{"id":175716,"updated":"2025-01-20T06:09:48.461516+00:00","links":{},"created":"2025-01-19T00:45:27.429569+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00175716","sets":["6164:6165:6462:8948"]},"path":["8948"],"owner":"11","recid":"175716","title":["アンチフォレンジック機能に対するメモリフォレンジックツールの有効性検証"],"pubdate":{"attribute_name":"公開日","attribute_value":"2016-10-04"},"_buckets":{"deposit":"8def3c03-8379-4ef3-a291-425954292f05"},"_deposit":{"id":"175716","pid":{"type":"depid","value":"175716","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"アンチフォレンジック機能に対するメモリフォレンジックツールの有効性検証","author_link":["367322","367325","367323","367324"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"アンチフォレンジック機能に対するメモリフォレンジックツールの有効性検証"},{"subitem_title":"Evaluation of the Effectiveness of Memory Forensics Tools under the Influence of Anti-Forensic Malwares","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"memory forensics","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2016-10-04","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"情報セキュリティ大学院大学"},{"subitem_text_value":"情報セキュリティ大学院大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"IISEC","subitem_text_language":"en"},{"subitem_text_value":"IISEC","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/175716/files/IPSJCSS2016016.pdf","label":"IPSJCSS2016016.pdf"},"date":[{"dateType":"Available","dateValue":"2018-10-04"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2016016.pdf","filesize":[{"value":"458.7 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"434e5cb3-8b8c-4031-8bcc-77ac201327f8","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2016 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"田中, 郁夫"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"橋本, 正樹"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Ikuo, Tanaka","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masaki, Hashimoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_18_relation_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_select":"NCID","subitem_relation_type_id_text":"ISSN 1882-0840"}}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"デジタルフォレンジックは従来のディスクフォレンジックだけでなく,メモリフォレンジックの重要度が高くなっている.しかし,マルウェアの種類によっては,メモリフォレンジックを妨害する機能を有し,メモリ上のデータ取得を妨害している状況があるため,今現在,フォレンジックを実施する現場で実際に使用されているメモリフォレンジックツールの有効性が懸念される.そのため,アンチフォレンジック技術の対策状況について,現場で使用されているメモリフォレンジックツールを実際にマルウェアを実行させた環境で使用し検証する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Digital forensics comes to have high importance of memory forensics as well as conventional disc forensics. However, the effectiveness of memory forensics tools which is really used on the site carrying out forensics as of now is concerned about because there is the situation interfering with the data acquisition on the memory having a function to interfere with memory forensics depending on a kind of the malware. Therefore I use used memory forensics tools on the site in the environment that let you really carry out malware and, about the measures situation of the anti forensics technology, inspect it.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"105","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2016論文集"}],"bibliographicPageStart":"100","bibliographicIssueDates":{"bibliographicIssueDate":"2016-10-04","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2016"}]},"relation_version_is_last":true,"weko_creator_id":"11"}}