{"id":175771,"updated":"2025-01-20T06:07:40.160263+00:00","links":{},"created":"2025-01-19T00:45:30.436505+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00175771","sets":["6164:6165:6462:8948"]},"path":["8948"],"owner":"11","recid":"175771","title":["電波再帰反射攻撃の攻撃成立条件評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2016-10-04"},"_buckets":{"deposit":"99e0760b-82a4-4a7b-b8d4-dd7acb3e0cf1"},"_deposit":{"id":"175771","pid":{"type":"depid","value":"175771","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"電波再帰反射攻撃の攻撃成立条件評価","author_link":["367707","367703","367710","367709","367706","367705","367708","367704"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"電波再帰反射攻撃の攻撃成立条件評価"},{"subitem_title":"Empirical Study of the RF Retro-Reflector Attack","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"システム,電波再帰反射攻撃,サイドチャネル攻撃,ハードウェアトロイ,ハードウェアセキュリティ","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2016-10-04","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"早稲田大学"},{"subitem_text_value":"仙台高等専門学校"},{"subitem_text_value":"東北学院大"},{"subitem_text_value":"早稲田大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Waseda University","subitem_text_language":"en"},{"subitem_text_value":"Sendai Ko-sen","subitem_text_language":"en"},{"subitem_text_value":"Tohoku-Gakuin University","subitem_text_language":"en"},{"subitem_text_value":"Waseda University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/175771/files/IPSJCSS2016071.pdf","label":"IPSJCSS2016071.pdf"},"date":[{"dateType":"Available","dateValue":"2018-10-04"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2016071.pdf","filesize":[{"value":"3.1 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"edfb8fb1-3f12-4bde-a464-9ed55fb0c66f","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2016 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"星野, 遼"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"衣川, 昌宏"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"林, 優一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"森, 達哉"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Haruka, Hoshino","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masahiro, Kinugawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yu-ichi, Hayashi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tatsuya, Mori","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_18_relation_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_select":"NCID","subitem_relation_type_id_text":"ISSN 1882-0840"}}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"電波再帰反射攻撃 (RFRA : RF Retroreflector Attack) はサイドチャネル攻撃の一種である.攻撃者がハードウェアトロイが埋め込まれた標的デバイスに電波を照射すると,デバイス内の信号で変調された反射波が外部に漏えいする.その反射波を受信・復調することによってデバイス内の信号を遠隔から読み取る攻撃が成立する.しかし RFRA がどのような条件下で成立するかは未解決の問題であった.本研究の目的は,RFRA の攻撃成立条件を実験的な手法で明らかにすることである.攻撃成立条件として,攻撃者と標的との距離,照射電波強度,標的信号の周波数に着目し,攻撃の成功度合への影響を調査する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"RF retroreflector attack (RFRA) is a side-channel attack that aims to leak the target's internal signals by irradiating radio frequency to the targeted device. There have been few studies that presented the basic mechanism of RFRA and demonstrated the success of attack, to the best of our knowledge, the conditions for successful attack have not been studied so far. This work aims to empirically study the conditions for successful RFRA. As the conditions for successful attack, we studied the distance between attacker and target, power of illuminating RF, and the frequencies of the target signal.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"473","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2016論文集"}],"bibliographicPageStart":"466","bibliographicIssueDates":{"bibliographicIssueDate":"2016-10-04","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2016"}]},"relation_version_is_last":true,"weko_creator_id":"11"}}