{"updated":"2025-01-21T11:17:57.411940+00:00","links":{},"id":101299,"created":"2025-01-18T23:46:55.529530+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00101299","sets":["1164:3925:7477:7588"]},"path":["7588"],"owner":"11","recid":"101299","title":["電子文書型マルウェアからシェルコードを抽出する方法の提案"],"pubdate":{"attribute_name":"公開日","attribute_value":"2014-05-15"},"_buckets":{"deposit":"28b0dd42-320d-4582-b7e7-18da090810f5"},"_deposit":{"id":"101299","pid":{"type":"depid","value":"101299","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"電子文書型マルウェアからシェルコードを抽出する方法の提案","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"電子文書型マルウェアからシェルコードを抽出する方法の提案"},{"subitem_title":"Proposal for Shellcode Extraction from Malicious Document File","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"プライバシ・マルウェア","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2014-05-15","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"株式会社セキュアブレイン先端技術研究所/信州大学大学院総合工学系研究科"},{"subitem_text_value":"独立行政法人情報通信研究機構/株式会社セキュアブレイン先端技術研究所"},{"subitem_text_value":"独立行政法人情報通信研究機構"},{"subitem_text_value":"独立行政法人情報通信研究機構"},{"subitem_text_value":"独立行政法人情報通信研究機構"},{"subitem_text_value":"独立行政法人情報通信研究機構"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Advanced Research Laboratory, SecureBrain Corporation / Interdisciplinary Graduate School of Science and Technology, Shinshu University","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Information and Communications Technology / Advanced Research Laboratory, SecureBrain Corporation","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Information and Communications Technology","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Information and Communications Technology","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Information and Communications Technology","subitem_text_language":"en"},{"subitem_text_value":"National Institute of Information and Communications Technology","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/101299/files/IPSJ-CSEC14065013.pdf"},"date":[{"dateType":"Available","dateValue":"2016-05-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC14065013.pdf","filesize":[{"value":"816.7 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"f015a606-6a2f-4b68-b062-52ce25db1bd8","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2014 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"岩本, 一樹"},{"creatorName":"神薗, 雅紀"},{"creatorName":"津田, 侑"},{"creatorName":"遠峰, 隆史"},{"creatorName":"井上, 大介"},{"creatorName":"中尾, 康二"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kazuki, Iwamoto","creatorNameLang":"en"},{"creatorName":"Masaki, Kamizono","creatorNameLang":"en"},{"creatorName":"Yu, Tsuda","creatorNameLang":"en"},{"creatorName":"Takashi, Tomine","creatorNameLang":"en"},{"creatorName":"Daisuke, Inoue","creatorNameLang":"en"},{"creatorName":"Koji, Nakao","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"アプリケーションの脆弱性を攻撃する電子文書型マルウェアを動的に解析するためには,該当する脆弱性をもつアプリケーションを準備する必要がある.しかし脆弱性の種類を特定することは困難な場合があり,またアプリケーションが入手できない可能性もある.一方,脆弱性を攻撃した後に動作する不正なプログラム (シェルコード) は脆弱性やアプリケーションに関係なく独立して動作することが多い.そこで本研究では脆弱性の種類を特定することなく,またアプリケーションが無くても電子文書型マルウェアの動的解析が行えるようにするために,電子文書型マルウェアに含まれるシェルコードを特定して実行する方法を提案する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The following document is an analysis of malicious documents which exploit vulnerability in applications dynamically, the application must have appropriate vulnerability. Therefore, we have to analyze the document statically to identify the type of vulnerability. Moreover it is difficult to identify unknown vulnerability, and the application may not be available even if we could identify the type of vulnerability. However malicious code which is executed after exploiting does not have relation with vulnerability in many cases. In this paper, we propose a method to extract and execute shellcode for analyzing malicious documents without identification of vulnerability and application.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2014-05-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"13","bibliographicVolumeNumber":"2014-CSEC-65"}]},"relation_version_is_last":true,"weko_creator_id":"11"}}