{"updated":"2025-01-20T05:05:53.165959+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00178500","sets":["1164:3925:9071:9132"]},"path":["9132"],"owner":"11","recid":"178500","title":["マルウェアのスリープ挙動の多様性に関する予備調査"],"pubdate":{"attribute_name":"公開日","attribute_value":"2017-02-23"},"_buckets":{"deposit":"5602a977-717b-47d3-881f-4e8dab9ab1a1"},"_deposit":{"id":"178500","pid":{"type":"depid","value":"178500","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"マルウェアのスリープ挙動の多様性に関する予備調査","author_link":["382535","382536"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"マルウェアのスリープ挙動の多様性に関する予備調査"},{"subitem_title":"Preliminary Investigation on Diversity of Sleep Behavior of Malware","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"マルウェア","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2017-02-23","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"筑波大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"University of Tsukuba","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/178500/files/IPSJ-CSEC17076015.pdf","label":"IPSJ-CSEC17076015.pdf"},"date":[{"dateType":"Available","dateValue":"2019-02-23"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSEC17076015.pdf","filesize":[{"value":"906.0 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"5c5a0f1d-9fa2-4274-be35-d37d6ec799e7","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2017 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"大山, 恵弘"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yoshihiro, Oyama","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8655","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"マルウェアは様々な目的でスリープを実行する.その目的には,資源消費速度の制御,攻撃開始までの潜伏,動的解析の妨害が含まれる.著者は,スリープ挙動がマルウェア間でどの程度異なるかを理解し,その知見をマルウェアの検知や分類に応用することを目指している.本稿では,長時間のスリープを実行するマルウェアの動的解析ログからスリープ挙動に関する特徴を抽出し,その特徴に基いてマルウェアを分類した予備調査について報告する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Malware sleeps for various purposes, which include controlling resource consumption speeds, staying dormant until the time of attacks, and thwarting dynamic analysis. The author aims to understand the diversity of sleep behavior between malware programs and then apply the finding to detection and classification of malware. This paper reports preliminary investigation in which the author extracted features of sleep behavior from a dynamic analysis log of malware programs that execute long sleeps, and classified the programs based on the features.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"8","bibliographic_titles":[{"bibliographic_title":"研究報告コンピュータセキュリティ(CSEC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2017-02-23","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"15","bibliographicVolumeNumber":"2017-CSEC-76"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"created":"2025-01-19T00:47:50.634674+00:00","id":178500,"links":{}}