid of Anti Virtual Machine Function on Malicious Software ; Proceedings of Computer Security Symposium 2017, Vol.2017, No.2, (2017).
- Masata Nishida, Tsuyoshi Tachikawa, Kazuki Iwamoto, Motoi Endo, Yoshio Okumura, Yuji Hoshizawa : Research on Attack Methods of Online Banking Malware Based on Static Analysis and Behavior Observation ; Proceedings of Computer Security Symposium 2014, Vol.2014, No.2, pp.859-866, (2014).
- Masata Nishida, Kazuki Iwamoto, Yuji Hoshizawa : Induction of Sending Private Information Based on Function Distance in Android Application Bytecode ; Proceedings of Computer Security Symposium 2013, Vol.2013, No.4, pp.216-223, (2013).
- Masato Terada, Kazuki Iwamoto, Motoi Endo, Nozomi Matsuzaka, Hideaki Kobayashi : Feasibility study of Observable Expression for Cyber Attack Countermeasure ; Proceedings of Computer Security Symposium 2012, Vol.2012, No.3, pp.238-245, (2012).
Addressiwm@maid.org