{"updated":"2025-01-21T09:24:06.668613+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00106623","sets":["6164:6165:6462:7729"]},"path":["7729"],"owner":"11","recid":"106623","title":["メモリ破損脆弱性に対する攻撃の調査と分類"],"pubdate":{"attribute_name":"公開日","attribute_value":"2014-10-15"},"_buckets":{"deposit":"2fb8894e-9cac-4f18-b123-f79a94d0d17f"},"_deposit":{"id":"106623","pid":{"type":"depid","value":"106623","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"メモリ破損脆弱性に対する攻撃の調査と分類","author_link":["13107","13109","13102","13105","13110","13104","13111","13103","13113","13108","13112","13106"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"メモリ破損脆弱性に対する攻撃の調査と分類"},{"subitem_title":"A Survey of Attacks Against Memory Corruption Vulnerabilities","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"メモリ破損,攻撃","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2014-10-15","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"明治大学大学院"},{"subitem_text_value":"明治大学大学院"},{"subitem_text_value":"明治大学大学院"},{"subitem_text_value":"明治大学大学院"},{"subitem_text_value":"明治大学"},{"subitem_text_value":"明治大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Meiji University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Meiji University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Meiji University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Meiji University","subitem_text_language":"en"},{"subitem_text_value":"Meiji University","subitem_text_language":"en"},{"subitem_text_value":"Meiji University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/106623/files/IPSJCSS2014100.pdf"},"date":[{"dateType":"Available","dateValue":"2016-10-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2014100.pdf","filesize":[{"value":"676.5 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"163a1fe3-a9ab-4346-8c6b-f0ddcaedeb4b","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2014 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"鈴木, 舞音"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"上原, 崇史"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"金子, 洋平"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"堀, 洋輔"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"馬場, 隆彰"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"齋藤, 孝道"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Maine, SUZUKI","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takafumi, UEHARA","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yohei, KANEKO","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yosuke, HORI","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takaaki, BABA","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takamichi, SAITO","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"ソフトウエアのメモリ破損脆弱性を悪用する攻撃,いわゆる,メモリ破損攻撃が次々と登場し問題となっている.メモリ破損攻撃とは,メモリ破損脆弱性のあるプログラムの制御フローを攻撃者の意図する動作に変えることである.一般的には,Buffer Overflow攻撃とも呼ばれている.OSやコンパイラでの防御・攻撃緩和機能が開発されてはいるが,それらを回避する更なる攻撃も登場している.そこで,本論文では,メモリ破損脆弱性の分類を行い,制御フローを不正に書き換えるまでの攻撃に関して調査し,分類する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"It has become a serious problem that the number of attacks that exploits memory corruption vulnerability in software is increased. Protection/mitigation technologies against it in OS or with compilers have been developed, but further attacks to avoid them have been appeared. In this paper, we survey to classify the memory corruption vulnerabilities, and their attacks.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"774","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2014論文集"}],"bibliographicPageStart":"767","bibliographicIssueDates":{"bibliographicIssueDate":"2014-10-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2014"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"created":"2025-01-18T23:49:59.726446+00:00","id":106623,"links":{}}