<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-04-11T11:06:23Z</responseDate>
  <request identifier="oai:ipsj.ixsq.nii.ac.jp:00175770" metadataPrefix="jpcoar_1.0" verb="GetRecord">https://ipsj.ixsq.nii.ac.jp/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:ipsj.ixsq.nii.ac.jp:00175770</identifier>
        <datestamp>2025-01-20T06:07:39Z</datestamp>
        <setSpec>6164:6165:6462:8948</setSpec>
      </header>
      <metadata>
        <jpcoar:jpcoar xmlns:datacite="https://schema.datacite.org/meta/kernel-4/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcndl="http://ndl.go.jp/dcndl/terms/" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:jpcoar="https://github.com/JPCOAR/schema/blob/master/1.0/" xmlns:oaire="http://namespace.openaire.eu/schema/oaire/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:rioxxterms="http://www.rioxx.net/schema/v2.0/rioxxterms/" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns="https://github.com/JPCOAR/schema/blob/master/1.0/" xsi:schemaLocation="https://github.com/JPCOAR/schema/blob/master/1.0/jpcoar_scm.xsd">
          <dc:title>Trojan of Things: モノに埋め込まれた悪性NFCタグがもたらす脅威の評価</dc:title>
          <dc:title xml:lang="en">Trojan of Things: Understanding the Threats of Malicious NFC Tags Embedded in the Things</dc:title>
          <jpcoar:creator>
            <jpcoar:creatorName>丸山, 誠太</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>星野, 遼</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>森, 達哉</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Seita, Maruyama</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Haruka, Hoshino</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Tatuya, Mori</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:subject subjectScheme="Other">システム，NFC，Android，Trojan of Things</jpcoar:subject>
          <datacite:description descriptionType="Other">NFC タグと呼ばれる小型機器にスマートフォンをかざすだけで，スマートフォンの様々な機能を利用できる．NFC の通信可能距離の短さゆえ，ユーザの意思に反してスマートフォンが NFC タグが近接してしまう危険性はこれまで十分に論じられてこなかった．しかし，NFC タグが私達の身の回りのモノに埋め込まれていた場合はどうであろうか．本論文では Trojan of Things という新たな脅威を定義し，その具体例として，貨幣型トロイ，ウェアラブルトロイ，家具型トロイなる新しい概念の攻撃が実現可能であることを示す．さらに，NFC が提供するユーザビリティを損なう事なく攻撃を防ぐ手段を提案する．</datacite:description>
          <datacite:description descriptionType="Other">Due to the limitation of short-range wireless communication of NFC technology, not much security threats and their countermeasures have been discussed so far. However, what will happen if maliciously programmed NFC tags are embedded into things around our lives? This work proposes a new proof-of-concept attack called "Trojan of Things". As concrete examples of the Trojan of Things, we implement three different types of attacks. We demonstrate these attacks are feasible in real world. We also evaluate the conditions of the successful attacks using 18 different models of smartphones. We also present countermeasures without sacrificing the usability of NFC tags.</datacite:description>
          <dc:publisher xml:lang="ja">情報処理学会</dc:publisher>
          <datacite:date dateType="Issued">2016-10-04</datacite:date>
          <dc:language>jpn</dc:language>
          <dc:type rdf:resource="http://purl.org/coar/resource_type/c_5794">conference paper</dc:type>
          <jpcoar:identifier identifierType="URI">https://ipsj.ixsq.nii.ac.jp/records/175770</jpcoar:identifier>
          <jpcoar:relation>
            <jpcoar:relatedIdentifier identifierType="NCID">ISSN　1882-0840</jpcoar:relatedIdentifier>
          </jpcoar:relation>
          <jpcoar:sourceTitle>コンピュータセキュリティシンポジウム2016論文集</jpcoar:sourceTitle>
          <jpcoar:volume>2016</jpcoar:volume>
          <jpcoar:issue>2</jpcoar:issue>
          <jpcoar:pageStart>458</jpcoar:pageStart>
          <jpcoar:pageEnd>465</jpcoar:pageEnd>
          <jpcoar:file>
            <jpcoar:URI label="IPSJCSS2016070.pdf">https://ipsj.ixsq.nii.ac.jp/record/175770/files/IPSJCSS2016070.pdf</jpcoar:URI>
            <jpcoar:mimeType>application/pdf</jpcoar:mimeType>
            <jpcoar:extent>2.7 MB</jpcoar:extent>
            <datacite:date dateType="Available">2018-10-04</datacite:date>
          </jpcoar:file>
        </jpcoar:jpcoar>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
