{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00106635","sets":["6164:6165:6462:7729"]},"path":["7729"],"owner":"11","recid":"106635","title":["静的解析と挙動観測による金融系マルウェアの攻撃手法の調査"],"pubdate":{"attribute_name":"公開日","attribute_value":"2014-10-15"},"_buckets":{"deposit":"6cba3f11-3a30-49e9-b954-5cd7614e96a4"},"_deposit":{"id":"106635","pid":{"type":"depid","value":"106635","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"静的解析と挙動観測による金融系マルウェアの攻撃手法の調査","author_link":["13182","13193","13187","13189","13184","13190","13185","13192","13183","13188","13186","13191"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"静的解析と挙動観測による金融系マルウェアの攻撃手法の調査"},{"subitem_title":"Research on Attack Methods of Online Banking Malware Based on Static Analysis and Behavior Observation","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"マルウェア,静的解析,挙動観測,MITB,インターネットバンキング","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2014-10-15","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"株式会社セキュアブレイン先端技術研究所"},{"subitem_text_value":"株式会社セキュアブレイン先端技術研究所"},{"subitem_text_value":"株式会社セキュアブレイン 先端技術研究所"},{"subitem_text_value":"株式会社セキュアブレイン先端技術研究所"},{"subitem_text_value":"株式会社セキュアブレイン先端技術研究所"},{"subitem_text_value":"株式会社セキュアブレイン先端技術研究所"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Advanced Research Laboratory, SecureBrain Corporation","subitem_text_language":"en"},{"subitem_text_value":"Advanced Research Laboratory, SecureBrain Corporation","subitem_text_language":"en"},{"subitem_text_value":"Advanced Research Laboratory, SecureBrain Corporation","subitem_text_language":"en"},{"subitem_text_value":"Advanced Research Laboratory, SecureBrain Corporation","subitem_text_language":"en"},{"subitem_text_value":"Advanced Research Laboratory, SecureBrain Corporation","subitem_text_language":"en"},{"subitem_text_value":"Advanced Research Laboratory, SecureBrain Corporation","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/106635/files/IPSJCSS2014112.pdf"},"date":[{"dateType":"Available","dateValue":"2016-10-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2014112.pdf","filesize":[{"value":"526.3 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"0ea320a0-95bc-4f62-ba5c-de49733ebb11","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2014 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"西田, 雅太"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"太刀川, 剛"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"岩本, 一樹"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"遠藤, 基"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"奥村, 吉生"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"星澤, 裕二"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Masata, Nishida","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tsuyoshi, Tachikawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kazuki, Iwamoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Motoi, Endo","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yoshio, Okumura","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yuji, Hoshizawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"近年,金融機関の利用者を攻撃対象としたマルウェアによる被害が急増している.これらのマルウェアは,自身の挙動を変化させるために設定情報を動的に外部から取得する.このため,マルウェアの攻撃対象や攻撃手法を知るためには,マルウェア本体の解析のみならず設定情報の入手と解析が必要となる.本稿では,金融機関の利用者を攻撃対象とする代表的なマルウェアの実行コードと設定情報を静的解析し,その攻撃手法を調査する.また当該検体を一定期間動作させ設定情報の変化を観測する.これらの調査により,金融機関の利用者に対する攻撃がマルウェア本体だけでなく,変化する設定情報を利用した複雑な枠組みで構成されることを示す.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The incidence of online banking malware has been increasing. These malware would obtain configuration settings from C&C servers and change their own behavior based on those settings. To understand a malware's attack methods and targets, we would need to analyze not just the malware on its own but also its corresponding configuration. In this paper, we will analyze an online banking malware and its configuration. We will also observe this malware's behavior to know more about the configuration changes. Based on this analysis, we can then show the complexity of an online banking malware's attack framework.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"866","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2014論文集"}],"bibliographicPageStart":"859","bibliographicIssueDates":{"bibliographicIssueDate":"2014-10-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2014"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"updated":"2025-01-21T09:24:33.599539+00:00","created":"2025-01-18T23:50:00.324632+00:00","links":{},"id":106635}