<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-04-21T20:44:04Z</responseDate>
  <request verb="GetRecord" metadataPrefix="jpcoar_1.0" identifier="oai:ipsj.ixsq.nii.ac.jp:00106624">https://ipsj.ixsq.nii.ac.jp/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:ipsj.ixsq.nii.ac.jp:00106624</identifier>
        <datestamp>2025-01-21T09:24:08Z</datestamp>
        <setSpec>6164:6165:6462:7729</setSpec>
      </header>
      <metadata>
        <jpcoar:jpcoar xmlns:datacite="https://schema.datacite.org/meta/kernel-4/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcndl="http://ndl.go.jp/dcndl/terms/" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:jpcoar="https://github.com/JPCOAR/schema/blob/master/1.0/" xmlns:oaire="http://namespace.openaire.eu/schema/oaire/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:rioxxterms="http://www.rioxx.net/schema/v2.0/rioxxterms/" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns="https://github.com/JPCOAR/schema/blob/master/1.0/" xsi:schemaLocation="https://github.com/JPCOAR/schema/blob/master/1.0/jpcoar_scm.xsd">
          <dc:title>メモリ破損攻撃への対策技術の調査と分類</dc:title>
          <dc:title xml:lang="en">A Survey of Prevention/Mitigation Against Memory Corruption Attacks</dc:title>
          <jpcoar:creator>
            <jpcoar:creatorName>齋藤, 孝道</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>鈴木, 舞音</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>上原, 崇史</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>金子, 洋平</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>角田, 佳史</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>馬場, 隆彰</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Takamichi, Saito</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Maine, Suzuki</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Takafumi, Uehara</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Yohei, Kaneko</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Yoshifumi, Sumida</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Takaaki, Baba</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:subject subjectScheme="Other">メモリ破損，対策</jpcoar:subject>
          <datacite:description descriptionType="Other">ソフトウエアのメモリ破損脆弱性を悪用する攻撃，いわゆる，メモリ破損攻撃が次々と登場し問題となっている．メモリ破損攻撃とは，メモリ破損脆弱性のあるプログラムの制御フローを攻撃者の意図する動作に変えることである．一般的には，Buffer Overflow攻撃とも呼ばれている．OSやコンパイラでの防御・攻撃緩和機能が開発されてはいるが，それらを回避する更なる攻撃も登場している．そこで，本論文では，メモリ破損脆弱性の分類を行い，制御フローを不正に書き換えるまでの攻撃に関して調査し，分類する．</datacite:description>
          <datacite:description descriptionType="Other">It has become a serious problem that the number of attacks that exploits memory corruption vulnerability in software is increased. Protection/mitigation technologies against it in OS or with compilers have been developed, but further attacks have been appeared to bypass them. In this paper, we survey to classify protection or mitigation technologies against memory corruption vulnerabilities in OS or with compilers.</datacite:description>
          <dc:publisher xml:lang="ja">情報処理学会</dc:publisher>
          <datacite:date dateType="Issued">2014-10-15</datacite:date>
          <dc:language>jpn</dc:language>
          <dc:type rdf:resource="http://purl.org/coar/resource_type/c_5794">conference paper</dc:type>
          <jpcoar:identifier identifierType="URI">https://ipsj.ixsq.nii.ac.jp/records/106624</jpcoar:identifier>
          <jpcoar:sourceTitle>コンピュータセキュリティシンポジウム2014論文集</jpcoar:sourceTitle>
          <jpcoar:volume>2014</jpcoar:volume>
          <jpcoar:issue>2</jpcoar:issue>
          <jpcoar:pageStart>775</jpcoar:pageStart>
          <jpcoar:pageEnd>782</jpcoar:pageEnd>
          <jpcoar:file>
            <jpcoar:URI>https://ipsj.ixsq.nii.ac.jp/record/106624/files/IPSJCSS2014101.pdf</jpcoar:URI>
            <jpcoar:mimeType>application/pdf</jpcoar:mimeType>
            <jpcoar:extent>394.9 kB</jpcoar:extent>
            <datacite:date dateType="Available">2016-10-15</datacite:date>
          </jpcoar:file>
        </jpcoar:jpcoar>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
