{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00106624","sets":["6164:6165:6462:7729"]},"path":["7729"],"owner":"11","recid":"106624","title":["メモリ破損攻撃への対策技術の調査と分類"],"pubdate":{"attribute_name":"公開日","attribute_value":"2014-10-15"},"_buckets":{"deposit":"0f11e554-9b3e-458b-b272-e6364286d5fc"},"_deposit":{"id":"106624","pid":{"type":"depid","value":"106624","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"メモリ破損攻撃への対策技術の調査と分類","author_link":["13122","13115","13125","13117","13124","13118","13123","13119","13120","13114","13116","13121"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"メモリ破損攻撃への対策技術の調査と分類"},{"subitem_title":"A Survey of Prevention/Mitigation Against Memory Corruption Attacks","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"メモリ破損,対策","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2014-10-15","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"明治大学"},{"subitem_text_value":"明治大学大学院"},{"subitem_text_value":"明治大学大学院"},{"subitem_text_value":"明治大学大学院"},{"subitem_text_value":"明治大学大学院"},{"subitem_text_value":"明治大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Meiji University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Meiji University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Meiji University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Meiji University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Meiji University","subitem_text_language":"en"},{"subitem_text_value":"Meiji University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/106624/files/IPSJCSS2014101.pdf"},"date":[{"dateType":"Available","dateValue":"2016-10-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2014101.pdf","filesize":[{"value":"394.9 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"90312ace-4d69-4e13-8b8b-2694a09d23a0","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2014 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"齋藤, 孝道"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"鈴木, 舞音"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"上原, 崇史"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"金子, 洋平"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"角田, 佳史"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"馬場, 隆彰"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Takamichi, Saito","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Maine, Suzuki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takafumi, Uehara","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yohei, Kaneko","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yoshifumi, Sumida","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takaaki, Baba","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"ソフトウエアのメモリ破損脆弱性を悪用する攻撃,いわゆる,メモリ破損攻撃が次々と登場し問題となっている.メモリ破損攻撃とは,メモリ破損脆弱性のあるプログラムの制御フローを攻撃者の意図する動作に変えることである.一般的には,Buffer Overflow攻撃とも呼ばれている.OSやコンパイラでの防御・攻撃緩和機能が開発されてはいるが,それらを回避する更なる攻撃も登場している.そこで,本論文では,メモリ破損脆弱性の分類を行い,制御フローを不正に書き換えるまでの攻撃に関して調査し,分類する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"It has become a serious problem that the number of attacks that exploits memory corruption vulnerability in software is increased. Protection/mitigation technologies against it in OS or with compilers have been developed, but further attacks have been appeared to bypass them. In this paper, we survey to classify protection or mitigation technologies against memory corruption vulnerabilities in OS or with compilers.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"782","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2014論文集"}],"bibliographicPageStart":"775","bibliographicIssueDates":{"bibliographicIssueDate":"2014-10-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2014"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":106624,"updated":"2025-01-21T09:24:08.849808+00:00","links":{},"created":"2025-01-18T23:49:59.775454+00:00"}