<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-04-16T12:02:36Z</responseDate>
  <request verb="GetRecord" metadataPrefix="jpcoar_1.0" identifier="oai:ipsj.ixsq.nii.ac.jp:00240904">https://ipsj.ixsq.nii.ac.jp/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:ipsj.ixsq.nii.ac.jp:00240904</identifier>
        <datestamp>2025-03-06T05:56:08Z</datestamp>
        <setSpec>6164:6165:6462:11854</setSpec>
      </header>
      <metadata>
        <jpcoar:jpcoar xmlns:datacite="https://schema.datacite.org/meta/kernel-4/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcndl="http://ndl.go.jp/dcndl/terms/" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:jpcoar="https://github.com/JPCOAR/schema/blob/master/1.0/" xmlns:oaire="http://namespace.openaire.eu/schema/oaire/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:rioxxterms="http://www.rioxx.net/schema/v2.0/rioxxterms/" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns="https://github.com/JPCOAR/schema/blob/master/1.0/" xsi:schemaLocation="https://github.com/JPCOAR/schema/blob/master/1.0/jpcoar_scm.xsd">
          <dc:title xml:lang="ja">シンボリック実行の動作ログを用いたマルウェアの耐解析機能無効化手法の提案</dc:title>
          <dc:title xml:lang="en">Disabling Malware Anti-Analysis Functions by Using Symbolic Execution Operation Logs</dc:title>
          <jpcoar:creator>
            <jpcoar:creatorName>田口, 涼将</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>福澤, 寧子</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Ryosuke, Taguchi</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Yasuko, Fukuzawa</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:subject subjectScheme="Other">マルウェア解析，シンボリック実行，パッチ生成，耐解析機能</jpcoar:subject>
          <datacite:description descriptionType="Other">動的解析はマルウェア解析における有効な手段の一つである．しかし，昨今のマルウェアの多くは解析者やセキュリティ製品による動的解析を妨害するために耐解析機能を実装している．耐解析機能にはデバッガや仮想環境の検知のほか，時間差の検知，マウス・キーボード操作など人間の動作を元にした検知など数多くの手法が存在する．このような環境下では解析ツールが有効に機能せず，マルウェアの動作情報を収集することができない．本稿では，プログラムの値をシンボル（記号）として制約条件に着目しながら模擬的に実行するシンボリック実行の動作ログから，耐解析機能における検知条件を抽出し，その条件から耐解析機能を無効化するためのパッチを生成し，マルウェアに適用する．まず，耐解析機能のPoC(Proof of Concept)であるAl-khaserの32-bit・64-bit検体を対象に，シンボリック実行適用とパッチの有効性を評価，および特徴の分析を行う．次に，疑似マルウェアおよび実際のマルウェア検体に対してもパッチを生成・適用し，本方式の有用性を評価する．</datacite:description>
          <datacite:description descriptionType="Other">Dynamic analysis is one of the effective tools in malware analysis. However, many of today's malware implement anti-analysis functions to prevent dynamic analysis by analysts and security products. There are many methods for anti-analysis functions, including detection of debuggers and virtual environments, time difference detection, and detection based on human actions such as mouse and keyboard operations. These functions prevent analysis tools from functioning effectively and collecting information about malware behavior. In this paper, we extract detection conditions for the anti-analysis function from symbolic execution operation logs, which simulate program values as symbols while focusing on constraint conditions, generate patches to disable the anti-analysis function based on these conditions, and apply them to malware. First, we evaluate the effectiveness of symbolic execution and patches for 32-bit and 64-bit samples of Al-khaser, a Proof of Concept (PoC) of the anti-analysis function. Next, we will generate and apply patches to pseudo-malware and actual malware samples to evaluate the usefulness of this method.</datacite:description>
          <dc:publisher xml:lang="ja">情報処理学会</dc:publisher>
          <datacite:date dateType="Issued">2024-10-15</datacite:date>
          <dc:language>jpn</dc:language>
          <dc:type rdf:resource="http://purl.org/coar/resource_type/c_5794">conference paper</dc:type>
          <jpcoar:identifier identifierType="URI">https://ipsj.ixsq.nii.ac.jp/records/240904</jpcoar:identifier>
          <jpcoar:sourceTitle>コンピュータセキュリティシンポジウム2024論文集</jpcoar:sourceTitle>
          <jpcoar:pageStart>1180</jpcoar:pageStart>
          <jpcoar:pageEnd>1187</jpcoar:pageEnd>
          <jpcoar:file>
            <jpcoar:URI label="IPSJ-CSS2024158.pdf">https://ipsj.ixsq.nii.ac.jp/record/240904/files/IPSJ-CSS2024158.pdf</jpcoar:URI>
            <jpcoar:mimeType>application/pdf</jpcoar:mimeType>
            <jpcoar:extent>834.9 kB</jpcoar:extent>
            <datacite:date dateType="Available">2026-10-15</datacite:date>
          </jpcoar:file>
        </jpcoar:jpcoar>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
